This course entails the use of basic microeconomic and macroeconomic theories in the analysis of problems facing decision-makers, not only in business, but also in household, government and other profit/ non-profit organizations. Microeconomics part includes demand and supply, consumer behavior, market demand, choice under uncertainty, production and cost, market supply, analysis of competitive markets, and monopoly theory, while macroeconomics part covers measurement of national income; unemployment and inflation; goods, money and labor markets; the Keynesian cross model (45°diagram), aggregate demand and aggregate supply (AS & AD), money demand, and the equilibrium interest rate.
Data Visualization and Statistical Analysis3-3-0
This course is an introduction into college-level statistics with a focus on data visualization. After this course, students should have competencies in basic data analysis if common visualization methods.
Information Technology for Global Business3-3-0
This course will introduce students to information technology systems and their role in global business. Specifically, the basics of computing and how technology supports and transforms businesses and business processes. This course will introduce students to core IT technologies, how these technologies work, and how businesses can use IT to create a global organization.
Information Law and Cyber Security3-3-0
It aims to understand the various cases of cyber security and information protection and to find out how to solve common problems by study ingrelated core laws.
Information Security Fundamentals3-3-0
This course introduces concept of information security. We will cover different types of security relating to information security, including physical security, computer security, and network security. We will also discuss common threats to and attacks against information systems, including accidental damage, identity theft, malicious software, and “spam”. Finally, we will cover how to check for, and defend against common attacks against information systems.
Crime Scene Investigation & Criminal Procedure3-3-0
Criminal procedures are safeguards against the indiscriminate application of criminal laws and the wanton treatment of suspected criminals. They being with the initial investigation of the crime, continuing through arrest,investigation, trial, sentencing, and appeals.
This course provides a technical and operational overview of digital computer networks. In this course, you will learn about the major software and hardware technologies used on home and enterprise computer networks as well as the Internet. You will learn how information is encoded and transported across the network to other computers. In this course, we will build networks, examine networking protocols and data packets, and have a firm understanding of how data is being transmitted from one computer to another.
Privacy and Data Protection Law3-3-0
The aim of the course is to understand how government seeks to protect information privacy as new technologies and new institutional practices emerge.The course traces the origins of the right to information privacy both in Europe and in American legal system. Students will look at recent controversies involving domestic surveillance, identification systems, social network insights, video surveillance, DNA databases, and the impact of the European privacy directive.
Introduction to Data Evidence Science3-3-0
This is a one-semester investigative science and technology course.Students will learn how to observe, collect, analyze and evaluate evidence found at crime scenes. Some of the many topics covered are fingerprint analysis, hair and fiber comparison, serology and crime scene analysis.Forensics is a demanding, fast-paced course covering a new topic of evidence nearly every week. The culmination of the course will include the analysis of a crime scene
Digital Forensic Practice3-2-2
This course builds on prior learning, focusing more on the application of digital forensic investigation techniques to investigate specific crimes. We will focus on proper procedure for digital investigations in criminal and civilcases. We will apply learned techniques to actually cybercrime investigation in an attempt to reconstruct events.
Crime Data Analysis & Intelligence3-2-2
Crime Data Analysis &Intelligence provides a broad understanding of the analysis discipline relevant to the criminal justice system, within the scope of law enforcement and national security. In this course, you will learn the important components of analysis within law enforcement and national intelligence. You will have a greater understanding of how an analysis is integral to policing and national security through increased knowledge of crime the oryand models of policing, national intelligence. You will also understand howtactical and strategic applications of crime and intelligence analysis are used to address serious and organized crime or recommend crime control and reduction strategies.
Understanding Law and Policy3-3-0
the structure of the courts; the law-making process, statute, judicialdecisions and the legal professions. The course is specifically designed forstudent with no legal educational background.
Introduction to Digital Forensics3-2-2
In this course, students will learn the fundamental process of analyzing data collected from electronic devices. Students will become familiar with proper techniques and tools utilized for securing, handling and preserving digital evidence at physical crime scenes. Students will utilize examination and chain of custody forms, as well as prepare crime scene and digital acquisition reports related to administrative, civil and criminal investigations.
Crime & Punishment3-3-0
Criminal law is the body of law that relates to crime. It proscribes conduct perceived as threatening, harmful, or otherwise endangering to the property, health, safety, and moral welfare of people inclusive of one's self.Most criminal law is established by statute, which is to say that the laws areenacted by a legislature. This course covers selected topics in substantive criminal law: principles underlying the definition of crime such as the requirements of actus reus and mens rea and general doctrines such as ignorance of fact and ignorance of law,causation, attempt, complicity and conspiracy.
The purpose of this course is to introduce students with the technical,social and legal aspects of cybercrime as well as expose students to theories and tools that enable scientific exploration of this phenomenon. In the first weeks of the semester we will learn about the computer and the Internet, and discuss several definitions and typologies of cybercrime. Then we will discuss the hacker, the victim and the IT manger. We will conclude this section by reviewing important steps taken by scholars while conducting scientific research. In the second half of the semester we will review various theories of crime causation, and assess the relevance of these theories in the context of cyber space.
This course explores the policy and legal frameworks and instruments affecting communication and media operations. Topics may include privacy,surveillance and monitoring, access to information, freedom of expression,control of objectionable content, and information security, focusing on Internet regulation and the impact of the Internet on legal issues. Students will be able to analyze policy and regulatory issues affecting media and communication practice at the end of the course.
Network Security & Forensics3-2-2
This course exposes students to procedures for conducting live network forensics of computer system components and data. It prepares students to collect,preserve, and examine network data, computers, mobile devices and relevant data that may be critical to an investigation. Building on prior courses, we will focus on procedure for data collection, processing and analysis of live network data for the purposes of a criminal investigation.
Transnational Crime & Cyber Security3-3-0
Transnational organized crime crosses borders, challenges states, exploits individuals, pursues profit, wrecks economies, destroys civil society, and ultimately weakens global democracy. This course will trace the increasingly global nature of transnational organized crime, its growing portfolio of illicit activities in the world’s economy, and its impact on security.
This course is designed to provide the student with a substantial and necessary foundation on which to base an understanding of criminal investigations. And case studies will be reviewed to ensure the student grasps the objectives being reviewed and to enhance the learning environment.
Capstone Design Seminar3-2-2
"Capstone Design Seminar" is the capstone design project course for the Legal Informatics and Forensic Science major. The course is designed to allow the students to showcase the skills and abilities you have developed in your studies here and to give you an extensive supervised experience of designing a service or product to fill a real need from customers. Our expectation is that this experience will prepare you well to take on professional responsibilities once you graduate. We expect you to deliver a working prototype by the end of the course which combines a formal oral presentation to Hallym University at the Capstone Project Fair. To achieve the goals, you will be provided with necessary lectures,mentoring, and industrial experiences. Basically, the students will form groups and conduct individual research and development with supervision and mentoring.
Crime & Investigative psychology3-3-0
This course examines the interaction of psychology and the legal system.The course focuses on the use of psychological assessments in court issues of criminal responsibility and predicting dangerousness, insanity, eyewitness testimony, police interrogation, lie detection, offender rehabilitation, jury decision making, and criminal profiling. In addition, the course will equip students to be in a position to evaluate the relationship between mental health and criminal behavior and effective techniques for rehabilitating offenders.