Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Criminal Justice
      • Digital Education in Practice
      • Investigation, Security and Defence
      • Law
      • Psychology
      • Computing
      • Design and creativity
      • Finance and Accounting
      • Marketing
      • Health and Care Management
      • Human Resource Management
      • Business Management
      • Supply Chain Management and Logistics
      • Hospitality and Tourism
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request it!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place
Support

UG Criminal Justice Reading Lists  CRI6010

Responding to Global Cyber Emergencies

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P.
Key Text Article

Deterring Cyberattacks

by Hennessey, S
Key Text Other

Guide to Intrusion Detection and Prevention…

by Scarfone, K., & Souppaya, M.
Key Text eBook

Cybercrime and Digital Forensics: An Introduction

by Holt, T. J., Bossler, A. M. & Seigfried-Spellar, K. C.
Essential Resource Article

Effects of cyber security knowledge on attack…

by Ben-Asher, N. and Gonzalez, C.
Essential Resource Website

Home page

by Have I Been Pwned.com.
Essential Resource Website

7 Reasons Global Attacks Will Rise Significantly…

by Reed, J.
Essential Resource Website

What is a Hacktivist?

by Putman, P.
Essential Resource Video

Threat Actors - SY0-601 CompTIA Security+ : 1.5

by Professor Messer
Essential Resource Website

The Global Cyber Threat

by Maurer, T., and Nelson, A.
Essential Resource Website

Which Countries are Most Dangerous?

by Pur, N. D.
Essential Resource Website

SolarWinds hack explained: Everything you need to…

by Oladimeji, S., and Kerner, S. M.

Lesson 2

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Essential Resource Website

How con artists use AI, apps, social engineering…

by Alfonsi, S.
Essential Resource Audio

S2.1. Jackpotting

by BBC podcasts
Essential Resource Website

How Can Cryptocurrency Reshape the Global Economy?

by International Finance
Essential Resource Website

Financial Crimes [online]. Available at:

by Interpol
Essential Resource Website

Yahoo Employee Stole 570,000 Pages of Source Code…

by Doshi, Y
Essential Resource Audio

Podcast Banks’ forever war against cyberattacks

by Heltman, J
Essential Resource Article

North Korean cyber attacks and policy responses:…

by Hwang, J., & Choi, K. S
Essential Resource Website

North Korean hackers said to have stolen nearly $…

by Korn, J.
Essential Resource Website

(2023). Fraud

by National Crime Agency
Essential Resource Video

Teen cooked up elaborate schemes to steal his way…

by 11Alive
Essential Resource Website

11 Real-Life Insider Threat Examples

by Simpson, A
Essential Resource Audio

Transatlantic perspectives on anti-money…

by Withersworldwide

Lesson 3

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Essential Resource Website

FASTCash 2.0: North Korea's BeagleBoyz…

by Cybersecurity & Infrastructure Security Agency [CISA]
Essential Resource Video

Technical Assistance and Information Exchange (…

by European External (2020) Technical Assistance and Information Exchange
Essential Resource Article

Cyber laundering: a threat to banking industries…

by Joveda, N. et al.
Essential Resource Website

North Korean Cyberattacks: A Dangerous and…

by Klingner, B.
Essential Resource Audio

Darknet Diaries, Ep 72: Bangladesh Bank Heist

by Rhysider, J
Essential Resource Audio

Inside North Korea’s Lazarus heist hack

by Zwetsloot, J

Lesson 4

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Essential Resource Audio

The State of Cybersecurity: How Did We Get Here,…

by Johnson, A
Essential Resource Website

Cybersecurity is too big a job for governments or…

by Mee, P. and Chandrasekhar, C
Essential Resource Website

Cybercrime Statistics

by Surfshark
Essential Resource Audio

Ransomware: Your Money or Your Files- Episode 6

by The Europol Podcast
Essential Resource Video

Cyber Threat Intelligence Explained. YouTube

by UnixGuy
Essential Resource Website

Sharing is Caring: Using Intelligence to Fight…

by Coker, J
Essential Resource Video

The importance of threat intelligence sharing.…

by Finextra Research

Lesson 5

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P. (ed.)
Key Text Other

Guide to Intrusion Detection and Prevention…

by Scarfone, K., & Souppaya, M
Essential Resource Website

Why Politically Motivated Cyber-Attacks Are a…

by Kotze, B
Essential Resource Article

International Responsibility Arising from…

by Alabbadi, F.S., Al Amaren, E.M. and Aletein, S.I.
Essential Resource Website

NCSC Annual Review

by National Cyber Security Centre
Essential Resource Website

Labour MP grills Tory minister over Matt Hancock…

by PoliticsJOE
Essential Resource Website

EU democracy is under attack by mercenary spyware…

by Liboreiro, J
Essential Resource Website

Trump versus the truth: The most outrageous…

by Timm, J. C
Essential Resource Video

Why democracy is still the best form of government

by Tedx Talks
Essential Resource Website

How to identify misinformation, disinformation,…

by Canadian Centre for Cyber Security
Essential Resource Website

Emmanuel Macron email leaks 'linked to…

by Dearden, L
Essential Resource Website

What is disinformation, why it spreads, and how…

by Pirkova, E
Essential Resource Article

The Hidden Threat of Cyber-attacks – undermining…

by Shandler, R. and Gomez, M. A.
Essential Resource Article

Digital Threats to Democratic Elections: How…

by Tenove, C., et al.

