Course syllabus

Cybersecurity and Cybercrimes, 15 credits

Course code: RV134A Credits: 15
Main field of study: Law Progression: A1N
Last revised: 13/03/2024    
Education cycle: Second cycle Approved by: Head of school
Established: 13/12/2022 Reading list approved: 13/03/2024
Valid from: Autumn semester 2024 Revision: 2

Learning outcomes

Knowledge and comprehension
After the completion of the course, the student shall be able to:

  • demonstrate an advanced knowledge on the cyberspace ecosystem,
  • explain comprehensively the concepts of cybersecurity and cybercrime as well as their principles, elements and practice, and
  • identify and explain regulatory aspects of cybersecurity and legal frameworks of cybercrimes.

Ability and capacity
After the completion of the course, the student shall be able to:

  • characterize cyber-attacks and distinguish between types of attacks in the cyberspace,
  • identify and analyse, critically and precisely, the legal issues and implications of cybersecurity and cybercrimes, and
  • describe, critically and independently, legislations and regulatory frameworks that are of importance to the management of cybersecurity and control of cybercrimes.

Valuation and perspective
After the completion of the course, the student shall be able to:

  • debate legal issues in relation to practical digital investigative knowledge, legal practices, and policies related to cybersecurity risk assessment and prevention of cybercrimes,
  • discuss critically the legal developments in cybersecurity and cybercrime laws, using applicable legal methods, and
  • discuss current and future challenges pertaining from the cyberspace.

Content

Cybersecurity and cybercrime are complex topics that new technology has created, not only facilitating criminal opportunities but also creating new types of crimes. This comes in connection with the contemporary use of technology including computer hardware and software, the internet, networks and the data that is transmitted by this technology. The dependence on technologies, such as Information and Communication Technologies (ICTs) and the Internet of Things (IoT), has increasingly led to digital vulnerability and risks and cyberthreats of various kinds. The course gives an understanding of the concepts and regulatory aspects of cybersecurity and cybercrimes. It focuses on the rules protecting cybersecurity and combating cybercrime in matters such as national security, data privacy and jurisdiction of law enforcement as well as international warfare among States. Furthermore, the course seeks to provide for different perspectives to the analysis of the relevant legal frameworks concerning cyber security and cybercrimes. The course also covers substantive examination of legal aspects of digital evidence and forensics that are coupled with cybercrimes.

Examinations and grades

Cybersecurity and Cybercrimes 1, 2.5 credits (Code: A005)
Grades used are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).

Cybersecurity and Cybercrimes 2, 7.5 credits (Code: A006)
Grades used are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).

Cybersecurity and Cybercrimes 3, 5 credits (Code: A007)
Grades used are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).


According to the Higher Education Ordinance, Chapter 6, Section 18, a grade is to be awarded on the completion of a course, unless otherwise prescribed by the university. The university may determine which grading system is to be used. The grade must be determined by a teacher specifically nominated by the university (the examiner).

In accordance with university regulations on grading systems for first and second-cycle courses and study programmes (Vice-Chancellor’s decision ORU 2018/00929), one of the following grades is to be used: fail (U), pass (G) or pass with distinction (VG). For courses included in an international master’s programme (60 or 120 credits) or offered to the university’s incoming exchange students, the A to F grading scale is to be used. The vice-chancellor, or a person appointed by them, may decide on exceptions from this provision for a specific course, if there are special grounds for doing so.

The grades used on this course are Fail (F), Sufficient (E), Satisfactory (D), Good (C), Very Good (B) or Excellent (A).

Comments on grades

In order to obtain the final course grade Sufficient (E), it is required that all the examinations ((A005), (A006), (A007)) receive the minimum grade E.

In order to obtain the final course grade Satisfactory (D), it is required that Cybersecurity and Cybercrimes 2 (A006) and Cybersecurity and Cybercrimes 3 (A007) are examined with grade D, and Cybersecurity and Cybercrimes 1 (A005) is examined with at least grade E.

In order to obtain the final course grade Good (C), it is required that Cybersecurity and Cybercrimes 2 (A006) and Cybersecurity and Cybercrimes 3 (A007) are examined with grade C, and Cybersecurity and Cybercrimes 1 (A005) is examined with at least grade D.

In order to obtain the final course grade Very Good (B), it is required that Cybersecurity and Cybercrimes 2 (A006) and Cybersecurity and Cybercrimes 3 (A007) are examined with grade B, and Cybersecurity and Cybercrimes 1 (A005) is examined with at least grade C.

In order to obtain the final course grade Excellent (A), it is required that Cybersecurity and Cybercrimes 2 (A006) and Cybersecurity and Cybercrimes 3 (A007) are examined with grade A, and Cybersecurity and Cybercrimes 1 (A005) is examined with at least grade B.

Modes of assessment

Cybersecurity and Cybercrimes 1, 2.5 credits (Code: A005)
Written assignment and oral presentation.
If a student does not reach the passing grade but is considered to be able to reach it with a limited effort, the examiner may instruct the student to submit a completed (written) assignment in accordance with the examiner instructions. The completion shall be submitted within two weeks from the date on which the student is communicated with the instructions.

Cybersecurity and Cybercrimes 2, 7,5 credits (Code: A006)
Written exam.

Cybersecurity and Cybercrimes 3, 5 credits (Code: A007)
Written assignment and oral presentation.
If a student does not reach the passing grade but is considered to be able to reach it with a limited effort, the examiner may instruct the student to submit a completed (written) assignment in accordance with the examiner instructions. The completion shall be submitted within three weeks from the date on which the student is communicated with the instructions.

For students with a documented disability, the university may approve applications for adapted or other modes of assessment.

For further information, see the university's local examination regulations.

Specific entry requirements

180 credits at the first level of which 90 credits with increasing depth within law, including an essay (G2E) of 15 credits. Alternatively, 180 credits at the first level of which 90 credits with increasing depth within informatics, including an essay (G2E) of 15 credits, and 7.5 credits in law. Alternatively, 180 credits at the first level in a Law Programme. Additional requirements: English Course B/English Course 6.

180 credits at the first level of which 90 credits with increasing depth within law. Alternatively, 180 credits at the first level of which 90 credits with increasing depth within informatics, and 7.5 credits within law. Alternatively, 180 credits at the first level in a Law Programme. Additional requirements: English Course B/English Course 6. (Exchange students)

For further information, see the university's admission regulations.

Other provisions

The course is given in English.

Students who have been admitted to and registered on a course have the right to receive tuition and/or supervision for the duration of the time period specified for the particular course to which they were accepted (see, the university's admission regulations (in Swedish)). After that, the right to receive tuition and/or supervision expires.

Reading list and other learning resources

Required Reading

Paul Cornish, ed. (2021)
The Oxford Handbook of Cyber Security
Oxford University Press

Thomas J Holt, Adam M Bossler, Kathryn C Seigfried-Spellar (2022)
Cybercrime and Digital Forensics: An Introduction
Routledge

Kittichaisaree, Kriangsak. (2017)
Public International Law of Cyberspace
Springer

Karlsson, Fredrik, Hedström, Karin, Goldkuhl, Göran (2017)
Practice-based discourse analysis of information security policies. Computers & Security Vol 67, pp. 267-279.

Additions and comments to the reading list
Always the latest edition of the books on the reading list is used.

Additional material of approximately 500 pages may be added, which is also part of the required reading.