Print |
|
PDF version |
Last update 23-10-2019 |
HU Credits:
2
Degree/Cycle:
1st degree (Bachelor)
Responsible Department:
Criminology
Semester:
1st Semester
Teaching Languages:
Hebrew
Campus:
Mt. Scopus
Course/Module Coordinator:
Dr. Tamar Berenblum
Coordinator Office Hours:
Mondays by appointment
Teaching Staff:
Dr. Tamar Berenblum
Course/Module description:
Throughout history, various technological developments, such as the internet, were exploited for criminal and deviant behavior (Grabosky, 2007). the internet allows the breakage of boundaries both of time and space as are embedded in legislation and formal control. Thus, the internet creates an illusion of anonymity, security and lack of supervision, which contributes to expressions of violence and crime.
This course will examine the Human factor in cyber crime.
Moreover, since understanding crime and deviance is not complete without a discussion about the ways to handle these behaviors and the modes of social control designed to prevent them; We will examine the regulation of cyber crime as well.
Course/Module aims:
On the theoretical level we will discuss the relevance of existing criminological theories and examine their relevance in explaining cyber crime
On the practical level we will discuss the development of social control practices and regulations with regard to cyber crime and deviance.
On the methodological level, we will address the challenges of designing criminological research studying the cyber sphere.
Learning outcomes - On successful completion of this module, students should be able to:
Demonstrate knowledge about
Criminological theories and their application to the cyber sphere.
Demonstrate knowledge about
cyber crimes and their regulation.
Create research designs in a critically meaningful way to address specific cyber crime related questions
Attendance requirements(%):
Full attendance
Teaching arrangement and method of instruction:
Frontal
Course/Module Content:
1. Internet as a social sphere and a target for Research in the field of criminology
2. Cyber crime and deviance
3. Cyber victimology
4. law enforcement and the Internet - Regulation, Legislation, Police
5. Cyber crime research – research design issues
Required Reading:
מבוא
דרור י. (2011) ההבניה החברתית של טכנולוגיה: על הדרך שבה ערכים, חוק ואכיפה מוטמעים בטכנולוגיה, בתוך: אלקין קורן נ. ובירנהק מ. (2011) רשת משפטית: משפט וטכנולוגית מידע, ת"א: אוניברסיטת ת"א. 79-116.
פשיעה וסטייה באינטרנט – הגדרות
Brown S. (2006).The criminology of hybrids: Rethinking crime and law in techno social networks, Theoretical Criminology, 10(2): 223–244.
Grabosky P. (2001). Virtual criminality: old wine in new bottles? Social and Legal
Studies,10(2): 243-249.
Grabosky P. (2014). The Evolution of Cybercrime, 2004- 2014. RegNet Working
Paper, No. 58, Regulatory Institutions Network.
Yar M. (2005). The Novelty of “Cybercrime”: an assessment in light of routine activity theory. European Journal of Criminology, 2: 407-427.
פשיעה וסטייה באינטרנט – פשעים כלכליים
Herley C. (2012), “Why do nigerian scammers say they are from nigeria?” WEIS, 1-14.
Tom Buchanan & Monica T. Whitty (2014) The online dating romance scam: causes and consequences of victimhood, Psychology, Crime & Law, 20:3, 261-283
פשיעה וסטייה באינטרנט –אלימות
Strikwerda L. (2015). Present and Future Instances of Virtual Rape in Light of Three Categories of Legal Philosophical Theories on Rape, Philos. Technol. (2015) 28:491–510
קורבנות פשעי מחשב וסייבר
Bossler, A., & Holt, T.J. (2010). The effect of self-control on victimization in the cyberworld. Journal of criminal Justice, 38: 227-236.
Shalhoub-Kevorkian, N., & Berenblum, T. (2010). Panoptical web: internet and victimization of women, International Review of Victimology 17: 69–95.
נגבי ע. (תשע"ג). המרשתת, מיזוגיניה וחופש הביטוי, משפט וממשל, כרך טו, עמודים 1-42.
פחד מפשיעה סייבר
Henson, B., Reyns, B. W., & Fisher, B. S. (2013). Fear of crime online? Examining the effect of risk, previous victimization, and exposure on fear of online interpersonal victimization. Journal of Contemporary Criminal Justice, 29(4), 475-497.
