Graduate Course Proposal Form Submission Detail - LIS6709
Edit function not enabled for this course.
Approved by SCNS
Submission Type: New
Course Change Information (for course changes only):
Comments: Recd after 3/1. To Chair; Appd 5/19/14. to USF 5/20/14; to SCNS 5/28/14. Mbr 6703 appd as 6709 eff 11/1/14
- Department and Contact Information
Tracking Number Date & Time Submitted 4831 2013-10-15 Department College Budget Account Number Library and Information Science AS 124800 Contact Person Phone Randy Borum 43520 firstname.lastname@example.org
- Course Information
Prefix Number Full Title LIS 6709 Cyber Intelligence Is the course title variable? N Is a permit required for registration? N Are the credit hours variable? N Is this course repeatable? N If repeatable, how many times? 0 Credit Hours Section Type Grading Option 3 C - Class Lecture (Primarily) R - Regular Abbreviated Title (30 characters maximum) Cyber Intelligence Course Online? Percentage Online O - Online (100% online) 0
No Course Pre-Reqs
No Course Co-Reqs
This course reviews the main actors, targets, threats, and other troublesome activities in cyberspace. It builds a foundation for understanding how cyber intelligence and counterintelligence can support enterprise and national cybersecurity.
A. Please briefly explain why it is necessary and/or desirable to add this course.
Needed for new program/concentration/certificate
B. What is the need or demand for this course? (Indicate if this course is part of a required sequence in the major.) What other programs would this course service?
This will be an essential (required for the concentration, but not for the degree itself) course for the Concentration in Cyber Intelligence for the M.S. in Information Studies and for the he Concentration in Cyber Intelligence for the M.S.in Cybersecurity.
C. Has this course been offered as Selected Topics/Experimental Topics course? If yes, how many times?
D. What qualifications for training and/or experience are necessary to teach this course? (List minimum qualifications for the instructor.)
Expertise in cyber intelligence theory and tradecraft.
- Other Course Information
To understand how cyber intelligence and counterintelligence can support enterprise and national cybersecurity.
B. Learning Outcomes
Define Cyber Intelligence and understand its role and value for online targeting and collection in modern organizations, businesses and governments
Use the Internet as an investigative tool while maintaining anonymity
Name and describe the major types of actors perpetrating cyber attacks,their motivations and likely targets
List the countries of greatest concern for US cyber counterintelligence and the nature of those concerns
Identify electronic devices likely to contain data of interest to the investigator
Define counterintelligence and discuss its applications in cybersecurity and in the cyber dimensions of an intelligence enterprise
Identify new and emerging technologies likely to impact the CI mission
Understand the challenge of cyber espionage and insider threats in the cyber realm
Discuss the concept of cyber operations as it pertains to cyber intelligence
C. Major Topics
The emerging discipline of cyber intelligence
The spectrum of cyber conflict
Actors: Crackers and Cyber vandals
Actors: Cyber Criminals
Actors: State and Nonstate Actors
Targets: Financial Institutions
Tactics: Cyber Scams
Tactics: Disruption and Destruction
Beyond Cyber Attacks: Cyber Operations
No Textbook. Course will use assigned readings.
E. Course Readings, Online Resources, and Other Purchases
Applegate, S. (2011). Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Security and Privacy, 9(5), 16-22.
Aransiola, J. O., & Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior, and Social Networking, 14(12), 759-763.
Atkins, B., & Huang, W. (2013). A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences, 1(3), 23-32.
Bachmann, M. (2010). The risk propensity and rationality of computer hackers. The International Journal of Cyber Criminology, 4, 643-656.
Ball, D. (2011). China’s cyber warfare capabilities. Security Challenges, 7(2), 81-103.
Barber, R. (2001). Hackers profiled—who are they and what are their motivations?. Computer Fraud & Security, 2001(2), 14-17.
Barnum, S. (2012). Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™). MITRE Corporation, July.
Berzins, M. (2010). Online scams: case studies from Australia. Handbook of Research on Social Interaction Technologies and Collaboration Software: Concepts and Trends, Pennsylvania: IGI Global.
Blank, L. (2012). International Law and Cyber Threats from Non-State Actors. International Law Studies, Naval War College.
Blum, J., & Friday, M. (2005). Hackers Target US Power Grid. Washington Post, 11, E01.
Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., Chon, S., & Da, C. (2013). Crime in Cyberspace: Offenders and the Role of Organized Crime Groups. Available at SSRN 2211842.
Buchanan, T., & Whitty, M. T. (2013). The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, (ahead-of-print), 1-23.
Burden, K., & Palmer, C. (2003). Internet crime: Cyber Crime—A new breed of criminal?. Computer Law & Security Review, 19(3), 222-227.
Caglayan, A., Toothaker, M., Drapeau, D., Burke, D., & Eaton, G. (2012). Behavioral analysis of botnets for threat intelligence. Information Systems and e-Business Management, 10(4), 491-519.
Cappelli, D., Moore, A., Trzeciak, R., & Shimeall, T. J. (2009). Common sense guide to prevention and detection of insider threats 3rd edition–version 3.1. CERT, Software Engineering Institute, Carnegie Mellon University.
Carr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. O'Reilly.
Caspi, A., & Gorsky, P. (2006). Online deception: Prevalence, motivation, and emotion. CyberPsychology & Behavior, 9(1), 54-59.
Chan, S. H., & Yao, L. J. (2011). An Empirical Investigation Of Hacking Behavior. Review of Business Information Systems (RBIS), 9(4), 41-58.
Chen, C. D., & Huang, L. T. (2011). Online Deception Investigation: Content Analysis and Cross-Cultural Comparison. The International Journal of Business and Information, 6(1), 91-111.
Chiesa, R., Ducci, S., & Ciappi, S. (2008). Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. CRC Press.
Choo, K. K. R. (2008). Organised crime groups in cyberspace: a typology. Trends in organized crime, 11(3), 270-295.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.
Ciluffo, F. (March 20, 2013). Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure. Testimony before U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies.
Claycomb, W. R., Huth, C. L., Flynn, L., McIntire, D. M., Lewellen, T. B., & Center, C. I. T. (2012). Chronological examination of insider threat sabotage: preliminary observations. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(4), 4-20.
Conway, M. (2003). Cyberterrorism: the story so far. Journal of Information Warfare, 2(2), 33-42.
Conway, M. (2003). Hackers as terrorists? Why it doesn't compute. Computer Fraud & Security, 2(12), 10-13.
Cummings, A., Lewellen, T., McIntire, D., Moore, A. P., & Trzeciak, R. F. (2012). Insider threat study: Illicit cyber activity involving fraud in the US financial services sector. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
Deibert, R. J. (2013). Black Code: Inside the Battle for Cyberspace. McClelland & Stewart.
Denning, D. E. (2012). Stuxnet: What Has Changed?. Future Internet, 4(3), 672-687.
Earl, J., Kimport, K., Prieto, G., Rush, C., & Reynoso, K. (2010). Changing the world one webpage at a time: Conceptualizing and explaining internet activism. Mobilization: An International Quarterly, 15(4), 425-446.
Eom, J. H., Kim, N. U., Kim, S. H., & Chung, T. M. (2012, June). Cyber military strategy for cyberspace superiority in cyber warfare. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 295-299). IEEE.
Everett, C. (2009). The lucrative world of cyber-espionage. Computer Fraud & Security, 2009(7), 5-7.
Fachkha, C., Bou-Harb, E., Boukhtouta, A., Dinh, S., Iqbal, F., & Debbabi, M. (2012, October). Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on (pp. 1-8). IEEE.
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet And The Future Of Cyber War. Survival, 53(1), 23-40.
Freiermuth, M. R. (2011). Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting. Discourse & Communication, 5(2), 123-145.
Gandhi, V. K. (2012). An Overview Study on Cyber crimes in Internet. Journal of Information Engineering and Applications, 2(1), 1-5.
Geers, K. (2009). The cyber threat to national critical infrastructures: Beyond theory. Information Security Journal: A Global Perspective, 18(1), 1-7.
Goel, S. (2011). Cyberwarfare: connecting the dots in cyber intelligence. Communications of the ACM, 54(8), 132-140.
Gragido, W., Molina, D., Pirc, J., & Selby, N. (2012). Blackhatonomics: An Inside Look at the Economics of Cybercrime. Access Online via Elsevier.
