-
1
-
-
32544449814
-
Controlling cyberspace: Applying the Computer Fraud and Abuse Act to the Internet
-
Adams, J. M. (1996). Controlling cyberspace: Applying the Computer Fraud and Abuse Act to the Internet. Computer and High Technology Law Journal, 12, 403-434.
-
(1996)
Computer and High Technology Law Journal
, vol.12
, pp. 403-434
-
-
Adams, J.M.1
-
2
-
-
84925838576
-
Why information security is hard: An economic perspective
-
Anderson, R. (2001, December). Why information security is hard: An economic perspective. Paper presented at the 17th Annual Computer Security Applications, New Orleans, LA.
-
17th Annual Computer Security Applications
-
-
Anderson, R.1
-
3
-
-
84950069637
-
Trespassers will be prosecuted: Computer crime in the 1990s
-
Baker, G. D. (1993). Trespassers will be prosecuted: Computer crime in the 1990s. Computer/Law Journal, 12, 61-100.
-
(1993)
Computer/Law Journal
, vol.12
, pp. 61-100
-
-
Baker, G.D.1
-
4
-
-
33846035528
-
-
Barrett, N. (2003). Students delete history. Retrieved November 5, 2005, from http://www.vnunet.com/itweek/comment/2086036/students-delete-history
-
(2003)
Students Delete History
-
-
Barrett, N.1
-
5
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11, 431-448.
-
(2003)
Journal of Computer Security
, vol.11
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
6
-
-
0003845462
-
-
Central Intelligence Agency. (2005). The world factbook. Retrieved July 26, 2005, from http://www.cia.gov/cia/publications/factbook/rankorder/2153rank. html
-
(2005)
The World Factbook
-
-
Intelligence Agency, C.1
-
7
-
-
33846118089
-
The legislative response to the evolution of computer viruses
-
Colombell, M. R. (2002). The legislative response to the evolution of computer viruses. Richmond Journal of Law and Technology, 8. Retrieved October 28, 2005, from http://law.richmond.edu/jolt/v8i3/article18.html
-
(2002)
Richmond Journal of Law and Technology
, vol.8
-
-
Colombell, M.R.1
-
8
-
-
33846048614
-
-
Computer Crime and Intellectual Property Section. (2005). Computer crime. Retrieved June 28, 2005, from http://www.usdoj.gov/criminal/cybercrime/ compcrime.html
-
(2005)
Computer Crime
-
-
Crime, C.1
Property Section, I.2
-
9
-
-
33846080793
-
It's virus season again, has your computer been vaccinated? A survey of computer crime legislation as a response to malevolent software
-
Davis, B. S. (1994). It's virus season again, has your computer been vaccinated? A survey of computer crime legislation as a response to malevolent software. Washington University Law Quarterly, 72, 411-440.
-
(1994)
Washington University Law Quarterly
, vol.72
, pp. 411-440
-
-
Davis, B.S.1
-
10
-
-
33645772419
-
-
Washington, DC: U.S. Census Bureau.
-
Day, J. C., Janus, A., & Davis, J. (2005). Computer and Internet use in the United States: 2003. Current population reports. Washington, DC: U.S. Census Bureau.
-
(2005)
Computer and Internet Use in the United States: 2003. Current Population Reports
-
-
Day, J.C.1
Janus, A.2
Davis, J.3
-
11
-
-
33846077756
-
Cyberterrorism: The logic bomb versus the truck bomb
-
Denning, D. E. (2000, Autumn). Cyberterrorism: The logic bomb versus the truck bomb. Global Dialogue, pp. 29-37.
-
(2000)
Global Dialogue
, pp. 29-37
-
-
Denning, D.E.1
-
13
-
-
33846088014
-
Tales of Trojan horses: Why you should beware of those bearing gifts
-
Dickey, K. (2003). Tales of Trojan horses: Why you should beware of those bearing gifts. Avoid & Defeat Viruses, 9, 12-16. Retrieved October 2, 2005, from http://www.smartcomputing.com/editorial/article.asp?article=articles/ archive/l0902/03l02/03l02.asp
-
(2003)
Avoid & Defeat Viruses
, vol.9
, pp. 12-16
-
-
Dickey, K.1
-
16
-
-
33846078948
-
Viruses and criminal law
-
P. J. Denning (Ed.), New York: Addison-Wesley.
-
Gemignani, M. (1990). Viruses and criminal law. In P. J. Denning (Ed.), Computers under attack: Intruders, worms, and viruses (pp. 489-494). New York: Addison-Wesley.
-
(1990)
Computers under Attack: Intruders, Worms, and Viruses
, pp. 489-494
-
-
Gemignani, M.1
-
17
-
-
3242808612
-
-
San Francisco: Computer Security Institute.
-
Gordon, L. W., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2005). 2005 CSI/FBI computer crime and security survey. San Francisco: Computer Security Institute.
