Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Criminal Justice
      • Digital Education in Practice
      • Investigation, Security and Defence
      • Law
      • Psychology
      • Computing
      • Design and creativity
      • Finance and Accounting
      • Marketing
      • Health and Care Management
      • Human Resource Management
      • Business Management
      • Supply Chain Management and Logistics
      • Hospitality and Tourism
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request it!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place
Support

PG Criminal Justice Reading Lists  CRI7001D

Cybercrime and the Dark Web

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Cybercrime: Key Issues and Debates

by Gillespie, A. A
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M., and Seigfried-Spellar, K. C.
Essential Resource Video

Inside the FBI: Decoding the Cyber Threat

by Federal Bureau of Investigation
Essential Resource Audio

The Perfect Scam: Team of Women Takes Down Serial…

by AARP
Essential Resource Audio

The Perfect Scam: Team of Women Takes Down Serial…

by AARP
Essential Resource Website

Differences between viruses, ransomware, worms,…

by McAfee
Essential Resource Video

How two moms are dealing with being victims of…

by NBC News
Essential Resource Video

What is Cybercrime?

by Eye on Tech
Essential Resource Website

Commonly Used Terms

by International Association of Chiefs of Police
Essential Resource Website

What is cybercrime?

by Kaspersky
Essential Resource Video

VideoBytes: First case of death due to ransomware

by Malwarebytes

Lesson 2

Key Text eBook

Cybercrime: Key Issues and Debates

by Gillespie, A. A.
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. and Seigfried-Spellar, K. C.
Key Text Website

Welcome to the Inclusion Portal!.

by Arden.
Essential Resource Video

IP BASICS - IP made easy

by Intellectual Property Office UK
Essential Resource Website

Taking the Profit Out of Intellectual Property…

by Janjeva, A., Reid, A. and Moiseienko, A.
Essential Resource Video

The children groomed in Romania for the UK sex…

by BBC News
Essential Resource Video

I Was Sold Into An Elite P*dophile Network

by Unfiltered Stories
Essential Resource Video

Online prostitution 'a hundred times more…

by WOOD TV8
Essential Resource Article

"Who is really British anyway?": A…

by Rohlfing, S. and Sonnenberg, S.
Essential Resource Video

The Danger Of Internet | Cyberbullying | Online…

by Moconomy
Essential Resource Audio

From Revenge Porn to Identity Theft: Avoid being…

by McGraw, P.
Essential Resource Audio

It can happen in any home (Bonus Episode 7)

by Internet Watch Foundation
Essential Resource Article

Current perspectives: The impact of cyberbullying…

by Nixon, C. L.

Lesson 3

Key Text Website

Welcome to the Inclusion Portal!.

by Arden.
Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P., ed.
Essential Resource Website

Factbox: Key findings from Senate inquiry into…

by Hosenball, M.
Essential Resource Video

Putin, Friend or Foe?

by AFP News Agency
Essential Resource Website

William “Boss” Tweed and political machines

by Bill of Rights Institute
Essential Resource Video

Cambridge Analytica Uncovered: Secret Filming…

by Channel 4 News
Essential Resource Video

Inside Russia’s Internet 'Troll Factory'

by CNN
Essential Resource Video

How Russian Trolls Collected Americans’ Personal…

by The Wall Street Journal
Essential Resource Video

How China Is Building an All-Seeing Surveillance…

by Washington Post
Essential Resource Website

Tammany Hall: New York City’s political machine…

by McNamara, R.
Essential Resource Video

How China’s Surveillance Is Growing More Invasive…

by The New York Times
Essential Resource Video

China’s Surveillance State: Why You Should Be…

by Vice News
Essential Resource Video

Watergate Scandal – Explained in 3 Minutes - mini…

by VidyPedia
Essential Resource Video

The Anatomy of a Russian Troll | The Fact Checker

by Washington Post
Essential Resource Video

French Worry about Election Hacking by Russia

by CNN
Essential Resource Video

Russian Media Expands Presence in France

by FRANCE 24 English
Essential Resource Audio

Special episode: The making of “The Kremlin…

by Ruy, D.
Essential Resource Website

MI5 accuses lawyer of trying to influence…

by Sabbagh, D.
Essential Resource Website

The IRA, Social Media and Political Polarization…

by Howard, P. N. et al.
Essential Resource Website

How China Is Interfering in Taiwan’s Election

by Kurlantzick, J.

