Cybercrime Logo

 

 

 NYLS Cybercrime.AdvancedStudies.Org

 

RESEARCH PAPER

Cybercrime, Cyberterrorism, and Digital Law Enforcement
NYLS CRI150 SPRING 2009
Professor K. A. Taipale (bio) (contact)


Registered Students login to NYLS Portal for updated Course Information and Reading Assignments.



Research Paper

Topic Selection: Research papers will involve independent research based on a current topic of your choice (subject to my prior approval) directly relating to legal or policy issues covered by this course (that is, any topic covered on the Cybercrime Web page except IP).

Paper Format: The research paper should be double-spaced with standard margins using 12-pt. Times New Roman or similar font. Bluebook format should be followed and footnotes (not endnotes) should be used for citations. Please include a title page with both your name and exam number. There is no set length requirement provided you sufficiently cover your topic. Papers in the past have ranged from 12-25 pages. I would suggest that 15-20 is probably the right target for most topics. I will generally not read more than 25 pages.

Grading: There is no precise formula for grading papers, however, novelty, non-obviousness, utility, and soundness of your analysis as well as the quality and organization of your writing will be rewarded.

For good advice on everything from picking a topic to writing your paper, see Eugene Volokh, Writing a Student Article, 48 J. LEGAL EDUC. 247 (1998).  

SUGGESTED READING:

Eugene Volokh, Writing a Student Article, 48 J. Legal Educ. 247 (1998).

Eugene Volokh, ACADEMIC LEGAL WRITING: Law Review Articles, Student Notes, Seminar Papers, and Getting on Law Review, Second Edition (Foundation Press 2004) (ISBN:158778792X).

 


Registered Students login to NYLS Portal for updated Reading Assignments.



 

Course Outline/Class Units

Registererd NYLS students login to my.nyls.edu for updated outline and assignments.

  1. Overview, What is Cybercrime?
  2. Computer Intrusions and Attacks (Unauthorized Access)
  3. Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
  4. Online Fraud and Identity Theft; Intellectual Property Theft; Virtual Crime
  5. Online Vice: Gambling; Pornography; Child Exploitation
  6. International Aspects and Jurisdiction
  7. Infrastructure and Information Security; Risk Management
  8. Investigating Cybercrime: Digital Evidence and Computer Forensics
  9. Interception, Search and Seizure, and Surveillance
  10. Information Warfare, Cyberterrorism, and Hacktivism
  11. Terrorism, Radicalization, and The War of Ideas
  12. Trade Secret Theft and Economic Espionage
  13. National Security
  14. Case Study: CALEA, VoIP

Course Information

  1. PAPER RESEARCH
  2. USEFUL LINKS FOR DEFINING TECHNICAL TERMS
  3. COURSE SUBTEXT AND OPTIONAL BACKGROUND MATERIAL

 


Registered Students login to NYLS Portal for updated Reading Assignments.


All original material on this or any linked page is copyright the Center for Advanced Studies in Science and Technology Policy © 2003-2009. Permission is granted to reproduce this material in whole or in part for non-commercial purposes, provided it is with proper citation and attribution.

 

 NYLS Logo