Unformatted Attachment Preview
HSM438
Introduction to Cyber Crime
This course focuses on the technical aspects of digital crime as well as
behavioral aspects of computer hackers, virus writers, terrorists and other
offenders. Using real life examples and case studies, students will
examine the history, development, extent and types of digital crime and
digital terrorism as well as current legislation and law enforcement
practices designed to prevent, investigate and prosecute these crimes.
HSM438: Introduction to Cyber Crime
Online
Table of Contents
COURSE AT A GLANCE ............................................................................................................................................................... 4
COURSE DESCRIPTION .................................................................................................................................................................... 4
COURSE DESIGN ............................................................................................................................................................................. 4
COURSE PREREQUISITES ................................................................................................................................................................. 5
LEARNING OUTCOMES .................................................................................................................................................................... 5
LEARNING RESOURCES ................................................................................................................................................................... 5
Required Text ............................................................................................................................................................................ 5
Required Websites ..................................................................................................................................................................... 6
Required Multimedia ................................................................................................................................................................. 6
Recommended Websites ............................................................................................................................................................. 6
COMPONENTS OF COURSE EVALUATION ............................................................................................................................. 7
DISCUSSIONS .................................................................................................................................................................................. 7
QUIZZES......................................................................................................................................................................................... 7
ASSIGNMENTS ................................................................................................................................................................................ 7
FINAL PAPER .................................................................................................................................................................................. 7
COURSE GRADING ........................................................................................................................................................................ 10
Grading Percent Breakdown .................................................................................................................................................... 10
WEEK ONE ................................................................................................................................................................................... 11
COURSE CONTENT ........................................................................................................................................................................ 11
Overview ................................................................................................................................................................................. 11
Learning Outcomes.................................................................................................................................................................. 11
Required Readings................................................................................................................................................................... 11
Discussions ............................................................................................................................................................................. 11
Quiz ........................................................................................................................................................................................ 12
WEEK TWO .................................................................................................................................................................................. 13
COURSE CONTENT ........................................................................................................................................................................ 13
Overview ................................................................................................................................................................................. 13
Learning Outcomes.................................................................................................................................................................. 13
Required Readings, Websites, and Multimedia ......................................................................................................................... 13
Discussions ............................................................................................................................................................................. 14
2
HSM438: Introduction to Cyber Crime
Online
Quiz ........................................................................................................................................................................................ 14
Assignments............................................................................................................................................................................. 15
WEEK THREE .............................................................................................................................................................................. 16
COURSE CONTENT ........................................................................................................................................................................ 16
Overview ................................................................................................................................................................................. 16
Learning Outcomes.................................................................................................................................................................. 16
Required Readings and Websites.............................................................................................................................................. 16
Discussions ............................................................................................................................................................................. 17
Quiz ........................................................................................................................................................................................ 17
WEEK FOUR ................................................................................................................................................................................ 18
COURSE CONTENT ........................................................................................................................................................................ 18
Overview ................................................................................................................................................................................. 18
Learning Outcomes.................................................................................................................................................................. 18
Required Readings................................................................................................................................................................... 18
Discussions ............................................................................................................................................................................. 18
Quiz ........................................................................................................................................................................................ 19
WEEK FIVE .................................................................................................................................................................................. 20
COURSE CONTENT ........................................................................................................................................................................ 20
Overview ................................................................................................................................................................................. 20
Learning Outcomes.................................................................................................................................................................. 20
Required Readings................................................................................................................................................................... 20
Discussions ............................................................................................................................................................................. 20
Final Paper ............................................................................................................................................................................. 21
COURSE MAP............................................................................................................................................................................... 22
3
HSM438: Introduction to Cyber Crime
Online
Course at a Glance
Course Description
This course focuses on the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus
writers, terrorists and other offenders. Using real life examples and case studies, students will examine the history,
development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement
practices designed to prevent, investigate and prosecute these crimes.
