• Offered by School of Sociology
  • ANU College ANU College of Arts and Social Sciences
  • Course subject Sociology
  • Areas of interest Sociology, Criminology
  • Academic career UGRD
  • Mode of delivery In Person
  • Co-taught Course

Cybercrime is now commonplace and presents new challenges in the prevention and detection of crime.  Drawing on a broad introduction to the history, functions and technologies of the Internet this course addresses issues of prevention and regulation and also describes the evolution of criminal activities involving computers.  Illustrative topics will include hacker myths and realities, computer forensics, ID Theft, spam, malware, phishing, fraud, crime ware tool kits, protecting personal privacy, passwords and crime groups in cyberspace. Students will gain an understanding of common forms of cybercriminal activity and the technological and 'social engineering' methods used to undertake such crimes. Current methods to prevent, investigate and detect computer-related offences, using case-based and problem based learning approaches, will be used to illustrate practical, legal and regulatory measures available to counter its impacts.

Learning Outcomes

Upon successful completion, students will have the knowledge and skills to:

Upon Successful completion of this course, students will be able to:

  1. Understand the main theoretical and cross-disciplinary approaches (criminological, legal and information security/management) in the study of cybercrime and the regulation of the Internet.
  2. Understand the structure and evolution of the Internet and its basic operations in the context of the emerging crime threats and trends in cyberspace.
  3. Identify the main typologies, characteristics, activities, actors and forms of cybercrime, including the definitional, technical and social (victim centered) aspects of crime commission.
  4. Evaluate behavioural assumptions about the role of offenders and victims in cyberspace.
  5. Analyse the impact of computer crime on government, businesses and individuals and discuss the impact of cybercrime on society.

Indicative Assessment

Tutorial participation: 10% (LO 1, 4 and 5)

Problem Based Learning Presentation of 20 minutes in tutorial: 20% (LO 1, 2, 3, and 4)

A one hour multiple-choice and short answer test in class: 20% (LO 1,2,3)

Major Essay of 3000 words: 50% (LO 1, 4, and 5) 

The ANU uses Turnitin to enhance student citation and referencing techniques, and to assess assignment submissions as a component of the University's approach to managing Academic Integrity. While the use of Turnitin is not mandatory, the ANU highly recommends Turnitin is used by both teaching staff and students. For additional information regarding Turnitin please visit the ANU Online website.


One 2 hour lecture and 1 hour tutorial for 13 weeks. Students are expected to undertake a further 7 hours of independent study per week during the semester (total of 130 hours).

Requisite and Incompatibility

To enrol in this course you must have completed CRIM1001 or SOCY1005, or with the permission of the convenor. You are unable to enrol in this course if you have previously completed SOCY6055.

Prescribed Texts

A selected collection of articles from various sources will be suggested. An introductory text is recommended and also preliminary reading:

Thomas J. Holt and, Bernadette H. Schell, 2013, Hackers and Hacking: A Reference Handbook,  ABC-CLIO, Santa Barbara

Preliminary Reading

Thomas J. Holt Ed, 2011, Crime on-line: correlates, causes, and context, Carolina Academic Press ISBN: 1594607818

Clough, John, 2010, Principles of Cybercrime, Cambridge.

Dudley-Sponaugle, Alfreda , James Braman and Giovanni Vincenti, 2011, Investigating cyber law and cyber ethics, issues, impact, Information Science Reference, ISBN: 1613501323

Glenny Misha 2011 Dark market: cyberthieves, cybercops and you, ISBN: 9781847921260

Grabosky Peter 2007 Electronic Crime, Sage, Calif

Jaishankar, K. [Ed.] 2011, Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, Boca Raton, FL, USA:  CRC Press.

McQuade III, S. C. 2006. Understanding and Managing Cybercrime, Pearson, ISBN 0-205-43973-X

Rohrbach, Shawn 2011, Virtual chaos: our vulnerability to cyber-crime and how to prevent it, Authormike  ISBN: 9780984580149

David Wall, 2009, Crime and Deviance in Cyberspace, Ashgate.

Wells, Joseph T. Ed. 2010, Internet fraud casebook : the World Wide Web of deceit, Wiley Blackwell ISBN: 9780470643631

Assumed Knowledge

Some basic knowledge of sociology/criminology is assumed or information security and computer science Recommended course is: SOCY2062 Dimensions of Crime.

Consideration for students with a computing science background or similar is warranted.




Tuition fees are for the academic year indicated at the top of the page.  

If you are a domestic graduate coursework or international student you will be required to pay tuition fees. Tuition fees are indexed annually. Further information for domestic and international students about tuition and other fees can be found at Fees.

Student Contribution Band:
Unit value:
6 units

If you are an undergraduate student and have been offered a Commonwealth supported place, your fees are set by the Australian Government for each course. At ANU 1 EFTSL is 48 units (normally 8 x 6-unit courses). You can find your student contribution amount for each course at Fees.  Where there is a unit range displayed for this course, not all unit options below may be available.

6.00 0.12500
Domestic fee paying students
Year Fee
2016 $2718
International fee paying students
Year Fee
2016 $3876
Note: Please note that fee information is for current year only.

Offerings, Dates and Class Summary Links

ANU utilises MyTimetable to enable students to view the timetable for their enrolled courses, browse, then self-allocate to small teaching activities / tutorials so they can better plan their time. Find out more on the Timetable webpage.

There are no current offerings for this course.

Responsible Officer: Registrar, Student Administration / Page Contact: Website Administrator / Frequently Asked Questions