-
(2005)
2005 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.W.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
18
-
-
33846044896
-
Hoaxes & hypes
-
Gordon, S., Ford, R., & Wells, J. (1997, October). Hoaxes & hypes. Paper presented at the 7th Virus Bulletin International Conference, San Francisco.
-
7th Virus Bulletin International Conference
-
-
Gordon, S.1
Ford, R.2
Wells, J.3
-
19
-
-
33846117288
-
The Computer Virus Eradication Act of 1989: The war against computer crime continues
-
Hansen, R. L. (1990). The Computer Virus Eradication Act of 1989: The war against computer crime continues. Software Law Journal, 3, 717-753.
-
(1990)
Software Law Journal
, vol.3
, pp. 717-753
-
-
Hansen, R.L.1
-
21
-
-
0023846187
-
The process of criminalization: The case of computer crime laws
-
Hollinger, R. C., & Lanza-Kaduce, L. (1988). The process of criminalization: The case of computer crime laws. Criminology, 26, 101-126.
-
(1988)
Criminology
, vol.26
, pp. 101-126
-
-
Hollinger, R.C.1
Lanza-Kaduce, L.2
-
23
-
-
33846098932
-
-
Kaspersky Lab. (2005). History of malicious programs. Retrieved November 1, 2005, from http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311030
-
(2005)
History of Malicious Programs
-
-
Lab, K.1
-
25
-
-
7644227432
-
Sophistication in distributed denial-of-service attacks on the Internet
-
Kumar, V. A. (2004). Sophistication in distributed denial-of-service attacks on the Internet. Current Science, 87, 885-888.
-
(2004)
Current Science
, vol.87
, pp. 885-888
-
-
Kumar, V.A.1
-
26
-
-
33846095176
-
-
CNet%20News.com
-
Lemos, R. (2001). Attack knocks out Microsoft Web sites. CNet%20News.com. Retrieved July 27, 2005, from http://news.com.com/ Attack+knocks+out+Microsoft+Web+sites/2100-1001_3-251573.html
-
(2001)
Attack Knocks Out Microsoft Web Sites
-
-
Lemos, R.1
-
28
-
-
33846068978
-
Computer viruses and the law
-
Marion, C. C. (1989). Computer viruses and the law. Dikinson Law Review, 93, 625-642.
-
(1989)
Dikinson Law Review
, vol.93
, pp. 625-642
-
-
Marion, C.C.1
-
29
-
-
33846047165
-
-
May, M. (2004). Federal computer crime laws. The SANS Institute. Retrieved October 7, 2005, from http://www.sans.org/rr/whitepapers/legal/1446. php
-
(2004)
Federal Computer Crime Laws
-
-
May, M.1
-
30
-
-
33846066957
-
Computer crime statutes: Are they bridging the gap between law and technology?
-
McCall, C. (1988). Computer crime statutes: Are they bridging the gap between law and technology? Criminal Justice Journal, 11, 203-233.
-
(1988)
Criminal Justice Journal
, vol.11
, pp. 203-233
-
-
McCall, C.1
-
31
-
-
33846111077
-
Super worms could pose new security threats
-
McCollum, T. (2003). Super worms could pose new security threats. IT Audit, 6. Retrieved November 28, 2005, from http://www.theiia.org/itaudit/index. cfm?fuseaction=forum&fid=5435
-
(2003)
IT Audit
, vol.6
-
-
McCollum, T.1
-
32
-
-
77953834371
-
-
Microsoft TechNet. (2004). The antivirus defense-in-depth guide. Retrieved October 2, 2005, from http://www.microsoft.com/technet/security/ topics/serversecurity/avdind_2.mspx
-
(2004)
The Antivirus Defense-in-depth Guide
-
-
Technet, M.1
-
33
-
-
24344470398
-
Viruses and the law: Why the law is ineffective
-
Montana, J. C. (2000). Viruses and the law: Why the law is ineffective. Information Management Journal, 34, 57-60.
-
(2000)
Information Management Journal
, vol.34
, pp. 57-60
-
-
Montana, J.C.1
-
34
-
-
33846041842
-
The worm case: From indictment to verdict
-
P. J. Denning (Ed.), New York: Addison-Wesley.
-
Montz, L. B. (1990). The worm case: From indictment to verdict. In P. J. Denning (Ed.), Computers under attack: Intruders, worms, and viruses (pp. 260-263). New York: Addison-Wesley.
-
(1990)
Computers under Attack: Intruders, Worms, and Viruses
, pp. 260-263
-
-
Montz, L.B.1
-
38
-
-
33751187983
-
-
Testimony before the House Committee on Government Reform, Subcommittee on Technology, Information Policy, Intergovernmental Relation and the Census. Retrieved September 16, 2003, from
-
Pethia, R. D. (2003). Viruses and worms: What can we do about them? Testimony before the House Committee on Government Reform, Subcommittee on Technology, Information Policy, Intergovernmental Relation and the Census. Retrieved September 16, 2003, from http://www.cert.org/congressional_testimony/ Pethia-Testimony-9-10-2003/
-
(2003)
Viruses and Worms: What Can We Do about Them?