Course Design
This introductory course is designed to systematically take students through the threats of cyber crime and cyberterrorism.
Over five weeks, students will examine the most common criminal threats on the Internet and the laws and organizations
empowered to fight them.
During Week One, students are introduced to the different crimes and acts of terrorism that are committed via computers
and the Internet. Students will learn to differentiate between cyberterrorism and information warfare as they are exposed
to subcategories of each. Week One closes with an examination of various psychological and social theories that explain
deviant behavior online.
During Week Two, students examine the subculture of hackers. This profile of hackers leads to an overview of whitecollar crimes committed on the Internet. Week Two closes with a review of viruses and malicious codes and how they are
used to perpetrate crime on the Internet.
During Week Three, students shift to topics of victimization via the Internet. Sexual exploitation, cyberbullying and
cyberstalking are examined, including a review of the legal provisions that restrict these behaviors. Extremist ideologies
of hate and terrorism are examined as they continue to proliferate on the Internet. Week Three closes with a discussion of
the key laws and legal codes which govern and authorize the investigation of digital crime.
During Week Four, students distinguish between the roles and responsibilities of federal, state, and local agencies in
policing the Internet. This includes learning about the different roles and areas of expertise investigators must utilize to
4
HSM438: Introduction to Cyber Crime
Online
effectively investigate digital crime. Week Four closes with an overview of evidentiary issues related to digital crime and
terrorism prevention.
Week Five concludes the course with an examination of issues related to network security and infrastructure protection.
This section discusses, at length, the problems typically encountered with regard to the U.S.A. Patriot Act. Week Five
ends with a discussion of eight different forecasts related to the future of cyber crime and cyberterrorism. Students will
also turn in their Final Paper, which is a plan for developing a Cyber Crime Task Force in a U.S. law enforcement
jurisdiction.
Course Prerequisites
There are no prerequisites for HSM438.
Learning Outcomes
Upon successful completion of this course, students will be able to:
1. Evaluate the changing character of cybervictimization types of computer crime.
2. Analyze the concepts of information warfare, cyberterrorism, and risk and critical infrastructure attacks.
3. Demonstrate an understanding of the types, nature, and extent of digital crime.
4. Determine how digital laws and legislation are used to control cyber crime.
5. Analyze the Federal Statutes as they relate to searches without warrants, The Wiretap Statute, and the U.S.A.
Patriot Act.
Learning Resources
Required Text
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital crime and digital terrorism (2nd ed.). Upper
Saddle River, NJ: Pearson.
5
HSM438: Introduction to Cyber Crime
Online
Required Websites
PBS (Producer). (1995-2010). Frontline: “Hackers: Who are hackers?" [Collection of interviews]. Boston, MA: WGBH
Educational Foundation. Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/
Required Multimedia
Block, M. (Host). (2010, September 30). The rise in cyberbullying [Audio podcast]. All things considered. Podcast
retrieved from http://www.npr.org/templates/story/story.php?storyId=130247610
MacIntyre, L. (Correspondent). (2001). Hacking into an ordinary home computer. [Television series episode]. In
Docherty, N. (Producer/Director), Frontline. Boston, MA: WGBH Educational Foundation. Retrieved from
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/etc/video.html
MacIntyre, L. (Correspondent). (2001). The most underreported hacking attacks. [Television series episode]. In Docherty,
N. (Producer/Director), Frontline. Boston, MA: WGBH Educational Foundation. Video retrieved from
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/etc/video.html
Recommended Websites
Ashford University. (n.d.). Ashford writing center. Retrieved from https://content.ashford.edu/
6
HSM438: Introduction to Cyber Crime
Online
Components of Course Evaluation
Multiple measures of evaluation are used in the course, allowing students opportunities to demonstrate their learning in
more than one way, and giving consideration to individual learning styles. Course components that will be evaluated
include:
Discussions
Each week students will participate in online discussions with classmates, which are related to the week’s readings. These
discussions replace the interactive dialogue that occurs in the traditional classroom setting. Each week, students’ initial
discussion posts are due by 11:59 p.m. (of the time zone in which each student resides) on Day 3 (Thursday). Students
will have until 11:59 p.m. on Day 7 (the following Monday) to make the required minimum number of response posts to
classmates. Discussions represent 30% of the overall course grade.
