College Of DuPage

ACTIVE COURSE FILE

*Curricular Area: CRIMINAL JUSTICE / Course Number: 1165
Course Title: Computers and Criminal Justice
SemesterCredit Hours:3 / Clinical Hours:0 / Lecture Hours:3 / Lab Hours:0

Course description to appear in catalog:

A comprehensive overview of computer-related crimes, including related reactive and proactive investigative strategies; programs involving computer technologies developed and utilized by criminal justice investigators, analysts and other professionals.

Repeatable for credit: No

Pre-Enrollment Criteria:

None

A. General Course Objectives:

Upon successful completion of the course the student should be able to do the following:

  1. Analyze the various criminal methodologies/strategies/solutions derived from developing computer technology
  2. Describe the nature of offenses created by criminal computer use, including theft of hardware/software piracy/information forgery, system sabotage, and on-line crimes involving fraud, identity theft, exortion, threats, pornography, indecent solicitations, pedophilia, terrorism and other related fields
  3. Analyze the various investigative strategies needed to address these emerging criminal usages
  4. Explain the various ways computer technology is utilized as an investigative strategy for criminal justice professionals, including evidence analysis and criminological research

B.Topical Outline:

  1. Introduction to computer forensics
  2. Computer crimes
  3. Theft of hardware
  4. Software piracy
  5. Information forgery
  6. System sabotage
  7. On-line crimes: fraud, extortion, threats, pornography, indecent solicitations, pedophilia, conspiracies, terrorism
  8. System hacking
  9. Identity theft
  10. Emerging related crimes
  11. Computer investigative strategies; reactive and proactive
  12. Evidence analysis
  13. Criminological research

C.Methods of Evaluating Students:

  1. Students will be evaluated by projects and/or tests, and/or participation. Class attendance may also be a factor in evaluation.

DENNIS L HUDSON07-03-2004

InitiatorDateDivision DeanDate

07-03-2004

SponsorDate


CRIMINAL

JUSTICE

AT THE

COLLEGE OF DUPAGE

Health and sciences division

Criminal Justice Department

Syllabus

COURSE NUMBER
COURSE NAME
CREDIT HOURS
REGISTRATION CODE
START/END DATES
COURSE DAY AND TIME
ROOM
INSTRUCTOR NAME
OFFICE
PHONE/VM
E-MAIL
OFFICE HOURS
COURSE MATERIALS / CRIMJ 1165-015
Computers & Criminal Justice
3
51251
Wednesday, January 20th - Wednesday, May 12,2010
Monday & Wednesday @ 9:00 AM - 9:50 AM CT
Blackboard Academic Suite

Eric R. Thompson
Mr. or Professor Thompson (either is fine)
SRC 3651
(630) 942-3360

See course Blackboard site
Virtual Office: I will also use the AIM Instant message system.
My AIM name is ethompson04. If you are not an AIM member, you can download the free service at:

t=Aim&client=no
*Anytime that I am signed on to the AIM service, I am available for course related questions
1.Crimes of the Internet, by Frank Schmalleger & Michael Pittaro
ISBN: 0-13-231886-5
Pearson Education, Inc., 2009

TARGET AUDIENCE

Those interested in the field of criminal justice or criminal justice professionals looking for career advancement or knowledge enhancement.

RECOMMENDED BACKGROUND

Students should have a basic knowledge of the criminal justice system, i.e., police, courts, and corrections. Also recommended is a plain understanding of technology and its many forms (e.g., hardware and software).

RECOMMENDED SOFTWARE

  • Microsoft Windows Operation System (Windows 98, ME, 2000, or XP)
  • Microsoft Office 2000 (or higher)
  • Internet Explorer 6.0 (or higher)
  • Adobe Acrobat Reader (free download on the Internet)
  • AOL Instant Messenger (free download on the Internet)

Thompson-CRIMJ 1165-Spring, 2010

COURSE DESCRIPTION

A comprehensive overview of computer-related crimes, including related reactive and proactive investigative strategies and programs involving computer technologies developed and utilized by criminal justice investigators, analysts and other professionals. (3 lecture hours)

COURSE OUTCOMES:

By the end of this course, you should be able to:

  1. Define the technological phenomenon of computer crime
  2. Describe physical and virtual risks faced by computing individuals and organizations
  3. Compare attacks versus information and infrastructure security
  4. Describe and categorize cybercriminals
  5. Explain how criminological theory is used to categorize cybercriminals
  6. Understand how cyber laws and regulations are used to manage computer crime
  7. Explain how understanding cybercrime will improve our ability to manage it
  8. Describe the various considerations of cybercrime management

ATTENDANCE:

Attendance for this class is compulsory. Unexcused absences will affect your ability to earn quiz and/or in-class activity points.

