This course entails the use of basic microeconomic and macroeconomictheories in the analysis of problems facing decision-makers, not only inbusiness, but also in household, government and other profit/ non-profitorganizations. Microeconomics part includes demand and supply, consumerbehavior, market demand, choice under uncertainty, production and cost, marketsupply, analysis of competitive markets, and monopoly theory, whilemacroeconomics part covers measurement of national income; unemployment andinflation; goods, money and labor markets; the Keynesian cross model (45°diagram), aggregate demand and aggregate supply (AS & AD), money demand, andthe equilibrium interest rate.
Data Visualization and Statistical Analysis3-3-0
This course is an introduction into college-level statistics with a focuson data visualization. After this course, students should have competencies inbasic data analysis if common visualization methods.
Information Technology for Global Business3-3-0
This course will introduce students to information technology systems andtheir role in global business. Specifically, the basics of computing and howtechnology supports and transforms businesses and business processes. Thiscourse will introduce students to core IT technologies, how these technologieswork, and how businesses can use IT to create a global organization.
This course provides a technical and operational overview of digitalcomputer networks. In this course, you will learn about the major software andhardware technologies used on home and enterprise computer networks as well asthe Internet. You will learn how information is encoded and transported across thenetwork to other computers. In this course, we will build networks, examinenetworking protocols and data packets, and have a firm understanding of howdata is being transmitted from one computer to another.
Information Law and Cyber Security3-3-0
It aims to understand the various cases of cyber security andinformation protection and to find out how to solve common problems by studyingrelated core laws.
Introduction to Forensic Science3-3-0
This is a one-semester investigative science and technology course.Students will learn how to observe, collect, analyze and evaluate evidencefound at crime scenes. Some of the many topics covered are fingerprintanalysis, hair and fiber comparison, serology and crime scene analysis.Forensics is a demanding, fast-paced course covering a new topic of evidencenearly every week. The culmination of the course will include the analysis of acrime scene.
Information Security Fundamentals3-3-0
This course introduces concept of information security. We will coverdifferent types of security relating to information security, includingphysical security, computer security, and network security. We will alsodiscuss common threats to and attacks against information systems, includingaccidental damage, identity theft, malicious software, and “spam”. Finally, wewill cover how to check for, and defend against common attacks againstinformation systems.
Crime Scene Investigation &Criminal Procedure3-3-0
Criminal procedures are safeguards against the indiscriminate applicationof criminal laws and the wanton treatment of suspected criminals. They beginwith the initial investigation of the crime, continuing through arrest,investigation, trial, sentencing, and appeals.
Privacy and Data Protection Law3-3-0
The aim of the course is to understand how government seeks to protectinformation privacy as new technologies and new institutional practices emerge.The course traces the origins of the right to information privacy both inEurope and in American legal system. Students will look at recent controversiesinvolving domestic surveillance, identification systems, social networkingsites, video surveillance, DNA databases, and the impact of the Europeanprivacy directive.
Digital Forensic Practice3-2-2
This course builds on prior learning, focusing more on the application ofdigital forensic investigation techniques to investigate specific crimes. Wewill focus on proper procedure for digital investigations in criminal and civilcases. We will apply learned techniques to actually cybercrime investigation inan attempt to reconstruct events.
Crime Data Analysis &Intelligence3-2-2
Crime Data Analysis &Intelligence provides a broad understanding ofthe analysis discipline relevant to the criminal justice system, within thescope of law enforcement and national security. In this course, you will learnthe important components of analysis within law enforcement and nationalintelligence. You will have a greater understanding of how an analysis is integralto policing and national security through increased knowledge of crime theoryand models of policing, national intelligence. You will also understand howtactical and strategic applications of crime and intelligence analysis are usedto address serious and organized crime or recommend crime control and reductionstrategies.
Understanding Law and Policy3-3-0
the structure of the courts; the law-making process, statute, judicialdecisions and the legal professions. The course is specifically designed forstudent with no legal educational background.
Introduction to Digital Forensics3-2-2
In this course, students will learn the fundamental process of analyzingdata collected from electronic devices. Students will become familiar withproper techniques and tools utilized for securing, handling and preservingdigital evidence at physical crime scenes. Students will utilize examinationand chain of custody forms, as well as prepare crime scene and digitalacquisition reports related to administrative, civil and criminalinvestigations.
Crime & Punishment3-3-0
Criminal law is the body of law that relates to crime. It proscribesconduct perceived as threatening, harmful, or otherwise endangering to theproperty, health, safety, and moral welfare of people inclusive of one's self.Most criminal law is established by statute, which is to say that the laws areenacted by a legislature. This course covers selected topics in substantive criminal law: principlesunderlying the definition of crime such as the requirements of actus reus andmens rea and general doctrines such as ignorance of fact and ignorance of law,causation, attempt, complicity and conspiracy.
The purpose of this course is to introduce students with the technical,social and legal aspects of cybercrime as well as expose students to theoriesand tools that enable scientific exploration of this phenomenon. In the firstweeks of the semester we will learn about the computer and the Internet, anddiscuss several definitions and typologies of cybercrime. Then we will discussthe hacker, the victim and the IT manger. We will conclude this section byreviewing important steps taken by scholars while conducting scientificresearch. In the second half of the semester we will review various theories ofcrime causation, and assess the relevance of these theories in the context ofcyber space.
This course explores the policy and legal frameworks and instrumentsaffecting communication and media operations. Topics may include privacy,surveillance and monitoring, access to information, freedom of expression,control of objectionable content, and information security, focusing onInternet regulation and the impact of the Internet on legal issues. Studentswill be able to analyze policy and regulatory issues affecting media andcommunication practice at the end of the course.
Network Security & Forensics3-2-2
This course exposes students to procedures for conducting live network forensicsof computer system components and data. It prepares students to collect,preserve, and examine network data, computers, mobile devices and relevant datathat may be critical to an investigation. Building on prior courses, we willfocus on procedure for data collection, processing and analysis of live networkdata for the purposes of a criminal investigation.
Transnational Crime & Cyber Security3-3-0
Transnational organized crime crosses borders, challenges states, exploitsindividuals, pursues profit, wrecks economies, destroys civil society, andultimately weakens global democracy. This course will trace the increasinglyglobal nature of transnational organized crime, its growing portfolio ofillicit activities in the world’s economy, and its impact on security.
This course is designed to provide the student with a substantial andnecessary foundation on which to base an understanding of criminalinvestigations. And case studies will be reviewed to ensure the student graspsthe objectives being reviewed and to enhance the learning environment.
Capstone Design Seminar3-1-4
"Capstone Design Seminar" is the capstone design project coursefor the Legal Informatics and Forensic Science major. The course is designed toallow the students to showcase the skills and abilities you have developed inyour studies here and to give you an extensive supervised experience ofdesigning a service or product to fill a real need from customers. Ourexpectation is that this experience will prepare you well to take onprofessional responsibilities once you graduate. We expect you to deliver a working prototype by the end of the course whichcombines a formal oral presentation to Hallym University at the CapstoneProject Fair. To achieve the goals, you will be provided with necessary lectures,mentoring, and industrial experiences. Basically, the students will form groupsand conduct individual research and development with supervision and mentoring.
Crime & Investigative psychology3-3-0
This course examines the interaction of psychology and the legal system.The course focuses on the use of psychological assessments in court issues ofcriminal responsibility and predicting dangerousness, insanity, eyewitnesstestimony, police interrogation, lie detection, offender rehabilitation, jurydecision making, and criminal profiling. In addition, the course will equipstudents to be in a position to evaluate the relationship between mental healthand criminal behavior and effective techniques for rehabilitating offenders.