Apply to USF Now | Graduate Admissions | Events & Workshops | Giving to the Office of Graduate Studies

Graduate Course Proposal Form Submission Detail - LIS6709

Edit function not enabled for this course.


Current Status: Approved by SCNS - 2014-11-01
Campus: Tampa
Submission Type: New
Course Change Information (for course changes only):
Comments: Recd after 3/1. To Chair; Appd 5/19/14. to USF 5/20/14; to SCNS 5/28/14. Mbr 6703 appd as 6709 eff 11/1/14


  1. Department and Contact Information

    Tracking Number Date & Time Submitted
    4831 2013-10-15
     
    Department College Budget Account Number
    Library and Information Science AS 124800
     
    Contact Person Phone Email
    Randy Borum 43520 borum@usf.edu

  2. Course Information

    Prefix Number Full Title
    LIS 6709 Cyber Intelligence

    Is the course title variable? N
    Is a permit required for registration? N
    Are the credit hours variable? N
    Is this course repeatable? N
    If repeatable, how many times? 0

    Credit Hours Section Type Grading Option
    3 C - Class Lecture (Primarily) R - Regular
     
    Abbreviated Title (30 characters maximum)
    Cyber Intelligence
     
    Course Online? Percentage Online
    O - Online (100% online) 0

    Prerequisites

    No Course Pre-Reqs

    Corequisites

    No Course Co-Reqs

    Course Description

    This course reviews the main actors, targets, threats, and other troublesome activities in cyberspace. It builds a foundation for understanding how cyber intelligence and counterintelligence can support enterprise and national cybersecurity.


  3. Justification

    A. Please briefly explain why it is necessary and/or desirable to add this course.

    Needed for new program/concentration/certificate

    B. What is the need or demand for this course? (Indicate if this course is part of a required sequence in the major.) What other programs would this course service?

    This will be an essential (required for the concentration, but not for the degree itself) course for the Concentration in Cyber Intelligence for the M.S. in Information Studies and for the he Concentration in Cyber Intelligence for the M.S.in Cybersecurity.

    C. Has this course been offered as Selected Topics/Experimental Topics course? If yes, how many times?

    No

    D. What qualifications for training and/or experience are necessary to teach this course? (List minimum qualifications for the instructor.)

    Expertise in cyber intelligence theory and tradecraft.


  4. Other Course Information

    A. Objectives

    To understand how cyber intelligence and counterintelligence can support enterprise and national cybersecurity.

    B. Learning Outcomes

    Define Cyber Intelligence and understand its role and value for online targeting and collection in modern organizations, businesses and governments

    Use the Internet as an investigative tool while maintaining anonymity

    Name and describe the major types of actors perpetrating cyber attacks,their motivations and likely targets

    List the countries of greatest concern for US cyber counterintelligence and the nature of those concerns

    Identify electronic devices likely to contain data of interest to the investigator

    Define counterintelligence and discuss its applications in cybersecurity and in the cyber dimensions of an intelligence enterprise

    Identify new and emerging technologies likely to impact the CI mission

    Understand the challenge of cyber espionage and insider threats in the cyber realm

    Discuss the concept of cyber operations as it pertains to cyber intelligence

    C. Major Topics

    The emerging discipline of cyber intelligence

    The spectrum of cyber conflict

    Actors: Crackers and Cyber vandals

    Actors: Hacktivists

    Actors: Cyber Criminals

    Actors: State and Nonstate Actors

    Targets: Financial Institutions

    Tactics: Cyber Scams

    Tactics: Disruption and Destruction

    Cyber Espionage

    Insider Threats

    Cyber Counterintelligence

    Beyond Cyber Attacks: Cyber Operations

    Cyber Behavior

    D. Textbooks

    No Textbook. Course will use assigned readings.

    E. Course Readings, Online Resources, and Other Purchases

    Applegate, S. (2011). Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Security and Privacy, 9(5), 16-22.

    Aransiola, J. O., & Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior, and Social Networking, 14(12), 759-763.

