This module is a resource for lecturers

Possible class structure

The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers can adapt the structure based on their needs and class times.

Introduction and learning outcomes

Lecture (10 minutes):

  • Provide a brief introduction to the class and its contents
  • Identify and discuss the learning outcomes of the class

Hacktivism

Lecture (30 minutes):

  • Discuss hacktivism, the manner in which it is perpetrated, and responses to hacktivism

Ask students to complete "Homework #1: Hacktivism" and discuss their findings in class. [*Reminder: This exercise needs to be completed before class].

Cyberespionage

Lecture (30 minutes):

  • Discuss cyberespionage, the manner in which it is perpetrated, and responses to cyberespionage

Ask students to complete "Homework # 2: Cyberespionage" and discuss their findings in class. [*Reminder: This exercise needs to be completed before class].

Break

Time: 10 minutes

Cyberterrorism

Lecture (30 minutes):

  • Discuss cyberterrorism, the manner in which it is perpetrated, and responses to cyberterrorism

Ask students to do "Homework # 3: Group Exercise Cyberterrorism Laws" and use the questions in the group exercise to facilitate a discussion on the topic. [*Reminder: This exercise needs to be completed before class].

Have students complete "Exercise # 2 - A Case of Cyberterrorism?" before class and discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].

[ Optional: Have students complete "Homework # 4: Which Incident is Considered Cyberterrorism According to National Law?" before class and have them discuss their findings during the lecture].

Cyberwarfare

Lecture (20 minutes):

  • Discuss cyberwarfare, the manner in which it is perpetrated, and responses to cyberwarfare
  • Discuss just war principles and their application to cyberwarfare

[ Optional: Have students complete "Exercise # 1 - What Political Cybercrime Is It?" before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].

Information Warfare, Disinformation, and Electoral Fraud

Lecture (30 minutes):

  • Discuss information warfare, disinformation, and electoral fraud, the manner in which these are perpetrated online, and responses to them

Have students complete "Exercise # 4 - Fake News" before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].

[ Optional: Ask students to complete the assignment of "Homework # 5: Disinformation and Fake News" and discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].

Responses to Cyberintervention as Prescribed by International Law

Lecture (20 minutes):

  • Discuss responses to cyberinterventions that are in accordance with international law

[ Optional: Have students complete "Exercise # 3 - Responses to Political Cybercrime" before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or come prepared to discuss their findings in class].

Next: Core reading
Back to top