Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Cybersecurity Research Guide

research and topic selection guide for cybersecurity course

Cybersecurity Course

This cybersecurity course will address the growing problem of the theft of valuable information and intellectual property through breaking into electronic networks (hacking) and other forms of espionage. We will particularly focus on government-sponsored information theft. Both hacking and more traditional spycraft are increasingly being used to steal valuable information from businesses and other private entities, including political parties and campaigns. Sometimes the perpetrators are ordinary criminals, but in other cases, the perpetrators have the support of foreign governments. The issues we will examine include the legality of such actions under international law and treaties; the effectiveness of current laws to address these problems; and potential solutions, including trade sanctions, international cooperation, criminal penalties, regulations, tort liability for insufficient protections, and voluntary private sector initiatives.