Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Cybersecurity Research Guide

research and topic selection guide for cybersecurity course

The Parts of a Scholarly Legal Work

Scholarly legal articles often follow this arrangement:

1.  Introduction - includes the statement of the claim (In other words: point of view, opinion, thesis statement, problem & solution or issue & resolution)

2. Background Section - Describes the existing law, facts and/or history necessary to understand the problem.

3. Proof of the Claim - Show your claim is correct and the best way to solve the problem.

4. Conclusion

Source:  Eugene Volokh, Academic Legal Writing: Law review articles, student notes, seminar papers, and getting on law review 10 (Thomson Reuters 2016).

 

Cybersecurity Course

This cybersecurity course will address the growing problem of the theft of valuable information and intellectual property through breaking into electronic networks (hacking) and other forms of espionage. We will particularly focus on government-sponsored information theft. Both hacking and more traditional spycraft are increasingly being used to steal valuable information from businesses and other private entities, including political parties and campaigns. Sometimes the perpetrators are ordinary criminals, but in other cases, the perpetrators have the support of foreign governments. The issues we will examine include the legality of such actions under international law and treaties; the effectiveness of current laws to address these problems; and potential solutions, including trade sanctions, international cooperation, criminal penalties, regulations, tort liability for insufficient protections, and voluntary private sector initiatives.