Case study
Case study
Case study . Students are to select one of the case studies (Child exploitation Playpen case, Data breach US Office of Personnel Mgt, Hacking Alexsey Belan, Romance fraud Audrey Elaine Elrod, Cyber terrorism Ardit Ferizi
Students then apply BOTH an individual and situational theory from the list provided on the course Learning@Griffith site to the case study.
The basic requirements are that the case study must:
(a) Provide a brief overview of the case
(b) Introduce and demonstrate a conceptual understanding of the selected theories/perspectives
(c) Apply the theories/perspectives in a manner that clearly demonstrates the applicability of each theory/perspective for understanding how and why the case occurred
(d) Drawing upon the theories/perspectives offer suggestions for prevention strategies applicable to the case and that type of cybercrime more broadly
Criteria & Marking:
Case study
More detailed marking criteria will be provided on the course Learning@Griffith site.
Case Overview
– Describes key features of the case
Theory Description and Review
– Describes and explains the selected theories
– Reviews the selected theories
Application of Theory
– Applies theories to the case
Implications of Theory for Prevention
– Provides theory-driven prevention strategies
– Provides support for prevention strategies
Presentation
– Complies with academic writing and structure
– Presentation and referencing
Assessment Item 1: Case Study
Theory Choice:
Case study
Choose ONE theory from Column A and choose ONE theory from Column B
| Column A – choose ONE theory | Column B – choose ONE theory |
| General Theory of Crime (GTC) | Routine Activities Approach/Theory |
| Social Learning Theory | Lifestyle Exposure Theory |
| Space Transition Theory | Opportunity Model of Victimology |
- Case Study Choice:
Choose ONE case study from the list below
- Case Study 1: Child exploitation ‐ Playpen case
- Case Study 2: Data breach ‐ US Office of Personnel Mgt
- Case Study 3: Hacking ‐ Alexsey Belan
- Case Study 4: Romance fraud ‐ Audrey Elaine Elrod
- Case Study 5: Cyber terrorism ‐ Ardit Ferizi