Quizzes
In Weeks One through Four, students will demonstrate and reinforce their understanding of the week’s content by taking
open-book quizzes. Students have up to 12 hours to complete a quiz once they begin. The quiz must be completed in one
sitting, by Day 6 of the week in which it is due. The questions are multiple choice and true/false. Each quiz is worth five
percent. Quizzes represent 20% of the overall course grade.
Assignments
There is a written assignment due in Week Two of this course. These assignments must reflect college-level writing and
critical thinking. Assignments represent 20% of the overall course grade.
Final Paper
The final assignment for this course is a Final Paper. The purpose of the Final Paper is for you to culminate the learning
achieved in the course by developing a task force plan. The Final Paper represents 30% of the overall course grade.
7
HSM438: Introduction to Cyber Crime
Online
Focus of the Final Paper
Scenario: You have been an investigator for the St. Louis Police Department for many years. Recent surges in cyber crime
have caused your police department to consider developing a cyber crime task force to combat the rising number of cyber
thefts in St. Louis County jurisdictions. The police commissioner recognizes that you are a top investigator and appoints
you to lead the new cyber crime task force. The commissioner says to you “Build a cyber crime task force. Tell us [a]
what the greatest cyber threats are, [b] what you need to establish a cyber crime task force, and [c] what legislation we
should push for to stop these cyber crimes.”
In eight to ten double-spaced pages, (excluding the title page and reference page) develop a cyber crime task force plan
for St. Louis County in Missouri. Use research from the Internet and the Ashford Online Library to identify cyber crime
investigative strategies and task force developments around the country. Identify techniques, tools, and organizational
structures used by other law enforcement agencies to determine which ones will be most useful for your task force. Use
the following outline to produce your plan for the St. Louis police commissioner:
1. Executive Summary of Cyber Crime Task Force Plan (one paragraph)
2. Cyber crime threats in St. Louis County
a. What are the greatest cyber crime threats that St. Louis County is currently facing or likely to face in
the near future? (Use data and statistics from outside the course text.)
b. Which three types of cyber crime will be the top priorities for the task force?
3. Cyber Crime Task Force Structure
a. Which organizational structure will the task force utilize?
b. What personnel and skills will the task force need to investigate the top three cyber threats?
c. Which federal agencies in the St. Louis area should the task force develop relationships with in order
to be effective?
4. Cyber Crime Task Force Equipment
a. Which types of equipment, technologies, and items should the police commissioner acquire for the
Cyber Crime Task Force?
b. What is needed to develop a cyber crime lab capable of performing cyber forensics?
c. Why are these systems important?
5. Cyber Crime Legislation
a. In order to pursue cyber criminals, what legislation and provisions should be developed in St. Louis
County to increase local law enforcement capacity for investigating cyber crime?
8
HSM438: Introduction to Cyber Crime
Online
b. Where should these laws be passed?
6. Conclusion
a. In addition to those identified above, what other factors should be considered in building a Cyber
Crime Task Force?
Students must refer to and cite cyber crime task force best practices used by federal, state and local law enforcement
around the country to inform their Cyber Crime Task Force Plan. In addition to the course text, you must use at least five
scholarly sources to support your thesis. At least two of these sources must come from the Ashford Online Library. All
sources must be properly cited, and the Final Paper must be formatted according to APA style. If you would like to refer
to APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation
toolbar, in your online course.
Writing the Final Paper
The Final Paper:
1. Must be eight to ten double-spaced pages in length, and formatted according to APA style as outlined in the
Ashford Writing Center.
