{"id":462,"date":"2026-04-29T20:00:00","date_gmt":"2026-04-29T20:00:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/destinyh\/?page_id=462"},"modified":"2026-05-04T01:13:33","modified_gmt":"2026-05-04T01:13:33","slug":"cybercriminology","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/destinyh\/cybercriminology\/","title":{"rendered":"Cybercriminology (CRJS 310)"},"content":{"rendered":"\n<p>This course demonstrates my analytical thinking skills through deep-level analysis of cybercriminal motives and methodologies. <\/p>\n\n\n\n<p><strong>#1: Thematic Analysis of Cyberattacks<\/strong><br><strong><br><\/strong>In this analytical paper, I synthesized ten different news sources to identify recurring trends in modern cybercrime, specifically the weaponization of AI and the shift toward psychological exploits. This paper showed me how to look at the \u201cwhy\u201d instead of the \u201chow\u201d of these attacks, which became the primary trends of cybercrime.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Midterm-Exam-Essay-CRJS-310-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Thematic Analysis of Cyberattacks.\"><\/object><a id=\"wp-block-file--media-b79dc92e-78ea-4979-8087-c3b3cf1d15a7\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Midterm-Exam-Essay-CRJS-310-.pdf\">Thematic Analysis of Cyberattacks<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Midterm-Exam-Essay-CRJS-310-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b79dc92e-78ea-4979-8087-c3b3cf1d15a7\">Download<\/a><\/div>\n\n\n\n<p><strong>#2: Cybercrime Concept Map<\/strong><br><strong><br><\/strong>In this concept map, I analyzed numerous concepts learned from the course that applied to cybercrime and synthesized them into multiple categories and subcategories to make connections. This concept map deepened my understanding of how the topic of cybercrime can be an interconnected topic that bridges the gap between criminological theory, challenges, and technical exploitation. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Destiny-Hale-Concept-Map-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cybercrime Concept Map.\"><\/object><a id=\"wp-block-file--media-c72645fa-af14-48d6-94ae-a1a72e000e3d\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Destiny-Hale-Concept-Map-1.pdf\">Cybercrime Concept Map<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Destiny-Hale-Concept-Map-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c72645fa-af14-48d6-94ae-a1a72e000e3d\">Download<\/a><\/div>\n\n\n\n<p><strong>#3: Tampa Bay Romance Scam<\/strong><br>In this assignment, I analyzed a cyberfraud case study that involved both romance and investment scams. This assignment deepened my understanding of how cybercriminals can weaponize trust for personal gain. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Tampa-Bay-Romance-Scam-CRJS-310.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Tampa Bay Romance Scam.\"><\/object><a id=\"wp-block-file--media-78289427-a448-4933-a449-793a92fefcf4\" href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Tampa-Bay-Romance-Scam-CRJS-310.pdf\">Tampa Bay Romance Scam<\/a><a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/wp-content\/uploads\/sites\/32241\/2026\/04\/Tampa-Bay-Romance-Scam-CRJS-310.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-78289427-a448-4933-a449-793a92fefcf4\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course demonstrates my analytical thinking skills through deep-level analysis of cybercriminal motives and methodologies. #1: Thematic Analysis of CyberattacksIn this analytical paper, I synthesized ten different news sources to identify recurring trends in modern cybercrime, specifically the weaponization of AI and the shift toward psychological exploits. This paper showed me how to look at &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/destinyh\/cybercriminology\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cybercriminology (CRJS 310)<\/span><\/a><\/p>\n","protected":false},"author":26014,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/462"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/users\/26014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/comments?post=462"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/462\/revisions"}],"predecessor-version":[{"id":491,"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/pages\/462\/revisions\/491"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/destinyh\/wp-json\/wp\/v2\/media?parent=462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}