CCJ 3075 - Introduction to Cybercrime

College of Public Safety Administration

Credit(s): 3
Contact Hours: 47
Effective Term Spring 2022 (600)

Requisites

Admission to Public Safety Administration (Bachelor of Applied Science) (PSA-BAS)

Course Description

This course presents an introduction to computer crime through an examination of the acts and theories of cybercrime, cyberterrorism, and information warfare. It also analyzes the individuals who commit cybercrimes, as well as the specific laws, investigative techniques, and criminological theories applicable to computer crime. Topics include the various types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other digital criminals, and the investigative, research, and legal strategies targeting these acts. Finally, the course examines the unique technical issues that arise during investigations of cybercrime.

Learning Outcomes and Objectives

  1. Students will evaluate the nature of digital crime and digital terrorism by:
    1. Describing the current issues, trends, and problems in cybercrime and cyberterrorism.
    2. Explaining the scheme for classifying computer crime.
    3. Listing the four categories of attacks that encompass cyberterrorism and/or information warfare.
    4. Summarizing the characteristics of an information attack.
    5. Analyzing the tenets of choice theory and its applicability to cybercrimes.
    6. Reviewing the major social structure theories that apply to cybercrime.
  2. Students will investigate the various types, nature, and extent of digital crime by:
    1. Distinguishing between computer crime, criminal hacking, and noncriminal hacking.
    2. Explaining how the role of technology influences the hacker subculture.
    3. Enumerating the various types of espionage and insider fraud.
    4. Identifying the various types of criminal organizations or enterprises that are engaged in cybercrime.
    5. Describing how computer technologies have altered the ways in which embezzlement, money laundering, and corporate espionage are committed.
    6. Summarizing how computer technologies and the increasing use of the Internet have affected identity theft and fraud crimes.
  3. Students will analyze how viruses, cyberstalking, and online hate speech increase cybercrime by:
    1. Listing the various types of viruses and malicious code.
    2. Comparing attacks including denial of service attacks and blended threats.
    3. Identifying the groups affected by cyber exploitation, bullying, stalking, and obscenity.
    4. Summarizing the legislation in the areas of cyberstalking, cyber exploitation, and pornography.
    5. Defining the elements of a hate crime.
    6. Describing how white supremacist groups use the Internet to spread their message of hate.
    7. Explaining the techniques that hate groups use to spread their propaganda.
  4. Students will interpret the legislation and enforcement of digital crime by:
    1. Listing the federal statutes that govern electronic surveillance in communications networks.
    2. Identifying the significant U.S. Supreme Court cases focusing on digital crime and evidence.
    3. Providing an overview of the roles and responses of federal law enforcement agencies concerning cybercrimes.
    4. Summarizing local law enforcement responses to computer crime.
    5. Explaining the search warrant application process appropriate to electronic evidence at a single-location crime scene.
    6. Identifying the best current practices for the collection, preservation, transportation, and storage of electronic evidence.
    7. Enumerating the steps used to preserve the verifiable integrity of digital evidence.
    8. Assessing the most common locations for particular types of digital evidence needed for various types of investigations.
  5. Students will describe the future trends of digital crime by:
    1. Comparing the primary security technologies that are used to protect information.
    2. Defining encryption and discuss its use in terms of authenticity, integrity, and confidentiality.
    3. Identifying trends and issues the criminal justice system will have to contend with regarding cybercrime and cyberterrorism.
    4. Demonstrating the areas of computer crime victimization that are growing in prevalence, magnitude, and frequency of occurrence.

Criteria Performance Standard

Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual course instructors.

History of Changes

C&I Approval: , BOT Approval: , Effective Term: Spring 2022 (600)

Related Programs

  1. Public Safety Administration (PSA-BAS) (655) (Active)