Crimes of the Internet
Frank Schmalleger & Michael Pittaro
2009 Pearson Education
Course Number: CJ 523 / CJ 603
Credit Hours: 3.0 / 4.0
Course Title: Internet Vulnerabilities and Criminal Activity
Professor: Susan E Traudt
Semester: Fall 2011
Classroom: Buckman Hall 203
Class Meets: Mondays
Time: 6:00 - 9:05 PM
Office Hours: Monsdays
Time: 5:00 - 6:00 PM
Since I do not have an office on campus, I will be available immediately before class.
Other times can be arranged by appointment.
Course Web Page: http://ttsw.com/CJ523 or http://ttsw.com/CJ603
"This course provides appropriate strategies for the proper documentation, preparation and presentation of investigations involving the Internet and familiarizes students with legal information which impacts Internet investigations"
Undergraduate: Successful completion of CS 107 Introduction to Data Processing (no exceptions), successful completion of or concurrent registration in CJ 520 Computer Crime: Legal Issues and Investigative Procedures as well as consent of the Professor.
This course is limited to those already computer literate, operationally defined as having, at minimum, a working knowledge of e-mail, word processing software, web browsers, and search engines.
Those who will benefit most from this course are students who contemplate making use of the skills learned in this course in an investigative capacity or as an information security specialist.
First priority is given to graduate students whose designated concentration is Forensic Computer Investigation. Law enforcement officers interested in moving into the field of high tech crime investigation or pre-service students attracted to information assurance and security are given second priority.
EXPECTED STUDENT OUTCOMES
By the end of the course students must be able to:
- Display the proficient use of web browsers and search engines.
- Summarize the architecture and typologies commonly in use on the Internet.
- Recognition of how the Internet can be used for criminal activities
- Understand the criminology of cyber criminals
- Understand the process of investigating and prosecuting Internet crimes
Students enrolled in CJ 603 will be expected one research project on Internet usage for criminal activity.
- What is cyberspace?
- Structure of Communications on the Internet
- A Brief History of the Internet
- Social Networking Sites
- Predatory & Exploitation Crimes
- Cyber Bullying
- Cyber stalking
- Child Pornography
- Child Exploitation
- Sexual Tourism
- Financial Crimes
- Credit Card Fraud
- Identity Theft
- Nigerian 419 E-mail Scams
- High-Yield Investment Programs (HYIP)
- Online Pharmaceutical Sales
- Internet Gambling
- Internet Organized Crime
- Intellectual Property Crime
- Malware & Crime
- Criminological Perspectives on Cyber Crime
- Space Transition Theory
- Routine Activity Theory
- Neutralization & Social Organization
- Investigating & Prosecuting Cyber Crime
- Cyber Terrorism & Cyber Warfare
- The Future of Cyber Crime
|1. Mid-Term Exam
|2. Final Exam
|3. Class Participation & In Class Exercises
|4. Term Paper
A = 100 -90 points
B = 89 -80
C = 79 -70
D = 69 -60
F = < 60
It is your responsibility to advise me in advance via e-mail if you anticipate missing a class. Regardless of the reason for your absence—or arriving late—it is your responsibility to secure lecture notes from a classmate. You are expected to attend every class meeting. Make-up for an exam must be requested within 24 hours of a scheduled exam and a doctor’s note, or other form of verification, may be requested by the instructor.
CODE OF CONDUCT
Academic dishonesty is not tolerated at the University of New Haven. All students are responsible for reading and understanding the statement on academic honesty in the Student Handbook. Violation of university standards for academic honesty, including plagiarism, will be a sufficient reason for an F in the course and will be reported to the Vice President for Student Affairs and Athletics. A second violation may be cause for expulsion from the university. Plagiarism is defined as the unacknowledged use of another person's work or the submission of the same work for more than one course without express written permission in advance (Undergraduate Catalog 2006 -2008,
p. 46; see also: http://www.newhaven.edu/show.asp?durki=2099#Honesty).
STUDENTS WITH DISABILITIES
UNH complies with Section 504 of the Rehabilitation Act of 1973, the Americans with Disabilities Act (ADA). Students who have a disability or special needs and require accommodation in order to have equal access to the classroom must register with the designated staff member in the Disability Services and Resources in Sheffield Hall (ground level, rear), telephone number (203) 932-7331 (Voice/TDD). Students will be required to provide documentation of any disability when an accommodation is requested (see Undergraduate Catalog 2006 -2008, p. 24; see also:
CELL PHONES & PAGERS
Nothing is more disruptive to a class then someone's cell phone going off or, worse yet, someone taking or making a call in class. Please show respect for me and your classmates by turning off your phone before class starts.