Law School Module Details |
The information contained in this module specification was correct at the time of publication but may be subject to change, either during the session because of unforeseen circumstances, or following review of the module at the end of the session. Queries about the module should be directed to the member of staff with responsibility for the module. |
Title | INFORMATION SECURITY | ||
Code | LLAW114 | ||
Coordinator |
Dr J Zrilic Law J.Zrilic@liverpool.ac.uk |
||
Year | CATS Level | Semester | CATS Value |
Session 2021-22 | Level 7 FHEQ | Whole Session | 15 |
Aims |
|
As the Internet and communication technologies become an integral part of social, cultural and commercial activity, individuals, organisations, industry and policymakers are having to address the information security threats posed by criminals, computer viruses and malicious software. This Module aims to equip the student with the opportunities, skills and resources which can be used to through introduce the student to examine some of the key governance challenges that the Internet, in particular poses for trust and security in the global networked environment. By the end of this module the student will be able to: Demonstrate an awareness of the nature of information security and the governance challenges they pose to stakeholders; |
Learning Outcomes |
|
(LO1) This module aims to develop the student’s understanding of the nature of Information Security; The Module covers some of the most common computer security threats encountered by individuals, organisations and society generally, the technological and legal solutions and the evolving global initiatives which attempt to address the problems. Each topic comprises of structured reading materials, exercises designed to test your understanding of the key concepts and ability to apply these to a given problem. The materials chosen for each topic draw on a range of sources, and include case law and legislation from the United Kingdom,. As Information Security is a global phenomenon, there will be comparative material drawn from the European Union, Council of Europe, United States, and the Commonwealth. The syllabus covers an introduction to Information Security Threats; Cryptography; E-Signatures; The legal response to information Security Threats in the UK, EU, US and Australia ; Standard Setting in Information Security; Information Security in Corporations and the Workplace. |
|
(LO2) You will be provided with opportunities to work individually and participate in on-line discussion on many of the policy, technological and legal questions raised by new technologies. The Module begins with a consideration of the technological setting for many of the public policy debates and issues, and thereafter proceeds to explore the substantive issues raised by applying law to the chosen fields of study. The Module concludes with your submission of a research assignment based on the topics covered during the course of study. |
|
(LO3) Understand the relationship between national and international regulatory initiatives and policies |
|
(LO4) Demonstate the practical, legal and technological aspects that underpin information security policymaking |
|
(LO5) Demonstrate an awareness of how emerging information security issues can be effectively addressed at national and international levels |
|
(LO6) Conduct effective research, including the use of legal information retrieval systems, to locate and collate information about the law applicable in a given situation |
|
(LO7) Demonstrate a high level of competency in the analysis and presentation of material |
|
(S1) Critical analysis appropriate for advanced level masters study. |
|
(S2) Problem-solving skills applicable to complex theoretical and practical contexts. |
|
(S3) Time management and prioritisation skills by working to deadlines. |
|
(S4) Individual and group communication skills by presentations in an online environment (e.g. the virtual classroom). |
|
(S5) Take responsibility for independent learning agenda. |
|
(S6) Reading, analysing and synthesising different viewpoints, becoming familiar with different viewpoints and presenting findings/conclusions in clear, comprehensible, structured format. |
|
(S7) Critical skills with regard to the merits of particular arguments and making reasoned choices between alternative solutions or arguments in all modules and dissertation. |
Syllabus |
|
Week One : The Nature of Information Security Primary materials:10th Annual Ernst & Young Global Information Security Survey; National Research Council, Computer Science and Telecommunications Board, Cybersecurity Today and Tomorrow: Pay Now or Pay Later (2002) (electronic version available at National Academy Press website, http://books.nap.edu/html/cybersecurity ). Organisation for Economic Development and Cooperation (OECD), Computer Viruses and Other Malicious Software: A Threat to the Internet Economy (2009) Week Two : The Institutional and Legal Responses to Information Security Week Three : Introduction to Cryptography Week Four : Electronic Signatures Week Five
: Standard Setting and Information Security Policies Week Six : Corporate Governance and Information Security Primary Materials: Week Seven : Preparing a Structured Policy Report Primary material: Guidance Sheet Week Eight : Final Assignment Primary material: Module Checklist Assessment Methods |
Teaching and Learning Strategies |
|
Teaching Method 1 - Online Discussions Description: Weekly Online Discussions and Assignments in Virtual Classroom |
Teaching Schedule |
Lectures | Seminars | Tutorials | Lab Practicals | Fieldwork Placement | Other | TOTAL | |
Study Hours | 0 | ||||||
Timetable (if known) | |||||||
Private Study | 150 | ||||||
TOTAL HOURS | 150 |
Assessment |
||||||
EXAM | Duration | Timing (Semester) |
% of final mark |
Resit/resubmission opportunity |
Penalty for late submission |
Notes |
CONTINUOUS | Duration | Timing (Semester) |
% of final mark |
Resit/resubmission opportunity |
Penalty for late submission |
Notes |
Individual Projects There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Whole Session | Week 4,6 | 5 | ||||
Final Project There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Whole Session | Week 8 | 30 | ||||
Discussion Question There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Whole Session | 1-8 weeks | 15 | ||||
Discussion Question Follow-on There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Whole Session | Weeks 1-8 | 15 | ||||
Hand-in Assignments There is a resit opportunity. Standard UoL penalty applies for late submission. This is not an anonymous assessment. Assessment Schedule (When) :Whole Session | Weeks 2,3,5,7 | 35 |
Recommended Texts |
|
Reading lists are managed at readinglists.liverpool.ac.uk. Click here to access the reading lists for this module. |
Other Staff Teaching on this Module |
||
Ms LE McManus | School of Law and Social Justice | L.E.Mcmanus@liverpool.ac.uk |
Modules for which this module is a pre-requisite: |
Pre-requisites before taking this module (other modules and/or general educational/academic requirements): |
Co-requisite modules: |
Programme(s) (including Year of Study) to which this module is available on a required basis: |
Programme(s) (including Year of Study) to which this module is available on an optional basis: |
Additional Programme Information |