Greitzer, F. L., Moore, A. P., Cappelli, D. M., Andrews, D. H., Carroll, L. A., & Hull, T. D. (2008). Combating the insider cyber threat. Security & Privacy, IEEE, 6(1), 61-64.
Grow, B., Epstein, K., & Tschang, C. C. (2008). The new e-spionage threat. Business Week, 10.
Hannabuss, S. (2010). Truth, Lies and Trust on the Internet. Library Review, 59(6), 476-478.
Heickerö, R. (2010). Emerging cyber threats and Russian views on Information warfare and Information operations. Defence Analysis, Swedish Defence Research Agency (FOI).
Held, W. V. (2012). Hacktivism: An Analysis of the Motive to Disseminate Confidential Information (Doctoral dissertation, Texas State University).
Himma, K. E. (2007). Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? In K. Himma (Ed.) Internet Security: Hacking, Counterhacking, and Society. Jones and Bartlett Learning.
Hooi, R., & Cho, H. (2012). Deception in avatar-mediated virtual environment. Computers in Human Behavior, 29(1), 276-284.
Hu, Q., Xu, Z., & Yayla, A. A. (2013). Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis.
Hurley, M. M. (2012). For and from Cyberspace: Conceptualizing Cyber Intelligence, Surveillance, and Reconnaissance. Air Univ Maxwell AFB Air Force Research Inst.
Information Warfare Monitor & Shadowserver Foundation (April 6, 2010). Shadows In The Cloud: Investigating Cyber Espionage 2.0. JR03-2010
Inkster, N. (2013). Chinese Intelligence in the Cyber Age. Survival, 55(1), 45-66.
INSA Cyber Intelligence Task Force (September, 2011). Cyber Intelligence: Setting the Landscape for an Emerging Discipline. Intelligence and National Security Alliance (INSA) White Paper. Arlington, VA: INSA.
Jain, G. (2005). Cyber Terrorism: A Clear and Present Danger to Civilized Society?. Information Systems Educational Journal, 3, 3-8.
Kallberg, J., & Thuraisingham, B. (2012). Towards Cyber Operations The New Role of Academic Cyber Security Research and Education. In Proceedings from the 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012) (No. June).
Knapp Jr, E. D. (2012). Unconventional Warfare in Cyberspace. Army War Coll Carlisle Barracks.
Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541-562.
Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41-69.
Leggitt, J. S., Shechter, O. G., & Lang, E. L. (2011). Cyberculture and Personnel Security: Report 1-Orientation, Concerns, and Needs (No. PERSEREC-TR-11-01). Defense Personnel Security Research Center Monterey CA.
Lewis, J. (July 9, 2013). Cyber Espionage and the Theft of U.S. Intellectual Property and Technology. Testimony before the House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations.
Lin, H. S. (2010). Offensive cyber operations and the use of force. Journal of National Security Law & Policy 4, 63.
Longe, O. B., Mbarika, V., Kourouma, M., Wada, F., & Isabalija, R. (2010). Seeing beyond the surface, understanding and tracking fraudulent cyber activities. arXiv preprint arXiv:1001.1993.
Mansfield-Devine, S. (2011). Hacktivism: assessing the damage. Network Security, 2011(8), 5-13.
Marchetti, M., Colajanni, M., Messori, M., Aniello, L., & Vigfusson, Y. (2012). Cyber attacks on financial critical infrastructures. In R. Baldoni & G. Chockler (Eds.) Collaborative Financial Infrastructure Protection (pp. 53-82). Springer Berlin Heidelberg.
Melnitzky, A. (2011). Defending America Against Chinese Cyber Espionage Through the Use of Active Defenses. Cardozo J. Int'l & Comp. L., 20, 537.
Moore, A. P., Cappelli, D. M., & Trzeciak, R. F. (2008). The “big picture” of insider IT sabotage across US critical infrastructures. Technical Report CMU/SEI-2008-TR-009 ESC-TR-2008-009. Pittsburgh, PA: Software Engineering institute, Carnegie Mellon University.
Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Digital Investigation: The International Journal of Digital Forensics & Incident Response, 2(4), 261-267.
Olson, J. M. (2001). The Ten Commandments Of Counterintelligence. Central Intelligence Agency, Washington DC: Center For The Study Of Intelligence.
Pelican, L. (2012). Peacetime Cyber-Espionage: A Dangerous But Necessary Game. CommLaw Conspectus, 20, 363-471.