    Atkins, B., & Huang, W. (2013). A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences, 1(3), 23-32.

    Bachmann, M. (2010). The risk propensity and rationality of computer hackers. The International Journal of Cyber Criminology, 4, 643-656.

    Ball, D. (2011). China’s cyber warfare capabilities. Security Challenges, 7(2), 81-103.

    Barber, R. (2001). Hackers profiled—who are they and what are their motivations?. Computer Fraud & Security, 2001(2), 14-17.

    Barnum, S. (2012). Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™). MITRE Corporation, July.

    Berzins, M. (2010). Online scams: case studies from Australia. Handbook of Research on Social Interaction Technologies and Collaboration Software: Concepts and Trends, Pennsylvania: IGI Global.

    Blank, L. (2012). International Law and Cyber Threats from Non-State Actors. International Law Studies, Naval War College.

    Blum, J., & Friday, M. (2005). Hackers Target US Power Grid. Washington Post, 11, E01.

    Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., Chon, S., & Da, C. (2013). Crime in Cyberspace: Offenders and the Role of Organized Crime Groups. Available at SSRN 2211842.

    Buchanan, T., & Whitty, M. T. (2013). The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, (ahead-of-print), 1-23.

    Burden, K., & Palmer, C. (2003). Internet crime: Cyber Crime—A new breed of criminal?. Computer Law & Security Review, 19(3), 222-227.

    Caglayan, A., Toothaker, M., Drapeau, D., Burke, D., & Eaton, G. (2012). Behavioral analysis of botnets for threat intelligence. Information Systems and e-Business Management, 10(4), 491-519.

    Cappelli, D., Moore, A., Trzeciak, R., & Shimeall, T. J. (2009). Common sense guide to prevention and detection of insider threats 3rd edition–version 3.1. CERT, Software Engineering Institute, Carnegie Mellon University.

    Carr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. O'Reilly.

    Caspi, A., & Gorsky, P. (2006). Online deception: Prevalence, motivation, and emotion. CyberPsychology & Behavior, 9(1), 54-59.

    Chan, S. H., & Yao, L. J. (2011). An Empirical Investigation Of Hacking Behavior. Review of Business Information Systems (RBIS), 9(4), 41-58.

    Chen, C. D., & Huang, L. T. (2011). Online Deception Investigation: Content Analysis and Cross-Cultural Comparison. The International Journal of Business and Information, 6(1), 91-111.

    Chiesa, R., Ducci, S., & Ciappi, S. (2008). Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. CRC Press.

    Choo, K. K. R. (2008). Organised crime groups in cyberspace: a typology. Trends in organized crime, 11(3), 270-295.

    Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.

    Ciluffo, F. (March 20, 2013). Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure. Testimony before U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies.

    Claycomb, W. R., Huth, C. L., Flynn, L., McIntire, D. M., Lewellen, T. B., & Center, C. I. T. (2012). Chronological examination of insider threat sabotage: preliminary observations. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(4), 4-20.

    Conway, M. (2003). Cyberterrorism: the story so far. Journal of Information Warfare, 2(2), 33-42.

    Conway, M. (2003). Hackers as terrorists? Why it doesn't compute. Computer Fraud & Security, 2(12), 10-13.

    Cummings, A., Lewellen, T., McIntire, D., Moore, A. P., & Trzeciak, R. F. (2012). Insider threat study: Illicit cyber activity involving fraud in the US financial services sector. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.

    Deibert, R. J. (2013). Black Code: Inside the Battle for Cyberspace. McClelland & Stewart.

    Denning, D. E. (2012). Stuxnet: What Has Changed?. Future Internet, 4(3), 672-687.

    Earl, J., Kimport, K., Prieto, G., Rush, C., & Reynoso, K. (2010). Changing the world one webpage at a time: Conceptualizing and explaining internet activism. Mobilization: An International Quarterly, 15(4), 425-446.

