This module is a resource for lecturers

Possible class structure

The following is a recommended structure for the class. Students should complete the required readings before coming to class. The lecture is meant to reinforce what they learned in the readings and the exercises are designed to apply what they learned in the readings and the lecture. The following breakdown is designed for a three-hour class. Lecturers can adapt the structure based on their needs and class times.

Introduction and learning outcomes

Lecture (10 minutes):

  • Provide a brief introduction to the class and its contents
  • Identify and discuss the learning outcomes of the class

Cybercrime reporting

Lecture (30 minutes):

  • Discuss and assess cybercrime reporting practices
  • Have students complete " Exercise # 1 - Who Are You Going to Call?" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].

Who conducts cybercrime investigations?

Lecture (40 minutes):

Break

Time: 10 minutes

Obstacles to cybercrime investigations

Lecture (50 minutes):

  • Explain and critically evaluate the obstacles encountered during cybercrime investigations
  • Assign students to complete " Exercise # 2 Hypothetical Cybercrime Investigation" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].

[ Optional: Have students complete " Homework # 2 Regional Internet Registry" under the "Student Assessment" section of this Module before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or merely come prepared to discuss their findings in class].

[ Optional: Instruct students to complete " Exercise # 4 GDPR and WHOIS" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. Students can either hand in a one- to three-page summary of their findings or merely come prepared to discuss their findings in class].

Knowledge management

Lecture (40 minutes):

  • Describe the role of knowledge management in cybercrime investigations
  • Have students complete " Exercise # 3 Who Responds?" under the "Exercises" section of this Module before class and have them discuss their findings during the lecture. [*Reminder: This exercise needs to be completed before class].
Next: Core reading
Back to top