• عربي
  • 中文
  • English
  • Français
  • Русский
  • Español
 
  This module is a resource for lecturers  

 

Possible class structure

 

The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers can adapt the structure based on their needs and class times.

Introduction and learning outcomes

Lecture  (10 minutes):

  • Provide a brief introduction to the class and its contents
  • Identify and discuss the learning outcomes of the class
 

Offences against the confidentiality, integrity and availability of computer data and systems

Lecture  (40 minutes):

  • Discuss and critically evaluate this category of cybercrime and the cybercrimes included within this category.

[ Optional: Have students complete the group exercise, " Exercise # 2: Cybercrime cases" before class and have them discuss their findings during this lecture and/or any of the lectures after this lecture. Students can either hand in a one to three-page summary of their findings or come prepared to discuss their findings in class].

[ Optional: Ask students to complete " Homework # 2: Were any cybercrimes not covered?" before class and have them discuss their findings during this lecture and/or any of the lectures afterwards. You can ask the students the question in this exercise here and/or in any (or all) of the sessions below. Students can either hand in a one to three-page summary of their findings or come prepared to discuss their findings in class].

 

Computer-related offences

Lecture  (50 minutes):

  • Discuss and critically evaluate this category of cybercrime and the cybercrimes included within this category

Case Study Discussion  (30 minutes):

 

Break

Time:  10 minutes

 

Content-related offences

Lecture  (40 minutes):

  • Discuss and critically evaluate this category of cybercrime and the cybercrimes included within this category

[ Optional: Instruct students to complete " Homework # 1: Where does spam belong?" before class and have them discuss their findings during the lecture. Students can either hand in a one to three-page summary of their findings or come prepared to discuss their findings in class].

 
Next: Core reading
Back to top