    Eom, J. H., Kim, N. U., Kim, S. H., & Chung, T. M. (2012, June). Cyber military strategy for cyberspace superiority in cyber warfare. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 295-299). IEEE.

    Everett, C. (2009). The lucrative world of cyber-espionage. Computer Fraud & Security, 2009(7), 5-7.

    Fachkha, C., Bou-Harb, E., Boukhtouta, A., Dinh, S., Iqbal, F., & Debbabi, M. (2012, October). Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on (pp. 1-8). IEEE.

    Farwell, J. P., & Rohozinski, R. (2011). Stuxnet And The Future Of Cyber War. Survival, 53(1), 23-40.

    Freiermuth, M. R. (2011). Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting. Discourse & Communication, 5(2), 123-145.

    Gandhi, V. K. (2012). An Overview Study on Cyber crimes in Internet. Journal of Information Engineering and Applications, 2(1), 1-5.

    Geers, K. (2009). The cyber threat to national critical infrastructures: Beyond theory. Information Security Journal: A Global Perspective, 18(1), 1-7.

    Goel, S. (2011). Cyberwarfare: connecting the dots in cyber intelligence. Communications of the ACM, 54(8), 132-140.

    Gragido, W., Molina, D., Pirc, J., & Selby, N. (2012). Blackhatonomics: An Inside Look at the Economics of Cybercrime. Access Online via Elsevier.

    Greitzer, F. L., Moore, A. P., Cappelli, D. M., Andrews, D. H., Carroll, L. A., & Hull, T. D. (2008). Combating the insider cyber threat. Security & Privacy, IEEE, 6(1), 61-64.

    Grow, B., Epstein, K., & Tschang, C. C. (2008). The new e-spionage threat. Business Week, 10.

    Hannabuss, S. (2010). Truth, Lies and Trust on the Internet. Library Review, 59(6), 476-478.

    Heickerö, R. (2010). Emerging cyber threats and Russian views on Information warfare and Information operations. Defence Analysis, Swedish Defence Research Agency (FOI).

    Held, W. V. (2012). Hacktivism: An Analysis of the Motive to Disseminate Confidential Information (Doctoral dissertation, Texas State University).

    Himma, K. E. (2007). Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? In K. Himma (Ed.) Internet Security: Hacking, Counterhacking, and Society. Jones and Bartlett Learning.

    Hooi, R., & Cho, H. (2012). Deception in avatar-mediated virtual environment. Computers in Human Behavior, 29(1), 276-284.

    Hu, Q., Xu, Z., & Yayla, A. A. (2013). Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis.

    Hurley, M. M. (2012). For and from Cyberspace: Conceptualizing Cyber Intelligence, Surveillance, and Reconnaissance. Air Univ Maxwell AFB Air Force Research Inst.

    Information Warfare Monitor & Shadowserver Foundation (April 6, 2010). Shadows In The Cloud: Investigating Cyber Espionage 2.0. JR03-2010

    Inkster, N. (2013). Chinese Intelligence in the Cyber Age. Survival, 55(1), 45-66.

    INSA Cyber Intelligence Task Force (September, 2011). Cyber Intelligence: Setting the Landscape for an Emerging Discipline. Intelligence and National Security Alliance (INSA) White Paper. Arlington, VA: INSA.

    Jain, G. (2005). Cyber Terrorism: A Clear and Present Danger to Civilized Society?. Information Systems Educational Journal, 3, 3-8.

    Kallberg, J., & Thuraisingham, B. (2012). Towards Cyber Operations The New Role of Academic Cyber Security Research and Education. In Proceedings from the 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012) (No. June).

    Knapp Jr, E. D. (2012). Unconventional Warfare in Cyberspace. Army War Coll Carlisle Barracks.

    Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541-562.

    Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41-69.

    Leggitt, J. S., Shechter, O. G., & Lang, E. L. (2011). Cyberculture and Personnel Security: Report 1-Orientation, Concerns, and Needs (No. PERSEREC-TR-11-01). Defense Personnel Security Research Center Monterey CA.