Petratos, P. (2011). Definition and Importance of Cyberintelligence: An Introduction. Available at SSRN 1977061.
Puram, P. K., Kaparthi, M., & Rayaprolu, A. K. H. (2011). Online Scams: Taking The Fun Out Of The Internet. Indian Journal of Computer Science and Engineering, 2(4), 559-565.
Reagan, M. (2005). Introduction to U.S. Counterintelligence - CI 101: A Primer. Unpublished Manuscript.
Rege, A. (2009). What's love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2), 494-512.
Reich, P. C., Weinstein, S., Wild, C., & Cabanlong, A. S. (2010). Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents–and the Dilemma of Anonymity. European Journal of Law and Technology, 1(2).
Rider, B. A. (2001). Cyber-Organised Crime—The Impact of Information Technology on Organised Crime. Journal of Financial Crime, 8(4), 332-346.
Rogers, M. K. (2010). The Psyche of Cybercriminals: A Psycho-Social Perspective. In Cybercrimes: A Multidisciplinary Analysis (pp. 217-235). Springer Berlin Heidelberg.
Rounds, M., & Pendgraft, N. (2009, August). Diversity in network attacker motivation: A literature review. In Computational Science and Engineering, 2009. CSE'09. International Conference on (Vol. 3, pp. 319-323). IEEE.
Rudner, M. (2013). Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453-481.
Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-Crimes and their Impacts: A Review.
Van Niekerk, B. R. E. T. T., & Maharaj, M. (2013). Social Media and Information Conflict. International Journal of Communication, 7, 1162-1184.
Schmitt, M. (2012). Classification of Cyber Conflict. Journal of Conflict and Security Law, 17(2), 245-260.
Shachaf, P., & Hara, N. (2010). Beyond vandalism: Wikipedia trolls. Journal of Information Science, 36(3), 357‐370.
Shaw, E., Ruby, K., & Post, J. (1998). The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin, 2(98), 1-10.
Shropshire, J. (2009). A canonical analysis of intentional information security breaches by insiders. Information Management & Computer Security, 17(4), 296-310.
Siboni, G. & Kronenfeld, S. (2012). Iran and Cyberspace Warfare. Military and Strategic Affairs, 4(3), 77-99.
Sigholm, J., & Bang, M. (2013). Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats, 2013 European Intelligence and Security Informatics Conference, IEEE, 37, 166-171.
Spade, J. M. (2011). China's Cyber Power and America's National Security. US Army War College Carlisle Barracks PA.
Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71-92.
Stabek, A., Watters, P., & Layton, R. (2010, July). The seven scam types: mapping the terrain of cybercrime. In Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second (pp. 41-51). IEEE.
Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326.
Talihärm, A. M. (2010). Cyberterrorism: in Theory or in Practice?. Defence Against Terrorism Review, 3(2), 59-74.
Trend Micro (2010). The Business of Cybercrime: A Complex Business Model. Trend Micro White Paper.
Trevathan, J., & Myers, T. (2012). Anti-social networking?. World Academy of Science, Engineering and Technology, 72, 127-135.
van Niekerk, B., & Maharaj, M. S. (2011). The Information Warfare Life Cycle Model. SA Journal of Information Management, 13(1), 9-pages.
Vegh, S. (2002). Hacktivists or cyberterrorists? The changing media discourse on hacking. First Monday, 7(10).
Ventre, D. (2013). Cyber Conflict: Competing National Perspectives. NY:John Wiley & Sons.
Wall, D. S., & Williams, M. L. (2013). Policing cybercrime: networked and social media technologies and the challenges for policing. Policing and Society, (ahead-of-print), 1-4.
Warfield, D. (2012). Critical Infrastructures: IT Security and Threats from Private Sector Ownership. Information Security Journal: A Global Perspective, 21(3), 127-136.
Watters, P. A., McCombie, S., Layton, R., & Pieprzyk, J. (2012). Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control, 15(4), 430-441.
Weimann, G. (2012). Lone wolves in cyberspace. Journal of Terrorism Research, 3(2).
Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking, 15(3), 181-183.
Williams, B. T. (2011). Ten Propositions Regarding Cyberspace Operations. Joint Force Quarterly, (61), 10.
