Hold on just a sec...
3 credits
Fall 2025 Lecture Distance Learning Upper DivisionThis course examines both the traditional and contemporary forms of cybercrime, including hacking, insider threat, Internet child pornography, cyberbullying, hacktivism, and cyberterrorism. Students will learn how computers can be either the target (e.g., hacking) or the tool (e.g., child pornography) for committing cybercrimes. In addition, this course will apply a variety of sociological, psychological, and criminological theories to help explain, "Why do some people engage in cybercrimes when others do not?" Theories discussed include: social learning theory, space transition theory, routine activity theory, social cognitive theory, techniques of neutralization, and personality characteristics.
Learning Outcomes1Juxtapose traditional and contemporary forms of cybercriminal behavior.
2Apply theoretical (psychological, sociological, criminological) concepts to different cybercrimes.
3Analyze and synthesize empirical literature on theory and cybercriminal behavior.