INDICATIVE CONTENT
Students are introduced to offences, investigation techniques and the use of computers and the internet for criminal intent. It will also look at the benefits that the computer and internet have provided in criminal investigations. Consideration of the development of modern-day computer technology and the legislation dealing with misuse of the technology will provide the basis on which aspects such as fraud, pornography, child abuse, copyright offences etc. will be examined. The law relating to seizure of computers and the like will be presented and the techniques for recovery of details from computer memories will be addressed. The difficulties of the need to cross international boundaries and seek assistance and involve police forces from other countries will be considered. The balance of privacy and security in cyberspace will be theme throughout.
In summary the module considers ‘what is cybercrime’ and how police and other law enforcement agencies respond to it.
ASSESSMENT DETAILS
Research paper –produce a research paper on an emerging cybercrime issue to enable achievement of learning outcomes 1,2,3,4
LEARNING STRATEGIES
Contact hours for lectures/tutorials and practical sessions will be a minimum of 28 hours.
13 x 1 hour lectures
13 x 1 hour tutorials
1 x 2 hour practical session
Non-contact time will involve extensive reading of relevant material with a view to developing knowledge and understanding of cybercrime in general but the chosen essay topic in particular.
LEARNING OUTCOMES
1. Critically discuss the key principles of cybercrime
Knowledge & understanding, Learning, Analysis
2. Evaluate the current and emerging cybercrime threats to the UK
Enquiry, Analysis
3. Evaluate policies, procedures and techniques of how cybercrime can be investigated
Problem solving, communication
4. Analyse and evaluate the significance of real case studies
Analysis, Application, Reflection
RESOURCES
Lecture Theatre
Blackboard or other VLE
IT rooms for practical session
TEXTS
Given the fast-moving pace of cybercrime as a concept and in the investigative techniques utilised this reference text needs to be kept under constant review.