Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About Library
    • Search the Library
    • A-Z Databases
    • Subject Guides
    • Research Tools
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
    • All Reading Lists

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

CRI7001D

Cybercrime and the Dark Web

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Cybercrime: Key Issues and Debates

by Gillespie, A. A
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J. et al.
Essential Resource Audio

Inside the FBI Podcast: Decoding the Cyber Threat

by Federal Bureau of Investigation (FBI)
Essential Resource Audio

The Perfect Scam: Team of Women Takes Down Serial…

by AARP
Essential Resource Audio

The Perfect Scam: Team of Women Takes Down Serial…

by AARP
Essential Resource Website

Differences between viruses, ransomware, worms,…

by McAfee Support
Essential Resource Video

How two moms are dealing with being victims of…

by NBC News
Essential Resource Video

What is Cybercrime? Types of Cybercrime and…

by Eye on Tech
Essential Resource Website

Commonly Used Terms

by Law Enforcement Cyber Center
Essential Resource Website

What is Cybercrime and How to Protect Yourself?

by Kaspersky
Essential Resource Video

VideoBytes: First case of death due to ransomware

by Malwarebytes
Wider Reading Article

Computer hacking and cyber terrorism: The real…

by Furnell, S. M. and Warren, M. J.
Wider Reading Article

Online sexual solicitation of children and…

by Hornor, G.

Lesson 2

Key Text eBook

Cybercrime: Key Issues and Debates

by Gillespie, A. A.
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J. et al.
Essential Resource Video

IP BASICS: Is Intellectual Property important to…

by Intellectual Property Office UK
Essential Resource Website

Taking the Profit Out of Intellectual Property…

by Janjeva, A. et al.
Essential Resource Video

The children groomed in Romania for the UK sex…

by BBC News
Essential Resource Video

I Was Sold Into An Elite P*dophile Network

by Unfiltered Stories
Essential Resource Video

Online prostitution 'a hundred times more…

by WOOD TV8
Essential Resource Article

"Who is really British anyway?": A…

by Rohlfing, S. and Sonnenberg, S.
Essential Resource Video

The Danger Of Internet | Cyberbullying | Online…

by Moconomy
Essential Resource Audio

From Revenge Porn to Identity Theft: Avoid being…

by McGraw, P.
Essential Resource Audio

It can happen in any home (Bonus Episode 7)

by Pixels from a Crime Scene Podcast
Essential Resource Article

Current perspectives: The impact of cyberbullying…

by Nixon, C. L.
Wider Reading Website

Wellbeing Services Student Portal

by Arden University Wellbeing Services
Wider Reading Legislation

Defamation Act 2013

Wider Reading Legislation

Protection from Harassment Act 1997

Wider Reading Legislation

Criminal Justice and Public Order Act 1994

Wider Reading Legislation

Malicious Communications Act 1988

Wider Reading Legislation

Communications Act 2003

Lesson 3

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P., ed.
Essential Resource Website

Factbox: Key findings from Senate inquiry into…

by Hosenball, M.
Essential Resource Video

Putin, Friend or Foe? Russia looms over French…

by AFP News Agency
Essential Resource Website

William “Boss” Tweed and political machines

by Bill of Rights Institute
Essential Resource Video

Cambridge Analytica Uncovered: Secret Filming…

by Channel 4 News
Essential Resource Video

Inside Russia's internet 'troll factory…

by CNN
Essential Resource Video

How Russian Trolls Collected Americans’ Personal…

by The Wall Street Journal
Essential Resource Video

How China Is Building an All-Seeing Surveillance…

by Washington Post
Essential Resource Website

Tammany Hall | Political Machine Ran NYC in the…

by McNamara, R.
Essential Resource Video

How China’s Surveillance Is Growing More Invasive…

by The New York Times
Essential Resource Video

China’s Surveillance State: Why You Should Be…

by Vice News
Essential Resource Video

Watergate Scandal – Explained in 3 Minutes - mini…

by VidyPedia
Essential Resource Video

The Anatomy of a Russian Troll | The Fact Checker

by Washington Post
Essential Resource Video

French Worry about Election Hacking by Russia

by CNN
Essential Resource Video

Russian Media Expands Presence in France

by FRANCE 24 English
Essential Resource Audio

Special episode: The making of “The Kremlin…

by Ruy, D.
Essential Resource Website

MI5 accuses lawyer of trying to influence…

by Sabbagh, D.
Essential Resource Website

The IRA, Social Media and Political Polarization…

by Howard, P. N. et al.
Essential Resource Website

How China Is Interfering in Taiwan’s Election

by Kurlantzick, J.
Wider Reading Website

Hacking Democracies - Cataloguing cyber-enabled…

by Hanson, F. et al.

