-
1
-
-
6244245533
-
Virtual defense
-
(May/Jun)
-
J. Adams Virtual defense Foreign Affairs (May/Jun) 2001 98-112
-
(2001)
Foreign Affairs
, pp. 98-112
-
-
Adams, J.1
-
3
-
-
28244445103
-
I am a thief, not a hacker: Indonesia's electronic underground
-
(July)
-
Antariksa I am a thief, not a hacker: Indonesia's electronic underground Latitudes Magazine 2001 12-17 (July)
-
(2001)
Latitudes Magazine
, pp. 12-17
-
-
Antariksa1
-
6
-
-
28244477934
-
The economics of crime
-
Becker, G.S., 1995. The economics of crime. Cross Sections, Fall, 8-15. http://www.rich.frb.org/pubs/cross/crime/crime.pdf.
-
(1995)
Cross Sections, Fall
, pp. 8-15
-
-
Becker, G.S.1
-
7
-
-
28244439719
-
Profiling cybercriminals: A promising but immature science
-
Network World November 29
-
Bednarz, A., 2004. Profiling cybercriminals: A promising but immature science. Network World, November 29, http://www.nwfusion.com/supp/2004/ cybercrime/112904profile.html?page=2.
-
(2004)
-
-
Bednarz, A.1
-
9
-
-
28244479215
-
Viruses: From Russia, with love?
-
May 28
-
Blau, J., 2004. Viruses: From Russia, with love? IDG News Service, May 28. http://www.pcworld.com/news/article/0,aid,116304,00.asp.
-
(2004)
IDG News Service
-
-
Blau, J.1
-
10
-
-
28244473489
-
E-Espionage rekindles cold-war tensions - U.S. tries to identify hackers; millions of documents are stolen
-
(Jun 27)
-
T. Bridis E-Espionage rekindles cold-war tensions - U.S. tries to identify hackers; millions of documents are stolen Wall Street Journal 2001 A.18 (Jun 27)
-
(2001)
Wall Street Journal
-
-
Bridis, T.1
-
11
-
-
84937324817
-
The multiple identities of the Middle East
-
LC. Brown The multiple identities of the Middle East Foreign Affairs 78 6 1999 158-159
-
(1999)
Foreign Affairs
, vol.78
, Issue.6
, pp. 158-159
-
-
Brown, L.C.1
-
12
-
-
28244492651
-
Towards a culture of online security
-
(December)
-
A. Carblanc S. Moers Towards a culture of online security The OECD Observer 2003 30 (December)
-
(2003)
The OECD Observer
, pp. 30
-
-
Carblanc, A.1
Moers, S.2
-
13
-
-
0006620814
-
Chinese Realpolitik
-
T. Christensen Chinese Realpolitik Foreign Affairs 75 5 1996 37-52
-
(1996)
Foreign Affairs
, vol.75
, Issue.5
, pp. 37-52
-
-
Christensen, T.1
-
14
-
-
28244445349
-
What's next? Foreseeable terrorist acts
-
J.F. Coates What's next? Foreseeable terrorist acts The Futurist 36 5 2002 23-26
-
(2002)
The Futurist
, vol.36
, Issue.5
, pp. 23-26
-
-
Coates, J.F.1
-
15
-
-
28244435033
-
Rebuffed Internet extortionist posts stolen credit card data
-
CNN.Com. January 10
-
CNN.Com., 2000. Rebuffed Internet extortionist posts stolen credit card data, January 10. http://cnn.com/2000/TECH/computing/01/10/ credit.card.crack.2/index.html.
-
(2000)
-
-
-
16
-
-
28244468828
-
Terrorist acts against computer installations and the role of the Internet in the context of International Terrorism Property Insurance Committee
-
Comité Européen Des Assurances IT Risks Insurance Sub-committee, February
-
Comité Européen Des Assurances, 2004. Terrorist acts against computer installations and the role of the Internet in the context of International Terrorism Property Insurance Committee, IT Risks Insurance Sub-committee, February 2004. http://www.cea.assur.org/cea/v1.1/actu/pdf/uk/annexe180.pdf.
-
(2004)
-
-
-
18
-
-
28244496014
-
Battle on Internet credit card fraud still long
-
December 08
-
Darmosumarto, S., 2003. Battle on Internet credit card fraud still long, The Jakarta Post, December 08. http://www.crime-research.org/news/2003/ 12/Mess0802.html.
-
(2003)
The Jakarta Post
-
-
Darmosumarto, S.1
-
20
-
-
1842852600
-
Digitisation and its Asian discontents: The Internet, politics and hacking in China and Indonesia
-
URL
-
de Kloet, J., 2002. Digitisation and its Asian discontents: The Internet, politics and hacking in China and Indonesia, First Monday, 7(9). URL: http://firstmonday.org/issues/issue7_9/kloet/index.html.