    Lewis, J. (July 9, 2013). Cyber Espionage and the Theft of U.S. Intellectual Property and Technology. Testimony 
before the House of Representatives
Committee on Energy and Commerce Subcommittee on Oversight and Investigations.

    Lin, H. S. (2010). Offensive cyber operations and the use of force. Journal of National Security Law & Policy 4, 63.

    Longe, O. B., Mbarika, V., Kourouma, M., Wada, F., & Isabalija, R. (2010). Seeing beyond the surface, understanding and tracking fraudulent cyber activities. arXiv preprint arXiv:1001.1993.

    Mansfield-Devine, S. (2011). Hacktivism: assessing the damage. Network Security, 2011(8), 5-13.

    Marchetti, M., Colajanni, M., Messori, M., Aniello, L., & Vigfusson, Y. (2012). Cyber attacks on financial critical infrastructures. In R. Baldoni & G. Chockler (Eds.) Collaborative Financial Infrastructure Protection (pp. 53-82). Springer Berlin Heidelberg.

    Melnitzky, A. (2011). Defending America Against Chinese Cyber Espionage Through the Use of Active Defenses. Cardozo J. Int'l & Comp. L., 20, 537.

    Moore, A. P., Cappelli, D. M., & Trzeciak, R. F. (2008). The “big picture” of insider IT sabotage across US critical infrastructures. Technical Report CMU/SEI-2008-TR-009 ESC-TR-2008-009. Pittsburgh, PA: Software Engineering institute, Carnegie Mellon University.

    Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Digital Investigation: The International Journal of Digital Forensics & Incident Response, 2(4), 261-267.

    Olson, J. M. (2001). The Ten Commandments Of Counterintelligence. Central Intelligence Agency, Washington DC: Center For The Study Of Intelligence.

    Pelican, L. (2012). Peacetime Cyber-Espionage: A Dangerous But Necessary Game. CommLaw Conspectus, 20, 363-471.

    Petratos, P. (2011). Definition and Importance of Cyberintelligence: An Introduction. Available at SSRN 1977061.

    Puram, P. K., Kaparthi, M., & Rayaprolu, A. K. H. (2011). Online Scams: Taking The Fun Out Of The Internet. Indian Journal of Computer Science and Engineering, 2(4), 559-565.

    Reagan, M. (2005). Introduction to U.S. Counterintelligence - CI 101: A Primer. Unpublished Manuscript.

    Rege, A. (2009). What's love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2), 494-512.

    Reich, P. C., Weinstein, S., Wild, C., & Cabanlong, A. S. (2010). Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents–and the Dilemma of Anonymity. European Journal of Law and Technology, 1(2).

    Rider, B. A. (2001). Cyber-Organised Crime—The Impact of Information Technology on Organised Crime. Journal of Financial Crime, 8(4), 332-346.

    Rogers, M. K. (2010). The Psyche of Cybercriminals: A Psycho-Social Perspective. In Cybercrimes: A Multidisciplinary Analysis (pp. 217-235). Springer Berlin Heidelberg.

    Rounds, M., & Pendgraft, N. (2009, August). Diversity in network attacker motivation: A literature review. In Computational Science and Engineering, 2009. CSE'09. International Conference on (Vol. 3, pp. 319-323). IEEE.

    Rudner, M. (2013). Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453-481.

    Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-Crimes and their Impacts: A Review.

    Van Niekerk, B. R. E. T. T., & Maharaj, M. (2013). Social Media and Information Conflict. International Journal of Communication, 7, 1162-1184.

    Schmitt, M. (2012). Classification of Cyber Conflict. Journal of Conflict and Security Law, 17(2), 245-260.

    Shachaf, P., & Hara, N. (2010). Beyond vandalism: Wikipedia trolls. Journal of Information Science, 36(3), 357‐370.

    Shaw, E., Ruby, K., & Post, J. (1998). The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin, 2(98), 1-10.

