American Government is designed to meet the scope and sequence requirements of …
American Government is designed to meet the scope and sequence requirements of the single-semester American government course. This title includes innovative features designed to enhance student learning, including Insider Perspective features and a Get Connected Module that shows students how they can get engaged in the political process. The book provides an important opportunity for students to learn the core concepts of American government and understand how those concepts apply to their lives and the world around them. American Government includes updated information on the 2016 presidential election.Senior Contributing AuthorsGlen Krutz (Content Lead), University of OklahomaSylvie Waskiewicz, PhD (Lead Editor)
Criminal Law uses a two-step process to augment learning, called the applied …
Criminal Law uses a two-step process to augment learning, called the applied approach. First, after building a strong foundation from scratch, Criminal Law introduces you to crimes and defenses that have been broken down into separate components. It is so much easier to memorize and comprehend the subject matter when it is simplified this way. However, becoming proficient in the law takes more than just memorization. You must be trained to take the laws you have studied and apply them to various fact patterns. Most students are expected to do this automatically, but application must be seen, experienced, and practiced before it comes naturally. Thus the second step of the applied approach is reviewing examples of the application of law to facts after dissecting and analyzing each legal concept. Some of the examples come from cases, and some are purely fictional. All the examples are memorable, even quirky, so they will stick in your mind and be available when you need them the most (like during an exam). After a few chapters, you will notice that you no longer obsess over an explanation that doesn’t completely make sense the first time you read it—you will just skip to the example. The examples clarify the principles for you, lightening the workload significantly.
This course provides an overview of the history and present-day operation of …
This course provides an overview of the history and present-day operation of the criminal justice process in the United States. Students analyze the role, responsibility and authority of each of the components of the system: police, courts, corrections and rehabilitation. They will also explore and examine the underlying principles and values of justice. All course content by Nunotte Zama. Content added to OER Commons by Victoria Vidal
This presentation covers the legal environment of cybercrime to date. It addresses: …
This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.
These rules govern the conduct of all criminal proceedings brought in Federal …
These rules govern the conduct of all criminal proceedings brought in Federal courts. Our Federal Rules ebooks include: The complete rules as of December 1, 2012 (for the 2013 edition); All notes of the Advisory Committee following each rule; Internal links to rules referenced within the rules; and external links to the LII website's version of the US Code.
This is a syllabus for a course in Issues in Law Enforcement, …
This is a syllabus for a course in Issues in Law Enforcement, a criminal justice course. The curriculum is a public interest technology course in cybersecurity. Principally, the federal government handles cybersecurity investigations along with some state governments and the FBI acts as the center for all cybersecurity complaints.
The course expands beyond law enforcement and provides a comprehensive background to the field through the following presentations: a history of cybersecurity; an explanation of the Internet; an introduction to cybercrime and cybersecurity techniques; the legal environment, which includes a survey of law enforcement and prosecution departments and agencies, and federal and NY state criminal, civil and privacy laws; a case (Silk Road Market) about a darknet market which demonstrates federal law enforcement in action; and the concept that cybersecurity is an enormous challenge to law enforcement.
The course provides two types of student activities:
(i) Service learning project in which students present about how to prevent yourself from being hacked; and
(ii) Group assignments in which students choose and analyze four types of current cybersecurity cases as a team by answering questions posed by the professor which is presented to the class as a whole.
The shooting death in Sanford, Florida, of unarmed teenager Trayvon Martin at …
The shooting death in Sanford, Florida, of unarmed teenager Trayvon Martin at the hands of 28-year-old George Zimmerman in February 2012 has touched off debate on many issues, including the role of race in both the shooting and the subsequent investigation by the Sanford Police department.
This exercise consists of two student readings. The first reading examines the debate surrounding Florida's "Stand Your Ground" law. What is the "Stand Your Ground" law? What do supporters and critics have to say about it? What effect has it had? The second reading takes a wider look at the gun control debate. Should stronger gun control laws be passed? Questions for student discussion follow each reading.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.