Graduate Studies Reports Access

Graduate Course Proposal Form Submission Detail - LIS6670
Tracking Number - 5299

Edit function not enabled for this course.


Current Status: Approved by SCNS - 2016-07-01
Campus: Tampa
Submission Type: Change
Course Change Information (for course changes only): Add LIS 6709 Cyber Intelligence as a prerequisite for LIS 6670
Comments: Required for MS in Cyber: Cyber Intel Conc. To GC. Approved pending acct #; To USF Sys 4/21/16; to SCNS after 4/28/16. Apprd eff 7/1/16


Detail Information

  1. Date & Time Submitted: 2015-10-16
  2. Department: Library and Information Science
  3. College: AS
  4. Budget Account Number: 1248000
  5. Contact Person: Randy Borum
  6. Phone: 9743520
  7. Email: borum@usf.edu
  8. Prefix: LIS
  9. Number: 6670
  10. Full Title: Advanced Cyber Intelligence
  11. Credit Hours: 3
  12. Section Type: C - Class Lecture (Primarily)
  13. Is the course title variable?: N
  14. Is a permit required for registration?: Y
  15. Are the credit hours variable?: N
  16. Is this course repeatable?: N
  17. If repeatable, how many times?: 0
  18. Abbreviated Title (30 characters maximum): Advanced Cyber Intel
  19. Course Online?: O - Online (100% online)
  20. Percentage Online: 100
  21. Grading Option: R - Regular
  22. Prerequisites: None
  23. Corequisites: None
  24. Course Description: Builds on the foundations of Cyber Intelligence (LIS 6703) and focuses on applying intelligence analytic methods to plan, collect, process, analyze, produce and disseminate cyber intelligence products.

  25. Please briefly explain why it is necessary and/or desirable to add this course: Replacing Selected Topics with Permanent number; already listed in program
  26. What is the need or demand for this course? (Indicate if this course is part of a required sequence in the major.) What other programs would this course service? This course will service two master's degree programs and a graduate certificate program. It will be a required course for the Concentration in Cyber Intelligence for the MS in Information Studies with a focus on Strategy and Information Analytics; for the Concentration in Cyber Intelligence for the (cost recovery) M.S.in Cybersecurity; and for the (cost recovery) Graduate Certificate in Cyber Intelligence
  27. Has this course been offered as Selected Topics/Experimental Topics course? If yes, how many times? Yes, 1 time
  28. What qualifications for training and/or experience are necessary to teach this course? (List minimum qualifications for the instructor.) Expertise in cyber intelligence theory and tradecraft
  29. Objectives: To apply intelligence analytic methods to create actionable intelligence products that support a cybersecurity mission.
  30. Learning Outcomes: Identify and evaluate key open source resources for Cyber Intelligence

    Describe some of the major (unclassified) software tools available for intelligence analysis and their applicability to cyber-related information

    Apply structured intelligence analytic methods to Cyber Intelligence questions

    Aggregate and organize resources for Cyber Intelligence collection

    Understand how to assess a competitive environment/landscape and to describe and categorize cyber capabilities, intentions, and activities

    Critically analyze and clarify intelligence requirements

    Write and critique an accurate, comprehensive, and timely intelligence product to inform a specific question/requirement

    Deliver a concise and effective briefing to inform a specific Cyber Intelligence question/requirement

  31. Major Topics: Intelligence disciplines and computer network exploitation

    Strategic, operational and tactical levels of Cyber Intelligence

    OSINT resources for Cyber Intelligence

    Aggregating and organizing data

    Structured Analysis Tools in Cyber Intelligence

    Overview of intelligence software tools

    Applying major intelligence software tools

    Identifying adversaries and competitors and assessing the competitive landscape

    Understanding and assessing Cyber-capabilities, intentions, and activities

    Navigating intelligence requirements

    Cyber Intelligence memo project

    Cyber Intelligence briefing project

  32. Textbooks: No Textbook. Course will use assigned readings.
  33. Course Readings, Online Resources, and Other Purchases: Applegate, S. (2011). Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Security and Privacy, 9(5), 16-22.

    Aransiola, J. O., & Asindemade, S. O. (2011). Understanding cybercrime perpetrators and the strategies they employ in Nigeria. Cyberpsychology, Behavior, and Social Networking, 14(12), 759-763.

