Skip to Main Content

CJUS 5100: Information Warfare, Security, and Risk Analysis

Week 2 readings

1. Chapter 1 and 2 Taylor

2. Holt, T. J. (2023). Understanding the state of criminological scholarship on cybercrimes. Computers in Human Behavior, 139, 107493.

3. Broeders, D., Cristiano, F., & Weggemans, D. (2023). Too close for comfort: cyber terrorism and information security across national policies and international diplomacy. Studies in Conflict & Terrorism, 46(12), 2426-2453.

4. Farahbod, K., Shayo, C., & Varzandeh, J. (2020). Cybersecurity indices and cybercrime annual loss and economic impacts. Journal of Business and Behavioral Sciences, 32(1), 63-71.

Week 3 readings

1. Chapter 3 Taylor

2. Weulen Kranenbarg, M., Holt, T. J., & Van Gelder, J. L. (2019). Offending and victimization in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap. Deviant Behavior, 40(1), 40-55.

3. Bada, M., & Nurse, J. R. (2021, June). Profiling the cybercriminal: a systematic review of research. In 2021 international conference on cyber situational awareness, data analytics and assessment (CyberSA) (pp. 1- 8). IEEE.

Week 4 readings

1. Chapter 4 Taylor 13

2. Fazzini, K. (2019, August 19). Alarm in Texas as 23 towns hit by 'coordinated' ransomware attack. In CNBC. Retrieved from https://www.cnbc.com/2019/08/19/alarm-in-texas-as-23-towns-hit-bycoordinated-ransomware-attack.html https://www.bbc.com/news/technology-49393479

3. Lee, J. R., & Holt, T. J. (2020). Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors. Frontiers in Psychology, 11, 840. https://www.frontiersin.org/articles/10.3389/fpsyg.2020.00840/full

4. Perlroth, N. (2017). Hackers are targeting nuclear facilities, Homeland Security Dept. and FBI say. New York Times, 6. 

Week 5 readings

1. Chapter 5 Taylor

2. Mitnick, K. (2011). Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Little, Brown and Company. ISBN-13: 978- 0316037709.

Week 6 readings

1. Chapter 6 Taylor

2. Payne, B. K. (2018). White-collar cybercrime: white-collar crime, cybercrime, or both?. Criminology, Crim. Just. L & Soc'y, 19, 16.

3. Hamerton, C. (2020). White-collar cybercrime: Evaluating the redefinition of a criminological artifact. Journal of Law and Criminal Justice, 8(2), 67-79.

Week 7 readings

1. Chapter 7 Taylor

2. Blauth, T. F., Gstrein, O. J., & Zwitter, A. (2022). Artificial intelligence crime: An overview of malicious use and abuse of AI. IEEE Access, 10, 77110-77122. 14

3. Puchkov, D. (2022). Main Trends in the Development of International Crime in the Implementation of Cybertechnologies. In Cybercrimes and Financial Crimes in the Global Era (pp. 27-33). Singapore: Springer Nature Singapore.

Week 8 readings

1. Chapter 8 Taylor

2. Agustina, J. R. (2015). Understanding cyber victimization: Digital architectures and the disinhibition effect. International Journal of Cyber Criminology, 9(1), 35.

3. Button, M., Blackbourn, D., Sugiura, L., Shepherd, D., Kapend, R., & Wang, V. (2021). From feeling like rape to a minor inconvenience: Victims’ accounts of the impact of computer misuse crime in the United Kingdom. Telematics and Informatics, 64, 101675.

4. Reyns, B. W., Henson, B., & Fisher, B. S. (2016). Guardians of the cyber galaxy: An empirical and theoretical analysis of the guardianship concept from routine activity theory as it applies to online forms of victimization. Journal of Contemporary Criminal Justice, 32(2), 148-168.

Week 9 readings

1. Felmlee, D., & Faris, R. (2016). Toxic ties: Networks of friendship, dating, and cyber victimization. Social psychology quarterly, 79(3), 243- 262

2. Lozano-Blasco, R., Quilez-Robres, A., & Latorre-Cosculluela, C. (2023). Sex, age and cyber-victimization: A meta-analysis. Computers in Human Behavior, 139, 107491.

3. Fissel, E. R., & Reyns, B. W. (2019). The Aftermath of Cyberstalking: School, Work, Social, and Health Costs of Victimization. American Journal of Criminal Justice, 1-18.

Week 11 readings

1. Paquet-Clouston, M., Haslhofer, B., & Dupont, B. (2019). Ransomware payments in the bitcoin ecosystem. Journal of Cybersecurity, 5(1), tyz003.

2. Lacson, W., & Jones, B. (2016). The 21st Century DarkNet Market: Lessons from the Fall of Silk Road. International Journal of Cyber Criminology, 10(1).

3. Bilton, N. (2018). American kingpin: The epic hunt for the criminal mastermind behind the Silk Road. Penguin. ISBN-13: 978-1591848141.

Week 12 readings

1. Chapter 9 Taylor

2. Castaño-Pulgarín, S. A., Suárez-Betancur, N., Vega, L. M. T., & López, H. M. H. (2021). Internet, social media and online hate speech. Systematic review. Aggression and Violent Behavior, 58, 101608.

3. Brown, A. (2018). What is so special about online (as compared to offline) hate speech?. Ethnicities, 18(3), 297-326.

Week 13 readings

1. Chapter 10 Taylor

2. Kosseff, J. (2020). Hacking cybersecurity law. U. Ill. L. Rev., 811.

3. Ogu, E. C., Ogu, C., & Oluoha, O. U. (2020). 'Global cybersecurity legislation?'-factors, perspective and implications. International Journal of Business Continuity and Risk Management, 10(1), 80-93.

Week 14 readings

Chapter 11 & Chapter 12

Week 15 readings

1. Chapter 14

2. Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. (2021). Understanding the challenge of cybersecurity in critical infrastructure sectors. Land Forces Academy Review, 26(1), 69-75.

3. Weiss, M., & Biermann, F. (2023). Cyberspace and the protection of critical national infrastructure. Journal of Economic Policy Reform, 26(3), 250-267.

Copyright © University of North Texas. Some rights reserved. Except where otherwise indicated, the content of this library guide is made available under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license. Suggested citation for citing this guide when adapting it:

This work is a derivative of "CJUS 5100: Information Warfare, Security, and Risk Analysis", created by [author name if apparent] and © University of North Texas, used under CC BY-NC 4.0 International.

Additional Links

top