Lesson 4

Key Text Website

Welcome to the Inclusion Portal!

by Arden.
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M., and Seigfried-Spellar, K. C.
Essential Resource eBook

Artificial Intelligence and National Security

by Montasari, R. (ed.).
Essential Resource Video

What are Sybil Attacks|Explained For Beginners

by Binance Academy
Essential Resource Video

Talking Behind Your Back: Attacks and…

by Black Hat
Essential Resource Website

Hackers demand $70 million to end biggest…

by CBS News
Essential Resource Website

What is the difference between the surface web,…

by Hoelscher, P.
Essential Resource eBook

Artificial Intelligence and National Security

by Montasari, R., ed.
Essential Resource Website

REvil: Day of reckoning for notorious cyber gang

by BBC News
Essential Resource Website

REvil: Ransomware gang websites disappear from…

by BBC News
Essential Resource Video

WORLD WIDE WEB: A brief history of the internet

by Gelabert, F.

Lesson 5

Key Text Website

Welcome to the Inclusion Portal!.

by Arden.
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M., and Seigfried-Spellar, K. C.
Essential Resource Audio

How emerging technologies drive the development…

by Kemsley, H.
Essential Resource Audio

Use of OSINT to support Special Operational Forces

by Kemsley, H.
Essential Resource Video

What is unstructured data and why is it so…

by Marr, B.
Essential Resource Website

A Beginners Guide to OSINT

by McFarlane, D.
Essential Resource Website

How to use open source intelligence data to…

by Ricchiardi, S.
Essential Resource Video

Ethical Hacking - Phase 1 - Recon - 23 - Maltego

by Salmon, A.
Essential Resource Website

Cameroon soldiers jailed for killing women and…

by BBC News
Essential Resource Website

MH17 - The Open Source Evidence

by Higgins, E.
Essential Resource Audio

S1E16 | Dark web research tips for the OSINT-…

by James, M.
Essential Resource Video

Have I Been Pwned

by Microsoft Developer
Essential Resource Video

Legal and Ethical Considerations of Open Source…

by Mossé Cyber Security Institute
Essential Resource Website

OSINT Framework

by Nordine, J.
Essential Resource Video

Reconnaissance - SY0-601 CompTIA Security+ : 1.8

by Professor Messer
Essential Resource Website

The Importance and Benefits of Open Source…

by Bifolchi, G.
Essential Resource Video

What is Open Source Intelligence?

by ClearanceJobs
Essential Resource Video

CEE14: The challenges of unstructured data

by Databarracks
Essential Resource Website

Assessing Geopolitical Risk: How OSINT Tools Can…

by Flashpoint

Lesson 6

Key Text eBook

Digital Transformation in Policing

by Montasari, R., Carpenter, V., and Masys, A. J., eds
Key Text eBook

Artificial Intelligence and National Security

by Montasari, R., ed
Essential Resource Video

Counter Terrorist Narratives – Kurt Braddock |…

by CoJiT – Combating Jihadist Terrorism and Extremism
Essential Resource Website

The FBI’s 'unprecedented' hacking…

by Cox, J.
Essential Resource eBook

Artificial Intelligence and National Security

by Montasari, R., ed.
Essential Resource Video

Terrorism and the Dark Web

by Chicago Council on Global Affairs
Essential Resource Article

Shining a Light on Policing of the Dark Web: An…

by Davies, G.
Essential Resource Video

Terror Plot to Destroy St Paul’s Foiled by Met…

by Metropolitan Police
Essential Resource eBook

Artificial Intelligence and National Security

by Montasari, R., ed.
Essential Resource eBook

Digital Transformation in Policing

by Montasari, R., Carpenter, V. and Masys, A. J., eds.
Essential Resource eBook

Artificial Intelligence and National Security

by Montasari, R., ed
Essential Resource Article

Online extremism: Research trends in internet…

by Winter, C. et al.

Lesson 7

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P., ed.
Essential Resource Website

Mapping Hacking Team’s “Untraceable” Spyware

by Marczak, B. et al.
Essential Resource Website

Hacking Team and the targeting of Ethiopian…

by Marczak, B. et al.
Essential Resource Website

Edward Snowden Broke the Law and Should Be…

by Morrissey, E.
Essential Resource Website

Edward Snowden plea deal with US a possibility,…

by Owen, P.
Essential Resource Website

Whistle-blowers deserve protection not prison

by Radack, J.
Essential Resource Website

The global expansion of AI surveillance

by Feldstein, S.
Essential Resource Website

State Surveillance and Implications for Children

by Feldstein, S.
Essential Resource Website

Edward Snowden calls for spyware trade ban amid…

by Pegg, D., and Lewis, P.
Essential Resource Audio

Discovering Pegasus Spyware - The Magic Worm

by Reid, R., and Vila, N.
Essential Resource Website

Edward Snowden: Traitor or Hero?

