Cybercrime is now commonplace and presents new challenges in the prevention and detection of crime. Drawing on a broad introduction to the history, functions and technologies of the Internet this course addresses issues of prevention and regulation and also describes the evolution of criminal activities involving computers. Illustrative topics will include hacker myths and realities, computer forensics, ID Theft, spam, malware, phishing, fraud, crime ware tool kits, protecting personal privacy, passwords and crime groups in cyberspace. Students will gain an understanding of common forms of cybercriminal activity and the technological and 'social engineering' methods used to undertake such crimes. Current methods to prevent, investigate and detect computer-related offences, using case-based and problem based learning approaches, will be used to illustrate practical, legal and regulatory measures available to counter its impacts.
Upon successful completion, students will have the knowledge and skills to:
Upon Successful completion of this course, students will be able to:
- Understand the main theoretical and cross-disciplinary
approaches (criminological, legal and information security/management) in the
study of cybercrime and the regulation of the Internet.
- Understand the structure and evolution of the Internet
and its basic operations in the context of the emerging crime threats and
trends in cyberspace.
- Identify the main typologies, characteristics,
activities, actors and forms of cybercrime, including the definitional,
technical and social (victim centered) aspects of crime commission.
- Evaluate behavioural assumptions about the role of
offenders and victims in cyberspace.
- Analyse the impact of computer crime on government, businesses and individuals and discuss the impact of cybercrime on society.
Tutorial participation: 10% (LO 1, 4 and 5)
Problem Based Learning Presentation of 20 minutes in tutorial: 20% (LO 1, 2, 3, and 4)
A one hour multiple-choice and short answer test in class: 20% (LO 1,2,3)
Major Essay of 3000 words: 50% (LO 1, 4, and 5)
The ANU uses Turnitin to enhance student citation and referencing techniques, and to assess assignment submissions as a component of the University's approach to managing Academic Integrity. While the use of Turnitin is not mandatory, the ANU highly recommends Turnitin is used by both teaching staff and students. For additional information regarding Turnitin please visit the ANU Online website.
One 2 hour lecture and 1 hour tutorial for 13 weeks. Students are expected to undertake a further 7 hours of independent study per week during the semester (total of 130 hours).
Requisite and Incompatibility
A selected collection of articles from various sources will be suggested. An introductory text is recommended and also preliminary reading:
Thomas J. Holt and, Bernadette H. Schell, 2013, Hackers and Hacking: A Reference Handbook, ABC-CLIO, Santa Barbara
Thomas J. Holt Ed, 2011, Crime on-line: correlates, causes, and context, Carolina Academic Press ISBN: 1594607818
Clough, John, 2010, Principles of Cybercrime, Cambridge.
Dudley-Sponaugle, Alfreda , James Braman and Giovanni Vincenti, 2011, Investigating cyber law and cyber ethics, issues, impact, Information Science Reference, ISBN: 1613501323
Glenny Misha 2011 Dark market: cyberthieves, cybercops and you, ISBN: 9781847921260
Grabosky Peter 2007 Electronic Crime, Sage, Calif
Jaishankar, K. [Ed.] 2011, Cyber Criminology: Exploring Internet Crimes and Criminal Behavior, Boca Raton, FL, USA: CRC Press.
McQuade III, S. C. 2006. Understanding and Managing Cybercrime, Pearson, ISBN 0-205-43973-X
Rohrbach, Shawn 2011, Virtual chaos: our vulnerability to cyber-crime and how to prevent it, Authormike ISBN: 9780984580149
David Wall, 2009, Crime and Deviance in Cyberspace, Ashgate.
Wells, Joseph T. Ed. 2010, Internet fraud casebook : the World Wide Web of deceit, Wiley Blackwell ISBN: 9780470643631
Some basic knowledge of sociology/criminology is assumed or information security and computer science Recommended course is: SOCY2062 Dimensions of Crime.
Consideration for students with a computing science background or similar is warranted.
Tuition fees are for the academic year indicated at the top of the page.
If you are a domestic graduate coursework or international student you will be required to pay tuition fees. Tuition fees are indexed annually. Further information for domestic and international students about tuition and other fees can be found at Fees.
- Student Contribution Band:
- Unit value:
- 6 units
If you are an undergraduate student and have been offered a Commonwealth supported place, your fees are set by the Australian Government for each course. At ANU 1 EFTSL is 48 units (normally 8 x 6-unit courses). You can find your student contribution amount for each course at Fees. Where there is a unit range displayed for this course, not all unit options below may be available.
Offerings, Dates and Class Summary Links
ANU utilises MyTimetable to enable students to view the timetable for their enrolled courses, browse, then self-allocate to small teaching activities / tutorials so they can better plan their time. Find out more on the Timetable webpage.