The emerging field of cyber law is characterized by rapid and substantive changes in the activities to which it applies both in the international arena and in Israel. Nearly half of the world's population currently has access to cyberspace, a new human phenomenon that has had much positive impact (such as in the fields of health, education and law).
Read more about Israeli and International Cybersecurity Law / Deborah Housen-Couriel
Throughout history, various technological developments, such as the internet, were exploited for criminal and deviant behavior (Grabosky, 2007). the internet allows the breakage of boundaries both of time and space as are embedded in legislation and formal control. Thus, the internet creates an illusion of anonymity, security and lack of supervision, which contributes to expressions of violence and crime.
This course will examine the Human factor in cyber crime.
Moreover, since understanding crime and deviance is not complete without a discussion about the ways to handle these behaviors and the modes of social control designed to prevent them; We will examine the regulation of cyber crime as well.
Big data has become in the last decade the trendiest tool in a wide range of domains: with the growing capacity to store large amounts of data, came also the algorithmic technologies to analyze them. Following Foucault's claim that power and knowledge come always as entangled, this course will attempt to grasp genealogically the social and political implications of the emergence of these technologies. Using Foucault’s conceptual toolbox, we will thus examine the power mechanisms propelled by the algorithms and the kind of social norms they imply. At the individual level, what can be said of the algorithms' effects on the contemporary self? If the process of subjectivation occurs in the relation of the self to truth, what is truth in the big data era, that some have coined the post-truth era? Finally, if the individual remains the provider of data, is there a way to resist this new order, and how? Read more about The "Big Data Revolution": A Critical Approach / Dr. Laurence Barry
As cyberspace — the online world of computer networks and the internet — evolves, it also facilitate the spread of disruptive cyber activities, which have the potential to cause significant damages for individuals, organizations and states. Today’s transition to cyberspace and Iinternet of things (IOT) has created new challenges for the prevention and regulation of cyber threats including: cybercrimes, cyber-warfare, internet terrorism, human rights violations and more. Read more about Cybersecurity: Prevention and Regulation of Cyber threats / Dr. Tamar Berenblum
This course examines the conflicts and the compromises taking place "behind the scenes" in the field of internet governance. In this course the student will learn about the national and the international actors operating within the cyber space and about the political, social and technological struggles that shape and construct the cyberspace in which we live.
The integration of the computer into modern society is causing unpredictable technological and social changes. The dominance of the Internet in the commercial and social life has raised new issues. Questions like jurisdiction, anonymity, contract making, infringement, privacy, tort laws, and many others.
Read more about Cyber Law / Dr. Abraham Tennenbaum
The course asks how we can use the internet as a research tool, and it asks how we can research the internet. Throughout the course special emphasis is placed on tools and concepts that are unique to the internet, such as hyperlinks and websites. In addition to frontal lectures, the course has a very practical orientation, and students will learn hands on how to use new tools.
The course focuses on various aspects of crime, media and the internet. Students will become familiar with the different theoretical approaches and research knowledge regarding media coverage of crime and police work. The second part of the course focuses on online deviance and cybercrime.