Registered Students login to NYLS Portal for updated Course Information and Reading Assignments.
Research Paper
Topic Selection: Research papers will involve independent research based on a current topic of your choice (subject to my prior approval) directly relating to legal or policy issues covered by this course (that is, any topic covered on the Cybercrime Web page except IP).
Paper Format: The research paper should be double-spaced with standard margins using 12-pt. Times New Roman or similar font. Bluebook format should be followed and footnotes (not endnotes) should be used for citations. Please include a title page with both your name and exam number.
There is no set length requirement provided you sufficiently cover your topic. Papers in the past have ranged from 12-25 pages. I would suggest that 15-20 is probably the right target for most topics. I will generally not read more than 25 pages.
Grading: There is no precise formula for grading papers, however, novelty, non-obviousness, utility, and soundness of your analysis as well as the quality and organization of your writing will be rewarded.
For good advice on everything from picking a topic to writing your paper, see Eugene Volokh, Writing a Student Article, 48 J. LEGAL EDUC. 247 (1998).
SUGGESTED READING:
Eugene Volokh, Writing a Student Article, 48 J. Legal Educ. 247 (1998).
Eugene Volokh, ACADEMIC LEGAL WRITING: Law Review Articles, Student Notes, Seminar Papers, and Getting on Law Review, Second Edition (Foundation Press 2004) (ISBN:158778792X).
Registered Students login to NYLS Portal for updated Reading Assignments.
Course Outline/Class Units
Registererd NYLS students login to my.nyls.edu for updated outline and assignments.
- Overview, What is Cybercrime?
- Computer Intrusions and Attacks (Unauthorized Access)
- Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
- Online Fraud and Identity Theft; Intellectual Property Theft; Virtual Crime
- Online Vice: Gambling; Pornography; Child Exploitation
- International Aspects and Jurisdiction
- Infrastructure and Information Security; Risk Management
- Investigating Cybercrime: Digital Evidence and Computer Forensics
- Interception, Search and Seizure, and Surveillance
- Information Warfare, Cyberterrorism, and Hacktivism
- Terrorism, Radicalization, and The War of Ideas
- Trade Secret Theft and Economic Espionage
- National Security
- Case Study: CALEA, VoIP
Course Information
- PAPER RESEARCH
- USEFUL LINKS FOR DEFINING TECHNICAL TERMS
- COURSE SUBTEXT AND OPTIONAL BACKGROUND MATERIAL
Registered Students login to NYLS Portal for updated Reading Assignments.
All original material on this or any linked page is copyright the Center for Advanced Studies in Science and Technology Policy © 2003-2009. Permission is granted to reproduce this material in whole or in part for non-commercial purposes, provided it is with proper citation and attribution.
|