    Shropshire, J. (2009). A canonical analysis of intentional information security breaches by insiders. Information Management & Computer Security, 17(4), 296-310.

    Siboni, G. & Kronenfeld, S. (2012). Iran and Cyberspace Warfare. Military and Strategic Affairs, 4(3), 77-99.

    Sigholm, J., & Bang, M. (2013). Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats, 2013 European Intelligence and Security Informatics Conference, IEEE, 37, 166-171.

    Spade, J. M. (2011). China's Cyber Power and America's National Security. US Army War College Carlisle Barracks PA.

    Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71-92.

    Stabek, A., Watters, P., & Layton, R. (2010, July). The seven scam types: mapping the terrain of cybercrime. In Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second (pp. 41-51). IEEE.

    Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326.

    Talihärm, A. M. (2010). Cyberterrorism: in Theory or in Practice?. Defence Against Terrorism Review, 3(2), 59-74.

    Trend Micro (2010). The Business of Cybercrime: A Complex Business Model. Trend Micro White Paper.

    Trevathan, J., & Myers, T. (2012). Anti-social networking?. World Academy of Science, Engineering and Technology, 72, 127-135.

    van Niekerk, B., & Maharaj, M. S. (2011). The Information Warfare Life Cycle Model. SA Journal of Information Management, 13(1), 9-pages.

    Vegh, S. (2002). Hacktivists or cyberterrorists? The changing media discourse on hacking. First Monday, 7(10).

    Ventre, D. (2013). Cyber Conflict: Competing National Perspectives. NY:John Wiley & Sons.

    Wall, D. S., & Williams, M. L. (2013). Policing cybercrime: networked and social media technologies and the challenges for policing. Policing and Society, (ahead-of-print), 1-4.

    Warfield, D. (2012). Critical Infrastructures: IT Security and Threats from Private Sector Ownership. Information Security Journal: A Global Perspective, 21(3), 127-136.

    Watters, P. A., McCombie, S., Layton, R., & Pieprzyk, J. (2012). Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control, 15(4), 430-441.

    Weimann, G. (2012). Lone wolves in cyberspace. Journal of Terrorism Research, 3(2).

    Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking, 15(3), 181-183.

    Williams, B. T. (2011). Ten Propositions Regarding Cyberspace Operations. Joint Force Quarterly, (61), 10.

    Woo, H. J., Kim, Y., & Dominick, J. (2004). Hackers: Militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6(1), 63-82.

    Williams, B. T. (2011). Ten Propositions Regarding Cyberspace Operations. Joint Force Quarterly, (61), 10.

    Williams, P., Shimeall, T., & Dunlevy, C. (2002). Intelligence analysis for Internet security. Contemporary Security Policy, 23(2), 1-38.

    Wortzel, L. (July 9, 2013). Cyber Espionage and the Theft of U.S. Intellectual Property and Technology. Testimony 
before the House of Representatives
Committee on Energy and Commerce Subcommittee on Oversight and Investigations.

    Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency?. The Howard Journal of Criminal Justice, 44(4), 387-399.

    Yazdanifard, R., Oyegoke, T., & Seyedi, A. P. (2011). Cyber-Crimes: Challenges of the Millennium Age. In Advances in Electrical Engineering and Electrical Machines (pp. 527-534). Springer Berlin Heidelberg.

    F. Student Expectations/Requirements and Grading Policy

    Grading Scale: The following grading scale will be applied:

    90% - 100% is an A

    80% - 89% is a B

    70% - 79% is a C

    60% - 69% is a D

    less than 60% is an F.

    Your performance in this class (and consequently, your grade) will be judged and weighted on the following basis:

    Presentation and Reading Quizzes: 65%

    Final Exam: 25%

    Final Project: 10%

    G. Assignments, Exams and Tests

    Week 1

    The Emerging Discipline of Cyber Intelligence

    o Cyber Intelligence: Setting the Landscape for an Emerging Discipline

    o Cyber Intelligence Tradecraft Project--Summary of Key Findings

    o Definition and Importance of Cyberintelligence: An Introduction.