מע' אכיפת החוק והאינטרנט – פיקוח חברתי ורגולציה
Brignal T. (2002). The new Panopticon: the internet viewed as a structure of social control". Theory and Science, 3(1): 1-13.
Barzilai-Nahon K. (2008). "toward a Theory of Network gatekeeping: A Framework for Exploring Information Control", Journal of the American Information Science and Technology, 59(9): 1-20.
Goldsmith, J., & Wu, T. (2008). Who controls the internet? Illusions of a borderless world. New York: Oxford University Press.
DeNardis, L. (2014). Controlling internet resources. In L. DeNardis (Ed.), The global war for internet governance (pp. 33-62). CT: Yale university press.
Take, I. (2012). Regulating the Internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS. Regulation & Governance, 6, 499–523 doi:10.1111/j.1748-5991.2012.01151.x
מע' אכיפת החוק והאינטרנט – פיקוח בלתי פורמאלי
מקרה הבוחן של ביוש ברשת
Huey, L., Nhan, J. and Broll, R. (2012), ‘Uppity Civilians’ and ‘Cyber-Vigilantes’: The Role of the General Public in Policing Cyber-Crime, Criminology & Criminal Justice, 13: 81–97
מע' אכיפת החוק והאינטרנט – חקיקה ומשפט
Chawki M. (2005). "A critical look at the regulation of cybercrime: a comparative analysis with suggestion for legal policy", The ICFAI journal of Cyberlaw, IV (4): 1-56.
Lessig, L. (2006). Code: Version 2, Ney-York: Basic Books.
McQuade III, Samuel C. 2006. Understanding and Managing Cybercrime chapter 8.
Michael N. Schmitt and Liis Vihul, “The Nature of International Law Cyber Norms”, in Anna-Maria Osula and Henry Roigas (eds.), International Cyber Norms, CCDCOE, 2016
טננבוים א.נ., (2006), "על המטאפורות בדיני המחשבים והאינטרנט", שערי משפט, כרך ד' (2), עמודים 359-396.
מע' אכיפת החוק והאינטרנט – משטרה
Walker D., Brock D., and Stuart T.R. (2006). Faceless-Oriented Policing: Traditional Policing Theories Are Not Adequate in a Cyber World. The Police Journal, 79: 169-176.
Wall S.D. (2007). Policing cybercrimes: situating the public police in networks of security within cyberspace. Police Practice and Research: An International Journal, 8(2): 183-205.
Schneider, C., & Trottier, D. (2011). The 2011 Vancouver riot and the role of Facebook in crows-sourced policing. CB Studies, 175: 57-72.
פשעי מחשב – מניעה מצבית והרתעה
Maimon D., M. Alper, B.Sobesto and M.Cukier. (2014). Restrictive Deterrent Effects of a Warning Banner in an Attacked Computer System. Criminology 52(1): 33-59
Maimon, D., Wilson, T., Ren, W., & Berenblum, T., (2015). On The Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, British Journal of Criminology.
מחקר פשעי סייבר – סוגיות מתודולוגיות
Bhutta, Christine Brickman. 2012. “Not by the Book: Facebook as a Sampling Frame.” Sociological Methods and Research.
Cook, Colleen, Fred Heath, and Russel L. Thompson. 2000"A meta-analysis of response rates in web-or internet-based surveys." Educational and psychological measurement 60: 821-836.
Siang, Sanyin. 1999. Researching Ethically with Human Subjects in Cyberspace. Professional Ethics Report 4
Tcherni, Maria., Andrew Davies, Giza Lopesand and Alan Lizotte. 2015. “The Dark Figure of Online Property Crime: Is Cyberspace Hiding a Crime Wave?” Justice Quarterly
Additional Reading Material:
Course/Module evaluation:
End of year written/oral examination 80 %
Presentation 0 %
Participation in Tutorials 10 %
Project work 0 %
Assignments 10 %
Reports 0 %
Research project 0 %
Quizzes 0 %
Other 0 %
Additional information:
|
|
Students needing academic accommodations based on a disability should contact the Center for Diagnosis and Support of Students with Learning Disabilities, or the Office for Students with Disabilities, as early as possible, to discuss and coordinate accommodations, based on relevant documentation.
For further information, please visit the site of the Dean of Students Office.
|
Print |