Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About Library
    • Search the Library
    • A-Z Databases
    • Subject Guides
    • Research Tools
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
    • All Reading Lists

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

CRI6010

Responding to Global Cyber Emergencies

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P.
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. & Seigfried-Spellar, K. C.
Essential Resource Article

Effects of cyber security knowledge on attack…

by Ben-Asher, N. and Gonzalez, C.
Essential Resource Website

Have I Been Pwned

by Have I Been Pwned
Essential Resource Website

7 Reasons Global Attacks Will Rise Significantly…

by Reed, J.
Essential Resource Website

What is a Hacktivist?

by Putman, P.
Essential Resource Video

Threat Actors - SY0-601 CompTIA Security+ : 1.5

by Professor Messer
Essential Resource Website

The Global Cyber Threat

by Maurer, T., and Nelson, A.
Essential Resource Website

Which Countries are Most Dangerous?

by Pur, N. D.
Essential Resource Website

SolarWinds hack explained: Everything you need to…

by Oladimeji, S., and Kerner, S. M.
Wider Reading eBook

Investigating Cyber Law and Cyber Ethics: Issues…

by Dudley, A., Braman, J. and Vincenti, G.

Lesson 2

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Essential Resource Website

How con artists use AI, apps, social engineering…

by Alfonsi, S.
Essential Resource Audio

S2.1. Jackpotting

by BBC podcasts
Essential Resource Website

How Can Cryptocurrency Reshape the Global Economy?

by International Finance Business Desk
Essential Resource Website

Financial Crime

by Interpol
Essential Resource Website

Yahoo Employee Stole 570,000 Pages of Source Code…

by Lee, A.
Essential Resource Audio

Podcast Banks’ forever war against cyberattacks

by Heltman, J
Essential Resource Website

North Korean hackers said to have stolen nearly $…

by Korn, J.
Essential Resource Website

Fraud

by National Crime Agency
Essential Resource Video

Teen cooked up elaborate schemes to steal his way…

by 11Alive
Essential Resource Website

11 Real-Life Insider Threat Examples

by Simpson, A
Essential Resource Audio

Transatlantic perspectives on anti-money…

by Withersworldwide

Lesson 3

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Essential Resource Website

FASTCash 2.0: North Korea's BeagleBoyz…

by Cybersecurity & Infrastructure Security Agency [CISA]
Essential Resource Video

Technical Assistance and Information Exchange (…

by European External (2020) Technical Assistance and Information Exchange
Essential Resource Article

Cyber laundering: a threat to banking industries…

by Joveda, N. et al.
Essential Resource Website

North Korean Cyberattacks: A Dangerous and…

by Klingner, B.
Essential Resource Audio

Darknet Diaries, Ep 72: Bangladesh Bank Heist

by Rhysider, J
Essential Resource Audio

Inside North Korea’s Lazarus heist hack

by Zwetsloot, J
Wider Reading eBook

Cyber Security Culture

by Trim, P., and Upton, D.

Lesson 4

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Essential Resource Audio

The State of Cybersecurity: How Did We Get Here,…

by Johnson, A
Essential Resource Website

Cybersecurity is too big a job for governments or…

by Mee, P. and Chandrasekhar, C
Essential Resource Website

Cybercrime Statistics

by Surfshark
Essential Resource Audio

Ransomware: Your Money or Your Files- Episode 7

by The Europol Podcast
Essential Resource Video

Cyber Threat Intelligence Explained. YouTube

by UnixGuy
Essential Resource Website

Sharing is Caring: Using Intelligence to Fight…

by Coker, J
Essential Resource Video

The importance of threat intelligence sharing.…

by Finextra Research

Lesson 5

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Key Text Other

Guide to Intrusion Detection and Prevention…

by Scarfone, K., & Souppaya, M
Essential Resource Website

Why Politically Motivated Cyber-Attacks Are a…

by Kotze, B
Essential Resource Article

International Responsibility Arising from…

by Alabbadi, F.S., Al Amaren, E.M. and Aletein, S.I.
Essential Resource Website

NCSC Annual Review 2021

by National Cyber Security Centre
Essential Resource Video

Labour MP grills Tory minister over Matt Hancock…

by PoliticsJOE
Essential Resource Website

EU democracy is under attack by mercenary spyware…

by Liboreiro, J
Essential Resource Website

Trump versus the truth: The most outrageous…

by Timm, J. C
Essential Resource Video

Why democracy is still the best form of government

by Tedx Talks
Essential Resource Website

How to identify misinformation, disinformation,…

by Canadian Centre for Cyber Security
Essential Resource Website

Emmanuel Macron email leaks 'linked to…

by Dearden, L
Essential Resource Website

What is disinformation, why it spreads, and how…

by Pirkova, E
Essential Resource Article

The Hidden Threat of Cyber-attacks – undermining…

by Shandler, R. and Gomez, M. A.
Essential Resource Other

Digital Threats to Democratic Elections: How…

by Tenove, C., et al.