    Week 2

    The Spectrum of Cyber Conflict

    o Cyberwarfare: connecting the dots in cyber intelligence.

    o The Information Warfare Life Cycle Model.

    o Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents–and the Dilemma of Anonymity.

    o Pattern of global cyber war and crime: A conceptual framework.

    Quiz on Wee 1 & 2

    Week 3

    Actors: Crackers and Cyber Vandals

    o Diversity in network attacker motivation: A literature review.

    o An Empirical Investigation Of Hacking Behavior.

    o The risk propensity and rationality of computer hackers.

    o Computer hacking: Just another case of juvenile delinquency?

    o Beyond vandalism: Wikipedia trolls.

    Week 4

    Actors: Hactivists

    o Anarchists, Pirates, Ideologists, And Disasters: New Digital Trends And Their Impacts

    o Changing The World One Webpage At A Time: Conceptualizing And Explaining Internet Activism

    o Hacktivism: assessing the damage.

    Quiz on Week 3 & 4

    Week 5

    Actors: Cyber Criminals

    o Cyber-Crimes: Challenges of the Millennium Age.

    o The Psyche of Cybercriminals: A Psycho-Social Perspective.

    o Organised crime groups in cyberspace: a typology.

    o Crime in Cyberspace: Offenders and the Role of Organized Crime Groups.

    Week 6

    Actors: States and Nonstate Actors

    o Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure.

    o China's Cyber Power and America's National Security

    o Chinese Intelligence in the Cyber Age .

    o Iran and Cyberspace Warfare.

    o Cybermilitias and political hackers: Use of irregular forces in cyberwarfare.

    o Cyberterrorism: in Theory or in Practice?

    Quiz on Week 5 & 6

    Week 7

    Target: Financial Institutions

    o The Business of Cybercrime: A Complex Business Model.

    o Cyber Attacks On Financial Critical Infrastructures.

    Week 8

    Tactics: Cyber Scams

    o A Study of Social Engineering in Online Frauds

    o Anti-social networking?

    o The seven scam types: mapping the terrain of cybercrime

    o Understanding cybercrime perpetrators and the strategies they employ in Nigeria.

    o Online Scams: Taking The Fun Out Of The Internet

    o The online romance scam: A serious cybercrime.

    o Online scams: case studies from Australia.

    Quiz on Week 7 & 8

    Week 9

    Tactics: Disruption & Destruction

    o Hackers: Militants or merry pranksters? A content analysis of defaced web pages

    Week 10

    Cyber Espionage

    o Cyber Espionage and the Theft of U.S. Intellectual Property and Technology.

    o Shadows In The Cloud: Investigating Cyber Espionage 2.0.

    o The lucrative world of cyber-espionage.

    Quiz on Week 9 & 10

    Week 11

    Insider Threats

    o Combating the insider cyber threat.

    o A canonical analysis of intentional information security breaches by insiders.

    o The “Big Picture” of insider IT sabotage across US critical infrastructures.

    o Common sense guide to prevention and detection of insider threats 3rd edition–version 3.1.

    o Chronological examination of insider threat sabotage: preliminary observations.

    Week 12

    Cyber Counterintelligence

    o The Ten Commandments of Counterintelligence

    o Introduction to U.S. Counterintelligence - CI 101: A Primer

    o Criminal profiling and insider cyber crime.

    o Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats

    Quiz on Week 11 & 12

    Week 13

    Beyond Cyber Attacks: Cyber Operations

    o Emerging cyber threats and Russian views on Information warfare and Information operations.