-
(2002)
First Monday
, vol.7
, Issue.9
-
-
de Kloet, J.1
-
21
-
-
84868692338
-
Australian Computer Crime and Security Survey
-
Deloitte Touche Tohmatsu
-
Deloitte Touche Tohmatsu, 2002. Australian Computer Crime and Security Survey. http://www.4law.co.il/346.pdf.
-
(2002)
-
-
-
22
-
-
28244469984
-
Hacktivism: An emerging threat to diplomacy
-
American Foreign Service Association. www.afsa.org/fsj/sept00/Denning.cfm
-
Denning, D.E., 2000. Hacktivism: An emerging threat to diplomacy, American Foreign Service Association. www.afsa.org/fsj/sept00/ Denning.cfm.
-
(2000)
-
-
Denning, D.E.1
-
23
-
-
28244463793
-
Largest Internet hacking ring uncovered
-
(November)
-
B. Duk-kun Largest Internet hacking ring uncovered The Korea Times 2003 19 (November)
-
(2003)
The Korea Times
, pp. 19
-
-
Duk-Kun, B.1
-
25
-
-
28244486338
-
FBI warns of Russian hackers stealing U.S. credit-card data
-
Forensic Accounting Review and Computer Security Digest, 2001. FBI warns of Russian hackers stealing U.S. credit-card data, 17(8), 2.
-
(2001)
Forensic Accounting Review and Computer Security Digest
, vol.17
, Issue.8
, pp. 2
-
-
-
28
-
-
28244446862
-
FBI warns of Russian hackers stealing credit-card data from U.S. computers
-
(March 9)
-
L. Gomes T. Bridis FBI warns of Russian hackers stealing credit-card data from U.S. computers Wall Street Journal 2001 A.4 (March 9)
-
(2001)
Wall Street Journal
-
-
Gomes, L.1
Bridis, T.2
-
29
-
-
0040915891
-
Monopolistic competition and the diffusion of new technology
-
G. Gotz Monopolistic competition and the diffusion of new technology The Rand Journal of Economics 30 4 1999 679-693
-
(1999)
The Rand Journal of Economics
, vol.30
, Issue.4
, pp. 679-693
-
-
Gotz, G.1
-
31
-
-
0347728434
-
Russia's rule by racketeers
-
(September 20)
-
S. Handelman Russia's rule by racketeers Wall Street Journal 1999 A.28 (September 20)
-
(1999)
Wall Street Journal
-
-
Handelman, S.1
-
33
-
-
28244490405
-
Online's when states go to cyber-war
-
(Wednesday, 16 February)
-
J. Havely Online's when states go to cyber-war BBC News 2000 (Wednesday, 16 February)
-
(2000)
BBC News
-
-
Havely, J.1
-
35
-
-
85044881647
-
Haven for hackers
-
(November/December)
-
S. Ho Haven for hackers Foreign Policy 2004 (November/December)
-
(2004)
Foreign Policy
-
-
Ho, S.1
-
36
-
-
0037346605
-
The hidden persuaders: Institutions and individuals in economic theory
-
G.M. Hodgson The hidden persuaders: Institutions and individuals in economic theory Cambridge Journal of Economics 27 2003 159-175
-
(2003)
Cambridge Journal of Economics
, vol.27
, pp. 159-175
-
-
Hodgson, G.M.1
-
37
-
-
0001943359
-
Institutions, institutional effects, and institutionalism
-
W.W. Powell P.J. DiMaggio (Eds.) University of Chicago Chicago
-
R. Jepperson Institutions, institutional effects, and institutionalism In: W.W. Powell P.J. DiMaggio (Eds.) The New Institutionalism in Organizational Analysis 1991 University of Chicago Chicago 143-163
-
(1991)
The New Institutionalism in Organizational Analysis
, pp. 143-163
-
-
Jepperson, R.1
-
38
-
-
0038616396
-
New media and the end of nationalism: China and the US in a war of words, Mots Pluriels
-
at www.arts.uwa.edu.au/MotsPluriels/MP1801ak.html, accessed 12 December 2001
-
Kluver, R., 2001. New media and the end of nationalism: China and the US in a war of words, Mots Pluriels, at www.arts.uwa.edu.au/MotsPluriels/ MP1801ak.html, accessed 12 December 2001.