Lesson 4

Key Text eBook

Artificial Intelligence and National Security

by Montasari, R., ed.
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J. et al.
Essential Resource Video

What are Sybil Attacks|Explained For Beginners

by Binance Academy
Essential Resource Video

Talking Behind Your Back: Attacks and…

by Black Hat
Essential Resource Website

Hackers demand $70 million to end biggest…

by CBS News
Essential Resource Website

What is the difference between the surface web,…

by Hoelscher, P.
Essential Resource Website

REvil: Day of reckoning for notorious cyber gang

by BBC News
Essential Resource Website

REvil: Ransomware gang websites disappear from…

by BBC News
Essential Resource Video

WORLD WIDE WEB: A brief history of the internet

by Fil Gelabert
Wider Reading Website

Cyber Choices

by National Crime Agency (NCA)
Wider Reading Other

Legal considerations when gathering online cyber…

by Cybersecurity Unit

Lesson 5

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J. et al.
Essential Resource Audio

How emerging technologies drive the development…

by The World of Intelligence
Essential Resource Website

Cameroon soldiers jailed for killing women and…

by BBC News
Essential Resource Website

MH17 - The Open Source Evidence

by Higgins, E.
Essential Resource Video

Legal and Ethical Considerations of Open Source…

by Mossé Cyber Security Institute
Essential Resource Video

Reconnaissance - SY0-601 CompTIA Security+ : 1.8

by Professor Messer
Essential Resource Article

The Importance and Benefits of Open Source…

by Bifolchi, G.
Essential Resource Video

What is Open Source Intelligence?

by ClearanceJobs
Wider Reading Audio

Use of OSINT to support Special Operational Forces

by The World of Intelligence
Wider Reading Video

What is unstructured data and why is it so…

by Bernard Marr
Wider Reading Website

A Beginners Guide to OSINT

by Stamm, E.
Wider Reading Website

How to use open source intelligence data to…

by Ricchiardi, S.
Wider Reading Video

Ethical Hacking - Phase 1 - Recon - 23 - Maltego

by Arthur Salmon
Wider Reading Audio

S1E16 | Dark web research tips for the OSINT-…

by authentic8
Wider Reading Video

Have I Been Pwned

by Microsoft Developer
Wider Reading Website

OSINT Framework

by Nordine, J.
Wider Reading Video

CEE14: The challenges of unstructured data

by Databarracks
Wider Reading Other

Assessing Geopolitical Risk: How OSINT Tools Can…

by Flashpoint
Wider Reading Website

Berkeley Protocol on Digital Open Source…

by OHCHR and Human Rights Centre

Lesson 6

Key Text eBook

Digital Transformation in Policing

by Montasari, R., et al.
Key Text eBook

Artificial Intelligence and National Security

by Montasari, R., ed
Essential Resource Video

Counter Terrorist Narratives – Kurt Braddock |…

by CoJiT – Combating Jihadist Terrorism and Extremism
Essential Resource Website

The FBI’s 'unprecedented' hacking…

by Cox, J.
Essential Resource Video

Terrorism and the Dark Web

by Chicago Council on Global Affairs
Essential Resource Video

Terror Plot to Destroy St Paul’s Foiled by Met…

by Metropolitan Police
Essential Resource eBook

Artificial Intelligence and National Security

by Montasari, R., ed.
Essential Resource Article

Online extremism: Research trends in internet…

by Winter, C. et al.
Wider Reading Article

Shining a Light on Policing of the Dark Web: An…

by Davies, G.

Lesson 7

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P., ed.
Essential Resource Website

The global expansion of AI surveillance

by Feldstein, S.
Essential Resource Website

State Surveillance and Implications for Children

by Feldstein, S.
Essential Resource Website

Edward Snowden calls for spyware trade ban amid…

by Pegg, D. and Lewis, P.
Essential Resource Video

Government Surveillance: The National Security…

by The Federalist Society
Essential Resource Video

Pegasus: the spyware technology that threatens…

by The Guardian
Essential Resource Video

The Power of Artificial Intelligence for…

by Booz Allen Hamilton
Essential Resource Video

A.I. Is Monitoring You Right Now and Here’s How…

by Seeker
Wider Reading Website

Mapping Hacking Team’s “Untraceable” Spyware

by Marczak, B. et al.
Wider Reading Website

Hacking Team and the targeting of Ethiopian…

by Marczak, B. et al.
Wider Reading Website

Edward Snowden Broke the Law and Should Be…

by Morrissey, E.
Wider Reading Website

Whistle-blowers deserve protection not prison

by Radack, J.
Wider Reading Audio

Season 01: Episode 02 - Discovering Pegasus…

by Shoot the Messenger
Wider Reading Website

Edward Snowden: Traitor or Hero?