Woo, H. J., Kim, Y., & Dominick, J. (2004). Hackers: Militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6(1), 63-82.
Williams, B. T. (2011). Ten Propositions Regarding Cyberspace Operations. Joint Force Quarterly, (61), 10.
Williams, P., Shimeall, T., & Dunlevy, C. (2002). Intelligence analysis for Internet security. Contemporary Security Policy, 23(2), 1-38.
Wortzel, L. (July 9, 2013). Cyber Espionage and the Theft of U.S. Intellectual Property and Technology. Testimony before the House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations.
Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency?. The Howard Journal of Criminal Justice, 44(4), 387-399.
Yazdanifard, R., Oyegoke, T., & Seyedi, A. P. (2011). Cyber-Crimes: Challenges of the Millennium Age. In Advances in Electrical Engineering and Electrical Machines (pp. 527-534). Springer Berlin Heidelberg.
F. Student Expectations/Requirements and Grading Policy
Grading Scale: The following grading scale will be applied:
90% - 100% is an A
80% - 89% is a B
70% - 79% is a C
60% - 69% is a D
less than 60% is an F.
Your performance in this class (and consequently, your grade) will be judged and weighted on the following basis:
Presentation and Reading Quizzes: 65%
Final Exam: 25%
Final Project: 10%
G. Assignments, Exams and Tests
The Emerging Discipline of Cyber Intelligence
o Cyber Intelligence: Setting the Landscape for an Emerging Discipline
o Cyber Intelligence Tradecraft Project--Summary of Key Findings
o Definition and Importance of Cyberintelligence: An Introduction.
The Spectrum of Cyber Conflict
o Cyberwarfare: connecting the dots in cyber intelligence.
o The Information Warfare Life Cycle Model.
o Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents–and the Dilemma of Anonymity.
o Pattern of global cyber war and crime: A conceptual framework.
Quiz on Wee 1 & 2
Actors: Crackers and Cyber Vandals
o Diversity in network attacker motivation: A literature review.
o An Empirical Investigation Of Hacking Behavior.
o The risk propensity and rationality of computer hackers.
o Computer hacking: Just another case of juvenile delinquency?
o Beyond vandalism: Wikipedia trolls.
o Anarchists, Pirates, Ideologists, And Disasters: New Digital Trends And Their Impacts
o Changing The World One Webpage At A Time: Conceptualizing And Explaining Internet Activism
o Hacktivism: assessing the damage.
Quiz on Week 3 & 4
Actors: Cyber Criminals
o Cyber-Crimes: Challenges of the Millennium Age.
o The Psyche of Cybercriminals: A Psycho-Social Perspective.
o Organised crime groups in cyberspace: a typology.
o Crime in Cyberspace: Offenders and the Role of Organized Crime Groups.
Actors: States and Nonstate Actors
o Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure.
o China's Cyber Power and America's National Security
o Chinese Intelligence in the Cyber Age .
o Iran and Cyberspace Warfare.
o Cybermilitias and political hackers: Use of irregular forces in cyberwarfare.
o Cyberterrorism: in Theory or in Practice?
Quiz on Week 5 & 6
Target: Financial Institutions
o The Business of Cybercrime: A Complex Business Model.
o Cyber Attacks On Financial Critical Infrastructures.
Tactics: Cyber Scams
o A Study of Social Engineering in Online Frauds
o Anti-social networking?
o The seven scam types: mapping the terrain of cybercrime
o Understanding cybercrime perpetrators and the strategies they employ in Nigeria.
o Online Scams: Taking The Fun Out Of The Internet
o The online romance scam: A serious cybercrime.
o Online scams: case studies from Australia.
Quiz on Week 7 & 8
Tactics: Disruption & Destruction
o Hackers: Militants or merry pranksters? A content analysis of defaced web pages
o Cyber Espionage and the Theft of U.S. Intellectual Property and Technology.
o Shadows In The Cloud: Investigating Cyber Espionage 2.0.
o The lucrative world of cyber-espionage.