    Atkins, B., & Huang, W. (2013). A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences, 1(3), 23-32.

    Bachmann, M. (2010). The risk propensity and rationality of computer hackers. The International Journal of Cyber Criminology, 4, 643-656.

    Ball, D. (2011). China’s cyber warfare capabilities. Security Challenges, 7(2), 81-103.

    Barber, R. (2001). Hackers profiled—who are they and what are their motivations?. Computer Fraud & Security, 2001(2), 14-17.

    Barnum, S. (2012). Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™). MITRE Corporation, July.

    Berzins, M. (2010). Online scams: case studies from Australia. Handbook of Research on Social Interaction Technologies and Collaboration Software: Concepts and Trends, Pennsylvania: IGI Global.

    Blank, L. (2012). International Law and Cyber Threats from Non-State Actors. International Law Studies, Naval War College.

    Blum, J., & Friday, M. (2005). Hackers Target US Power Grid. Washington Post, 11, E01.

    Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., Chon, S., & Da, C. (2013). Crime in Cyberspace: Offenders and the Role of Organized Crime Groups. Available at SSRN 2211842.

    Buchanan, T., & Whitty, M. T. (2013). The online dating romance scam: causes and consequences of victimhood. Psychology, Crime & Law, (ahead-of-print), 1-23.

    Burden, K., & Palmer, C. (2003). Internet crime: Cyber Crime—A new breed of criminal?. Computer Law & Security Review, 19(3), 222-227.

    Caglayan, A., Toothaker, M., Drapeau, D., Burke, D., & Eaton, G. (2012). Behavioral analysis of botnets for threat intelligence. Information Systems and e-Business Management, 10(4), 491-519.

    Cappelli, D., Moore, A., Trzeciak, R., & Shimeall, T. J. (2009). Common sense guide to prevention and detection of insider threats 3rd edition–version 3.1. CERT, Software Engineering Institute, Carnegie Mellon University.

    Carr, J. (2011). Inside cyber warfare: Mapping the cyber underworld. O'Reilly.

    Caspi, A., & Gorsky, P. (2006). Online deception: Prevalence, motivation, and emotion. CyberPsychology & Behavior, 9(1), 54-59.

    Chan, S. H., & Yao, L. J. (2011). An Empirical Investigation Of Hacking Behavior. Review of Business Information Systems (RBIS), 9(4), 41-58.

    Chen, C. D., & Huang, L. T. (2011). Online Deception Investigation: Content Analysis and Cross-Cultural Comparison. The International Journal of Business and Information, 6(1), 91-111.

    Chiesa, R., Ducci, S., & Ciappi, S. (2008). Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. CRC Press.

    Choo, K. K. R. (2008). Organised crime groups in cyberspace: a typology. Trends in organized crime, 11(3), 270-295.

    Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719-731.

    Ciluffo, F. (March 20, 2013). Cyber Threats from China, Russia and Iran: Protecting American Critical Infrastructure. Testimony before U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies.

    Claycomb, W. R., Huth, C. L., Flynn, L., McIntire, D. M., Lewellen, T. B., & Center, C. I. T. (2012). Chronological examination of insider threat sabotage: preliminary observations. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(4), 4-20.

    Conway, M. (2003). Cyberterrorism: the story so far. Journal of Information Warfare, 2(2), 33-42.

    Conway, M. (2003). Hackers as terrorists? Why it doesn't compute. Computer Fraud & Security, 2(12), 10-13.

    Cummings, A., Lewellen, T., McIntire, D., Moore, A. P., & Trzeciak, R. F. (2012). Insider threat study: Illicit cyber activity involving fraud in the US financial services sector. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.

    Deibert, R. J. (2013). Black Code: Inside the Battle for Cyberspace. McClelland & Stewart.

    Denning, D. E. (2012). Stuxnet: What Has Changed?. Future Internet, 4(3), 672-687.

    Earl, J., Kimport, K., Prieto, G., Rush, C., & Reynoso, K. (2010). Changing the world one webpage at a time: Conceptualizing and explaining internet activism. Mobilization: An International Quarterly, 15(4), 425-446.

    Eom, J. H., Kim, N. U., Kim, S. H., & Chung, T. M. (2012, June). Cyber military strategy for cyberspace superiority in cyber warfare. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 295-299). IEEE.

