0% found this document useful (0 votes)
99 views

Cyber Crime - Course Syllabus

Uploaded by

scepzard44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

Cyber Crime - Course Syllabus

Uploaded by

scepzard44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Rutgers University – Newark

Cyber Crime
47:202:323 :01
Spring 2020
CPS 105
Tuesday and Friday 1:00pm – 2:20pm

Instructor: Binneh s Minteh


Office Hours: Tuesday 9:00am – 12: 30 pm By appointment
Office Location: CLJ 354E
Email: [email protected]
Telephone: 862-235-7055

I: Course Overview

This course provides an overview of crime in cyber space to students who have no
educational background on computer science. This course will provide students with an
introduction of the social, legal, and technical impact of cybercrime on the global stage.
The main course contents will generally focus on cybercrime in the context of
criminology and policing cybercrime. Course lessons will expose students to specific
aspects of cybercrime (micro level) and the linkages of traditional crime to cybercrime
and mainstream society at large (macro level). The course will incorporate diverse
learning activities including lectures, class exercises, presentations and group
discussions.

Prerequisites: None

B.S., Criminal Justice Program Learning Goals


Upon completion of the B.S. in Criminal Justice at Rutgers University-Newark, students
should be able to:
1) Describe the development and functions of major criminal justice institutions (e.g.,
police, courts, corrections, and juvenile justice), the activities of actors within these
institutions, and how they relate to one another as well as the broader social, political, and
economic world.

2) Describe the mechanisms, correlates, theoretical underpinnings, and situational


contexts of crime, criminal behavior and opportunity, and techniques for prevention and
treatment.
3) Apply and analyze theories related to the policies and practices of the criminal justice
system and its major institutions.
4) Demonstrate the ability to gather, explain, and apply empirical research in the field of
criminal justice.
5) Obtain a comprehensive knowledge about the process of conducting criminal justice
research, and develop the skills to conduct criminal justice research with appropriate
methodologies.

Student Learning Objectives/Outcomes

 Students will learn about the origin, development, trend and future of delinquency
and crime in cyber space.
 Students will learn about the causes, definitions and typologies of cybercrime
including cyber terrorism.
 Students will learn about the basic structure and functions of Information and
Technology infrastructure and its vulnerabilities.
 Students will learn that the cybercrime studies are interdisciplinary studies made
up of technology, delinquency, policing and society.
 Students will learn about the dynamic relationships among all parts and players of
the cybercriminals, victims, IT society and cyber policing.
 Students will learn to think critically about how policies and practices of policing
on cybercrime might affect other criminal justice agencies, social systems, and/or
key stakeholders

Required Course Material


 Taylor, R. E., Fritsch, E.J., Liederbach, J, Michael. R.S, William L.T (2018).
Cyber Crime and Cyber Terrorism (4th edition), Pearson ISBN-13:
9780134846514,

Recommended Course Material


 Janine Kremling, Amanda M.Sharp Parker (2018), Cyber Space, Cyber Security,
and Cyber Crime, ISBN-978-1-5063-4725-7

 Supplemental reading articles will be assigned and made available to


students each class time during the semester.

Course Requirements:
Students are required to complete assigned readings and participate in classroom
discussions in a manner that reflects familiarity with the readings and previous class
sessions. Students are required to access the course website regularly to stay informed
about any changes in lecture topics, assigned readings and other course
announcements.

2
Course Structure:

The course will incorporate diverse learning activities including lectures, PowerPoint
presentations, and group discussions.
Classroom learning is a group activity that depends upon everyone’s full participation in
order to succeed. I expect students to: be prepared to begin class on time, silence or turn
off and put away cell phones and other electronic devices, read and be prepared to
discuss homework, submit assignments on time, and assist your classmates. You can
expect that I will: be on time and prepared for every class, be available via email and
appointments to answer questions, make every class engaging and valuable, and respect
your contributions to class.

II: Course Schedule

Week Date Topics and Assignment Deadlines


Introductions
01/21
1
01/24 Course Overview
Taylor , Fritsch and Liederbach , Chapter 1: Overview of
Digital Crime
01/28 Janine Kremling, Amanda M.Sharp Parker, Chapter 1: Cyber
01/31 Space , The Internet and The World Wide Web
Janine Kremling, Amanda M.Sharp Parker, Chapter 2: What
2 is Cyber Security?

