Global Security Challenges
Postgraduate: Level 7
Sunday 17 January 2021
Friday 26 March 2021
29 June 2020
Requisites for this module
MSC MF9012 Organised Crime, Terrorism and Security
This module will critically assess current research, policies and practices related to current global security challenges, including those relating to human rights, climate change, migration, health, and the cybersphere
The module will engage students with complex issues both systematically and creatively, with the fields of security studies, criminology, legal theory and philosophy. Topics will include the developing concept of security, cybercrime and cyber security, the surveillance industry, international policing, transnational crime and alternative security actors such as hacktivists and whistleblowers. The module is an opportunity to open up new thinking and to expand career opportunities within the security industry and the criminal justice sector, nationally and internationally.
By the end of the course, students should:
a) Be able to show an understanding of the contemporary debates in global security.
b) Have developed a critical awareness of the broad social, cultural, economic and political aspects of global security challenges.
c) Be able to assess the intersections of different fields in researching global security challenges.
d) Be able to make sound judgements in the complexity of data related to global security challenges and communicate these ideas clearly.
Please note that assessment information is currently showing for 2019-20 and will be updated in September.
No information available.
- Yochai Benkler. (2014) 'A Public Accountability Defense for National Security Leakers and Whistleblowers', in Harvard Law and Policy Review. vol. 8, pp.281-326
- Reveron, Derek S. (c2012) Cyberspace and national security: threats, opportunities, and power in a virtual world, Washington, DC: Georgetown University Press.
- Made in China, Exported to the World: The Surveillance State - The New York Times, https://www.nytimes.com/2019/04/24/technology/ecuador-surveillance-cameras-police-government.html
- Marta Poblet; Jonathan Kolieb. (2018) 'Responding to Human Rights Abuses in the Digital Era: New Tools, Old Challenges', in Stanford Journal of International Law. vol. 54 (2) , pp.259-283
- VG exposed the largest child sexual abuse forum. It was run by the police., https://www.vg.no/spesial/2017/undercover-darkweb/?lang=en
- Zedner, Lucia. (2009) Security, Abingdon: Routledge.
- Bartlett, Jamie. (2014) The dark net: inside the digital underworld, London: William Heinemann.
- Waldron, Jeremy. (2003-06) 'Security and Liberty: The Image of Balance*', in Journal of Political Philosophy. vol. 11 (2) , pp.191-210
- Wall, David S. School of Applied Social Sciences, Durham University, Durham, United Kingdom, WilliamsM7@cf.ac.uk Williams, Matthew L., ORCID 0000-0003-2566-6063 . School of Social Sciences, Cardiff University, Cardiff, United Kingdom, firstname.lastname@example.org. (2013) 'Policing cybercrime: Networked and social media technologies and the challenges for policing.', in Policing & Society,. vol. 23 (4) , pp.409-412
- Stefan Elbe. (2006) 'Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security', in International Studies. vol. 50 (1) , pp.119-144
- Minárik, Tomáš; Osula, Anna-Maria. (2016-02) 'Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law', in Computer Law & Security Review. vol. 32 (1) , pp.111-127
- Gardiner, Stephen Mark; EBSCOhost ebook collection. (2010) Climate ethics: essential readings, Oxford: Oxford University Press.
- How China Uses High-Tech Surveillance to Subdue Minorities - The New York Times, https://www.nytimes.com/2019/05/22/world/asia/china-surveillance-xinjiang.html
- KING, GARY; MURRAY, CHRISTOPHER J. L. (2001-12) 'Rethinking Human Security', in Political Science Quarterly. vol. 116 (4) , pp.585-610
- Joh, Elizabeth E. (2017) 'The Undue Influence of Surveillance Technology Companies on Policing', in SSRN Electronic Journal.
- Hawkesworth, M. E.; Kogan, Maurice. (2004) Encyclopedia of government and politics, London: Routledge.
- Aradau, Claudia. (2004-03) 'The Perverse Politics of Four-Letter Words: Risk and Pity in the Securitisation of Human Trafficking', in Millennium: Journal of International Studies. vol. 33 (2) , pp.251-277
The above list is indicative of the essential reading for the course. The library makes provision for all reading list items, with digital provision where possible, and these resources are shared between students. Further reading can be obtained from this module's reading list.
Assessment items, weightings and deadlines
|Coursework / exam
Module supervisor and teaching staff
Dr Katerina Hadjimatheou, email: email@example.com.
Dr Katerina Hadjimatheou
Michele Hall, Graduate Administrator, Telephone 01206 873051, Email: firstname.lastname@example.org
No external examiner information available for this module.
Available via Moodle
Of 18 hours, 18 (100%) hours available to students:
0 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s).
* Please note: due to differing publication schedules, items marked with an asterisk (*) base their information upon the previous academic year.
Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can
be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements,
industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist
of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules.
The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.
The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.