Scholarly legal articles often follow this arrangement:
1. Introduction - includes the statement of the claim (In other words: point of view, opinion, thesis statement, problem & solution or issue & resolution)
2. Background Section - Describes the existing law, facts and/or history necessary to understand the problem.
3. Proof of the Claim - Show your claim is correct and the best way to solve the problem.
4. Conclusion
Source: Eugene Volokh, Academic Legal Writing: Law review articles, student notes, seminar papers, and getting on law review 10 (Thomson Reuters 2016).
This cybersecurity course will address the growing problem of the theft of valuable information and intellectual property through breaking into electronic networks (hacking) and other forms of espionage. We will particularly focus on government-sponsored information theft. Both hacking and more traditional spycraft are increasingly being used to steal valuable information from businesses and other private entities, including political parties and campaigns. Sometimes the perpetrators are ordinary criminals, but in other cases, the perpetrators have the support of foreign governments. The issues we will examine include the legality of such actions under international law and treaties; the effectiveness of current laws to address these problems; and potential solutions, including trade sanctions, international cooperation, criminal penalties, regulations, tort liability for insufficient protections, and voluntary private sector initiatives.