The University of Southampton
Courses

CRIM6008 Cyber Crime, Insecurity and the Dark Web (Cyber Security)

Module Overview

Aims and Objectives

Module Aims

To critically evaluate cutting edge research in the area of Cyber Crime and Cyber Security; To introduce the history of research into Cyber Crime; To understand the organisations and key stake holders in the business of preventing, controlling and policing Cyber Crime; To critically evaluate the theoretical foundation of research into Cyber Crime; To develop an approach to Cyber Crime and Cyber Security that recognises the interdisciplinary nature of the area.

Learning Outcomes

Learning Outcomes

Having successfully completed this module you will be able to:

  • To critically evaluate cutting edge research in the area of Cyber Crime and Cyber Security.
  • To introduce the history of research into Cyber Crime.
  • To understand the organisations and key stake holders in the business of preventing, controlling and policing Cyber Crime
  • To critically evaluate the theoretical foundation of research into Cyber Crime.
  • To develop an approach to Cyber Crime and Cyber Security that recognises the interdisciplinary nature of the area.

Syllabus

1. Cyber: A History of a Prefix 2. Technology and Crime: Tracking the Interface 3. Hacking, Spoofing and Cracking 4. Cyber Crime grows up: Carding, Escrow and the Dark Markets 5. Hacktivism: Political Protests on the web or Threat to National Security 6. Future Shock: Web 3.0 and Beyond 7. From Cyber Crime to Cyborg: The Bio-Intuitive Web 8. Policing the Web 9. Law, Tor and the Web 10. How much damage can a mouse do?: Punishing Cyber Criminals 11. Bitcoins and the political economy of crime 12. Surveillance and the Web: Research and Investigation online

Special Features

Students will be introduced to PhD students and stake holders who are undertaking cutting edge research in the field of Cyber Crime and Cyber Security.

Learning and Teaching

Teaching and learning methods

Teaching will take place in 2 teaching units per week, the format will be a mix of lectures, workshops and seminars to a total of 24 contact hours.

TypeHours
Independent Study126
Teaching24
Total study time150

Resources & Reading list

Wall, D. (2007). Cybercrime. 

Holt, T.J., (2010). Examining the Role of Technology in the Formation of Deviant Subcultures. Science Computer Review. ,28 , pp. 466–481.

Jewkes, Y. and Yar, M. (eds) (2010). Handbook of Internet Crime. 

Taylor, P. A. (1999). Hackers. 

Holt, T.J. & Lampke, E., (2010). Exploring stolen data markets online: products and market forces. Criminal Justice Studies,. ,23 , pp. 33–50.

McGuire, M. (2007). Hypercrime. 

Assessment

Summative

MethodPercentage contribution
Essay  (1500 words) 30%
Essay  (2000 words) 50%
Group presentation 20%

Referral

MethodPercentage contribution
Coursework assignment(s) 100%

Repeat Information

Repeat type: Internal & External

Share this module Facebook Google+ Twitter Weibo

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×