|
Academic staff member responsible for the design of the course syllabus
(name, surname, academic title/scientific degree, email address and signature)
|
Dr. Gentjan Skara gskara@epoka.edu.al
|
|
Main Course Lecturer (name, surname, academic title/scientific degree, email address
and signature) and Office Hours:
|
Dr. Gentjan Skara gskara@epoka.edu.al
|
|
Second Course Lecturer(s) (name, surname, academic title/scientific degree, email
address and signature) and Office Hours:
|
NA
|
| Language: |
English
|
| Compulsory/Elective: |
Elective
|
| Study program: (the study for which this course is offered) |
Integrated second cycle study program in Law
|
| Classroom and Meeting Time: |
Thursday: 12:40-16:30, D 204
|
| Teaching Assistant(s) and Office Hours: |
NA
|
| Code of Ethics: |
Code of Ethics of EPOKA University
Regulation of EPOKA University "On Student Discipline"
|
| Attendance Requirement: |
Elective
|
| Course Description: |
The course is part of the field of criminal law. The course elaborates on the main directions of the development of cybercrime and further develops students' knowledge about the contemporary issues of applying criminal responsibility to forms of cybercrime. This course will address the legal issues that arise for discussion in the practice of criminal justice bodies and law enforcement agency employees when dealing with various forms of cybercrime. Special attention has been paid to the presentation of specific techniques for the identification and investigation of computer crime. The transmission of knowledge is done in a gradual manner through the explanation of essential concepts, conveying of theoretical knowledge and reference to the legal provisions applicable to the criminal actions in question.
|
| Course Objectives: |
The course aims for students to identify computer crimes, what are the first electronic evidence in the sense of material criminal law and criminal procedural law and correctly explain money laundering law. The purpose of this course is to develop methodologies in analyzing and documenting cybercrimes. The course also provides coverage of topics such as intellectual property infringement, security risks, cybercrime, identity theft, employee surveillance, privacy and compliance. While analyzing these topics the student will gain decision-making skills for business managers and professionals.
|
|
BASIC CONCEPTS OF THE COURSE
|
| 1 |
Cybercrime
|
| 2 |
Cybertrespass
|
| 3 |
Hacking
|
| 4 |
Malware
|
| 5 |
Cyberviolence
|
| 6 |
Cyberpornography
|
| 7 |
Cyberfraud
|
| 8 |
Cyberterrorism
|
| 9 |
Cybervictimization
|
| 10 |
Cybercriminology
|
| Week |
Topics |
| 1 |
Introduction to Cybercrime This week provides a brief overview of the internet and cybercrime. Moreover, the lecturer explains transnational crimes on the internet and the current state of cybercrime development. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 1. |
| 2 |
International development of Cybercrime This week focuses on two main international conventions: the Budapest Convention and the United Nations Convention against Cybercrime. This week aims to provide a legal understanding of the international regulatory framework of cybercrime. Literature: 1) Budapest Convention; 2) United Nations Convention against Cybercrime. |
| 3 |
Cybertrespass This week focuses on Cybertrespass, which refers to the unauthorised access to the computer systems of other persons. In this class, we will discuss owners’ rights in the digital area. Additionally, the lecture will provide an example of the cybertrespass process. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 2. |
| 4 |
Hacking and Malware The lecturer will focus on the types of hackers and explain the types of crimes of cybertrespass. Moreover, the lecture will discuss the function of malware and guide how to prevent it. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 2. |
| 5 |
Cyber violence This lecturer focuses on cyberviolence, which is manifested mainly in three forms: a) Cyberbullying, b) cyberstalking, and c) hate speech. By examining real case examples, we will discuss the legal framework and highlight the importance of addressing cyberviolence. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 4. |
| 6 |
Cyberpornography This week focuses on cyberpornography. As a first step, we will discuss the definition of cyberpornography. Then, the lecturer will explain cases of sexual deviances in online space and discus pornography consumption in online space. Additionally, the lecturer will focus on the need to legislate pornography in the digital environment. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 3. |
| 7 |
Mid term exam |
| 8 |
Cyberfraud This lecturer focuses on cyberfraud, which encompasses the concepts of cyberdeception and cybertheft. In this lecture, we will explain the types of cyberfraud and discuss how they occur. To gain a better understanding, real case scenarios will be discussed in class. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 5. |
| 9 |
