{"id":312,"date":"2024-01-24T20:23:25","date_gmt":"2024-01-24T20:23:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pm1\/?page_id=312"},"modified":"2024-04-23T01:42:40","modified_gmt":"2024-04-23T01:42:40","slug":"crjs-310","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pm1\/crjs-310\/","title":{"rendered":"CRJS 310"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybercriminology: Foundations<\/h1>\n<h2>Course Description<\/h2>\n<p>This course\u2019s primary goal is to introduce students to the basic vocabulary and ideas used by cybercriminologists and other social scientists. These goals will be met in four ways:<\/p>\n<ol>\n<li>Students will explore the most common types of cybercrimes.\u00a0 Cybercrimes can be roughly divided into four categories \u2013 cybertrespass, cyberpornography, cyberviolence, and cyberdeception.<\/li>\n<li>Students will critique some of the significant debates surrounding cybercrime.\u00a0 Society\u2019s understanding of what should be prohibited, how we should investigate, and how we should prosecute cybercrime are continuously being negotiated by groups in society.\u00a0 Our social world is socially constructed, and cybercrime issues are no different.<\/li>\n<li>Students will discuss the impacts of cybercrimes on individuals and families.\u00a0 While cybersecurity courses may focus more on corporations&#8217; and governments\u2019 concerns and how to protect the data within them, a cybercrime course focuses more on how everyday people are victimized.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<h3>Social Science Writing Assignment<\/h3>\n<p>This assignment is meant to achieve two goals: (1) give students the opportunity to learn more about a topic, and (2) gain experience doing \u201cscience writing,\u201d where social science research is summarized and communicated to the public. I was not answering a research question as you would in a research paper &#8211; I summarized what scholars have written about a topic.<\/p>\n\n<a href=\"https:\/\/sites.wp.odu.edu\/pm1\/wp-content\/uploads\/sites\/35619\/2024\/01\/What-Social-Scientists-Know-About-Data-Breaches.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">What-Social-Scientists-Know-About-Data-Breaches<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminology: Foundations Course Description This course\u2019s primary goal is to introduce students to the basic vocabulary and ideas used by cybercriminologists and other social scientists. These goals will be met in four ways: Students will explore the most common types of cybercrimes.\u00a0 Cybercrimes can be roughly divided into four categories \u2013 cybertrespass, cyberpornography, cyberviolence, and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pm1\/crjs-310\/\">Read More<\/a><\/div>\n","protected":false},"author":27146,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/312"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/users\/27146"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/312\/revisions"}],"predecessor-version":[{"id":476,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/312\/revisions\/476"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/media?parent=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}