2. Must include a title page with the following:
a. Title of paper
b. Student’s name
c. Course name and number
d. Instructor’s name
e. Date submitted
3. Must begin with an introductory paragraph that has a succinct thesis statement.
4. Must address the topic of the paper with critical thought.
5. Must end with a conclusion that reaffirms your thesis.
6. Must use at least five scholarly resources, including a minimum of two from the Ashford Online Library.
7. Must document all sources in APA style, as outlined in the Ashford Writing Center.
8. Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing
Center.
9
HSM438: Introduction to Cyber Crime
Online
Course Grading
Grading Percent Breakdown
Discussions
Quizzes
Assignments
Final Paper
Total:
10
30%
20%
20%
30%
100%
HSM438: Introduction to Cyber Crime
Online
Week One
Course Content
To be completed during the first week of class
Overview
Assignment
Post Your Introduction
Information Attacks
Hacker Theory
Week One Quiz
Day 1
Discussion
Grading
Percent
1
Day 3
(1st post)
Day 3
(1st post)
Day 6
Discussion
3
Discussion
3
Quiz
5
Due Date
Format
Learning Outcomes
This week students will:
1. Analyze various types of information attacks to determine which poses the greatest threat to the United States and
its citizens.
2. Investigate the origin and development of the hacker subculture in digital environments.
Required Readings
1. To successfully complete this week’s assignments, read the following chapters from the text, Digital Crime and
Digital Terrorism:
a. Chapter One – Introduction and Overview of Digital Crime and Digital Terrorism
b. Chapter Two – Digital Terrorism
c. Chapter Three – The Criminology of Computer Crime
Discussions
Participate in the following discussions:
11
HSM438: Introduction to Cyber Crime
Online
1. 1st Posting Due by Day 1. Post Your Introduction. Please post a brief bio on the first day of class. Respond to
at least three of your classmates' bios. Use this forum to get acquainted and for ongoing non-content related
discussions.
2. 1st Posting Due by Day 3. Information Attacks. Identify which type of information attack described in the
Week One readings poses the greatest threat to the United States and its citizens. Explain why you believe this
information attack is the greatest threat.
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
3. 1st Posting Due by Day 3. Hacker Theory. Describe which theory from Chapter Three of Digital Crime and
Digital Terrorism best explains the origin and development of the hacker subculture in digital environments.
Identify one strength and one weakness of this theory in describing hacker behavior.
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
Quiz
1. Due Day 6. Week One Quiz. Complete the quiz on the assigned readings for the week.
12
HSM438: Introduction to Cyber Crime
Online
Week Two
Course Content
To be completed during the second week of class
Overview
Assignment
Hacker Subculture
Denial-of-Service Attacks
Week Two Quiz
Case Studies: Information Warfare &
Cyberterrorism
Day 3
(1st post)
Day 3
(1st post)
Day 6
Discussion
Grading
Percent
3
Discussion
3
Quiz
5
Day 7
Assignment
20
Due Date
Format
Learning Outcomes
This week students will:
1. Identify different types of hackers.
2. Deconstruct the hacker subculture and its influences.
3. Analyze different types of malicious codes and viruses.
4. Construct effective solutions to cases studies regarding information warfare and cyberterrorism.
Required Readings, Websites, and Multimedia
1. To successfully complete this week’s assignments, read the following chapters from the text, Digital Crime and
Digital Terrorism:
a. Chapter Four – Digital Criminal and Hackers
b. Chapter Five – White-Collar Crimes
c. Chapter Six – Viruses and Malicious Code
2. In order to successfully complete this week’s assignments, review the material at the following website:
a. Frontline: “Hackers: Who Are Hackers?"
(This online source provides in-depth interviews with hackers and cyber security experts.)