-
(2001)
-
-
Kluver, R.1
-
39
-
-
28244461908
-
Experts see rush of hack attacks coming. Recent costly hits show 'more brazen' criminals preying on companies
-
September 27 p. 01.B
-
Kong, D., Swartz, J., 2000. Experts see rush of hack attacks coming. Recent costly hits show 'more brazen' criminals preying on companies. USA Today, September 27, p. 01.B.
-
(2000)
USA Today
-
-
Kong, D.1
Swartz, J.2
-
40
-
-
85055310034
-
Hacking the odds
-
(May/June)
-
N. Kshetri Hacking the odds Foreign Policy 2005 93 (May/June)
-
(2005)
Foreign Policy
, pp. 93
-
-
Kshetri, N.1
-
42
-
-
28244459311
-
FBI "hack" raises global security concerns
-
May 1
-
Lemos, R., 2001. FBI "hack" raises global security concerns May 1, CNet News, http://news.com.com/2100-1001-950719.html.
-
(2001)
CNet News
-
-
Lemos, R.1
-
43
-
-
28244445350
-
US credit card firm fights DDoS attack
-
23 September
-
Leyden, J., 2004. US credit card firm fights DDoS attack, 23 September, http://www.theregister.co.uk/2004/09/23/authorize_ddos_attack/.
-
(2004)
-
-
Leyden, J.1
-
44
-
-
28244438670
-
Feds enlist hacker to foil piracy rings; plea agreement includes help in satellite TV cases
-
(January 10)
-
D. Lieberman Feds enlist hacker to foil piracy rings; plea agreement includes help in satellite TV cases USA Today 2003 B.01 (January 10)
-
(2003)
USA Today
-
-
Lieberman, D.1
-
45
-
-
28244481321
-
From real to virtual (and back again): Civil society, public sphere, and the Internet in Indonesia
-
Paper presented at Internet political economy forum conference Singapore
-
Lim, M., 2001. From real to virtual (and back again): Civil society, public sphere, and the Internet in Indonesia, Paper presented at Internet political economy forum conference Singapore.
-
(2001)
-
-
Lim, M.1
-
46
-
-
0034997910
-
Intrinsic motivation in a new light
-
S. Lindenberg Intrinsic motivation in a new light Kyklos 54 2/3 2001 317-342
-
(2001)
Kyklos
, vol.54
, Issue.2-3
, pp. 317-342
-
-
Lindenberg, S.1
-
47
-
-
28244482476
-
Russian Mafia Net Threat
-
July 16
-
Lorek, L., 2001. Russian Mafia Net Threat, Interactive Week, July 16, p. 11.
-
(2001)
Interactive Week
, pp. 11
-
-
Lorek, L.1
-
48
-
-
28244465583
-
'Red Mafia' operating in the U.S. - Helping terrorists
-
October 1, 2001
-
Lunev, S., 2001. 'Red Mafia' operating in the U.S. - helping terrorists, October 1, 2001, http://www.newsmax.com/archives/articles/2001/9/28/ 90942.shtml.
-
(2001)
-
-
Lunev, S.1
-
49
-
-
28244440755
-
Crime and punishment in Texas: Update
-
National Center for Policy Analysis
-
National Center for Policy Analysis 2002. Crime and punishment in Texas: update, http://www.ncpa.org/pub/st/st202/st202c.html.
-
(2002)
-
-
-
50
-
-
28244469460
-
-
National Institute of Justice August 2001
-
National Institute of Justice, 2001. 2000 Annual Report to Congress, August 2001, http://www.ncjrs.org/txtfiles1/nij/189105.txt.
-
(2001)
2000 Annual Report to Congress
-
-
-
52
-
-
0001633460
-
China's confident nationalism
-
M. Oksenberg China's confident nationalism Foreign Affairs 65 3 1987 501-523
-
(1987)
Foreign Affairs
, vol.65
, Issue.3
, pp. 501-523
-
-
Oksenberg, M.1
-
55
-
-
28244455715
-
Mob's extortion attempt on Internet bookies
-
Onlinecasinonews.com February 3
-
Onlinecasinonews.com, 2004. Mob's extortion attempt on Internet bookies, February 3, http://www.onlinecasinonews.com/ocnv2_1/article/ article.asp?id=4748.
-
(2004)
-
-
-
56
-
-
0035729294
-
E-commerce readiness: Institutional environment and international competitiveness
-
J.E. Oxley B. Yeung E-commerce readiness: Institutional environment and international competitiveness Journal of International Business Studies 32 4 2001 705-723
-
(2001)
Journal of International Business Studies
, vol.32
, Issue.4
, pp. 705-723
-
-
Oxley, J.E.1
Yeung, B.2
-
57
-
-
14844353009
-
Economic activity and institutions: Taking stock
-
S. Parto Economic activity and institutions: Taking stock Journal of Economic Issues 39 1 2005 21-52
-
(2005)
Journal of Economic Issues
, vol.39
, Issue.1
, pp. 21-52
-
-
Parto, S.1
-
58
-
-
28244480646
-
Lashkar web site hacked
-
July 10
-
Peer, B., 2001. Lashkar web site hacked, July 10, http://www.rediff.com/news/2001/jul/10hack1.htm.