by Ethics Unwrapped
Wider Reading Video

The NSA and surveillance...made simple – animation

by The Guardian
Wider Reading Other

New evidence suggests spyware used to surveil…

by Kirchgaessner, S.
Wider Reading Other

FBI confirms it obtained NSO’s Pegasus spyware;…

by Kirchgaessner, S.
Wider Reading Website

Hide and seek: tracking NSO group’s Pegasus…

by Marczak, B. et al.
Wider Reading Website

Why Edward Snowden should be pardoned

by Amnesty International UK
Wider Reading Website

Israeli spyware company NSO Group placed on US…

by Kirchgaessner, S.
Wider Reading Website

Revealed: leak uncovers global use of cyber-…

by Kirchgaessner, S. et al.
Wider Reading Website

Transparency - NSO Group

by NSO Group
Wider Reading Article

The Lazarus Group: The cybercrime syndicate…

by Park, J.
Wider Reading Website

Countering the cyber enforcement gap:…

by Peters, A. and Jordan, A.
Wider Reading Article

Transnational governance of cybersecurity: Policy…

by Calderaro, A. and Craig, A. J. S.
Wider Reading Website

Governments are using spyware on citizens

by Feldstein, S.
Wider Reading Article

Cybercrime as a threat to Ukraine’s national…

by Varenia, N. et al.
Wider Reading eBook

Artificial Intelligence and National Security

by Montasari, R., ed.
Wider Reading Website

Edward Snowden plea deal with US a possibility,…

by Owen, P.
Wider Reading Website

Hacking democracies: Cataloguing cyber-enabled…

by Hanson, F. et al.

Lesson 8

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J. et al.
Essential Resource Video

Forensic Science: An Insider's Guide | BBC…

by BBC Ideas
Essential Resource Video

Have you been fooled by forensics on TV?

by BBC Ideas
Essential Resource eBook

Digital Evidence and Computer Crime: Forensic…

by Casey, E.
Essential Resource Video

DFS101: 5.3 Digital Investigation Procedure

by DFIRScience
Essential Resource eBook

Digital Forensics Explained

by Gogolin, G.
Essential Resource Other

Electronic Crime Scene Investigation: A Guide for…

by Mukasey, M. B. et al.
Essential Resource Other

Digital forensics and incident response (DFIR)…

by Salfati, E. and Pease, M.
Essential Resource Video

Computer Forensic Investigation Process (CISSP…

by Skillset
Essential Resource Other

ACPO Good Practice Guide for Digital Evidence

by Williams, J.
Essential Resource Article

Practising Crime Scene Investigation: Trace and…

by Wyatt, D.
Essential Resource eBook

Digital Forensics

by Årnes, A., ed.
Essential Resource Article

Reducing contamination in forensic science

by Balk, C.
Essential Resource Video

Types of Digital Forensics

by eSecurity Institute
Essential Resource Article

Tool testing and reliability issues in the field…

by Horsman, G.
Essential Resource Website

Guide to Integrating Forensic Techniques into…

by Kent, K. et al.
Essential Resource eBook

Advances in Digital Forensics IV: Conference…

by Ray, I. and Shenoi, S., eds.
Wider Reading Video

5 Skills Needed for a Career in Digital Forensics

by eSecurity Institute
Wider Reading Video

Necessary skills for a career in digital…

by Infosec
Wider Reading Video

DFS101: 1.1 Introduction to digital forensics

by DFIRScience
Wider Reading Article

Exposing Manipulated Photos and Videos in Digital…

by Ferreira, S. et al.
Wider Reading eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Wider Reading Article

Dirty work? Policing online indecency in digital…

by Wilson-Kovacs, D. et al.

Lesson 9

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J. et al.
Essential Resource Website

From Fitbits to PlayStations, the Justice System…

by Burgess, M.
Essential Resource Website

Digital Forensics Techniques for Social Media…

by Cvitić, I. et al.
Essential Resource Website

Exhibits

by Crown Prosecution Service (CPS)
Essential Resource Video

How to Make a Forensic Image with FTK Imager

by DFIR Noob
Essential Resource eBook

Cybercrime Investigators Handbook

by Edwards, G.
Essential Resource Video

What is chain of custody and why is it important…

by eyeWitness to Atrocities
Essential Resource Website

Forensics 101: What Is a Forensic Image?

by Raedts, N.
Essential Resource Video

Forensic Analysis of sUAS aka Drones - SANS DFIR…

by SANS Digital Forensics and Incident Response
Essential Resource Video

Forensic Acquisition in Windows - FTK Imager

by DFIRScience
Essential Resource Video

DFS101: 4.3 Electronic Evidence

by DFIRScience
Essential Resource Audio

061: Order in the Court: Digital Evidence…

by Paperless Productivity
Essential Resource Video

How To Prepare for Testifying in Court Presented…

by Primeau Forensics
Essential Resource Website

Social media forensics in law enforcement…

by Thomson Reuters
Essential Resource Website

What Is a Write Blocker?

by Threat Media
Wider Reading eBook

Digital Forensics and Incident Response: Incident…

by Johansen, G.
Wider Reading Website

Expert Evidence

by Crown Prosecution Service (CPS)
Wider Reading Website

chain of custody - Glossary | CSRC

by NIST Computer Security Resource Center
Wider Reading Website

Improving the Collection of Digital Evidence

by Novak, M.
Wider Reading Website

The Value of Digital Forensics

by Walcott, S.

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2025 Arden University  | All rights reserved