Lesson 6

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Essential Resource Website

Factbox: Key findings from Senate inquiry into…

by Hosenball, M.
Essential Resource Other

The IRA, Social Media and Political Polarization…

by Howard, P.N., et al.
Essential Resource Video

How China’s Surveillance Is Growing More Invasive…

by The New York Times
Essential Resource Audio

Special Episode: The Making of “The Kremlin…

by Ruy, D.
Essential Resource Video

The anatomy of a Russian troll | The Fact Checker

by Washington Post
Essential Resource Video

How China is building an all-seeing surveillance…

by Washington Post
Essential Resource Video

Watergate Scandal - explained in 3 minutes - mini…

by VidyPedia
Essential Resource Video

How Russian Trolls Collected Americans'…

by Wall Street Journal
Essential Resource Video

Cambridge Analytica Uncovered: Secret filming…

by Channel 4 News
Essential Resource Video

Inside Russia's internet 'troll factory…

by CNN
Essential Resource Video

Putin, Friend or Foe?

by AFP News Agency
Essential Resource Website

William “Boss” Tweed and Political Machines

by Bill of Rights Institute
Essential Resource Video

French worry about election hacking by Russia

by CNN
Essential Resource Video

Video: Russian media expands presence in France

by FRANCE 24 English
Essential Resource Website

How China Is Interfering in Taiwan’s Election

by Kurlantzick, J.
Essential Resource Website

Tammany Hall: New York City's Political…

by McNamara, R.
Essential Resource Website

MI5 accuses lawyer of trying to influence…

by Sabbagh. D.
Essential Resource Video

China’s Surveillance State: Why You Should Be…

by Vice News

Lesson 7

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Essential Resource Video

The power of artificial intelligence for…

by Booz Allen Hamilton
Essential Resource Website

Hacking Team and the targeting of Ethiopian…

by Marczak, B., et al.
Essential Resource Website

Hide and seek: tracking NSO group’s Pegasus…

by Marczak, B., et al.
Essential Resource Video

AI Is Monitoring You Right Now and Here’s How It…

by Seeker
Essential Resource Website

Researchers find and decode the spy tools…

by Zetter, K.
Essential Resource Video

Pegasus: the spyware technology that threatens…

by The Guardian
Essential Resource Website

New evidence suggests spyware used to surveil…

by Kirchgaessner, S.
Essential Resource Website

FBI confirms it obtained NSO’s Pegasus spyware

by Kirchgaessner, S.
Essential Resource Website

Mapping Hacking Team’s “Untraceable” Spyware

by Marczak, B., et al.
Essential Resource Website

Edward Snowden calls for spyware trade ban amid…

by Pegg, D. and Lewis, P.
Essential Resource Audio

Discovering Pegasus Spyware - The Magic Worm, ep…

by Reid, R. and Vila, N.
Essential Resource Video

Government Surveillance: The National Security…

by Federalist Society
Essential Resource Other

State surveillance and implications for children

by Feldstein, S.
Essential Resource Other

The global expansion of AI surveillance

by Feldstein, S.
Wider Reading Website

Edward Snowden: Traitor or Hero?

by Ethics Unwrapped
Wider Reading Video

The NSA and surveillance ... made simple –…

by The Guardian
Wider Reading Website

Edward Snowden, Whistle-Blower

by The Editorial Board
Wider Reading Website

Edward Snowden plea deal with US a possibility,…

by Owen, P.
Wider Reading Website

Whistle-Blowers Deserve Protection Not Prison

by Radack, J.
Wider Reading Website

Holder talks Snowden plea deal

by Gerstein, J.
Wider Reading Website

Edward Snowden Broke the Law and Should Be…

by Morrissey, E.
Wider Reading Website

Why Edward Snowden should be pardoned

by Amnesty International UK

Lesson 8

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Essential Resource Video

Day in the Life: cyber threat intelligence analyst

by Chevron
Essential Resource Other

What is Cyber Threat Intelligence and how is it…

by CREST
Essential Resource Other

Data protection and cyber risk issues in…

by Bienvenu, P.
Essential Resource Website

Data Protection and Cybersecurity – Together or…

by Maczka, P
Essential Resource Video

Cyber Threat Intelligence Explained

by Mitrecorp
Essential Resource Video

Understanding the Threat Intelligence Lifecycle

by Anomali
Essential Resource Video

A Brief Explanation of Cybersecurity and Why It…

by Bython
Essential Resource Audio

International arbitration #4: data protection and…

by Schroeder, P.
Essential Resource Audio

Learn about cyber threat intelligence from one of…

by Tiller, J.
Essential Resource Video

What is Data Protection and Why Do You Need It?

by Eye on Tech
Essential Resource Website

Most Common Cyber Security Threats

by Koziol, J. and Watts, R.
Essential Resource Other

Cyber Threat Intelligence Model: An Evaluation of…

by Mavroeidis, V. and Bromander, S.
Essential Resource Video

Cyber Threat Intelligence | Tips to Use Cyber…

by NetCom Learning
Essential Resource Video

What Is Firewall ? | Firewall Explained |…

by Simplilearn
Wider Reading eBook

Digital Forensic Investigation of Internet of…

by Montasari, R., Jahankhani, H., Hill, R., Parkinson, S., (eds)

Lesson 9

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Key Text eBook

Countering Cyberterrorism

by Montasari, R.
Essential Resource Video

How AI is being used in warfare | Sitrep podcast…

by Gerbeau, K.
Essential Resource Website

How social media filter bubbles and algorithms…

by Hern, A.
Essential Resource eBook

Society and the Internet: How Networks of…

by Graham, M. and Dutton, W.H., (eds)
Essential Resource Article

A Survey on the Internet of Things (IoT)…

by Stoyanova, M. et al.
Essential Resource Website

Using AI to Reduce IoT Vulnerability

by Pilkington, B.
Essential Resource Other

Towards Responsible, A.I Innovation. Second…

by UNICRI and INTERPOL
Essential Resource Video

The Horrors of Being a Facebook Moderator |…

by VICE

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2025 Arden University  | All rights reserved