by Ethics Unwrapped
Essential Resource Video

Government Surveillance: The National Security…

by The Federalist Society
Essential Resource Video

The NSA and surveillance...made simple – animation

by The Guardian
Essential Resource Video

Pegasus: the spyware technology that threatens…

by The Guardian
Essential Resource Website

New evidence suggests spyware used to surveil…

by Kirchgaessner, S.
Essential Resource Website

FBI confirms it obtained NSO’s Pegasus spyware;…

by Kirchgaessner, S.
Essential Resource Website

Hide and seek: tracking NSO group’s Pegasus…

by Marczak, B. et al.
Essential Resource Website

Edward Snowden, Whistle-Blower

by The Editorial Board
Essential Resource Video

The Power of Artificial Intelligence for…

by Booz Allen Hamilton
Essential Resource Video

A.I. Is Monitoring You Right Now and Here’s How…

by Seeker
Essential Resource Website

Why Edward Snowden should be pardoned

by Amnesty International UK
Essential Resource Website

Holder talks Snowden plea deal

by Gerstein, J.

Lesson 8

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M., and Seigfried-Spellar, K. C.
Essential Resource Video

Forensic Science: An Insider's Guide | BBC…

by BBC Ideas
Essential Resource Video

Have you been fooled by forensics on TV?

by BBC Ideas
Essential Resource eBook

Digital Evidence and Computer Crime: Forensic…

by Casey, E.
Essential Resource Video

DFS101: 5.3 Digital Investigation Procedure

by DFIRScience
Essential Resource eBook

Digital Forensics Explained

by Gogolin, G.
Essential Resource Other

Electronic Crime Scene Investigation: A Guide for…

by Hagy, D. W.
Essential Resource Other

Digital forensics and incident response (DFIR)…

by Salfati, E. and Pease, M.
Essential Resource Video

Computer Forensic Investigation Process (CISSP…

by Skillset
Essential Resource Other

ACPO Good Practice Guide for Digital Evidence

by Williams, J.
Essential Resource Article

Practising Crime Scene Investigation: Trace and…

by Wyatt, D.
Essential Resource eBook

Digital Forensics

by Årnes, A., ed.
Essential Resource Article

Reducing contamination in forensic science

by Balk, C.
Essential Resource Video

Types of Digital Forensics

by eSecurity Institute™️
Essential Resource Video

5 Skills Needed for a Career in Digital Forensics

by eSecurity Institute™️
Essential Resource Article

Tool testing and reliability issues in the field…

by Horsman, G.
Essential Resource Video

Necessary skills for a career in digital…

by Infosec
Essential Resource Article

Guide to Integrating Forensic Techniques into…

by Kent, K. et al.
Essential Resource Article

When is Digital Evidence Forensically Sound?

by McKemmish, R.

Lesson 9

Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M., and Seigfried-Spellar, K. C
Essential Resource Website

From Fitbits to PlayStations, the Justice System…

by Burgess, M.
Essential Resource Website

Digital Forensics Techniques for Social Media…

by Cvitić, I., Praneeth, G., and Peraković, D.
Essential Resource Website

Exhibits

by Crown Prosecution Service (CPS)
Essential Resource Video

How to Make a Forensic Image with FTK Imager

by DFIR Noob
Essential Resource eBook

Cybercrime Investigators Handbook

by Edwards, G.
Essential Resource Video

What is chain of custody and why is it important…

by eyeWitness to Atrocities
Essential Resource Website

Forensics 101: What Is a Forensic Image?

by RAEDTS.BIZ
Essential Resource Video

Forensic Analysis of sUAS aka Drones - SANS DFIR…

by SANS Digital Forensics and Incident Response
Essential Resource Video

Forensic Acquisition in Windows - FTK Imager

by DFIRScience
Essential Resource Video

DFS101: 4.3 Electronic Evidence

by DFIRScience
Essential Resource Audio

061: Order in the Court: Digital Evidence…

by Paperless Productivity
Essential Resource Video

How To Prepare for Testifying in Court Presented…

by Primeau Forensics
Essential Resource Website

Social media forensics in law enforcement…

by Thomson Reuters
Essential Resource Website

What Is a Write Blocker?

by ThreatDotMedia

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon

Library@arden.ac.uk
AcademicSkills@arden.ac.uk
EnglishLanguageHub@arden.ac.uk

footer logo

Follow us on

  • Arden twitter

© 2005-2025 Arden University  | All rights reserved