Module Texts
Introduction to Information Technology Law, 6th Edition, Bainbridge, D., 2004, Pearson Longman, ISBN 978140584666-0
Information Warfare and Security, Denning, D.E., Addison-Wesley, 2005. ISBN 978-0-201-43303-6
Cybercrime and Espionage, An Analysis of Subversive Multivector Threats., Gragido, W., Pirc, J., Elsevier, 2011, ISBN 978-1-59749-613-1
Incident Response and Computer Forensics, Prosise, C., & Mandia, K., 2003, Osborne McGraw Hill, ISBN: 007222696-X
Investigating Computer Related Crime, Stephenson, P., CRC Press, 2000, ISBN: 084932218-9
International Journal of Forensic Computer Science www.ijofcs.org
Module Learning Strategies
32 hours of lectures and 16 hours of workshops as a blend of 16 * 2 hour lectures, and 8 * 2 hour workshops.
Practical tasks and workshops will be used to re-enforce and apply theory to encourage an analytical and problem based approach. Observance of legal, social and ethical issues will need to be demonstrated throughout.
Module Indicative Content
This module explicitly focuses on significant elements required for the achievement of STAFFORDSHIRE GRADUATE ATTRIBUTES.
Legal context and structures.
Digital evidence controls.
Processing crime and incident scenes..
Expert testimony.
Forensic investigation and evidence handling
Traps & deceptive measures
Chain of custody
Digital Rights Management
Cybercrminal Profiling & Victimology
Offender tracking
Regulating cyberspace
Role of an Expert Witness
Note taking & Report writing
The UK Legal System
Jurisdictional Issues within Forensic Computing
Cyber warriors
A defensive strategy
National Security
Offensive Information Warfare
Defensive Information Warfare
Subversive Multivector Threats
Module Additional Assessment Details
A single 6000 word report, based upon a review of some aspect of the Legal and/or International aspects of Forensic Computing and Incident Investigation. This will be used to assess learning outcomes 1 to 5.