General Information
In this subject you will examine the role of technology in crime and investigate the motivations, methodology and victims of cybercrime. You will study past and current cyber threats, and examine these new type of offences. The expansion of victimisation will be looked at and you will evaluate the effectiveness of institutional and investigative responses to cyber threats.
-
Details
Academic unit: Faculty of Society & Design Subject code: CRIM71-115 Subject title: Cybercrime Subject level: Postgraduate Semester/Year: January 2023 Credit points: 10.000 -
Delivery & attendance
Timetable: https://bond.edu.au/timetable Delivery mode: Standard Workload items: - Forum: x12 (Total hours: 24) - Weekly Forum
- Tutorial: x12 (Total hours: 12) - Weekly Tutorial
- Personal Study Hours: x12 (Total hours: 84) - Recommended study hours
Attendance and learning activities: Attendance and participation for this subject is required. The student will be expected to engage in group activities during lectures and tutorials and contribute to class discussions and engage on Twitter. -
Resources
Prescribed resources: Books
- Thomas J Holt (2017). Cybercrime and Digital Forensics: An Introduction 2nd Edition. 2nd, Routledge 754
iLearn@Bond & Email: iLearn@Bond is the online learning environment at Bond University and is used to provide access to subject materials, lecture recordings and detailed subject information regarding the subject curriculum, assessment and timing. Both iLearn and the Student Email facility are used to provide important subject notifications. Additionally, official correspondence from the University will be forwarded to students’ Bond email account and must be monitored by the student. To access these services, log on to the Student Portal from the Bond University website as www.bond.edu.au
Academic unit: | Faculty of Society & Design |
---|---|
Subject code: | CRIM71-115 |
Subject title: | Cybercrime |
Subject level: | Postgraduate |
Semester/Year: | January 2023 |
Credit points: | 10.000 |
Timetable: | https://bond.edu.au/timetable |
---|---|
Delivery mode: | Standard |
Workload items: |
|
Attendance and learning activities: | Attendance and participation for this subject is required. The student will be expected to engage in group activities during lectures and tutorials and contribute to class discussions and engage on Twitter. |
Prescribed resources: | Books
|
---|---|
iLearn@Bond & Email: | iLearn@Bond is the online learning environment at Bond University and is used to provide access to subject materials, lecture recordings and detailed subject information regarding the subject curriculum, assessment and timing. Both iLearn and the Student Email facility are used to provide important subject notifications. Additionally, official correspondence from the University will be forwarded to students’ Bond email account and must be monitored by the student. To access these services, log on to the Student Portal from the Bond University website as www.bond.edu.au |
Enrolment requirements
Requisites: |
Nil |
---|---|
Assumed knowledge: |
Assumed knowledge is the minimum level of knowledge of a subject area that students are assumed to have acquired through previous study. It is the responsibility of students to ensure they meet the assumed knowledge expectations of the subject. Students who do not possess this prior knowledge are strongly recommended against enrolling and do so at their own risk. No concessions will be made for students’ lack of prior knowledge.
|
Restrictions: |
Nil |
Assurance of learning
Assurance of Learning means that universities take responsibility for creating, monitoring and updating curriculum, teaching and assessment so that students graduate with the knowledge, skills and attributes they need for employability and/or further study.
At Bond University, we carefully develop subject and program outcomes to ensure that student learning in each subject contributes to the whole student experience. Students are encouraged to carefully read and consider subject and program outcomes as combined elements.
Program Learning Outcomes (PLOs)
Program Learning Outcomes provide a broad and measurable set of standards that incorporate a range of knowledge and skills that will be achieved on completion of the program. If you are undertaking this subject as part of a degree program, you should refer to the relevant degree program outcomes and graduate attributes as they relate to this subject.
Subject Learning Outcomes (SLOs)
On successful completion of this subject the learner will be able to:
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
Generative Artificial Intelligence in Assessment
The University acknowledges that Generative Artificial Intelligence (Gen-AI) tools are an important facet of contemporary life. Their use in assessment is considered in line with students’ development of the skills and knowledge which demonstrate learning outcomes and underpin study and career success. Instructions on the use of Gen-AI are given for each assessment task; it is your responsibility to adhere to these instructions.