GRADING

Grade Weighting

Description / Date/Week Assigned / Points / Your Score
Attestation / Week 1 / 30
Activities / Weeks 2-5, 7-9, & 11-15 / 300 (25 points each)
Exam I / Week 6 due no later then Friday, February 26th
@ 11:59 PM CT / 100
Exam II / Week 10 due no later then Friday, Mach 26th
@ 11:59 PM CT / 100
Exam III / FINAL EXAM (Chapters 22-31) [In-Class]Monday, May 10th @ 2:00 PM - 3:50 PM CT / 100
Research Paper / due no later then Friday, April 30th @ 11:59 PM CT / 200
Research
Paper
Assignments / Weeks 2-7 & 11 / 70 (10 points each)
Presentation / Weeks 14 & 15 (earlier dates are available upon request) / 100
TOTAL / 1000

Grading Scale

A / 900-1000 / 90-100%
B / 800-899 / 80-89%
C / 700-799 / 70-79%
D / 600-699 / 60-69%
F / 500-599 / 0-59%

Thompson-CRIMJ 1165-Spring, 2010

ATTENDANCE

Active participation is compulsory. In order to complete this course successfully, you must participate actively throughout the entire term. Failing to keep-up, will affect your ability to earn quiz, web field trip, writing assignment, and/or in-class participation points.

COURSE REQUIREMENTS

  1. You are expected to gain access to the course Blackboard site. Contact the Student Helpdesk by e-mail () or call (630.942.2999) with any technical questions.
  2. You are expected to read the materials during the week that they are assigned and to participate in class discussions.
  3. Examinations and/or quizzes may include information from class lectures, readings, videos, and discussion sessions. You are expected to learn all key concepts for these assessments, which may include multiple-choice and/or essay questions.
  4. If you are unable to take an exam, you must contact me by phone 48-hours in advance. Subsequently, a prepared essay exam must be taken within an agreed upon timeframe.

MISCELLANEOUS

Coverage of the topics is not exhaustive and is limited by time and knowledge level of the student.

Tests scores and grades on papers will not be curved.

There will be no extra credit offered, so do not ask!

Classroom civility is expected at ail times. Breaches of this rule will result in the individual being asked to leave the class for that period.

Except in emergencies, the use of cell phones, beepers, or other communication devices is disruptive, and is therefore prohibited during class.

No sleeping in class. If you are too tired, please respect yourself and the classroom environment enough to stay home and rest.

I reserve the right to elevate a final grade by one designation if the student has shown superior class performance and participation. This is NOT at the discretion of the student and will be limited in scope to those students 2-percentage point from the higher-grade designation.

Academic dishonesty, if discovered, will mean a ZERO on the assignment or exam involved and will be reported to the appropriate College of DuPage authorities. Plagiarism will not be accepted. If necessary, cite your sources well.

If you have disabilities that require alternative accommodations or course requirements, please inform me of these disabilities before the first week of class ends. In addition, contact the Office of Special Student Services at 1 -630-942-2306 or 4260.

Thompson-CRIMJ 1165-Spring, 2010

IMPORTANT DATES

  • Monday, January 18th: Legal Holiday (M. L King's Birthday) (No Classes)
  • Friday, February 26th: In-Service Day/Professional Day (No Classes)
  • Monday, Mach 29th - Sunday, April 4th Spring Break (No Classes)
  • Friday, May 7th End of 16-Week Classes
  • Saturday, May 8th - Friday, May 14th Final Evaluations/Culminating Activities

PROPOSED COURSE OUTLINE

Note that I will adjust the course outline to match class progress.