13
HSM438: Introduction to Cyber Crime
Online
3. In order to successfully complete this week’s discussion, “Hacker Subculture,” watch the following videos from
Hackers:
a. Hacking Into an Ordinary Home Computer
b. The Most Underreported Hacking Attacks
(These Frontline video excerpts provide students with different perspectives regarding hacker subculture.
A transcript of the entire Frontline episode, “Hackers,” is available at the Frontline: Tapes and
Transcripts website.)
Discussions
Participate in the following discussions:
1. 1st Posting Due by Day 3. Hacker Subculture. Describe what is meant by the “hacker subculture” and identify
at least one value that drives the hacker subculture. Watch Hacking Into an Ordinary Home Computer and The
Most Underreported Hacking Attacks, video excerpts from the Frontline episode, “Hackers,” and read the
interviews found at the website Frontline: “Hackers: Who Are Hackers?" to help formulate your opinions. Do you
think this hacker value system can ultimately be used to disrupt and deter hackers in the future?
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
2. 1st Posting Due by Day 3. Denial-of-Service Attacks. Describe what is meant by a “Denial-of-Service” attack.
Do you believe that denial-of-service attacks could realistically be used as part of a cyberterrorism or cyber
warfare campaign? Is there any evidence of this technique being used successfully by nation-states in warfare?
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
Quiz
1. Due Day 6. Week Two Quiz. Complete the quiz on the assigned readings for the week.
14
HSM438: Introduction to Cyber Crime
Online
Assignments
1. Due by Day 7. Case Studies: Information Warfare & Cyberterrorism. Outline three major information
warfare or cyberterrorism events that occurred around the globe in recent history. To complete the assignment:
1. Research the following three case studies:
a. Russian denial-of-service attack on the country of Estonia in 2007
b. Cyberattacks during the 2008 South Ossetia war between Georgia and Russia
c. US State Department Compromised Computers in the East Asia Bureau in July 2006
2. For each of the three case studies above, address all of the following:
a. Who was the victim of the cyberterrorism or information warfare campaign?
b. Who was the aggressor in the cyberterrorism or information warfare campaign?
c. What type of cyber attack occurred (e.g. virus, malicious code, denial-of-service, hacking, etc.)?
d. Explain how the technique was used and what the outcome was for the victim.
e. What has the victim (country or person) done since the cyber attack to prevent similar attacks
from occurring, in the future?
3. Compare and contrast the different attacks. Based on your analysis, identify which cyber defense
mechanisms you think are critical to preventing the recurrence of these types of cyber attacks in the
future.
The paper must be three pages in length and formatted according to APA style. You must use at least three
scholarly resources other than the textbook to support your claims and subclaims. Cite your resources in text and
on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center,
within the Learning Resources tab on the left navigation toolbar, in your online course.
15
HSM438: Introduction to Cyber Crime
Online
Week Three
Course Content
To be completed during the third week of class
Overview
Assignment
Cyberbullying
Policing Hate on the Internet
Week Three Quiz
Discussion
Grading
Percent
3
Discussion
3
Quiz
5
Due Date
Day 3
(1st post)
Day 3
(1st post)
Day 6
Format
Learning Outcomes
This week students will:
1. Analyze the prevalence of victimization in cyber crime.
2. Assess the incidence and regulation of cyberbullying.
3. Identify the threat of hate groups on the internet.
4. Investigate the uses and authorizations for Title III wiretaps, the U.S.A. Patriot Act, and the Electronic
Communications Privacy Act.
Required Readings and Websites
1. To successfully complete this week’s assignments, read the following chapters from the text, Digital Crime and
Digital Terrorism:
a. Chapter Seven – Sex Crimes, Victimization, and Obscenity on the World Wide Web
b. Chapter Eight – Anarchy and Hate on the World Wide Web
c. Chapter Nine – Digital Laws and Legislation
2. In order to successfully complete this week’s assignments, review the material at the following websites:
16
HSM438: Introduction to Cyber Crime
Online
a. NPR: The Rise In Cyberbullying
(This radio interview discusses elements of cyberbullying and potential aspects of laws related to
cyberbullying in the future. A transcript of the interview is available also at the website.)
