Task 1
Task 1
Task 1. Students are to select one of the case studies (Child exploitation ‐ Playpen case, Data breach ‐ US Office of Personnel Mgt, Hacking ‐ Alexsey Belan, Romance fraud ‐ Audrey Elaine Elrod, Cyber terrorism ‐ Ardit Ferizi
Students then apply BOTH an individual and situational theory from the list provided on the course Learning@Griffith site to the case study.
The basic requirements are that the case study must:
(a) Provide a brief overview of the case
(b) Introduce and demonstrate a conceptual understanding of the selected theories/perspectives
(c) Apply the theories/perspectives in a manner that clearly demonstrates the applicability of each theory/perspective for understanding how and why the case occurred
(d) Drawing upon the theories/perspectives offer suggestions for prevention strategies applicable to the case and that type of cybercrime more broadly
Criteria & Marking:
Task 1
More detailed marking criteria will be provided on the course Learning@Griffith site.
Case Overview
– Describes key features of the case
Theory Description and Review
– Describes and explains the selected theories
– Reviews the selected theories
Application of Theory
– Applies theories to the case
Implications of Theory for Prevention
– Provides theory-driven prevention strategies
– Provides support for prevention strategies
Presentation
– Complies with academic writing and structure
– Presentation and referencing
Assessment Item 1: Case Study
Theory Choice:
Task 1
Choose ONE theory from Column A and choose ONE theory from Column B
Column A – choose ONE theory | Column B – choose ONE theory |
General Theory of Crime (GTC) | Routine Activities Approach/Theory |
Social Learning Theory | Lifestyle Exposure Theory |
Space Transition Theory | Opportunity Model of Victimology |
- Case Study Choice:
Choose ONE case study from the list below
- Case Study 1: Child exploitation ‐ Playpen case
- Case Study 2: Data breach ‐ US Office of Personnel Mgt
- Case Study 3: Hacking ‐ Alexsey Belan
- Case Study 4: Romance fraud ‐ Audrey Elaine Elrod
- Case Study 5: Cyber terrorism ‐ Ardit Ferizi