Subject details

At the completion of this subject students will:

  1. understand, analyse, and critically discuss different types of cyber crime activities with respect to the motivations, methods of operation of offenders, and the types of victims/targets
  2. demonstrate a comprehensive understanding of past, current cyber threats and future trends in high tech crime
  3. analyse the impact of cyber crime on government, businesses, society and individuals
  4. demonstrate knowledge of relevant theories, cross disciplinary approaches (criminology and information security), and the applicability to the study of cyber crime
  5. demonstrate a comprehensive understanding of strategies and steps to investigate digital evidence.
  • Topics

    • A week-by-week guide to the topics you will explore in this subject will be provided in your study materials.
  • Study resources

    • Instructional Methods

      • Disscusion forum/Discussion Board
      • Online assignment submission
      • Podcasting/Leacture capture
      • Streaming Multimedia
      • Web links
    • Online Materials

      • Resources and Links

In order to enrol in this subject, you must be accepted into one of the following degrees:

  • MAQ-PIC-GCE-2018
  • MAQ-ISS-GDI-2018
  • MAQ-ISS-MAS-2018
  • MAQ-PIC-GDI-2018
  • MAQ-PIC-MAS-2018
  • MAQ-PII-MAS-2018
  • MAQ-SSC-GCE-2018
  • MAQ-SSC-GDI-2018
  • MAQ-MCT-MAS-2018
  • MAQ-SEC-MAS-2018
  • MAQ-INT-MAS-2018
  • MAQ-PIC-GDI-2018
  • MAQ-PIC-MAS-2018
  • OUA-PSU-GCE-2018
  • MAQ-PII-MAS-2018

Special requirements

No special requirements

Cybercrime refers to an array of criminal activity including offences against computer data and systems, computer-related offences, content offences, and copyright offences. While early computer hackers were more interested in youthful exploration, modern cybercrime is increasingly about criminal profit and this is reflected in the involvement of transnational organised crime groups. This subject will provide students with detailed understanding about the different types of cybercrime, the perpetrators, and investigation techniques.

  • Assessment 1 (10%)
  • Assessment 2 (10%)
  • Assessment 3 (20%)
  • Assessment 4 (20%)
  • Assessment 5 (40%)

Textbooks are subject to change within the academic year. Students are advised to purchase their books no earlier than one to two months before the start of a subject.

View textbooks

Related degrees