Investigate the motivations, methodology and the victims of cyber crime by studying past and current cyber threats and future trends in high tech crime. Follow the involvement of transnational organised crime groups and profit trails.
Enrolments for this year have closed. Keep exploring subjects.
This research-intensive university in north-western Sydney offers a range of undergraduate and postgraduate degrees. With over 30,000 current students, Macquarie has a strong reputation for welcoming international students and embracing flexible and convenient study options, including its partnership with Open Universities Australia.
QS RANKING 2020
Times Higher Education Ranking 2020
At the completion of this subject students will:
- understand, analyse, and critically discuss different types of cyber crime activities with respect to the motivations, methods of operation of offenders, and the types of victims/targets
- demonstrate a comprehensive understanding of past, current cyber threats and future trends in high tech crime
- analyse the impact of cyber crime on government, businesses, society and individuals
- demonstrate knowledge of relevant theories, cross disciplinary approaches (criminology and information security), and the applicability to the study of cyber crime
- demonstrate a comprehensive understanding of strategies and steps to investigate digital evidence.
- A week-by-week guide to the topics you will explore in this subject will be provided in your study materials.
In order to enrol in this subject, you must be accepted into one of the following degrees:
No special requirements
Cybercrime refers to an array of criminal activity including offences against computer data and systems, computer-related offences, content offences, and copyright offences. While early computer hackers were more interested in youthful exploration, modern cybercrime is increasingly about criminal profit and this is reflected in the involvement of transnational organised crime groups. This subject will provide students with detailed understanding about the different types of cybercrime, the perpetrators, and investigation techniques.
- Assessment 1 (10%)
- Assessment 2 (10%)
- Assessment 3 (20%)
- Assessment 4 (20%)
- Assessment 5 (40%)