Lecturer(s)
|
-
Melotíková Petra, Mgr. Ph.D.
-
Červínek Zdeněk, JUDr. Ph.D.
-
Frumarová Kateřina, doc. JUDr. Ph.D.
-
Tomoszek Maxim, JUDr. Ph.D.
-
Ščerba Filip, doc. JUDr. Ph.D.
|
Course content
|
1. Cybersecurity - State and Individual 2. The use of digital technologies by the security forces of the state 3. Cybercrime - economic 4. Cybercrime - information 5. Cybercrime - other 6. Digital technologies in the criminal process
|
Learning activities and teaching methods
|
Monologic Lecture(Interpretation, Training), Dialogic Lecture (Discussion, Dialog, Brainstorming)
|
Learning outcomes
|
Course objectives: Public Law and Digital Technologies 4 concludes the course on public regulation of digital technologies by focusing on issues of cyber security and crime. In this course, students will be introduced to legal issues related to the security risks associated with the use (or misuse) of digital technologies. Attention will first be given to the topic of cybersecurity and the relationship between the state and the individual in this area, including with respect to the use of digital technologies by state security forces. The second part of the course will focus on cybercrime and specific segments of crime (economic, information), where digital technologies are intensively used and where their legal regulation can represent an important preventive tool. Students will examine the existing legal regulation in the field of cyber security and cybercrime and will evaluate it in terms of fulfilling the basic principles of digital technology regulation and in terms of the degree of achievement of the pursued public interests, but also in terms of its effectiveness and its implementation by security forces. The course will also lead students to develop competencies such as critical thinking, problem solving, information literacy, research and analysis, written and oral communication, and global learning so that they can independently identify and solve problems arising from continuous technical innovation through creative approaches based on high expertise. The course will also respond flexibly to rapid developments in the field and offer students analysis and discussion of current challenges and trends. Within each topic, students will analyse practical issues arising in the application of cyber security and cybercrime legislation and their impact on different regulated areas of human activity. The teaching in this course will be divided into 6 seminars, which will be devoted to the following main topics: 1. Cybersecurity - State and Individual 2. The use of digital technologies by the security forces of the state 3. Cybercrime - economic 4. Cybercrime - information 5. Cybercrime - other 6. Digital technologies in the criminal process By completing this course, students will gain knowledge of the criminal and security framework of digital technology regulation, be able to define the basic principles, distinguish the basic tools of regulation, identify threats and find solutions for specific cases. In addition, they will acquire the skill of analytical work with legislation, case law and policy documents. Evaluation To successfully complete the course, students will be required to complete the following learning requirements: - drafting, submitting and presenting two essays on seminar topics. - active participation in the class.
By completing the course, students will gain knowledge of the criminal and security framework of digital technology regulation, be able to define the basic principles, distinguish the basic tools of regulation, identify threats and find solutions for specific cases. In addition, they will acquire the skill of analytical work with legislation, case law and policy documents.
|
Prerequisites
|
Completion of this course is contingent upon completion of the course Legal Theory of Information Technology 1 and 2 Information Technology for Law and Legal Science 1 and 2 Public Law and Digital Technologies 1 - 3
MEP/TLTT1 and MEP/TLTT2 and MEP/TIT1 and MEP/TIT2 and VPK/TVPD1 and VPK/TVPD2 and VPK/TVPD3
|
Assessment methods and criteria
|
Student performance
Active participation of the student in seminars, preparation of a semester project and its oral defence are required. Full-time students must attend at least 80% of the seminars, while combined students must attend 50% of the seminars and one individual consultation.
|
Recommended literature
|
-
A Europe fit for the digital age: Empowering people with a new generation of technologies. European Commission. https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age_en.
-
GILLESPIE, A., A. (2019). Cybercrime: Key Issues and Debates. Routledge.
-
Going Digital: Shaping Policies, Improving Lives. (2019). https://www.oecd-ilibrary.org/science-and-technology/going-digital-shaping-policies-improving-lives_9789264312012-en. OECD.
-
HOLT, T., J, BOSSLER, A., M. (eds.). (2020). The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave MacMillan.
-
Informační koncepce České republiky. Dostupné z:. Informační koncepce České republiky. Dostupné z:.
-
KREMILING, J., SHARP PARKER, M., A. (2017). Cyberspace, Cybersecurity, and Cybercrime.. SAGE Publications.
-
LUKINGS, M., HABIBI LASHKARI, A. (2021). Understanding Cybersecurity Law and Digital Privacy: A Common Law Perspective. Springer.
-
PORCEDDA, M., G. (2023). Cybersecurity, Privacy and Data Protection in EU Law: A Law, Policy and Technology Analysis.. Hart Publishing.
-
UN SECRETARY GENERAL´S STRATEGY ON NEW TECHNOLOGIES United Nations, 2018. (2018). UN SECRETARY GENERAL´S STRATEGY ON NEW TECHNOLOGIES. United Nations, 2018.
-
WAGNER, B., KETTEMANN, C., M., VIETH, K., (eds). (2019). Research Handbook on Human Rights and Digital Technology: Global Politics, Law and International Relations. Edward Elgar Publishing.
-
WINTER, L., B., RUGGERI, S. (eds.). (2022). Investigating and Preventing Crime in the Digital Era: New Safeguards, New Rights. Springer.
|