Quiz on Week 9 & 10
o Combating the insider cyber threat.
o A canonical analysis of intentional information security breaches by insiders.
o The “Big Picture” of insider IT sabotage across US critical infrastructures.
o Common sense guide to prevention and detection of insider threats 3rd edition–version 3.1.
o Chronological examination of insider threat sabotage: preliminary observations.
o The Ten Commandments of Counterintelligence
o Introduction to U.S. Counterintelligence - CI 101: A Primer
o Criminal profiling and insider cyber crime.
o Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats
Quiz on Week 11 & 12
Beyond Cyber Attacks: Cyber Operations
o Emerging cyber threats and Russian views on Information warfare and Information operations.
o Offensive cyber operations and the use of force
o Ten Propositions Regarding Cyberspace Operations
o The online disinhibition effect
o Online deception: Prevalence, motivation, and emotion
o Online Deception Investigation: Content Analysis and Cross-Cultural Comparison
Quiz on Week 13 & 14
Memo and Briefing
H. Attendance Policy
Course Attendance at First Class Meeting – Policy for Graduate Students: For structured courses, 6000 and above, the College/Campus Dean will set the first-day class attendance requirement. Check with the College for specific information. This policy is not applicable to courses in the following categories: Educational Outreach, Open University (TV), FEEDS Program, Community Experiential Learning (CEL), Cooperative Education Training, and courses that do not have regularly scheduled meeting days/times (such as, directed reading/research or study, individual research, thesis, dissertation, internship, practica, etc.). Students are responsible for dropping undesired courses in these categories by the 5th day of classes to avoid fee liability and academic penalty. (See USF Regulation – Registration - 4.0101,
Attendance Policy for the Observance of Religious Days by Students: In accordance with Sections 1006.53 and 1001.74(10)(g) Florida Statutes and Board of Governors Regulation 6C-6.0115, the University of South Florida (University/USF) has established the following policy regarding religious observances: (http://usfweb2.usf.edu/usfgc/gc_pp/acadaf/gc10-045.htm)
In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It’s the responsibility of the student to monitor Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.
I. Policy on Make-up Work
Policy on Make-up Work
As a general policy, there are no make-ups for quizzes, projects or the final exam. If a student wishes to submit an assignment late, the instructor may accept it at his/her discretion and assess a suitable grade penalty.
In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It is the responsibility of the student to monitor the Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.
Students are expected to notify their instructors at the beginning of each academic term if they intend to be absent for a class or announced examination for religious reasons. They will be given reasonable opportunities to make up any work missed. For further information, please refer to: http://generalcounsel.usf.edu/policies-and-procedures/pdfs/policy-10-045.pdf
The University of South Florida has in place specific policies and procedures regarding academic dishonesty or disruption of academic process (also see below for more detail). Academic dishonesty includes, but is not limited to: copying or relying on another’s work and using it as your own; representing work you previously prepared for another class as work that was prepared for this class; and using any material during a quiz exam that has not been approved by the professor.
Academic dishonesty will result in a grade of “FF” and, possible dismissal from the program. An “FF” received as a result of academic dishonesty puts you on Academic Warning for the remainder of your time at USF. A class in which you receive an “FF” as a result of academic dishonesty is not repeatable. All papers, research, and examinations will be monitored carefully and students found cheating will be punished to the fullest extent allowed by the University and the Department.
In an effort to ensure compliance, plagiarism tracking software (SafeAssign) may be employed in this course. The University of South Florida has an account with an automated plagiarism detection service which allows instructors to submit student assignments to be checked for plagiarism. Your assignments may be submitted to this detection system, in which they are compared to a large database of journal articles, web articles, and previously submitted papers. Because all papers will be submitted to SafeAssign, you should know your rights:
You may be required to submit your paper to a plagiarism detection site that will be identified by your instructor. In order to comply with federal (FERPA) and state privacy laws, you (students) are not required to include personal identifying information such as your name, SSN, and/or U# in the body of the work (text) or use such information in the file naming convention prior to submitting. Please follow carefully your instructor’s instructions regarding what identifying information to include. Your submission will be placed in the course grade center in your account that can be accessed by the instructor and attributed to you.
If you have any questions, please refer to USF’s Procedures for Alleged Academic Dishonesty or Disruption – http://www.ugs.usf.edu/catalogs/0809/adap.htm and Student Academic Grievance Procedures – http://www.ugs.usf.edu/catalogs/0809/arcsagp.htm
J. Program This Course Supports
M.S. in Information Studies with a focus on Straregy & Information Analytics
- Course Concurrence Information