CCST9029 Scientific and Technological Literacy
Cyberspace Crime: Technology and Ethics

[This course is under the thematic cluster of ‘Sustaining Cities, Cultures, and the Earth’.]


Course Description

The Internet (aka cyberspace) has become a platform in many arenas, including social, cultural, and public policy. Consequently, great amounts of information and data transmitted by and stored in cyberspace are vulnerable to attack by hackers and abuse by Internet users. Moreover, some cyberspace users perform unethical or criminal acts with the belief that his or her identity cannot be reviewed in cyberspace, such as sharing of copyright-protected materials and spreading of rumours.

This course will adopt a holistic approach to introduce the fundamental concepts of cyberspace crime, not only from the technological point of view, but also from the legal and ethical points of view. Through the discussion of different case studies, the course aims to help students to become a scientifically and technologically equipped and responsible individual and citizen. The topics of these case studies include: internet piracy, internet privacy and data leakage, freedom of speech in cyberspace, online pornography, and cyberspace theft. Famous cyberspace crime and non-crime cases in Hong Kong and the rest of the world will be included.

Course Learning Outcomes

On completing the course, students will be able to:

  1. Demonstrate understanding of what actions or application of technology in our everyday life might constitute a crime in the cyberspace.
  2. Describe and explain the legal challenges of cyberspace crime in Hong Kong.
  3. Formulate arguments in responding to cyberspace crime related ethical issues.
  4. Demonstrate understanding of real-world issues relating to the balance between the use of cyberspace technologies, legal challenges and ethical responsibilities.

Offer Semester and Day of Teaching

First semester (Wed)


Study Load

Activities Number of hours
Lectures 24
Tutorials 10
Assessment: Essay / Report writing 50
Assessment: Presentation (incl preparation) 40
Assessment: Quiz 20
Total: 144

Assessment: 100% coursework

Assessment Tasks Weighting
Quizzes 40
Case study and final project 30
In-class presentation / Class discussion 30

Required Reading

Recommended Reading

  • Baase, S. (2003). A gift of fire: Social, legal, and ethical issues for computers and the Internet. Upper Saddle River, NJ: Pearson Education.
  • Himma, K. E., & Tavani, H. T. (Eds.). (2008). The handbook of information and computer ethics. Hoboken, NJ: John Wiley & Sons, Inc.
  • Spinello, R. A. (2003). Case studies in information technology ethics and policy (2nd ed.). Upper Saddle River, NJ: Prentice Hall.
  • Spinello, R. A. (2014). CyberEthics: morality and law in cyberspace (5th ed.). Sudbury, MA: Jones and Bartlett Publishers.

Recommended Websites


Course Co-ordinator and Teacher(s)

Course Co-ordinator Contact
Dr K.P. Chow
Department of Computer Science, Faculty of Engineering
Tel: 2859 2191
Email: chow@cs.hku.hk
Teacher(s) Contact
Dr K.P. Chow
Department of Computer Science, Faculty of Engineering
Tel: 2859 2191
Email: chow@cs.hku.hk