CRIM6002 Cyber Crime, Insecurity and the Dark Web
This module is designed to introduce you to the human dimension of cybercrime and cyber security. It is not coming from a technical perspective, but instead a critical criminological approach is applied to the topic. This means that we will be questioning theory, policy and practice, and discuss the way that this area might develop in the future. This module is a ‘transdisciplinary’ approach to a very contemporary human development. As such, we are all still pioneers making our way through the subject. As such we will traverse a wide range of literature, ideas and research drawn from a dizzying array of subject areas, and their interactions. A bold claim might be that we are at the end of subject insularity and only a transdisciplinary approach provides the robust analytical tools that we need to understand issues like the Web and Cybercrime.
Aims and Objectives
To critically evaluate cutting edge research in the area of Cyber Crime and Cyber Security; To introduce the history of research into Cyber Crime; To understand the organisations and key stake holders in the business of preventing, controlling and policing Cyber Crime; To critically evaluate the theoretical foundation of research into Cyber Crime; To develop an approach to Cyber Crime and Cyber Security that recognises the interdisciplinary nature of the area.
Having successfully completed this module you will be able to:
- To critically evaluate cutting edge research in the area of Cyber Crime and Cyber Security.
- To introduce the history of research into Cyber Crime.
- To understand the organisations and key stake holders in the business of preventing, controlling and policing Cyber Crime.
- To critically evaluate the theoretical foundation of research into Cyber Crime.
- To develop an approach to Cyber Crime and Cyber Security that recognises the interdisciplinary nature of the area.
1. Cyber: A History of a Prefix 2. Technology and Crime: Tracking the Interface 3. Hacking, Spoofing and Cracking 4. Cyber Crime grows up: Carding, Escrow and the Dark Markets 5. Hacktivism: Political Protests on the web or Threat to National Security 6. Future Shock: Web 3.0 and Beyond 7. From Cyber Crime to Cyborg: The Bio-Intuitive Web 8. Policing the Web 9. Law, Tor and the Web 10. How much damage can a mouse do?: Punishing Cyber Criminals 11. Bitcoins and the political economy of crime 12. Surveillance and the Web: Research and Investigation online
Students will be introduced to PhD students and stake holders who are undertaking cutting edge research in the field of Cyber Crime and Cyber Security.
Learning and Teaching
Teaching and learning methods
Teaching will take place in 2 teaching units per week, the format will be a mix of lectures, workshops and seminars to a total of 24 contact hours.
|Total study time||150|
Resources & Reading list
Wall, D. (2007). Cybercrime.
Holt, T.J., (2010). Examining the Role of Technology in the Formation of Deviant Subcultures.. Social Science Computer Review. ,28 , pp. 466–481.
McGuire, M. (2007). Hypercrime.
Taylor, P. A. (1999). Hackers.
Holt, T.J. & Lampke, E., (2010). Exploring stolen data markets online: products and market forces. Criminal Justice Studies. ,23 , pp. 33–50.
Jewkes, Y. and Yar, M. (eds) (2010). Handbook of Internet Crime.
|Essay (1500 words)||30%|
|Essay (3000 words)||50%|
Repeat type: Internal & External