-
(2001)
-
-
Peer, B.1
-
59
-
-
0037660521
-
The paradoxes of American nationalism
-
M. Pei The paradoxes of American nationalism Foreign Policy 136 2003 30-37
-
(2003)
Foreign Policy
, vol.136
, pp. 30-37
-
-
Pei, M.1
-
60
-
-
0035289645
-
Strategy and the Internet
-
M.E. Porter Strategy and the Internet Harvard Business Review 79 3 2001 63-78
-
(2001)
Harvard Business Review
, vol.79
, Issue.3
, pp. 63-78
-
-
Porter, M.E.1
-
62
-
-
28244496013
-
Selling strategies - Scammed! Web merchants use new tools to keep buyers from ripping them off
-
(Jan 27)
-
R. Richmond Selling strategies - scammed! Web merchants use new tools to keep buyers from ripping them off Wall Street Journal 2003 R.6 (Jan 27)
-
(2003)
Wall Street Journal
-
-
Richmond, R.1
-
65
-
-
28244444218
-
Romania emerges as nexus of cybercrime
-
Romania Gateway. October 24
-
Romania Gateway. 2003. Romania emerges as nexus of cybercrime, October 24, http://ro-gateway.ro/node/185929/comnews/item?item_id=223937.
-
(2003)
-
-
-
66
-
-
84937289974
-
Security in a turbulent world
-
J.N. Rosenau Security in a turbulent world Current History 94 592 1995 193-200
-
(1995)
Current History
, vol.94
, Issue.592
, pp. 193-200
-
-
Rosenau, J.N.1
-
67
-
-
85043751872
-
Self-determination theory and the facilitation of intrinsic motivation, social development, and well being
-
R.M. Ryan E.L. Deci Self-determination theory and the facilitation of intrinsic motivation, social development, and well being American Psychologist 55 2000 68-78
-
(2000)
American Psychologist
, vol.55
, pp. 68-78
-
-
Ryan, R.M.1
Deci, E.L.2
-
68
-
-
0004941659
-
Nations competing against themselves: An interpretation of European integration
-
Breton Galeotti Salmon Wintrobe (Eds.) Cambridge University Press Cambridge
-
P. Salmon Nations competing against themselves: An interpretation of European integration In: Breton Galeotti Salmon Wintrobe (Eds.) Nationalism and Rationality 1995 Cambridge University Press Cambridge
-
(1995)
Nationalism and Rationality
-
-
Salmon, P.1
-
69
-
-
28244481740
-
Peking man and the politics of paleoanthropological nationalism in China
-
B. Sautman Peking man and the politics of paleoanthropological nationalism in China The Journal of Asian Studies 60 1 2001 95-124
-
(2001)
The Journal of Asian Studies
, vol.60
, Issue.1
, pp. 95-124
-
-
Sautman, B.1
-
73
-
-
85047683883
-
Expectancy determinants of intrinsically motivated behavior
-
Z. Shapira Expectancy determinants of intrinsically motivated behavior Journal of Personality and Social Psychology 34 1976 1235-1244
-
(1976)
Journal of Personality and Social Psychology
, vol.34
, pp. 1235-1244
-
-
Shapira, Z.1
-
75
-
-
84929065097
-
Technology and the world tomorrow
-
E.B. Skolnikoff Technology and the world tomorrow Current History 88 534 1989 5-13
-
(1989)
Current History
, vol.88
, Issue.534
, pp. 5-13
-
-
Skolnikoff, E.B.1
-
76
-
-
0036744294
-
Post-Mao China: An alternative to 'The end of history'? Communist and Post-communist studies
-
D. Shlapentokh Post-Mao China: An alternative to 'The end of history'? Communist and Post-communist studies Kidlington 35 3 2002 237
-
(2002)
Kidlington
, vol.35
, Issue.3
, pp. 237
-
-
Shlapentokh, D.1
-
77
-
-
28244486663
-
Taking a swipe at cyber card fraud
-
CNN.com, February fs6, 2003
-
Shubert, A., 2003. Taking a swipe at cyber card fraud, CNN.com, February fs6, 2003, http://www.cnn.com/2003/WORLD/asiapcf/southeast/02/06/ indonesia.fraud/.