Policing the digital experience This week focuses on the policing the digital experience. We will discuss the role of police work associated with cybercrime. Firstly, we will discuss the practice and process of digital forensic analysis. Secondly, we will focus on investigating data trails, which refer to the data in the form of text, audio, and video that a suspect or victim has left behind. Finally, the lesson will provide some online undercover investigations. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 6. |
| 10 |
Organised CyberCrimes and State Crime This lesson focuses on cybercrimes and state crimes. Recently, many organised crimes have shifted their activity in the digital environment, either by committing cybercrimes or more commonly using digital technologies to help facilitate crimes they have traditionally committed offline (racketeering, sex trafficking, gambling, prostitution). In this lecture, we will focus less on traditional organised crime groups and more on describing the structure and practices of organised crime groups that originated specifically to commit cybercrimes. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 7. |
| 11 |
Cyberterrorism This lesson focuses on cyberterrorism. It discusses terrorist groups’ attacks motivated by religious or political ideologies that can commit crimes and potentially harm citizens through cyber-attacks. Additionally, the lesson analyses the types of modern cyberterrorism and methods of countering cyberterrorism. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 7. |
| 12 |
Algorithm, AI and Big Data This lecturer explains how the criminal justice system utilises big data, algorithms, and artificial intelligence to investigate and prosecute crimes. Recently, the police, courts, and correctional institutions have begun to adopt algorithms and Big Data, promising a more efficient and impartial means of achieving their institutional goals. Nevertheless, these new technologies are not beyond criticism. Civil Society Organisations question the use of algorithms and allege that they are violating civil liberties and can be biased against minority groups. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 8. |
| 13 |
Cybervictimization With the proliferation of Internet usage over the past years, the phenomenon of cybervictimization has appeared. Young people, the elderly, and populations of specific vulnerability are particularly prone to victimisation experiences online. This week illustrates real cases of cybervictimization. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 9. |
| 14 |
Cybercriminology This week focuses on cybercriminology, which is the study of crime as it relates to computers and the internet, focusing on how offences are committed, who commits them, and their impact on society. In this lecture, we will discuss two aspects. Firstly, the lecturer discusses how computers can serve as tools for committing a crime, the medium through which communication occurs, or both, influencing the nature of the offence. Secondly, it analyses how computers facilitate or create barriers between offenders and their victims, affecting the execution of cybercrime. Literature: Roderick S Graham and Shawn K Smith, Cybercrime and Digital Deviance (2nd edition, Routledge 2024), chapter 10. |
| No |
Program Competencies |
Cont. |
| Integrated second cycle study program in Law Program |
| 1 |
Fitimi dhe përdorimi i njohurive të avancuara në fushën e drejtësisë dhe jurisprudencës, mbështetur në tekstet mësimore, materialet dhe burimet e tjera shkencore. |
5 |
| 2 |
Fitimi i njohurive rreth çështjeve dhe problematikave të fushës së drejtësisë, së bashku me analizën e aspekteve historike, shoqërore e politike. |
5 |
| 3 |
Fitimi i njohurive rreth organizimit të shtetit. |
5 |
| 4 |
Fitimi i njohurive rreth kapaciteteve të analizës lidhur me konceptet dhe ndarjet kryesore të degëve të së drejtës. |
5 |
| 5 |
Përmirësimi i aftësive për të punuar së bashku me disiplinat kryesore të shkencave sociale dhe disiplinat e tjera të cilat janë të lidhura me drejtësinë. |
4 |
| 6 |
Fitimi i njohurive rreth drejtësisë duke përthithur terminologjinë profesionale të fushës. |
5 |
| 7 |
Përcaktimi i ngjarjeve dhe temave komplekse, nëpërmjet zhvillimit të diskutimeve dhe bërjes së sugjerimeve të reja në përputhje me hulumtimet e fushës. |
5 |
| 8 |
Fitimi i aftësive në përdorimin e programeve kompjuterike dhe të teknologjisë së informacionit me qëllim arritjen e qasjes në dijen aktuale. |
3 |
| 9 |
Përmirësimi i të menduarit kritik dhe aftësive në kryerjen e hulumtimit në mënyrë të pavarur. |
5 |
| 10 |
Fitimi i njohurive për të folur në një gjuhë të huaj në një nivel të mjaftueshëm për të komunikuar me kolegët dhe për të kuptuar zhvillimet bashkëkohore në fushën e drejtësisë dhe të jurisprudencës. |
5 |
| 11 |
Fitimi i aftësive për të respektuar vlerat shoqërore, shkencore dhe etike gjatë mbledhjes dhe interpretimit të të dhënave që kanë të bëjnë me zhvillimet shoqërore dhe atyre në drejtësi. |
5 |
| 12 |
Ndërgjegjësimi në lidhje me rëndësinë e të drejtave të njeriut dhe mjedisit. |
5 |