Bibliography

Home

Introduction

  • Abstract
  • Definition
    Nature of Crimes
    Fighting Crime
  • Policy
  • Prevention
    Effectiveness
  • Detection
  • Measuring
    Crimes of the Future
  • Information Theft
  • Cyber-Terrorism
    Pop Culture

    Links

    References

    About

  • Note: View this page full-screen.

    Otherwise, parts of the page
    may overlap the left
    black bar, correcting which
    is beyond our control.

    "$100 Million Verdict Against Anti-Abortion Activists." _CNN Interactive_. Internet. URL: http://cnn.com/US/9902/02/abortion.web.verdict.03/index.html. Accessed 9 March, 1999: 1-2.

    "Annual Cost of Computer Crime Rise Alarmingly." Computer Security Institute press release, 4 March 1998. Online URL: http://www.gocsi.com/prelea11.htm. Accessed 11 Mar., 1999: 1.

    Associated Press. "Court Upholds Child Pornography Law." 30 January, 1999: 1.

    Barkley, J. "Role Based Access Control." URL: http://hissa.ncsl.nist.gov/rbac/proj/paper/node3.html. Accessed 9 Mar., 1999: 1.

    Barlow, J. "Crime and Puzzlement: Desperados of the DataSphere," 1990. (Also online as http://www.eff.org/pub/Publications/John_Perry_Barlow/crime_and_puzzlement.1)

    Bunn, A. "31 Nabbed, 1,500 Fingered in Net Kid-Porn Sting." _Wired News_. Internet. URL: http://www.wired.com/news/news/politics/story/7335.html. Accessed 8 March, 1999: 1.

    Carter, D., Katz, A. "Computer Crime: An Emerging Challenge for Law Enforcemen." URL: http://www.fbi.gov/leb/dec961.txt. Accessed 9 Mar., 1999: 1.

    "Computer Crime." URL: http://www3.bc.sympatico.ca/gja/980630.htm Accessed 9 Mar., 1999: 1.

    "Computer and Network Usage Policy." Stanford Unversity. URL: http://www-portfolio.stanford.edu:80/200141 Accessed 9 Mar., 1999: 1.

    "Court Upholds Child Pornography Law." _CNN Interactive_. Internet. URL: http://cnn.com/US/9901/30/ComputerPorn.ap/index.html. Accessed 24 Feb., 1999: 1.

    CPSR Statement of Ethics. Communications of the ACM, Vol 32 Num 6, June 1989.

    "Criminal Organizations." URL: http://oicj.acsp.uic.edu/spearmint/public/pubs/cjfarrago/terror02.cfm . Accessed 9 Mar., 1999: 1.

    "Cybercrime on the Internet." _Jones Telecommunications & Multimedia Encyclopedia_. Internet. URL: http://www.digitalcentury.com/encyclo/update/crime.html. Accessed 7 March, 1999: 2-3.

    Denning, Peter J. (editor), Computers Under Attack: Intruders, Worms, and Viruses, Reading, MA: Addison-Wesley, 1990.

    Eliptic Curve Cryptosystem Whitepapers, Current Public-Key Cryptographic Systems. April 1997. URL:

    "FBI Computer Crime Squad." _Emergency.com_. Internet. URL: http://www.emergency.com/fbi-nccs.htm. Accessed 7 March, 1999: 1.

    "Florida Association of Computer Crime Investigators." URL: http://facci.org/. Accessed 9 Mar. 1999: 1.

    "Former Chief Computer Network Program Designer Arraigned for Alleged $10 Million Computer 'Bomb.'" _Department of Justice Computer Crime and Intellectual Property Section_. Internet. URL: http://www.usdoj.gov/criminal/cybercrime/lloydpr.htm. Accessed 22 Feb., 1999: 1-3.

    Hafner, K. & Markoff, J. Cyberpunk: Outlaws and Hackers on the Computer Frontier, New York: Simon and Schuster, 1995.

    Hanson, Wayne. "Future Crime" 1996. URL:
    http://www.govtech.net/1995/gt/mar/future.htm . Accessed 9 Mar., 1999: 1.