Week 1

Wednesday, January 20th

  • Introduction to the course and Blackboard
  • Introduction to computer crime concepts
  • Chapter 1 ~ Sexual Addiction to the Internet: From Curiosity to Compulsive Behavior (Pittaro)
  • Online course attestation

Week 2

Monday & Wednesday, January 25th & 27th

  • Chapter 2 ~ Pedophile, Pornography, and Stalking: Analyzing Child Victimization on the Internet (Jaishankar/Halder/Ramdoss)
  • Chapter 3 ~ Internet Child Sexual Exploitation: Offenses, Offenders, and Victims (Huang/Leopard/Brockman)
  • Research paper topic
  • Activity 1

Week 3

Monday & Wednesday, February 1st & 3rd

  • Chapter 4 ~ Cyber Bullying: A Transnational Perspective (Jaishankar/Shariff)
  • Chapter 5 ~ Internet Crimes: Youth and Children (Raghavan/Ranjan/Reddy)
  • Preliminary research paper reading list
  • Activity 2

Week 4

Monday& Wednesday, February 8th & 10th

  • Chapter 6 ~ Online Pharmaceutical Sales and the Challenge of Law Enforcement (Finley)
  • Chapter 7 ~ Charges Without Borders: Consumer Credit Card Fraud in Ghana (Davison)
  • Chapter 8 ~ Regulating Cyberstalking (Basu/Jones)
  • Final research paper reading list
  • Activity 3

Weeks 5

Monday* Wednesday, February 15th & 17th

  • Chapter 9 ~ Internet Gambling (Geis/Brown/Jones)
  • Chapter 10 ~ Nature and Distribution of Phishing (Stroik/Huang)
  • Chapter 11 ~ You Can't Cheat an Honest Man: Making($$$ and) Sense of the Nigerian E-mail Scams (King/Thomas)
  • Preliminary research paper outline
  • Activity 4

Week 6

Monday & Wednesday, February 22nd & 24th

  • Chapters 12 ~ Identity Theft Causes, Correlates, and Factors: A Content Analysis (Berg)
  • Chapter 13 ~ Internet Fraud and Cyber Crime (Cukier / Levin)
  • Final research paper outline
  • Exam I (Chapters 1-13) due no later then Friday, February 26th @ 11:59 PM CT

Thompson-CRIMJ 1165-Spring, 2010

Week 7

Monday & Wednesday, March 1st & 3rd

  • Chapter 14 ~ Space Transition Theory of Cyber Crimes (Jaishankar)
  • Chapter 15 ~ Routine Activity Theory and Internet Crime (Cox/Johnson/Richards)
  • Page 1 of research paper
  • Activity 5

Week 8

Monday & Wednesday, March 8th & 10th

  • Chapter 16 ~ The Rhetoric of Hackers' Neutralizations (Turgeman-Goldschmidt)
  • Chapter 17 ~ Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers (Holt)
  • Activity 6

Week 9

Monday & Wednesday, March 15th & 17th

  • Chapter 18 ~ "It's Like Printing Money": Piracy on the Internet (Nhan)
  • Chapter 19 ~ The Warez Scene: Digital Piracy on the Online World (Ponte)
  • Activity 7

Week 10

Monday & Wednesday, March 22nd & 24th

  • Chapter 20 ~ Internet and Crime Trends (Ouimet)
  • Chapter 21 ~ Internet Gambling: The Birth of a Victimless Crime? (Giacopassi/Pitts)
  • Exam II (Chapters 14-21) due no later then Friday, March 26th @ 11:59 PM CT

SPRING BREAK (No Classes)

March 29th - April 4th

Week 11

Monday & Wednesday, April 5th & 7th

  • Chapter 22 ~ Investigating Computer Crime (Hinduja)
  • Chapter 23 ~ Criminal Profiling and Cyber Criminal Investigations (Shoemakier/Kennedy)
  • Research paper (rough draft)
  • Activity 8

Week 12

Monday & Wednesday, April 12th & 14th

  • Chapter 24 ~ Digital Evidence (Scarborough/Rogere/Frakes/Marting)
  • Chapter 25 ~ The Dateline Effect: Internet Stings (Rubenser/Orvis/Rush)
  • Activity 9

Week 13

Monday & Wednesday, April 19th & 21st

  • Chapter 26 ~ Evidence Issues Involved in Prosecuting Internet Crime (Roberson)
  • Chapter 27 ~ The Politics of Internet Crimes (Marion)
  • Chapter 28 ~ The Fourth Amendment Impact on Electronic Evidence (Obinyan/lkegwuonu/Vanderpuye)
  • Activity 10