-
(2003)
-
-
Shubert, A.1
-
78
-
-
28244479213
-
The first world hacker war
-
(May 13)
-
C.S. Smith The first world hacker war New York Times 2001 4.2 (May 13)
-
(2001)
New York Times
-
-
Smith, C.S.1
-
79
-
-
28244499026
-
Police crack suspected online extortion ring
-
sophos.com Sophos reports, 23 July
-
sophos.com, 2004. Police crack suspected online extortion ring, Sophos reports, 23 July. http://www.sophos.com/virusinfo/articles/ extortion.html.
-
(2004)
-
-
-
80
-
-
28244439541
-
Crooks, slither into Net's shady nooks and crannies crime explodes as legions of strong-arm thugs, sneaky thieves log on USA Today
-
October 21, www.usatoday.com/printedition/money/20041021/ cybercrimecover.art.htm
-
Swartz, J., Crooks slither into Net's shady nooks and crannies crime explodes as legions of strong-arm thugs, sneaky thieves log on USA Today, October 21, www.usatoday.com/printedition/money/20041021/ cybercrimecover.art.htm.
-
-
-
Swartz, J.1
-
81
-
-
28244461404
-
Foreign fraud hits U.S. e-commerce firms hard
-
MSNBC, April 1
-
Sullivan, B., 2004. Foreign fraud hits U.S. e-commerce firms hard, MSNBC, April 1, http://www.msnbc.msn.com/id/4648378/.
-
(2004)
-
-
Sullivan, B.1
-
83
-
-
28244456373
-
The no-payment plan: Thousands of young Indonesians commit cyberfraud for fun and profit
-
September 23, 2002
-
Tedjasukmana, J., 2002. The no-payment plan: Thousands of young Indonesians commit cyberfraud for fun and profit, September 23, 2002, http://www.time.com/time/globalbusiness/article/ 0,9171,1101020923-351237,00.html.
-
(2002)
-
-
Tedjasukmana, J.1
-
84
-
-
28244440364
-
Special report: Fighting the worms of mass destruction - Internet security
-
The Economist November 29
-
The Economist, 2003. Special report: Fighting the worms of mass destruction - Internet security; November 29, 101
-
(2003)
, pp. 101
-
-
-
85
-
-
28244479692
-
The US/China cyberwar of April/May 2001
-
The Happy Hacker accessed 14 November 2001
-
The Happy Hacker, 2001. The US/China cyberwar of April/May 2001, http://www.happyhacker.org/news/china.shtml, accessed 14 November 2001.
-
(2001)
-
-
-
87
-
-
28244474769
-
FBI chief: Lack of incident reporting slows cybercrime fight October 31 Computerworld
-
Verton, D., 2002. FBI chief: Lack of incident reporting slows cybercrime fight October 31 Computerworld, http://computerworld.com/securitytopics/ security/cybercrime/story/0,10801,75532,00.html.
-
(2002)
-
-
Verton, D.1
-
88
-
-
28244494015
-
Russian mafia extorts gambling websites
-
June
-
Walker, C., 2004. Russian mafia extorts gambling websites June, http://www.americanmafia.com/cgi/ clickcount.pl?url=www.americanmafia.com/Feature_Articles_270.html.
-
(2004)
-
-
Walker, C.1
-
89
-
-
0037273349
-
Who participates and why?: An analysis of citizens on the Internet and the mass public
-
L.M. Weber A. Loumakis J. Bergman Who participates and why?: An analysis of citizens on the Internet and the mass public Social Science Computer Review 21 1 2003 26-42
-
(2003)
Social Science Computer Review
, vol.21
, Issue.1
, pp. 26-42
-
-
Weber, L.M.1
Loumakis, A.2
Bergman, J.3
-
90
-
-
28244491363
-
Organized crime and cybercrime: Synergies, trends, and responses
-
13 August, Office of International Information Programs, U.S. Department of State
-
Williams, P., 2001. Organized crime and cybercrime: Synergies, trends, and responses, 13 August, Office of International Information Programs, U.S. Department of State, http://usinfo.state.gov.
-
(2001)
-
-
Williams, P.1
-
92
-
-
0002305159
-
Where do institutional patterns come from? Organizations as actors in social systems
-
L.G. Zucker (Ed.) Ballinger Cambridge, MA
-
L.G. Zucker Where do institutional patterns come from? Organizations as actors in social systems In: L.G. Zucker (Ed.) Institutional Patterns and Organizations: Culture and Environment 1988 Ballinger Cambridge, MA 23-49
-
(1988)
Institutional Patterns and Organizations: Culture and Environment
, pp. 23-49
-
-
Zucker, L.G.1
|