Taylor , Fritsch and Liederbach , Chapter 3: The criminology of


02/04 Computer Crime
3
Janine Kremling, Amanda M.Sharp Parker: Chapter 3: Three Factors
02/07
– Computers as Targets
Taylor , Fritsch and Liederbach , Chapter 4: Hackers
02/11
Janine Kremling, Amanda M.Sharp Parker: Chapter 4: Threats to
4 Cyber Security by Hacktivists and Nations -States
Taylor, Fritsch and Liederbach, Chapter 5; Sophisticated Cyber
02/14
Criminal Organizations
Taylor , Fritsch and Liederbach , Chapter 7: Viruses and Malicious
02/18
5 Code
02/21 Exam I
Taylor , Fritsch and Liederbach , Chapter 8: Sex Crimes,
Victimization, Obscenity across the World Wide Web
02/25 Janine Kremling, Amanda M.Sharp Parker, Chapter 8: An evolving
Threat : The Deep Web
6
02/28 Mid-Term Exam
7 03/03 Taylor , Fritsch and Liederbach , Chapter 9 : Anarchy and Hate on

3
the World Wide Web
03/06
Taylor , Fritsch and Liederbach , Chapter 10: Digital Laws and
03/10 Legislation
8
Janine Kremling, Amanda M.Sharp Parker, Chapter 10: Cyber
03/13 Security Policies and Legal Issues
Exam II - Midterm Exam
9 Spring Recess- March 14– March 22

Taylor , Fritsch and Liederbach , Chapter 2: Cyber Terrorism and


Information Warfare
03/24
Janine Kremling, Amanda M.Sharp Parker : Chapter 7:
10 Cyberterrorism
03/27
Taylor , Fritsch and Liederbach , Chapter 14: Information Security
and Infrastructure Protection
03/31
Janine Kremling, Amanda M.Sharp Parker, Chapter 6: National
11
Security and Information Warfare
Chapter11: Law Enforcement Roles and Responses
04/03
Taylor , Fritsch and Liederbach , Chapter 12: - The Investigation of
Computer-Related Crime
04/07
12 Janine Kremling, Amanda M.Sharp Parker, Chapter 9: Cyber
Security Operations
04/10 Taylor , Fritsch and Liederbach ,Chapter 13; Digital Forensics
13 04/14
Janine Kremling, Amanda M.Sharp Parker,Chapter 4: Threats to
04/17 Cybersecurity by Criminals and Organized Crime.
Exam III
Taylor , Fritsch and Liederbach , Chapter 15: A Forecast of Trends
04/21 and Policy Implications
14
Taylor , Fritsch and Liederbach , Chapter 15: A Forecast of Trends
04/24 and Policy Implications

Janine Kremling, Amanda M.Sharp Parker, Chapter 11: What The


04/28
15 Future Holds
05/01 Class Summary and Exam Review

Final Exam TBA

4
III: Grading
Grading: 500 points
Course Components Possible Points Letter Grade
Attendance/ Participation (10%) 50 A 90 - 100%
B+ 85 -89%
Exams I (15%) 75 B 80-84%
Exam II – Midterm Exam (20%) 100
C+ 75-79%
Exam III (15%) 75 C 70-74%
D 70%
Final Exam (40%)* 200 F 60%

Readings. Students are expected to complete all assigned readings before each class
meeting. Class lectures and discussions will provide a venue to share insights gained from
the assigned readings and to ask questions about issues of concern from the readings.
Students also are responsible for reading all supplemental material assigned or provided.

Attendance and Participation


Attendance and participation constitute an integral part of your grade. Two or more
unexcused absences will affect a portion of your grade. As such, students’ attendance
and active participation are both desired and expected. Failure to attend a class or
leaving class before its conclusion will constitute an absence, unless a documented
excuse is provided. If you miss more than two (2) classes without a documented
excuse, your ability to pass this class will be placed in serious jeopardy. Also, it is
important to note that lateness will not be tolerated. You will be considered late if you
arrive after class has started. Please note that three (3) tardy days equate to one
absence.

