Advanced Computer Law
A.Y. 2021/2022
Learning objectives
The Course has the specific purpose of giving students:
· a thorough knowledge of the topics covered by the course, both from a technical and legal point of view, on the assumption of the acquisition of the first basic elements during the previous university career;
· the ability to critically address issues and resolve legal issues through the revision of the concepts learned;
· strengthening the technical and IT language relevant to the subject;
· the ability to link the different topics in order to elaborate useful proposals for the solution of concrete cases, also through practical lessons carried out with the active participation of the students.
· a thorough knowledge of the topics covered by the course, both from a technical and legal point of view, on the assumption of the acquisition of the first basic elements during the previous university career;
· the ability to critically address issues and resolve legal issues through the revision of the concepts learned;
· strengthening the technical and IT language relevant to the subject;
· the ability to link the different topics in order to elaborate useful proposals for the solution of concrete cases, also through practical lessons carried out with the active participation of the students.
Expected learning outcomes
At the end of the course the student who has successfully learned the subject will have an in-depth knowledge of the Course topics, with the acquisition of a reasoning method suitable for dealing with more specific and complex IT-legal topics with respect to institutional notions.
Lesson period: Second semester
Assessment methods: Esame
Assessment result: voto verbalizzato in trentesimi
Single course
This course cannot be attended as a single course. Please check our list of single courses to find the ones available for enrolment.
Course syllabus and organization
Single session
Responsible
Lesson period
Second semester
Lessons will take place in the classroom in person, at the established times, and will be broadcast on Teams in real time in synchronous mode. Information on how to access Microsoft Teams lessons and other instructional instructions will be uploaded to the course's ARIEL website, which is recommended to be consulted regularly.
Course syllabus
The aim of the Course is to teach students with an approach to the correct use of technology by the jurist, in order to significantly improve their IT-legal skills and to allow independent evaluation procedures, useful for the future professional context. The program will be divided into twenty lessons of two hours each, during which the Professor will explain questions concerning surveillance, control, secrets, computer crimes, cyberstalking, cyberbullying, digital investigations.
· First lesson (2 hours): control and surveillance in the digital society.
· Second lesson (2 hours): the "liquid society" and the Snowden case. Political and technological issues.
· Third lesson (2 hours): leaking, whistleblowing and the WikiLeaks case.
· Fourth lesson (2 hours): profiling, micro-targeting and the case of Cambridge Analytica. Profiling for electoral purposes.
· Fifth lesson (2 hours): the framework of computer crimes. Classic computer crimes and computer-related crimes.
· Sixth lesson (2 hours): online defamation and identity theft.
· Seventh lesson (2 hours): cyberstalking.
· Eighth lesson (2 hours): cyberbullying.
· Ninth lesson (2 hours): grooming of minors online.
· Tenth lesson (2 hours): hate speech online.
· Eleventh lesson (2 hours): hate on the web and on social networks.
· Twelfth lesson (2 hours): cybersecurity.
· Thirteenth lesson (2 hours): the deep web and the dark web.
· Fourteenth lesson (2 hours): the information war.
· Fifteenth lesson (2 hours): fake news and disinformation.
· Sixteenth lesson (2 hours): basics of digital forensics.
· Seventeenth lesson (2 hours): digital investigations.
· Eighteenth lesson (2 hours): hacking tools for Law Enforcement.
· Nineteenth lesson (2 hours): drafting of policies for information security purposes. The importance of rules and behaviors for cybersecurity.
· Twentieth lesson (2 hours): viruses and malware. Virus protection, best protection methods, ransomware.
· First lesson (2 hours): control and surveillance in the digital society.
· Second lesson (2 hours): the "liquid society" and the Snowden case. Political and technological issues.
· Third lesson (2 hours): leaking, whistleblowing and the WikiLeaks case.
· Fourth lesson (2 hours): profiling, micro-targeting and the case of Cambridge Analytica. Profiling for electoral purposes.
· Fifth lesson (2 hours): the framework of computer crimes. Classic computer crimes and computer-related crimes.
· Sixth lesson (2 hours): online defamation and identity theft.
· Seventh lesson (2 hours): cyberstalking.
· Eighth lesson (2 hours): cyberbullying.
· Ninth lesson (2 hours): grooming of minors online.
· Tenth lesson (2 hours): hate speech online.
· Eleventh lesson (2 hours): hate on the web and on social networks.
· Twelfth lesson (2 hours): cybersecurity.
· Thirteenth lesson (2 hours): the deep web and the dark web.
· Fourteenth lesson (2 hours): the information war.
· Fifteenth lesson (2 hours): fake news and disinformation.
· Sixteenth lesson (2 hours): basics of digital forensics.
· Seventeenth lesson (2 hours): digital investigations.
· Eighteenth lesson (2 hours): hacking tools for Law Enforcement.
· Nineteenth lesson (2 hours): drafting of policies for information security purposes. The importance of rules and behaviors for cybersecurity.
· Twentieth lesson (2 hours): viruses and malware. Virus protection, best protection methods, ransomware.
Prerequisites for admission
There are no particular pre-requisites for adequately addressing the contents of the course. The first lessons are, in fact, dedicated to an introduction to the themes that can guarantee a basic preparation for the whole class. It is suggested to follow, before this Course, the Legal Informatics Course.
Teaching methods
The Course consists of 40 hours of classroom lessons (or online) held by the Professor.
Teaching Resources
P. Perri, G. Ziccardi (edited by), Tecnologia e diritto. Informatica Giuridica Avanzata, Volume III (2019), Giuffrè, Milan, 2019.
The text must be studied in full.
The text must be studied in full.
Assessment methods and Criteria
The final exam takes place orally in the exam session, with a question consisting of at least three questions on three different parts of the program. At the end of the course, it is possibile for the student who attended to have the exam in the form of an essay (final paper).
Professor(s)
Reception:
thursday 10:30 - 11:30 (send an email to [email protected])
Dipartimento "Cesare Beccaria"