Discussions
Participate in the following discussions:
1. 1st Posting Due by Day 3. Cyberbullying. Describe the difference between cyberbullying and cyberstalking.
Recent cases of cyberbullying have received national attention. Do you think cyberbullying is a crime? Is
cyberbullying an act that should be pursued legally in U.S. courts of law?
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
2. 1st Posting Due by Day 3. Policing Hate on the Internet. Identify two challenges that law enforcement and
intelligence organizations face when policing hate groups on the Internet. Do you think that police should be able
to gather evidence on extremist groups via the Internet? How does the USA Patriot Act, the Electronic
Communications Privacy Act and Title III wiretaps help or hinder police from investigating extremist groups on
the internet.
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
Quiz
1. Due Day 6. Week Three Quiz. Complete the quiz on the assigned readings for the week.
17
HSM438: Introduction to Cyber Crime
Online
Week Four
Course Content
To be completed during the fourth week of class
Overview
Assignment
Local Response to Computer Crimes
Electronic Search Warrants
Week Four Quiz
Discussion
Grading
Percent
3
Discussion
3
Quiz
5
Due Date
Day 3
(1st post)
Day 3
(1st post)
Day 6
Format
Learning Outcomes
This week students will:
1. Identify the roles and responsibilities of law enforcement in the prevention of cyber crime.
2. Analyze legislative impediments to local prevention of cyber crime.
3. Assess different personnel and skills needed to investigate computer-related crime.
4. Summarize the process by which digital evidence is acquired during an investigation of computer-related crimes.
5. Recognize the considerations that must be addressed when dealing with Electronic Search Warrants.
Required Readings
1. To successfully complete this week’s assignments, read the following chapters from the text, Digital Crime and
Digital Terrorism:
a. Chapter Ten – Law Enforcement Roles and Responses
b. Chapter Eleven – The Investigation of Computer-Related Crime
c. Chapter Twelve – Digital Forensics
Discussions
Participate in the following discussions:
18
HSM438: Introduction to Cyber Crime
Online
1. 1st Posting Due by Day 3. Local Response to Computer Crimes. Describe at least two reasons why local law
enforcement and municipalities face challenges when investigating computer crimes. Identify at least one key
component that local law enforcement agencies should have to improve their investigative response.
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
2. 1st Posting Due by Day 3. Electronic Search Warrants. Identify at least two considerations that must be
addressed when developing a search warrant application during an investigation of computer-related crime. How
does a single crime scene or multiple crime scenes affect cyber investigations?
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
Quiz
1. Due Day 6. Week Four Quiz. Complete the quiz on the assigned readings for the week.
19
HSM438: Introduction to Cyber Crime
Online
Week Five
Course Content
To be completed during the fifth week of class
Overview
Assignment
Firewalls and Encryption
Forecasting Future Digital Crime and
Terrorism
Cyber Crime Task Force Plan
Discussion
Grading
Percent
2
Discussion
3
Final Paper
30
Due Date
Day 3
(1st post)
Day 3
(1st post)
Day 7
Format
Learning Outcomes
This week students will:
1. Distinguish between firewalls and encryption in cyber security.
2. Analyze security technologies used to protect against system intrusion.
3. Justify different forecasts predicting the future of digital crime and terrorism.
4. Develop a plan for a cyber crime task force that will combat cyber threats.
Required Readings
1. To successfully complete this week’s assignments, read the following chapters from the text, Digital Crime and
Digital Terrorism:
a. Chapter Thirteen – The Future of Digital Crime and Digital Terrorism: Prevention and Trends
b. Chapter Fourteen – Digital Crime and Terrorism: A Forecast of Trends and Policy Implications
Discussions
Participate in the following discussions:
20
HSM438: Introduction to Cyber Crime
Online
1. 1st Posting Due by Day 3. Firewalls and Encryption. Describe the difference between firewall protection and
encryption protection within the domain of information security and infrastructure protection. Assess which type
of protection you believe is the most vital (firewalls or encryption) for securing digital information.