    Everett, C. (2009). The lucrative world of cyber-espionage. Computer Fraud & Security, 2009(7), 5-7.

    Fachkha, C., Bou-Harb, E., Boukhtouta, A., Dinh, S., Iqbal, F., & Debbabi, M. (2012, October). Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on (pp. 1-8). IEEE.

    Farwell, J. P., & Rohozinski, R. (2011). Stuxnet And The Future Of Cyber War. Survival, 53(1), 23-40.

    Freiermuth, M. R. (2011). Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting. Discourse & Communication, 5(2), 123-145.

    Gandhi, V. K. (2012). An Overview Study on Cyber crimes in Internet. Journal of Information Engineering and Applications, 2(1), 1-5.

    Geers, K. (2009). The cyber threat to national critical infrastructures: Beyond theory. Information Security Journal: A Global Perspective, 18(1), 1-7.

    Goel, S. (2011). Cyberwarfare: connecting the dots in cyber intelligence. Communications of the ACM, 54(8), 132-140.

    Gragido, W., Molina, D., Pirc, J., & Selby, N. (2012). Blackhatonomics: An Inside Look at the Economics of Cybercrime. Access Online via Elsevier.

    Greitzer, F. L., Moore, A. P., Cappelli, D. M., Andrews, D. H., Carroll, L. A., & Hull, T. D. (2008). Combating the insider cyber threat. Security & Privacy, IEEE, 6(1), 61-64.

    Grow, B., Epstein, K., & Tschang, C. C. (2008). The new e-spionage threat. Business Week, 10.

    Hannabuss, S. (2010). Truth, Lies and Trust on the Internet. Library Review, 59(6), 476-478.

    Heickerö, R. (2010). Emerging cyber threats and Russian views on Information warfare and Information operations. Defence Analysis, Swedish Defence Research Agency (FOI).

    Held, W. V. (2012). Hacktivism: An Analysis of the Motive to Disseminate Confidential Information (Doctoral dissertation, Texas State University).

    Himma, K. E. (2007). Hacking as Politically Motivated Digital Civil Disobedience: Is Hacktivism Morally Justified? In K. Himma (Ed.) Internet Security: Hacking, Counterhacking, and Society. Jones and Bartlett Learning.

    Hooi, R., & Cho, H. (2012). Deception in avatar-mediated virtual environment. Computers in Human Behavior, 29(1), 276-284.

    Hu, Q., Xu, Z., & Yayla, A. A. (2013). Why College Students Commit Computer Hacks: Insights from a Cross Culture Analysis.

    Hurley, M. M. (2012). For and from Cyberspace: Conceptualizing Cyber Intelligence, Surveillance, and Reconnaissance. Air Univ Maxwell AFB Air Force Research Inst.

    Information Warfare Monitor & Shadowserver Foundation (April 6, 2010). Shadows In The Cloud: Investigating Cyber Espionage 2.0. JR03-2010

    Inkster, N. (2013). Chinese Intelligence in the Cyber Age. Survival, 55(1), 45-66.

    INSA Cyber Intelligence Task Force (September, 2011). Cyber Intelligence: Setting the Landscape for an Emerging Discipline. Intelligence and National Security Alliance (INSA) White Paper. Arlington, VA: INSA.

    Jain, G. (2005). Cyber Terrorism: A Clear and Present Danger to Civilized Society?. Information Systems Educational Journal, 3, 3-8.

    Kallberg, J., & Thuraisingham, B. (2012). Towards Cyber Operations The New Role of Academic Cyber Security Research and Education. In Proceedings from the 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012) (No. June).

    Knapp Jr, E. D. (2012). Unconventional Warfare in Cyberspace. Army War Coll Carlisle Barracks.

    Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541-562.

    Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13(1), 41-69.

    Leggitt, J. S., Shechter, O. G., & Lang, E. L. (2011). Cyberculture and Personnel Security: Report 1-Orientation, Concerns, and Needs (No. PERSEREC-TR-11-01). Defense Personnel Security Research Center Monterey CA.

    Lewis, J. (July 9, 2013). Cyber Espionage and the Theft of U.S. Intellectual Property and Technology. Testimony 
before the House of Representatives
Committee on Energy and Commerce Subcommittee on Oversight and Investigations.

    Lin, H. S. (2010). Offensive cyber operations and the use of force. Journal of National Security Law & Policy 4, 63.