-
Assessment details
Type Task % Timing* Outcomes assessed Computer-Aided Examination (Closed) Ilearn exam to be held in exam week on campus. 40% Final Examination Period 1,2,3,4,5,6 Student Engagement Participation and engagement will be measured each week in terms of the student's contribution to discussion and group work in the lectures and tutorials and Twitter usage in the course feed. 20% Weekly 1,2,3,4,5,6 Presentation 20 minute oral presentation on a argument that relates to the course material. 40% Weekly 1,2,3,4,5,6 - * Assessment timing is indicative of the week that the assessment is due or begins (where conducted over multiple weeks), and is based on the standard University academic calendar
- C = Students must reach a level of competency to successfully complete this assessment.
-
Assessment criteria
Assessment criteria
High Distinction 85-100 Outstanding or exemplary performance in the following areas: interpretative ability; intellectual initiative in response to questions; mastery of the skills required by the subject, general levels of knowledge and analytic ability or clear thinking. Distinction 75-84 Usually awarded to students whose performance goes well beyond the minimum requirements set for tasks required in assessment, and who perform well in most of the above areas. Credit 65-74 Usually awarded to students whose performance is considered to go beyond the minimum requirements for work set for assessment. Assessable work is typically characterised by a strong performance in some of the capacities listed above. Pass 50-64 Usually awarded to students whose performance meets the requirements set for work provided for assessment. Fail 0-49 Usually awarded to students whose performance is not considered to meet the minimum requirements set for particular tasks. The fail grade may be a result of insufficient preparation, of inattention to assignment guidelines or lack of academic ability. A frequent cause of failure is lack of attention to subject or assignment guidelines. Quality assurance
For the purposes of quality assurance, Bond University conducts an evaluation process to measure and document student assessment as evidence of the extent to which program and subject learning outcomes are achieved. Some examples of student work will be retained for potential research and quality auditing purposes only. Any student work used will be treated confidentially and no student grades will be affected.
Type | Task | % | Timing* | Outcomes assessed |
---|---|---|---|---|
Computer-Aided Examination (Closed) | Ilearn exam to be held in exam week on campus. | 40% | Final Examination Period | 1,2,3,4,5,6 |
Student Engagement | Participation and engagement will be measured each week in terms of the student's contribution to discussion and group work in the lectures and tutorials and Twitter usage in the course feed. | 20% | Weekly | 1,2,3,4,5,6 |
Presentation | 20 minute oral presentation on a argument that relates to the course material. | 40% | Weekly | 1,2,3,4,5,6 |
- * Assessment timing is indicative of the week that the assessment is due or begins (where conducted over multiple weeks), and is based on the standard University academic calendar
- C = Students must reach a level of competency to successfully complete this assessment.
Assessment criteria
High Distinction | 85-100 | Outstanding or exemplary performance in the following areas: interpretative ability; intellectual initiative in response to questions; mastery of the skills required by the subject, general levels of knowledge and analytic ability or clear thinking. |
---|---|---|
Distinction | 75-84 | Usually awarded to students whose performance goes well beyond the minimum requirements set for tasks required in assessment, and who perform well in most of the above areas. |
Credit | 65-74 | Usually awarded to students whose performance is considered to go beyond the minimum requirements for work set for assessment. Assessable work is typically characterised by a strong performance in some of the capacities listed above. |
Pass | 50-64 | Usually awarded to students whose performance meets the requirements set for work provided for assessment. |
Fail | 0-49 | Usually awarded to students whose performance is not considered to meet the minimum requirements set for particular tasks. The fail grade may be a result of insufficient preparation, of inattention to assignment guidelines or lack of academic ability. A frequent cause of failure is lack of attention to subject or assignment guidelines. |
Quality assurance
For the purposes of quality assurance, Bond University conducts an evaluation process to measure and document student assessment as evidence of the extent to which program and subject learning outcomes are achieved. Some examples of student work will be retained for potential research and quality auditing purposes only. Any student work used will be treated confidentially and no student grades will be affected.