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
2. 1st Posting Due by Day 3. Forecasting Future Digital Crime and Terrorism. Chapter Fourteen of the course
text, Digital Crime and Digital Terrorism, provides eight forecasts for the potential future of digital crime and
digital terrorism. Identify which of these eight forecasts you believe is most likely to come true. Provide at least
two reasons why you believe that forecast is the most accurate. What is the biggest challenge that the criminal
justice system faces in trying to defend against the forecast you selected?
Your initial post should be at least 250-300 words in length. Support your claims with examples from required
material(s) and/or other scholarly resources, and properly cite any references. Respond to at least two of your
classmates’ posts by Day 7.
Final Paper
1. Due by Day 7. Cyber Crime Task Force Plan. The complete instructions for the Final Paper can be found in
Week Five of your online course or in the “Components of Course Evaluation” section of this guide.
21
HSM438: Introduction to Cyber Crime
Online
Course Map
The course map illustrates the careful design of the course through which each learning objective is supported by one or
more specific learning activities in order to create integrity and pedagogical depth in the learning experience.
Learning Outcome
1. Evaluate the changing character of
cybervictimization types of computer crime.
2. Analyze the concepts of information warfare,
cyberterrorism, and risk and critical
infrastructure attacks.
3. Demonstrate an understanding of the types,
nature, and extent of digital crime.
22
Week
Assignment
1
1
1
2
2
2
3
3
3
5
5
5
1
1
1
2
2
2
2
3
5
5
5
1
1
1
2
2
2
3
3
4
4
5
Information Attacks Discussion
Hacker Theory Discussion
Week One Quiz
Hacker Subculture Discussion
Week Two Quiz
Case Studies: Information Warfare &
Cyberterrorism Written Assignment
Cyberbullying Discussion
Policing Hate on the Internet Discussion
Week Three Quiz
Firewalls and Encryption Discussion
Forecasting Future Digital Crime and
Terrorism
Final Paper: Cyber Crime Task Force Plan
Information Attacks Discussion
Hacker Theory Discussion
Week One Quiz
Hacker Subculture Discussion
Denial-of-Service Attacks Discussion
Week Two Quiz
Case Studies: Information Warfare &
Cyberterrorism Written Assignment
Policing Hate on the Internet Discussion
Firewalls and Encryption Discussion
Forecasting Future Digital Crime and
Terrorism Discussion
Final Paper: Cyber Crime Task Force Plan
Information Attacks Discussion
Hacker Theory Discussion
Week One Quiz
Denial-of-Service Attacks Discussion
Week Two Quiz
Case Studies: Information Warfare &
Cyberterrorism Written Assignment
Cyberbullying Discussion
Week Three Quiz
Local Response to Cyber Crime Discussion
Week Four Quiz
Forecasting Future Digital Crime and
HSM438: Introduction to Cyber Crime
Online
5
Terrorism Discussion
Final Paper: Cyber Crime Task Force Plan
4. Determine how digital laws and legislation
are used to control cyber crime.
3
3
3
4
4
4
5
Cyberbullying Discussion
Policing Hate on the Internet Discussion
Week Three Quiz
Local Response to Cyber Crime Discussion
Electronic Search Warrants Discussion
Week Four Quiz
Final Paper: Cyber Crime Task Force Plan
5. Analyze the Federal Statutes as they relate
to searches without warrants, The Wiretap
Statute, and the U.S.A. Patriot Act.
3
3
4
4
4
5
Policing Hate on the Internet Discussion
Week Three Quiz
Local Response to Cyber Crime Discussion
Electronic Search Warrants Discussion
Week Four Quiz
Final Paper: Cyber Crime Task Force Plan
23