    Longe, O. B., Mbarika, V., Kourouma, M., Wada, F., & Isabalija, R. (2010). Seeing beyond the surface, understanding and tracking fraudulent cyber activities. arXiv preprint arXiv:1001.1993.

    Mandiant (2011). APT1: Exposing One of China's Cyber Espionage Units. Alexandria, VA: Mandiant.

    Mansfield-Devine, S. (2011). Hacktivism: assessing the damage. Network Security, 2011(8), 5-13.

    Marchetti, M., Colajanni, M., Messori, M., Aniello, L., & Vigfusson, Y. (2012). Cyber attacks on financial critical infrastructures. In R. Baldoni & G. Chockler (Eds.) Collaborative Financial Infrastructure Protection (pp. 53-82). Springer Berlin Heidelberg.

    Melnitzky, A. (2011). Defending America Against Chinese Cyber Espionage Through the Use of Active Defenses. Cardozo J. Int'l & Comp. L., 20, 537.

    Moore, A. P., Cappelli, D. M., & Trzeciak, R. F. (2008). The “big picture” of insider IT sabotage across US critical infrastructures. Technical Report CMU/SEI-2008-TR-009 ESC-TR-2008-009. Pittsburgh, PA: Software Engineering institute, Carnegie Mellon University.

    Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Digital Investigation: The International Journal of Digital Forensics & Incident Response, 2(4), 261-267.

    Olson, J. M. (2001). The Ten Commandments Of Counterintelligence. Central Intelligence Agency, Washington DC: Center For The Study Of Intelligence.

    Pelican, L. (2012). Peacetime Cyber-Espionage: A Dangerous But Necessary Game. CommLaw Conspectus, 20, 363-471.

    Petratos, P. (2011). Definition and Importance of Cyberintelligence: An Introduction. Available at SSRN 1977061.

    Puram, P. K., Kaparthi, M., & Rayaprolu, A. K. H. (2011). Online Scams: Taking The Fun Out Of The Internet. Indian Journal of Computer Science and Engineering, 2(4), 559-565.

    Reagan, M. (2005). Introduction to U.S. Counterintelligence - CI 101: A Primer. Unpublished Manuscript.

    Rege, A. (2009). What's love got to do with it? Exploring online dating scams and identity fraud. International Journal of Cyber Criminology, 3(2), 494-512.

    Reich, P. C., Weinstein, S., Wild, C., & Cabanlong, A. S. (2010). Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents–and the Dilemma of Anonymity. European Journal of Law and Technology, 1(2).

    Rider, B. A. (2001). Cyber-Organised Crime—The Impact of Information Technology on Organised Crime. Journal of Financial Crime, 8(4), 332-346.

    Rogers, M. K. (2010). The Psyche of Cybercriminals: A Psycho-Social Perspective. In Cybercrimes: A Multidisciplinary Analysis (pp. 217-235). Springer Berlin Heidelberg.

    Rounds, M., & Pendgraft, N. (2009, August). Diversity in network attacker motivation: A literature review. In Computational Science and Engineering, 2009. CSE'09. International Conference on (Vol. 3, pp. 319-323). IEEE.

    Rudner, M. (2013). Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge. International Journal of Intelligence and CounterIntelligence, 26(3), 453-481.

    Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-Crimes and their Impacts: A Review.

    Van Niekerk, B. R. E. T. T., & Maharaj, M. (2013). Social Media and Information Conflict. International Journal of Communication, 7, 1162-1184.

    Schmitt, M. (2012). Classification of Cyber Conflict. Journal of Conflict and Security Law, 17(2), 245-260.

    Shachaf, P., & Hara, N. (2010). Beyond vandalism: Wikipedia trolls. Journal of Information Science, 36(3), 357‐370.

    Shaw, E., Ruby, K., & Post, J. (1998). The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin, 2(98), 1-10.

    Shropshire, J. (2009). A canonical analysis of intentional information security breaches by insiders. Information Management & Computer Security, 17(4), 296-310.

    Siboni, G. & Kronenfeld, S. (2012). Iran and Cyberspace Warfare. Military and Strategic Affairs, 4(3), 77-99.

    Sigholm, J., & Bang, M. (2013). Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats, 2013 European Intelligence and Security Informatics Conference, IEEE, 37, 166-171.