    o Offensive cyber operations and the use of force

    o Ten Propositions Regarding Cyberspace Operations

    Week 14

    Cyber Behavior

    o The online disinhibition effect

    o Online deception: Prevalence, motivation, and emotion

    o Online Deception Investigation: Content Analysis and Cross-Cultural Comparison

    Quiz on Week 13 & 14

    Week 15

    Final Project

    Memo and Briefing

    Week 16

    Final Exam

    H. Attendance Policy

    Course Attendance at First Class Meeting – Policy for Graduate Students: For structured courses, 6000 and above, the College/Campus Dean will set the first-day class attendance requirement. Check with the College for specific information. This policy is not applicable to courses in the following categories: Educational Outreach, Open University (TV), FEEDS Program, Community Experiential Learning (CEL), Cooperative Education Training, and courses that do not have regularly scheduled meeting days/times (such as, directed reading/research or study, individual research, thesis, dissertation, internship, practica, etc.). Students are responsible for dropping undesired courses in these categories by the 5th day of classes to avoid fee liability and academic penalty. (See USF Regulation – Registration - 4.0101,

    http://usfweb2.usf.edu/usfgc/ogc%20web/currentreg.htm)

    Attendance Policy for the Observance of Religious Days by Students: In accordance with Sections 1006.53 and 1001.74(10)(g) Florida Statutes and Board of Governors Regulation 6C-6.0115, the University of South Florida (University/USF) has established the following policy regarding religious observances: (http://usfweb2.usf.edu/usfgc/gc_pp/acadaf/gc10-045.htm)

    In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It’s the responsibility of the student to monitor Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.

    I. Policy on Make-up Work

    Policy on Make-up Work

    As a general policy, there are no make-ups for quizzes, projects or the final exam. If a student wishes to submit an assignment late, the instructor may accept it at his/her discretion and assess a suitable grade penalty.

    System Emergencies

    In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It is the responsibility of the student to monitor the Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.

    Scheduled Absences

    Students are expected to notify their instructors at the beginning of each academic term if they intend to be absent for a class or announced examination for religious reasons. They will be given reasonable opportunities to make up any work missed. For further information, please refer to: http://generalcounsel.usf.edu/policies-and-procedures/pdfs/policy-10-045.pdf

    Academic Dishonesty

    The University of South Florida has in place specific policies and procedures regarding academic dishonesty or disruption of academic process (also see below for more detail). Academic dishonesty includes, but is not limited to: copying or relying on another’s work and using it as your own; representing work you previously prepared for another class as work that was prepared for this class; and using any material during a quiz exam that has not been approved by the professor.

    Academic dishonesty will result in a grade of “FF” and, possible dismissal from the program. An “FF” received as a result of academic dishonesty puts you on Academic Warning for the remainder of your time at USF. A class in which you receive an “FF” as a result of academic dishonesty is not repeatable. All papers, research, and examinations will be monitored carefully and students found cheating will be punished to the fullest extent allowed by the University and the Department.

    In an effort to ensure compliance, plagiarism tracking software (SafeAssign) may be employed in this course. The University of South Florida has an account with an automated plagiarism detection service which allows instructors to submit student assignments to be checked for plagiarism. Your assignments may be submitted to this detection system, in which they are compared to a large database of journal articles, web articles, and previously submitted papers. Because all papers will be submitted to SafeAssign, you should know your rights:

    You may be required to submit your paper to a plagiarism detection site that will be identified by your instructor. In order to comply with federal (FERPA) and state privacy laws, you (students) are not required to include personal identifying information such as your name, SSN, and/or U# in the body of the work (text) or use such information in the file naming convention prior to submitting. Please follow carefully your instructor’s instructions regarding what identifying information to include. Your submission will be placed in the course grade center in your account that can be accessed by the instructor and attributed to you.

    If you have any questions, please refer to USF’s Procedures for Alleged Academic Dishonesty or Disruption – http://www.ugs.usf.edu/catalogs/0809/adap.htm and Student Academic Grievance Procedures – http://www.ugs.usf.edu/catalogs/0809/arcsagp.htm

    J. Program This Course Supports

    M.S. in Information Studies with a focus on Straregy & Information Analytics


  5. Course Concurrence Information



- if you have questions about any of these fields, please contact chinescobb@grad.usf.edu or joe@grad.usf.edu.