CJE 1680 - Introduction to Computer Related Crime Investigations
College of Public Safety Administration
Credit(s): 3
Contact Hours: 47
Contact Hours: 47
Effective Term Fall 2024 (640)
Course Description
Cybercrime is one of the fastest-growing crimes in the world, and it's becoming increasingly sophisticated. This course will provide students with the skills and knowledge they need to recognize, investigate and prosecute cybercrime. The students will learn about the different types of cybercrime, how the crimes are actually committed, and how to properly investigate them. The course also explores the investigative software tools and the legal issues involved in prosecuting cybercrime.
Learning Outcomes and Objectives
- The student will explain the definition of a computer related crime by:
- distinguishing federal and state laws related to computer crime.
- contrasting the various types of computer related crime.
- reading and discussing case histories of computer-related crimes.
- listing crimes that can be committed with the use of a computer.
- The student will elaborate how a computer and the Internet can be used to commit a crime by:
- comparing the methods used by individuals to commit computer related crimes.
- describing the methods used by individuals to commit computer related crimes.
- enumerating crimes that have been committed with the use of a computer.
- explaining how the Internet can be used to commit computer related crimes.
- listing the items required to commit a crime with a computer.
- The student will characterize the principles of investigating a computer related crime by:
- interpreting scenarios to determine if a computer related crime has occurred.
- predicting which, if any, federal or state laws apply to scenarios provided.
- defining electronic evidence.
- reviewing standard procedures for the collection of evidence.
- explaining the importance of collecting electronic evidence.
- describing the chain of custody.
- reviewing software tools used to retrieve hidden and deleted electronic data from computers and storage media.
- identifying the true identity of individuals based upon fictitious Internet identifiers.
- recalling how to track individuals on the Internet.
- The student will examine investigative software tools by:
- reviewing the sources of investigative software tools.
- exploring the features of investigative software tools.
- using investigative software tools.
- discovering investigative software tools on the Internet.
- The student will explain the issues related to the jurisdiction of computer related crimes by:
- reviewing laws and rules regarding jurisdiction.
- comparing and contrasting federal, state, and international jurisdiction.
- recognizing the jurisdiction of various types of computer related crimes.
Criteria Performance Standard
Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual classroom instructors.
History of Changes
C&I Approval: , BOT Approval: 05/15/2001, Effective Term: Fall 2008 (400).
C&I Approval: 02/17/2024, BOT Approval: 03/19/2024, Effective Term: Fall 2024 (640)
Related Programs
- Computer Related Crime Investigation (CRCI-CT) (625) (Active)
- Digital Forensics and Computer Investigations (DIGFORN-AS) (620) (Active)
- Public Safety (CJPSS-AS) (645) (Active)
- Public Safety Administration (PSA-TR) (670) (Active)