    Spade, J. M. (2011). China's Cyber Power and America's National Security. US Army War College Carlisle Barracks PA.

    Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71-92.

    Stabek, A., Watters, P., & Layton, R. (2010, July). The seven scam types: mapping the terrain of cybercrime. In Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second (pp. 41-51). IEEE.

    Suler, J. (2004). The online disinhibition effect. Cyberpsychology & behavior, 7(3), 321-326.

    Talihärm, A. M. (2010). Cyberterrorism: in Theory or in Practice?. Defence Against Terrorism Review, 3(2), 59-74.

    Trend Micro (2010). The Business of Cybercrime: A Complex Business Model. Trend Micro White Paper.

    Trevathan, J., & Myers, T. (2012). Anti-social networking?. World Academy of Science, Engineering and Technology, 72, 127-135.

    van Niekerk, B., & Maharaj, M. S. (2011). The Information Warfare Life Cycle Model. SA Journal of Information Management, 13(1), 9-pages.

    Vegh, S. (2002). Hacktivists or cyberterrorists? The changing media discourse on hacking. First Monday, 7(10).

    Ventre, D. (2013). Cyber Conflict: Competing National Perspectives. NY:John Wiley & Sons.

    Wall, D. S., & Williams, M. L. (2013). Policing cybercrime: networked and social media technologies and the challenges for policing. Policing and Society, (ahead-of-print), 1-4.

    Warfield, D. (2012). Critical Infrastructures: IT Security and Threats from Private Sector Ownership. Information Security Journal: A Global Perspective, 21(3), 127-136.

    Watters, P. A., McCombie, S., Layton, R., & Pieprzyk, J. (2012). Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control, 15(4), 430-441.

    Weimann, G. (2012). Lone wolves in cyberspace. Journal of Terrorism Research, 3(2).

    Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social Networking, 15(3), 181-183.

    Williams, B. T. (2011). Ten Propositions Regarding Cyberspace Operations. Joint Force Quarterly, (61), 10.

    Woo, H. J., Kim, Y., & Dominick, J. (2004). Hackers: Militants or merry pranksters? A content analysis of defaced web pages. Media Psychology, 6(1), 63-82.

    Williams, B. T. (2011). Ten Propositions Regarding Cyberspace Operations. Joint Force Quarterly, (61), 10.

    Williams, P., Shimeall, T., & Dunlevy, C. (2002). Intelligence analysis for Internet security. Contemporary Security Policy, 23(2), 1-38.

    Wortzel, L. (July 9, 2013). Cyber Espionage and the Theft of U.S. Intellectual Property and Technology. Testimony 
before the House of Representatives
Committee on Energy and Commerce Subcommittee on Oversight and Investigations.

    Yar, M. (2005). Computer hacking: Just another case of juvenile delinquency?. The Howard Journal of Criminal Justice, 44(4), 387-399.

    Yazdanifard, R., Oyegoke, T., & Seyedi, A. P. (2011). Cyber-Crimes: Challenges of the Millennium Age. In Advances in Electrical Engineering and Electrical Machines (pp. 527-534). Springer Berlin Heidelberg.

  34. Student Expectations/Requirements and Grading Policy: Grading Scale: The following grading scale will be applied:

    90% - 100% is an A

    80% - 89% is a B

    70% - 79% is a C

    60% - 69% is a D

    less than 60% is an F.

    Your performance in this class (and consequently, your grade) will be judged and weighted on the following basis:

    Presentation and Reading Quizzes: 65%

    Final Exam: 25%

    Final Project: 10%

  35. Assignments, Exams and Tests: Module 1:

    Intelligence disciplines, computer network exploitation, and cybersecurity terminology

    Module 1 Quiz

    Module 2:

    Strategic, operational and tactical levels of Cyber Intelligence

    Module 2 Quiz

    Module 3:

    Identifying, aggregating and organizing OSINT resources for Cyber Intelligence

    Module 3 Quiz

    Develop Annotated Resource List

    Module 4:

    Applying Structured Analysis Tools (SAT) in Cyber Intelligence

    Module 4 Quiz

    SAT Application Exercise

    Module 5:

    Applications of intelligence software tools

    Module 5 Quiz

    Palantir Analysis Project

    Module 6:

    Identifying adversaries and competitors and assessing the competitive landscape

    Module 6 Quiz

    Intelligence Memo Assignment

    Module 7:

