Cybersecurity Law, Policy and Ethics
Duration
- One Semester or equivalent
Contact hours
- 36
On-campus unit delivery combines face-to-face and digital learning. For Online unit delivery, learning is conducted exclusively online.
2022 teaching periods
Swinburne Online Teaching Period 2 |
||
---|---|---|
Dates: Results: Last self enrolment: Census: Last withdraw without fail: |
Aims and objectives
The unit aims to help students operate effectively in the cybersecurity governance arena implementing frameworks and developing policy responses to issues that arise. The unit introduces students to legal frameworks that govern cybersecurity in Australia and the key governance organisations. Students are also exposed to the General Data Protection Regulation (GDPR) in the European Union and mandatory reporting of data breaches in Australia and the growing body of ICMS including ISO 27K. Students will learn about the changing nature of cybersecurity threats the requirement for managers to maintain an up-to-date tool kit in relation to cyber law and policy.
Students who successfully complete this unit will be able to:
1. Critically evaluate the legal and regulatory structure for dealing with cybersecurity both domestically and internationally
2. Analyse cybersecurity policy and law in Australia and their application to business
3. Research and analyse the international standards that support cybersecurity governance frameworks in Australia
4. Critically analyse ethics in relation to governance and policy in cybersecurity
2. Analyse cybersecurity policy and law in Australia and their application to business
3. Research and analyse the international standards that support cybersecurity governance frameworks in Australia
4. Critically analyse ethics in relation to governance and policy in cybersecurity
Unit information in detail
- Teaching methods, assessment, general skills outcomes and content.
Teaching methods
Face to Face Mode: Class 3 hours per week
Online Mode (SOL):
Engaging with online content and discussions
Student workload:
For all teaching and learning structures (both face to face and online), students are expected to spend an average of 150 hours per unit in total over the duration of the study period
This includes all:
• Scheduled teaching and learning events and activities (contact hours timetabled in a face-to-face teaching space) and scheduled online learning events (contact hours scheduled in an online teaching space), and
To be successful, students should:
• Read all prescribed materials and/or view videos in preparation for each class
• Attend and engage in all scheduled classes (face to face or online)
• Start assessment tasks well ahead of the due date, and submit assessments promptly
• Read / listen to all feedback carefully, and consider it for future assessment
• Engage with fellow students and teaching staff (don’t hesitate to ask questions)
Online Mode (SOL):
Engaging with online content and discussions
Student workload:
For all teaching and learning structures (both face to face and online), students are expected to spend an average of 150 hours per unit in total over the duration of the study period
This includes all:
• Scheduled teaching and learning events and activities (contact hours timetabled in a face-to-face teaching space) and scheduled online learning events (contact hours scheduled in an online teaching space), and
• Non-scheduled learning events and activities (including directed online learning activities, assessments, independent study, student group meetings, and research)
• Read all prescribed materials and/or view videos in preparation for each class
• Attend and engage in all scheduled classes (face to face or online)
• Start assessment tasks well ahead of the due date, and submit assessments promptly
• Read / listen to all feedback carefully, and consider it for future assessment
• Engage with fellow students and teaching staff (don’t hesitate to ask questions)
Assessment
Assignments (Individual) 50-60%
Project (Individual) 40-50%
General skills outcomes
• problem solving skills
• analysis skills
• ability to tackle unfamiliar problems
• ability to work independently
• analysis skills
• ability to tackle unfamiliar problems
• ability to work independently
Content
• Laws and legal frameworks that govern cybersecurity and cybercrime in Australia, including the key governance bodies of the internet
• Governance of cybercrime and the internet in Australia and other common law jurisdictions, including the United States, Canada and the European Union (EU)
• Understand the variety of national and international laws that have been enacted and proposed to deal with issues of data breaches, management of information, cyber attacks and online privacy
• Appreciate the ethical issues that relate to the investigation/prosecution of cybercrime and the formation of laws in this area
• Demonstrate an ability to identify some legal problems that may arise in business (e.g. privacy requirements, contractual relations and consumer protection) and some ability to predict how a legal problem might be solved.
• Privacy Act, ISO27,000(K)
• Continuous improvement principles
• Corporate policy
• Policy framework
• Risk acceptance, reduction, transfer and avoidance
• Research methods
• Appreciate the ethical issues that relate to the investigation/prosecution of cybercrime and the formation of laws in this area
• Demonstrate an ability to identify some legal problems that may arise in business (e.g. privacy requirements, contractual relations and consumer protection) and some ability to predict how a legal problem might be solved.
• Privacy Act, ISO27,000(K)
• Continuous improvement principles
• Corporate policy
• Policy framework
• Risk acceptance, reduction, transfer and avoidance
• Research methods
Study resources
- References.
References
• Gui, A 2017, Cybersecurity: Geopolitics, Law and Policy, , CRC Press, London
• Kosseff, J 2017, Cybersecurity Law, , John Wiley & Sons US
• National Research Council. 2014. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, DC: The National Academies Press. https://doi.org/10.17226/18749.
• https://www.nap.edu/catalog/18749/at-the-nexus-of-cybersecurity-and-public-policy-some-basic
• ISO 27000 https://www.iso.org/news/ref2266.html
• Kosseff, J 2017, Cybersecurity Law, , John Wiley & Sons US
• National Research Council. 2014. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, DC: The National Academies Press. https://doi.org/10.17226/18749.
• https://www.nap.edu/catalog/18749/at-the-nexus-of-cybersecurity-and-public-policy-some-basic
• ISO 27000 https://www.iso.org/news/ref2266.html