    Hoffman, L., et al. "Cryptography Policy and Technology Trends." URL: http://ftp.eff.org/pub/Privacy/crypto-policy_doe_94.report. 1 Dec 1993, revised 30 Jan, 1994.

    Howard, John. "Internet Characteristics." _An Analysis of Security Incidents on the Internet 1989 - 1995_. Internet. URL: http://www.cert.org/research/JHThesis/Chapter2.html. Accessed 8 March, 1999: 9-10.

    "Information Warfare Database." URL: http://www.georgetown.edu/users/samplem/iw/ Accessed 15 Feb., 1999: 1.

    "Internet Child Porn Ring Busted." _Wired News_. Internet. URL: http://www.wired.com/news/print_version/politics/story/15908.html. Accessed 8 March, 1999: 1.

    Koops, B. "Crypto Law Survey." URL: http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm. Accessed 9 Mar., 1999: 1.

    "Israeli Citizen Arrested in Israel for Hacking United States and Israeli Government Computers." _Department of Justice Computer Crime and Intellectual Property Section_. Internet. URL: http://www.usdoj.gov/criminal/cybercrime/ehudpr.htm. Accessed 22 Feb., 1999: 1-2.

    "Juvenile Computer Hacker Cuts off FAA Tower at Regional Airport -- First Federal Charges Brought Against a Juvenile for Computer Crime." _Department of Justice Computer Crime and Intellectual Property Section_. Internet. URL: http://www.usdoj.gov/criminal/cybercrime/juvenilepld.htm . Accessed 22 Feb., 1999: 1-4.

    "Latest Web Statistics." InterGOV International. Internet. URL: http://www.intergov.org/public_administration/information/latest_web_stats.html . Accessed 22 Feb., 1999: 3.

    MacMillan, Robert. "Online Kiddie Porn Ring Busted." _InfoWar.Com_. Internet. URL: http://www.infowar.com/law/law_091198h_j.shtml. Accessed 8 March, 1999: 1.

    McKee, Phillip C. "Remarks to the 'Consumer Protection in Electronic Commerce' Panel at The Public Voice in the Development of Internet Policy Conference of the Global Internet Liberty Campaign." National Fraud Information Center. Internet. URL: http://www.fraud.org/internet/intstat.htm . Accessed 25 Feb., 1999: 1.

    "The National Information Infrastructure Protection Act of 1996 Legislative Analysis." Department of Justice Computer Crime and Intellectual Property Section. Internet. URL: http://www.usdoj.gov/criminal/cybercrime/1030_anal.html. Accessed 22 Feb., 1999: 1.

    NCSC: A Guide to Understanding Descretionary Access Control in Trusted Systems. 30 Sept. 1987.

    Roush, W. "Hackers: Taking a Byte Out of Computer Crime." Internet. URL: http://www.techreview.com/articles/apr95/Roush.html Accessed 9 Mar., 1999: 1.

    "Section 1030 as Amended Oct. 11, 1996." Department of Justice Computer Crime and Intellectual Property Section. Internet. URL: http://www.usdoj.gov/criminal/cybercrime/1030_new.html. Accessed 22 Feb., 1999: 1-2.

    Shimomuro, T. & Markoff, J. Take-Down: The Pursuit and Capture of Kevin Mitnick, New York: Hyperion, 1996.

    Strothcamp, Dave. Fraud and Computer Crime. Internet. URL: http://www.csuohio.edu/accounts/Strothcamp/TOPIC07/sld001.htm. Accessed 23 Feb., 1999: 1.

    "Sun Microsystems: Questra: Questra Consulting." Questra: What's New: Advanced IT Conference. Internet. URL: http://www.questra.com/news/itConf/slides/sunsoft/sunsoft/sld007.htm. Accessed 23 Feb., 1999: 1.

    Varon, Elana. "Bill Would Double Budget to Fight Internet Child Pornography." CNN Interactive. Internet. URL: http://cnn.com/TECH/computing/9902/12/fightporn.idg/index.html . Accessed 24 Feb., 1999: 1-2.