Skip to main navigationSkip to main content
The University of Southampton

CRIM6002 Cyber Crime, Insecurity and the Dark Web

Module Overview

This module is designed to introduce you to the human dimension of cybercrime and cyber security. It is not coming from a technical perspective, but instead a critical criminological approach is applied to the topic. This means that we will be questioning theory, policy and practice, and discuss the way that this area might develop in the future. This module is a 'transdisciplinary' approach to a very contemporary human development. As such, we are all still pioneers making our way through the subject. As such we will traverse a wide range of literature, ideas and research drawn from a dizzying array of subject areas, and their interactions. A bold claim might be that we are at the end of subject insularity and only a transdisciplinary approach provides the robust analytical tools that we need to understand issues like the Web and Cybercrime.

Aims and Objectives

Learning Outcomes

Learning Outcomes

Having successfully completed this module you will be able to:

  • To critically evaluate cutting edge research in the area of Cyber Crime and Cyber Security.
  • To introduce the history of research into Cyber Crime.
  • To understand the organisations and key stake holders in the business of preventing, controlling and policing Cyber Crime.
  • To critically evaluate the theoretical foundation of research into Cyber Crime.
  • To develop an approach to Cyber Crime and Cyber Security that recognises the interdisciplinary nature of the area.


1. Cyber: A History of a Prefix 2. Technology and Crime: Tracking the Interface 3. Hacking, Spoofing and Cracking 4. Cyber Crime grows up: Carding, Escrow and the Dark Markets 5. Hacktivism: Political Protests on the web or Threat to National Security 6. Future Shock: Web 3.0 and Beyond 7. From Cyber Crime to Cyborg: The Bio-Intuitive Web 8. Policing the Web 9. Law, Tor and the Web 10. How much damage can a mouse do?: Punishing Cyber Criminals 11. Bitcoins and the political economy of crime 12. Surveillance and the Web: Research and Investigation online

Learning and Teaching

Teaching and learning methods

Teaching will take place in 2 teaching units per week, the format will be a mix of lectures, workshops and seminars to a total of 24 contact hours.

Blended Learning150
Total study time150

Resources & Reading list

Holt, T.J. & Lampke, E., (2010). Exploring stolen data markets online: products and market forces. Criminal Justice Studies. ,23 , pp. 33-50.

Wall, D. (2007). Cybercrime. 

Jewkes, Y. and Yar, M. (eds) (2010). Handbook of Internet Crime. 

McGuire, M. (2007). Hypercrime. 

Taylor, P. A. (1999). Hackers. 

Holt, T.J., (2010). Examining the Role of Technology in the Formation of Deviant Subcultures.. Social Science Computer Review. ,28 , pp. 466-481.



MethodPercentage contribution
Essay  (1500 words) 30%
Essay  (3000 words) 50%
Group presentation 20%


MethodPercentage contribution
Coursework assignment(s) 100%

Repeat Information

Repeat type: Internal & External

Share this module Share this on Facebook Share this on Twitter Share this on Weibo
Privacy Settings