CJE 1684 - Internet Fraud Investigations

College of Public Safety Administration

Credit(s): 3
Contact Hours: 47
Effective Term Fall 2015 (505)

Course Description

This course will provide the student with the knowledge of the tools, procedures and appropriate laws necessary to investigate Internet fraud crimes.

Learning Outcomes and Objectives

  1. The student will understand the definition of Internet fraud crimes by:
    1. explaining the definition of an Internet fraud crime.
    2. applying federal and state laws related to Internet fraud crimes.
    3. discussing case histories of major computer and Internet fraud crimes.
    4. describing the affect of Internet fraud on E-commerce.
    5. listing computer and Internet fraud crimes that can be committed with the use of a computer and the Internet.
  2. The student will demonstrate how a computer can be used to commit an Internet fraud crime by:
    1. researching the methods used by individuals to commit Internet fraud crimes.
    2. describing the methods used by individuals to commit Internet fraud crimes.
    3. giving examples of Internet fraud crimes that have been committed.
    4. explaining how the Internet can be used to commit Internet fraud crimes.
    5. reading cases histories of Internet fraud crimes.
    6. describing secure Internet web sites.
    7. explaining how identity theft can be used to commit Internet fraud crimes.
    8. describing how a persons’ identity can be stolen on the Internet.
    9. listing the elements of an Internet fraud crime with a computer.
  3. The student will understand the issues related to the laws and jurisdiction of Internet fraud investigations by:
    1. evaluating scenarios to determine if an Internet fraud crime has occurred.
    2. determining which, if any, federal or state laws apply to scenarios provided.
    3. defining electronic evidence in an Internet fraud crime.
    4. reviewing standard procedures for the collection of computer or Internet related evidence.
    5. explaining the importance of collecting electronic evidence.
  4. The student will understand the principles of investigating an Internet fraud crime by:
    1. researching computer related Internet fraud web sites.
    2. reviewing laws and rules regarding computer related Internet fraud criminal acts.
    3. reading case histories of computer related Internet fraud investigations.
    4. discussing state jurisdiction related to computer related Internet fraud investigations.
    5. discussing federal jurisdiction related to computer related Internet fraud investigations.
    6. discussing international jurisdiction related to computer related Internet fraud investigations.
  5. The student will demonstrate investigative software applications that may be used to investigate Internet fraud crimes by:
    1. locating sources of investigative software applications.
    2. exploring the features of investigative software applications.
    3. downloading shareware copies of investigative software applications.
    4. using investigative software applications to investigate a Internet fraud crime.
  6. The student will know the location of web sites that can be used as resources in the investigation of Internet fraud crimes by:
    1. exploring web sites related to Internet fraud crimes.
    2. obtaining access to secured sources of information regarding computer related Internet fraud investigations.
    3. locating law enforcement resources that are available to assist in computer related Internet fraud investigations.
    4. exploring newsgroups related to computer related Internet fraud investigations.

Criteria Performance Standard

Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual classroom instructors.

History of Changes

C&I 4/10/01, DBT 5/15/01, eff 20003. C&I 6/25/02, BOT 7/29/02, eff 20021. Online 20031. eff 20051(0355). 3 Year Review 2008. C&I Approval: 01/25/2005, BOT Approval: 03/15/2005, Effective Term: Fall 2005 (355).
C&I Approval: 11/21/2014, BOT Approval: 02/17/2015, Effective Term: Fall 2015 (505)

Related Programs

  1. Computer Related Crime Investigation (CRCI-CT) (625) (Active)
  2. Computer Related Crime Investigation (CRCI-CT) (585) (Draft)
  3. Digital Forensics and Computer Investigations (DIGFORN-AS) (620) (Active)
  4. Public Safety (CJPSS-AS) (645) (Active)
  5. Public Safety Administration (PSA-TR) (670) (Active)