Study Information
Submission procedures
Students must check the iLearn@Bond subject site for detailed assessment information and submission procedures.
Policy on late submission and extensions
A student who has not established a basis for an extension in compliance with University and Faculty policy either by 1) not applying before the assessment due date or 2) by having an application rejected due to failure to show a justifiable cause for an extension, will receive a penalty on assessment submitted after its due date. The penalty will be 10% of marks awarded to that assessment for every day late, with the first day counted after the required submission time has passed. No assessment will be accepted for consideration seven calendar days after the due date. Where a student has been granted an extension, the late penalty starts from the new due date and time set out in the extension.
Academic Integrity
The University’s Academic Integrity Policy defines plagiarism as the act of misrepresenting as one’s own original work: another’s ideas, interpretations, words, or creative works; and/or one’s own previous ideas, interpretations, words, or creative work without acknowledging that it was used previously (i.e., self-plagiarism). The University considers the act of plagiarising to be a breach of the Student Conduct Code and, therefore, subject to the Discipline Regulations which provide for a range of penalties including the reduction of marks or grades, fines and suspension from the University.
Bond University utilises Originality Reporting software to inform academic integrity.Feedback on assessment
Feedback on assessment will be provided to students within two weeks of the assessment submission due date, as per the Assessment Policy.
Accessibility and Inclusion Support
If you have a disability, illness, injury or health condition that impacts your capacity to complete studies, exams or assessment tasks, it is important you let us know your special requirements, early in the semester. Students will need to make an application for support and submit it with recent, comprehensive documentation at an appointment with a Disability Officer. Students with a disability are encouraged to contact the Disability Office at the earliest possible time, to meet staff and learn about the services available to meet your specific needs. Please note that late notification or failure to disclose your disability can be to your disadvantage as the University cannot guarantee support under such circumstances.
Additional subject information
Twitter will be used for student interaction throughout the course.
Subject curriculum
-
Introduction to technology and cybercrime
Introduces students to technology as a landscape for crime. Looks at the typology of cybercrime. Apply criminological theories to understand why and how cybercrime occurs.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Computer hacking
Defines computer hacking, examines hacking subculture and the history of hacking.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Digital piracy and intellectual property
Defines what is intellectual property? The evolution of online piracy and examines the subculture of piracy.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Pornography, prostitution and sex crimes
Examines the expanding role that technology plays in the facilitation of sex related crimes.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Cyberbullying, online harassment and cyberstalking
Covers online threats, bullying and harassment. Examines predictors of cyberbullying.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Online extremism, cyberterror and cyberwarfare
Analyses the role that technology plays in state-based cybercrimes and terrorism.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Digital forensics and evidence
Looks at the role of digital evidence and how digital forensic evidence is examined.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Digital forensic investigations
Examines how criminal investigations are meeting the challenges of cybercrime.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
International responses to cybercrime
Examines the role and responses of the international community to cybercrime. Examines the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
The role of victims in cybercrime
Examines how cybercrime has created new victims categories and what help is available for the victims of cybercrime.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Australian responses to cybercrime
Examines the response of Australian authorities to cybercrime.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.
-
Future challenges of cybercrime
Provides a summary of the new challenges facing society from cybercrime and future developments.
SLOs included
- Demonstrate advanced knowledge of the role of technology in criminal behaviour, and cybercrime as contemporary and evolving crime categories.
- Demonstrate advanced knowledge and skills in evaluating the significant harms (financial, emotional and societal) that result from cybercrime.
- Demonstrate advanced knowledge in evaluating past, current and future cyber threats.
- Critically evaluate and develop advanced strategies for the prevention, disruption and detection of and cybercrime.
- Demonstrate advanced knowledge and evaluation of the role, responsibilities and investigative capacities of governments, law enforcement, regulatory agencies and corporate and private sectors groups in combating cybercrime.
- Demonstrate an advanced ability to research, interpret and apply established criminological theories in relation to cybercrime.