Compare and contrast cyber-crime investigations, including critiquing crimes commonly committed using cyber technology; classifying most likely people to be victimized by cyber-crime; and identifying investigative techniques used to combat cyber-crimes.
Standard detail
11.4
Depth 1Parent ID: AF191096767F4373909933C5047DA651Standard set: Criminal Investigations (2013)
Original statement
Quick facts
- Statement code
- 11.4
- List ID
- 11.4
- Standard ID
- 8C74A463FD85496AAB0FF710BE65D93E
- Subject
- CTAE (2013-)
- Grades
- 10, 11, 12
- Ancestor IDs
- AF191096767F4373909933C5047DA651
- Source document
- Law, Public Safety, Corrections and Security Career Cluster
- License
- CC BY 4.0 US