JST408 Cyber and Technology Enabled Crime (8)


Investigators need to have an understanding of the kinds of crimes that can be committed using high tech devices, computers and the internet. Additionally, computers may hold evidence relevant to the proof of a great many offences, many of which are not cyber crimes, but where the computer has been used as the "electronic filing cabinet". Importantly, investigations involving cyber related crimes can be affected in many cases by jurisdictional issues. This includes availability of evidence, which can be affected by varying legislation and international treaties, or the lack of treaties. This subject will provide the student with a critical understanding of these current and evolving issues.

+ Subject Availability Modes and Location

Session 1
DistanceManly Campus
Session 3
DistanceManly Campus
Continuing students should consult the SAL for current offering details: JST408
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLAustralian Graduate School of Policing and Security

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to review, analyse, consolidate and synthesis past, present and future trends in high tech crime and the development of preventative measures to address these;
  • be able to demonstrate an understanding of e-crime criminals and the methods of their criminal activities;
  • be able to think critically about internet related legislation and regulation in Australia and overseas;
  • be able to think critically about challenges facing enforcement, regulatory agencies and private industry in dealing with e-crime and the impact of this on investigative methodologies.


The subject will cover the following topics:
  • Module 1: Introduction to Cyber and Technology Enabled Crime
  • Module 2: Cybercrime for Profit and Technology Enabled Crime
  • Module 3: Hacktivism and Information Warfare
  • Module 4: The Law and Cybercrime
  • Module 5: Investigating Cybercrime and Technology Enabled Crime
  • Module 6: Case Studies


The information contained in the 2016 CSU Handbook was accurate at the date of publication: 06 September 2016. The University reserves the right to vary the information at any time without notice.