Week 14

Monday & Wednesday, April 26th & 28th

  • Chapter 29 ~ The Dark Side of the Web: Terrorists' Use of the Internet (Damphusse)
  • Chapter 30 ~ Cyber Terrorism: Problems, Perspectives, and Prescriptions (Soma/Sundaram/Jaishankar)
  • Research Paper (Final Version) due no later then Friday, April 30th @ 11:59 PM CT
  • Presentations BEGIN
  • Activity 11

Week 15

Monday & Wednesday, May 3rd & 5th

  • Chapter 31 ~ Cyber Terrorism: Problems, and Prescription (Soma Sundaram/Jaishankar)
  • Activity 12
  • Presentations END

EXAM III (Chapters 22-31) [In-Class] Monday, May 10th @ 2:00 PM - 3:50 PM CT

Spring 2010 Final Exams and other Culminating Activities: Saturday, May 8th to Friday, May 14th

Thompson-CRIMJ 1165-Spring, 2010

College of DuPage POLICIES

Withdrawal from Class

Students are encouraged to consult directly with the instructor when considering a course withdrawal. The student may withdraw from a course by contacting the Registration office up to the eighth calendar day following the midterm date in any semester (or the equivalent in any session of non-standard length) and receive a grade of "W." After the eighth calendar day following midterm, written permission to withdraw signed by the instructor must be presented to the Registration office by the student prior to the end of the semester or session.

Administrative Withdrawal

Students not actively pursuing the completion of course objectives may be withdrawn from the class by the instructor. Instructors of courses numbered below 1000 may assign a final grade of "W" without an official withdrawal through the Registration office.

Incomplete

The instructor of record may give an incomplete or "I" grade when a student has been unable to complete the course within the prescribed time due to unforeseen circumstances. The student is responsible for contacting the instructor of record or, when the instructor of record is no longer employed at the college, the appropriate dean regarding course completion. Course work must be completed within the time limits prescribed by the instructor of record but not to exceed twelve (12) months from the end of the term in which the "I" grade was assigned. The "I" grade may be changed within the time limit prescribed by the instructor of record. If the "I" has not been changed by the instructor of record at the end of the twelve (12) month period, the T will automatically change to an "F." During the time the "I" is on the student's record, it.

Student Conduct, Academic Dishonesty, and Plagiarism

Each student will be held accountable for every 'Right and Responsibility' as described by the Student's Code of Conduct, within the College of DuPage Catalog (see pp. 49-50)

[

All academic assignments are to be the work of the individual student. Academic dishonesty is a serious offense and may result in a failing grade on an assignment, failure in the course or dismissal from the College. The following are examples of dishonesty, or unethical and unprofessional behavior

  • Plagiarism - Using another person's words, ideas, or results without giving proper credit to that person, giving the impression that it is a student's own work
  • Any form of cheating on examinations
  • Altering academic or clinical records
  • Falsifying information for any assignment
  • Partly or wholly completing an assignment for another student or submitting partly or wholly completed assignments by another student.

Plagiarism is a very serious matter. Any assignment that includes information that has been copied from a website or other source will receive a score of zero. In addition, every paper will be checked for authenticity. If plagiarism occurs, the violation will be reported to the appropriate COD personnel for possible disciplinary action. Please read the following description for clarification.

What is Plagiarism?

One significant misconception that students have is that rewriting something is not plagiarism, because they are "putting it in their own words." However, if the source is not officially acknowledged, IT IS PLAGIARISM. Copying and pasting actually accounts for only a small percentage of plagiarism. The majority of plagiarism is a result of text manipulation. Simply stated, plagiarism is using someone's work without giving the appropriate credit. This can mean several things. For example, all of the following are considered plagiarism:

  1. Copying and pasting text from on-line media, such as encyclopedias.
  2. Copying and pasting text from any web site.
  3. Transcribing text from any printed material, such as books, magazines, journals, encyclopedias, and newspapers.
  4. Simply modifying text from any of the above sources is plagiarism. For example, replacing a few words using a thesaurus does not constitute original work.
  5. Using another student's work and claiming it as your own, even with permission, is academically unethical and is treated as plagiarism.
  6. Any time you quote, summarize, or paraphrase, you must acknowledge the original source. Even if you summarize or paraphrase, if you do not directly credit your source through a citation you are plagiarizing.

Please refer to for more information on this matter.

Thompson-CRIMJ 1165-Spring, 2010

tc-crimj1165-015-syll.doc 10/07/101