CYBERCRIME AND CYBERSECURITY - 2022/3
Module code: SOCM051
In light of the Covid-19 pandemic the University has revised its courses to incorporate the ‘Hybrid Learning Experience’ in a departure from previous academic years and previously published information. The University has changed the delivery (and in some cases the content) of its programmes. Further information on the general principles of hybrid learning can be found at: Hybrid learning experience | University of Surrey.
We have updated key module information regarding the pattern of assessment and overall student workload to inform student module choices. We are currently working on bringing remaining published information up to date to reflect current practice in time for the start of the academic year 2021/22.
This means that some information within the programme and module catalogue will be subject to change. Current students are invited to contact their Programme Leader or Academic Hive with any questions relating to the information available.
The study of cybercrime and cybersecurity not only represents one of the key emerging areas of research within contemporary criminology but is also a crucial problem of national policy and crime control. Recent (2016) data from the Crime Survey for England and Wales suggest that cybercrime may now be the most prevalent form of criminality in the UK and repeated breaches to key infrastructures across most jurisdictions have emphasized why it is has also become one of the main threats to international peace and security.
This module will introduce students to the key themes within the study of cybercrime and cybersecurity – including, offence types and their prevalence; typical victims and perpetrators; policing and control measures; varieties of cybersecurity responses and the ‘human’ problem in making these resilient.
MCGUIRE Michael (Sociology)
Number of Credits: 15
ECTS Credits: 7.5
Framework: FHEQ Level 7
JACs code: M211
Module cap (Maximum number of students): N/A
Overall student workload
Independent Learning Hours: 100
Lecture Hours: 10
Seminar Hours: 10
Guided Learning: 20
Captured Content: 10
Prerequisites / Co-requisites
Indicative content includes:
- Week 1 – Introduction
- Week 2 – Cyber dependent Crime (I) - Malware & Ransomware
- Week 3 – Cyberdependent Crime (II) - Bots
- Week 4 – Cyberenabled Crime Fraud
- Week 5 – Sexual Offending and Indecent Imagery
- Week 6 – Hate Speech & Trolling
- Week 7 – Stealing Ideas in the digital domain
- Week 8 – State and Corporate Sponsored Cybercrimes
- Week 9 – Cybersecurity – themes and methods
- Week 10 – Humans and other problems with Cybersecurity
- Week 11 – Cybercrime 4.0?
|Assessment type||Unit of assessment||Weighting|
|Coursework||2,000 WORD ESSAY||40|
|Coursework||CASE STUDY REPORT||60|
The assessment strategy is designed to provide students with the opportunity to demonstrate
Demonstrate a systematic understanding of the ways in which different theories have sought to understand different types of cybercrimes
- 2,000 word essay
Use an advanced ability to make connections and distinctions between these different theories and to apply them to real world cases of cybercriminality and the cybersecurity response
- Formative Case Study proposal
- Case Study Report
Apply critical understanding to the ways in which issues and theories of cybercrime and cybersecurity intersect with policy and the operations of the criminal justice system
- 2,000 word essay
- Case Study Report
Thus, the summative assessment for this module consists of:
- An essay of 2,000 words. Feedback will be provided to students both via written and verbal comments
- A case study report/presentation of 3,000 words. Feedback will be provided to students both via written and verbal comments
Formative assessment and feedback
- A proposal and outline plan for the Case Study Report of no more than 1,000 words. Verbal and written feedback will be provided to students.
- As learning outcomes
|001||Have a systematic understanding of the ways in which different theories have sought to understand different types of cybercrimes||KC|
|002||Have an advanced ability to make connections and distinctions between these different theories and to apply them to real world cases of cybercriminality and the cybersecurity response.||KCPT|
|003||Have a critical understanding of the ways issues and theories of cybercrime and cybersecurity intersect with policy and the operations of the criminal justice system.||KCP|
C - Cognitive/analytical
K - Subject knowledge
T - Transferable skills
P - Professional/Practical skills
Methods of Teaching / Learning
The learning and teaching strategy is designed to:
- Foster an advanced ability to make connections and distinctions between these different theories and apply these to real world contexts of cybersecurity and cybercrime.
- Provide a systematic understanding of the ways in which different theories have sought to understand different types of cyber-criminality
- Develop a critical understanding of the ways cyber-criminality and cybersecurity intersect with public policy and the operations of the criminal justice system
The learning and teaching methods include:
Knowledge and understanding is fostered through lectures, seminars and workshops that guide students through relevant material and develop their capacity for critical thought. Students are encouraged to pursue deeper study independently through extensive reading and to apply learning to their own specialist substantive areas or interests. Teaching and learning consists of a mixture of lectures, seminars and applied case study exercises, Guest speakers with expertise in cybercrime theory and the implementation of cybersecurity measures will provide engagement with innovative and leading edge developments in cybercrime theory and the practical responses to preventing cybercrime
Indicated Lecture Hours (which may also include seminars, tutorials, workshops and other contact time) are approximate and may include in-class tests where one or more of these are an assessment on the module. In-class tests are scheduled/organised separately to taught content and will be published on to student personal timetables, where they apply to taken modules, as soon as they are finalised by central administration. This will usually be after the initial publication of the teaching timetable for the relevant semester.
Upon accessing the reading list, please search for the module using the module code: SOCM051
Please note that the information detailed within this record is accurate at the time of publishing and may be subject to change. This record contains information for the most up to date version of the programme / module for the 2022/3 academic year.