There will be Four Exams administered throughout the semester. Students who fail to
complete the exam on the prescribed dates WILL NOT be permitted to take the exam
unless extenuating circumstances exists (i.e. medical attention, family emergency, etc.).
Proper documentation MUST be provided before the student is able to take a make-up
examination.

 Exam I
 Exam II – Midterm Exam
 Exam III
 Final Exam

Final Exams
This is a cumulative final examination designed to confirm student understanding of the
concepts, theories and challenges of cyber-crime in contemporary criminal justice. In this

5
exam students will respond to Multiple Choice, True or False and Short Questions. No
text books, computers or cell phones are allowed during the exams.

IV. Course Policies

Classroom Rules
All members of this class are required to conduct themselves in an appropriate and
professional manner. Laptops are permitted only if disengaged from the internet and
other electronic devices should be stored away unless you specifically seek the
instructor’s permission. In this class, we may have discussions that challenge our
taken for granted assumptions about crime and justice. Students should be prepared to
engage honestly and openly about this material and perhaps even examine their own
beliefs about the issues. While I am hopeful that the course materials will spark
interesting discussion, personal insults or other types of demeaning, disrespectful, or
threatening comments toward other class members about their experiences,
backgrounds, or statements will NOT be tolerated. No eating and use of cell phone is
allowed in the classroom.

Academic Integrity
As a member of the Rutgers University community you are not to engage in any
academic dishonesty. You are responsible for adhering to basic academic standards of
honesty and integrity as outlined in the Rutgers University Policy on Academic Integrity
for Undergraduate and Graduate Students http://studentconduct.rutgers.edu/academic-
integrity

Your academic work should be the result of your own individual effort, you should not
allow other students to use your work, and you are required to recognize and reference
any material that is not your own. Violations of the university’s policy will result in
appropriate action.

Academic Resources

The Writing Center: The Writing Center offers writing tutoring and writing workshops
to all undergraduate students currently enrolled in classes on the Rutgers, Newark
campus. To request more information, sign up for tutoring or to register for workshops,
visit Conklin Hall 126, or online at: http://andromeda.rutgers.edu/~nwc/

Rutgers Blackboard System


All of the materials and assignments for this course can be accessed on, and downloaded
from, the Rutgers’ Blackboard Course site: http://blackboard.newark.rutgers.edu/. Your login
information is the same username and password you use to access your Rutgers student
information. If you utilize an email address that is different from the one that Rutgers assigns

6
you, please change your email address on blackboard. Emails will be sent to the class
through Blackboard. Students are responsible for any messages sent via the Blackboard
message system.

Students with Disabilities


Rutgers University is committed to providing equal educational opportunity for persons
with disabilities in accordance with the Nondiscrimination Policy of the University and
in compliance with § 504 of the Rehabilitation Act of 1973 and with Title II of the
Americans with Disabilities Act of 1990. For additional information please visit the
website https://ods.rutgers.edu/ or contact the representative for the Newark Campus.
Allen Sheffield
Director of ADA Services and Academic Support
Robeson Campus Center, Suite 352
350 Martin Luther King Jr. Boulevard
Newark, NJ 07102
Phone: 973.353.5300
Fax: 973.353.5666
E-mail: [email protected]
Website: https://ods.rutgers.edu/
Psychological and Counseling Services
If you experience psychological or other difficulties as a result of this course, or because
of other issues that may interfere with your performance in the course, please contact the
university’s psychological and counseling service center
(http://www.counseling.newark.rutgers.edu; 973-353-5805), which is located in
Blumenthal Hall, room 101. The center offers a variety of free, confidential services to
part-time and full-time students who are enrolled at Rutgers.
If you are interested in finding out more about
• Accelerated Master's Program (B.S. /M.A.)
• Criminal Justice National Honor Society (Alpha Phi Sigma)
Please refer to the School of Criminal Justice website http://rscj.newark.rutgers.edu/
Follow us, to stay up to date! @SCJ_apps

You might also like