Lesson 6

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Essential Resource Website

Factbox: Key findings from Senate inquiry into…

by Hosenball, M.
Essential Resource Other

The IRA, Social Media and Political Polarization…

by Howard, P.N., et al.
Essential Resource Video

How China’s Surveillance Is Growing More Invasive…

by The New York Times
Essential Resource Audio

Special Episode: The Making of “The Kremlin…

by Ruy, D.
Essential Resource Video

The anatomy of a Russian troll | The Fact Checker

by Washington Post
Essential Resource Video

How China is building an all-seeing surveillance…

by Washington Post
Essential Resource Video

Watergate Scandal - explained in 3 minutes - mini…

by VidyPedia
Essential Resource Video

How Russian Trolls Collected Americans'…

by Wall Street Journal
Essential Resource Video

Cambridge Analytica Uncovered: Secret filming…

by Channel 4 News
Essential Resource Video

Inside Russia's internet 'troll factory…

by CNN
Essential Resource Video

Putin, Friend or Foe?

by AFP News Agency
Essential Resource Website

William “Boss” Tweed and Political Machines

by Bill of Rights Institute
Essential Resource Video

French worry about election hacking by Russia

by CNN
Essential Resource Video

Video: Russian media expands presence in France

by FRANCE 24 English
Essential Resource Website

How China Is Interfering in Taiwan’s Election

by Kurlantzick, J.
Essential Resource Website

Tammany Hall: New York City's Political…

by McNamara, R.
Essential Resource Website

MI5 accuses lawyer of trying to influence…

by Sabbagh. D.
Essential Resource Video

China’s Surveillance State: Why You Should Be…

by Vice News

Lesson 7

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Essential Resource Video

The power of artificial intelligence for…

by Booz Allen Hamilton
Essential Resource Website

Edward Snowden: Traitor or Hero?

by Ethics Unwrapped
Essential Resource Website

Hacking Team and the targeting of Ethiopian…

by Marczak, B., et al.
Essential Resource Other

Hide and seek: tracking NSO group’s Pegasus…

by Marczak, B., et al.
Essential Resource Video

AI Is Monitoring You Right Now and Here’s How It…

by Seeker
Essential Resource Website

Researchers find and decode the spy tools…

by Zetter, K.
Essential Resource Video

Pegasus: the spyware technology that threatens…

by The Guardian
Essential Resource Website

New evidence suggests spyware used to surveil…

by Kirchgaessner, S.
Essential Resource Website

FBI confirms it obtained NSO’s Pegasus spyware

by Kirchgaessner, S.
Essential Resource Website

Mapping Hacking Team’s “Untraceable” Spyware

by Marczak, B., et al.
Essential Resource Website

Edward Snowden calls for spyware trade ban amid…

by Pegg, D. and Lewis, P.
Essential Resource Audio

Discovering Pegasus Spyware - The Magic Worm, ep…

by Reid, R. and Vila, N.
Essential Resource Video

Government Surveillance: The National Security…

by Federalist Society
Essential Resource Other

State surveillance and implications for children

by Feldstein, S.
Essential Resource Other

The global expansion of AI surveillance

by Feldstein, S.
Essential Resource Video

The NSA and surveillance ... made simple –…

by The Guardian

Lesson 8

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Essential Resource Video

Day in the Life: cyber threat intelligence analyst

by Chevron
Essential Resource Other

What is Cyber Threat Intelligence and how is it…

by CREST
Essential Resource Article

Data protection and cyber risk issues in…

by Bienvenu, P and Grant, B.,
Essential Resource Website

Data Protection and Cybersecurity – Together or…

by Maczka, P
Essential Resource Video

Cyber Threat Intelligence Explained

by Mitrecorp
Essential Resource Video

Understanding the Threat Intelligence Lifecycle

by Anomali
Essential Resource Video

A Brief Explanation of Cybersecurity and Why It…

by Bython
Essential Resource Audio

International arbitration #4: data protection and…

by Schroeder, P.
Essential Resource Audio

Learn about cyber threat intelligence from one of…

by Tiller, J.
Essential Resource Video

What is Data Protection and Why Do You Need It?

by Eye on Tech
Essential Resource Website

Most Common Cyber Security Threats In 2023

by Koziol, J., Watts, R. and Bottorff, C.
Essential Resource Article

Cyber Threat Intelligence Model: An Evaluation of…

by Mavroeidis, V. and Bromander, S.
Essential Resource Video

Cyber Threat Intelligence | Tips to Use Cyber…

by NetCom Learning
Essential Resource Video

What Is Firewall ? | Firewall Explained |…

by Simplilearn

Lesson 9

Key Text eBook

The Oxford Handbook of Cyber Security

by Cornish, P
Key Text eBook

Countering Cyberterrorism, The Confluence of…

by Montasari, R.
Essential Resource Video

How AI is being used in warfare | Sitrep podcast…

by Gerbeau, K.
Essential Resource Website

How social media filter bubbles and algorithms…

by Hern, A.
Essential Resource eBook

Society and the Internet: How Networks of…

by Graham, M. and Dutton, W.H., (eds)
Essential Resource Article

A Survey on the Internet of Things (IoT)…

by Stoyanova, M. et al.
Essential Resource Website

Using AI to Reduce IoT Vulnerability

by Pilkington, B.
Essential Resource Other

Towards Responsible, A.I Innovation. Second…

by UNICRI and INTERPOL
Essential Resource Video

The Horrors of Being a Facebook Moderator |…

by VICE

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon

Library@arden.ac.uk
AcademicSkills@arden.ac.uk
EnglishLanguageHub@arden.ac.uk

footer logo

Follow us on

  • Arden twitter

© 2005-2025 Arden University  | All rights reserved