Global Security Challenges

The details
Sociology and Criminology
Colchester Campus
Postgraduate: Level 7
Sunday 17 January 2021
Friday 26 March 2021
29 June 2020


Requisites for this module



Key module for

MSC MF9012 Organised Crime, Terrorism and Security,
MSC L31124 Migration Studies

Module description

This module will critically assess current research, policies and practices related to current global security challenges, including those relating to human rights, climate change, migration, health, and the cybersphere

Module aims

The module will engage students with complex issues both systematically and creatively, with the fields of security studies, criminology, legal theory and philosophy. Topics will include the developing concept of security, cybercrime and cyber security, the surveillance industry, international policing, transnational crime and alternative security actors such as hacktivists and whistleblowers. The module is an opportunity to open up new thinking and to expand career opportunities within the security industry and the criminal justice sector, nationally and internationally.

Module learning outcomes

By the end of the course, students should:

a) Be able to show an understanding of the contemporary debates in global security.

b) Have developed a critical awareness of the broad social, cultural, economic and political aspects of global security challenges.

c) Be able to assess the intersections of different fields in researching global security challenges.

d) Be able to make sound judgements in the complexity of data related to global security challenges and communicate these ideas clearly.

Module information

Please note that assessment information is currently showing for 2019-20 and will be updated in September.

Learning and teaching methods

No information available.


  • Marta Poblet; Jonathan Kolieb. (2018) 'Responding to Human Rights Abuses in the Digital Era: New Tools, Old Challenges', in Stanford Journal of International Law. vol. 54 (2) , pp.259-283
  • VG exposed the largest child sexual abuse forum. It was run by the police.,
  • Waldron, Jeremy. (2003-06) 'Security and Liberty: The Image of Balance*', in Journal of Political Philosophy. vol. 11 (2) , pp.191-210
  • Minárik, Tomáš; Osula, Anna-Maria. (2016-02) 'Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law', in Computer Law & Security Review. vol. 32 (1) , pp.111-127
  • Roderick S. Graham. (October 19, 2017 12.33am BST) 'The difference between cybersecurity and cybercrime, and why it matters', in The Conversation.
  • Yar, Majid; Steinmetz, Kevin F. (2019) Cybercrime and society, Los Angeles: SAGE.
  • Rothschild, Emma. (no date) What is Security?.
  • Elbe, Stefan. (2006) 'Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security', in International Studies. vol. 50 (1) , pp.119-144
  • Wall, David S.; Williams, Matthew L. (2013) 'Policing cybercrime: Networked and social media technologies and the challenges for policing', in Policing & Society. vol. 23 (4) , pp.409-412
  • The Securitization of COVID-19: Three Political Dilemmas | Global Policy Journal,
  • Bowling, Ben; Westenra, Sophie. (2018) '‘A really hostile environment’: Adiaphorization, global policing and the crimmigration control system', in Theoretical Criminology., pp.1-21
  • Elbe, Stefan. (2006-03) 'Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security', in International Studies Quarterly. vol. 50 (1) , pp.119-144
  • Eric Jardine. (no date) The Dark Web Dilemma: Tor, Anonymity and Online Policing.
  • Clough, Jonathan. (2015) Principles of Cybercrime, Cambridge: Cambridge University Press.
  • Baldwin, David A. (1997) 'The concept of security', in Review of International Studies. vol. 23 (1) , pp.5-26
  • King, Gary; Murray, Christopher J. L. (2001) 'Rethinking Human Security', in Political Science Quarterly. vol. 116 (4) , pp.585-610
  • McDonald, Matt. (2008-12) 'Securitization and the Construction of Security', in European Journal of International Relations. vol. 14 (4) , pp.563-587
  • Shue, Henry. (2010) 'Deadly Delays, Saving Opportunities: Creating a More Dangerous World?', in Climate ethics: essential readings, Oxford: Oxford University Press., pp.146-162
  • Yochai Benkler. (2014) 'A Public Accountability Defense for National Security Leakers and Whistleblowers', in Harvard Law and Policy Review. vol. 8, pp.281-326
  • Zedner, Lucia. (2009) Security, Abingdon: Routledge.
  • Reveron, Derek S. (c2012) Cyberspace and national security: threats, opportunities, and power in a virtual world, Washington, DC: Georgetown University Press.
  • Hawkesworth, M. E.; Kogan, Maurice. (2004) Encyclopedia of government and politics, London: Routledge.
  • Bartlett, Jamie. (2014) The dark net: inside the digital underworld, London: William Heinemann.
  • Deibart. (2018) 'Trajectories for Future Cybersecurity Research', in The Oxford Handbook of International Security: Oxford University Press.

The above list is indicative of the essential reading for the course. The library makes provision for all reading list items, with digital provision where possible, and these resources are shared between students. Further reading can be obtained from this module's reading list.

Assessment items, weightings and deadlines

Coursework / exam Description Deadline Coursework weighting
Coursework   Weekly exercise 1  28/01/2021  10% 
Coursework   Weekly exercise 2  04/02/2021  10% 
Coursework   Weekly exercise 3  11/02/2021  10% 
Coursework   Weekly exercise 7  11/03/2021  10% 
Coursework   Weekly exercise 8  18/03/2021  10% 
Coursework   Essay  24/03/2021  40% 
Coursework   Weekly exercise 9  25/03/2021  10% 

Additional coursework information

1 x 5,000 word essay Please note that assessment information is currently showing for 2018-19 and will be updated in August 2019

Exam format definitions

  • Remote, open book: Your exam will take place remotely via an online learning platform. You may refer to any physical or electronic materials during the exam.
  • In-person, open book: Your exam will take place on campus under invigilation. You may refer to any physical materials such as paper study notes or a textbook during the exam. Electronic devices may not be used in the exam.
  • In-person, open book (restricted): The exam will take place on campus under invigilation. You may refer only to specific physical materials such as a named textbook during the exam. Permitted materials will be specified by your department. Electronic devices may not be used in the exam.
  • In-person, closed book: The exam will take place on campus under invigilation. You may not refer to any physical materials or electronic devices during the exam. There may be times when a paper dictionary, for example, may be permitted in an otherwise closed book exam. Any exceptions will be specified by your department.

Your department will provide further guidance before your exams.

Overall assessment

Coursework Exam
100% 0%


Coursework Exam
100% 0%
Module supervisor and teaching staff
Dr Katerina Hadjimatheou, email:
Dr Katerina Hadjimatheou
Michele Hall, Graduate Administrator, Telephone 01206 873051, Email:



External examiner

Prof Benjamin Bradford
University College London
Available via Moodle
Of 850 hours, 3 (0.4%) hours available to students:
847 hours not recorded due to service coverage or fault;
0 hours not recorded due to opt-out by lecturer(s).


Further information
Sociology and Criminology

Disclaimer: The University makes every effort to ensure that this information on its Module Directory is accurate and up-to-date. Exceptionally it can be necessary to make changes, for example to programmes, modules, facilities or fees. Examples of such reasons might include a change of law or regulatory requirements, industrial action, lack of demand, departure of key personnel, change in government policy, or withdrawal/reduction of funding. Changes to modules may for example consist of variations to the content and method of delivery or assessment of modules and other services, to discontinue modules and other services and to merge or combine modules. The University will endeavour to keep such changes to a minimum, and will also keep students informed appropriately by updating our programme specifications and module directory.

The full Procedures, Rules and Regulations of the University governing how it operates are set out in the Charter, Statutes and Ordinances and in the University Regulations, Policy and Procedures.