    Understanding and assessing Cyber-capabilities, intentions, and activities

    Module 7 Quiz

    Intelligence Memo and Briefing Assignment

    Module 8:

    Navigating intelligence requirements, production and dissemination

    Module 8 Quiz

    Intelligence Memo and Briefing Assignment

    Cumulative Final Exam

  36. Attendance Policy: Course Attendance at First Class Meeting – Policy for Graduate Students: For structured courses, 6000 and above, the College/Campus Dean will set the first-day class attendance requirement. Check with the College for specific information. This policy is not applicable to courses in the following categories: Educational Outreach, Open University (TV), FEEDS Program, Community Experiential Learning (CEL), Cooperative Education Training, and courses that do not have regularly scheduled meeting days/times (such as, directed reading/research or study, individual research, thesis, dissertation, internship, practica, etc.). Students are responsible for dropping undesired courses in these categories by the 5th day of classes to avoid fee liability and academic penalty. (See USF Regulation – Registration - 4.0101,

    http://usfweb2.usf.edu/usfgc/ogc%20web/currentreg.htm)

    Attendance Policy for the Observance of Religious Days by Students: In accordance with Sections 1006.53 and 1001.74(10)(g) Florida Statutes and Board of Governors Regulation 6C-6.0115, the University of South Florida (University/USF) has established the following policy regarding religious observances: (http://usfweb2.usf.edu/usfgc/gc_pp/acadaf/gc10-045.htm)

    In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It’s the responsibility of the student to monitor Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.

  37. Policy on Make-up Work: As a general policy, there are no make-ups for quizzes, projects or the final exam. If a student wishes to submit an assignment late, the instructor may accept it at his/her discretion and assess a suitable grade penalty.

    System Emergencies

    In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. It is the responsibility of the student to monitor the Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.

    Scheduled Absences

    Students are expected to notify their instructors at the beginning of each academic term if they intend to be absent for a class or announced examination for religious reasons. They will be given reasonable opportunities to make up any work missed. For further information, please refer to: http://generalcounsel.usf.edu/policies-and-procedures/pdfs/policy-10-045.pdf

    Academic Dishonesty

    The University of South Florida has in place specific policies and procedures regarding academic dishonesty or disruption of academic process (also see below for more detail). Academic dishonesty includes, but is not limited to: copying or relying on another’s work and using it as your own; representing work you previously prepared for another class as work that was prepared for this class; and using any material during a quiz exam that has not been approved by the professor.

    Academic dishonesty will result in a grade of “FF” and, possible dismissal from the program. An “FF” received as a result of academic dishonesty puts you on Academic Warning for the remainder of your time at USF. A class in which you receive an “FF” as a result of academic dishonesty is not repeatable. All papers, research, and examinations will be monitored carefully and students found cheating will be punished to the fullest extent allowed by the University and the Department.

    In an effort to ensure compliance, plagiarism tracking software (SafeAssign) may be employed in this course. The University of South Florida has an account with an automated plagiarism detection service which allows instructors to submit student assignments to be checked for plagiarism. Your assignments may be submitted to this detection system, in which they are compared to a large database of journal articles, web articles, and previously submitted papers. Because all papers will be submitted to SafeAssign, you should know your rights:

    You may be required to submit your paper to a plagiarism detection site that will be identified by your instructor. In order to comply with federal (FERPA) and state privacy laws, you (students) are not required to include personal identifying information such as your name, SSN, and/or U# in the body of the work (text) or use such information in the file naming convention prior to submitting. Please follow carefully your instructor’s instructions regarding what identifying information to include. Your submission will be placed in the course grade center in your account that can be accessed by the instructor and attributed to you.

    If you have any questions, please refer to USF’s Procedures for Alleged Academic Dishonesty or Disruption – http://www.ugs.usf.edu/catalogs/0809/adap.htm and Student Academic Grievance Procedures – http://www.ugs.usf.edu/catalogs/0809/arcsagp.htm

  38. Program This Course Supports: MS in Intelligence Studies
  39. Course Concurrence Information: MS in Cybersecurity - Cyber Intelligence Concentration

    Graduate Certificate in Cyber Intelligence



- if you have questions about any of these fields, please contact chinescobb@grad.usf.edu or joe@grad.usf.edu.