-
-
Pethia, R.D.1
-
42
-
-
70449634813
-
The zombie hunters: On the trail of cyberextortionist
-
Ratliff, E. (2005, October 10). The zombie hunters: On the trail of cyberextortionist. The New Yorker, pp. 44-49.
-
(2005)
The New Yorker
, pp. 44-49
-
-
Ratliff, E.1
-
44
-
-
33846055775
-
Countering cyber war
-
Shimeall, T., Williams, P., & Dunlevy, C. (2001-2002). Countering cyber war. NATO Review, 49, 16-18. Retrieved July 16, 2005, from http://www.cert.org/archive/pdf/counter_cyberwar.pdf
-
(2001)
NATO Review
, vol.49
, pp. 16-18
-
-
Shimeall, T.1
Williams, P.2
Dunlevy, C.3
-
45
-
-
0032148572
-
An electronic Pearl Harbor? Not likely
-
Smith, G. (1998). An electronic Pearl Harbor? Not likely. Issues in Science and Technology, 15, 68-73.
-
(1998)
Issues in Science and Technology
, vol.15
, pp. 68-73
-
-
Smith, G.1
-
46
-
-
84929715938
-
-
Cambridge, UK: Cambridge University Press.
-
Smith, R. G., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Cambridge, UK: Cambridge University Press.
-
(2004)
Cyber Criminals on Trial
-
-
Smith, R.G.1
Grabosky, P.2
Urbas, G.3
-
47
-
-
9744256585
-
Computer crime - The need for deterrent legislation
-
Sokolik, S. L. (1980). Computer crime - The need for deterrent legislation. Computer/Law Journal, 2, 353-383.
-
(1980)
Computer/Law Journal
, vol.2
, pp. 353-383
-
-
Sokolik, S.L.1
-
49
-
-
1242295776
-
State and local law enforcement needs to combat electronic crime
-
Washington, DC: U.S. Department of Justice, National Institute of Justice, Office of Justice Programs.
-
Stambaugh, H., Beaupre, D., Icove, D. J., Baker, R., Cassaday, W., & Williams, W. P. (2000). State and local law enforcement needs to combat electronic crime. In Research in brief (pp. 1-6). Washington, DC: U.S. Department of Justice, National Institute of Justice, Office of Justice Programs.
-
(2000)
Research in Brief
, pp. 1-6
-
-
Stambaugh, H.1
Beaupre, D.2
Icove, D.J.3
Baker, R.4
Cassaday, W.5
Williams, W.P.6
-
50
-
-
84883894090
-
-
Staniford, S., Grim, G., & Jonkman, R. (2001). Flash worms: Thirty seconds to infect the Internet. Silicon defense. Retrieved July 18, 2005, from http://richie.idc.ul.ie/eoin/SILICON%2520DEFENSE%2520- %2520Flash%2520Worm%2520Analysis.htm
-
(2001)
Flash Worms: Thirty Seconds to Infect the Internet. Silicon Defense
-
-
Staniford, S.1
Grim, G.2
Jonkman, R.3
-
53
-
-
33846073247
-
-
Symantec. (2005a). Security risks. Retrieved October 5, 2005, from http://securityresponse.symantec.com/avcenter/security_risks/
-
(2005)
Security Risks
-
-
-
55
-
-
33846117745
-
A survey of computer crime studies
-
Taber, J. K. (1980). A survey of computer crime studies. Computer/Law Journal, 2, 275-327.
-
(1980)
Computer/Law Journal
, vol.2
, pp. 275-327
-
-
Taber, J.K.1
-
56
-
-
33846043733
-
-
Upper Saddle River, NJ: Prentice Hall.
-
Taylor, R. W., Caeti, T. J., Fritsch, E. J., & Liederbach, J. (2005). Digital crime and digital terrorism. Upper Saddle River, NJ: Prentice Hall.
-
(2005)
Digital Crime and Digital Terrorism
-
-
Taylor, R.W.1
Caeti, T.J.2
Fritsch, E.J.3
Liederbach, J.4
-
57
-
-
84882022925
-
-
Timeline. (2005). CBSNews. Retrieved November 28, 2005, from http://www.cbsnews.com/htdocs/cyber_crime/timeline.html
-
(2005)
Timeline
-
-
-
61
-
-
4344568547
-
-
Washington, DC: U.S. Department of Justice, Federal Bureau of Investigation, Criminal Justice Information Services Division, Uniform Crime Reporting Program.
-
U.S. Department of Justice. (2000). National incident-based reporting system volume 1: Data collection guidelines. Washington, DC: U.S. Department of Justice, Federal Bureau of Investigation, Criminal Justice Information Services Division, Uniform Crime Reporting Program.
-
(2000)
National Incident-based Reporting System Volume 1: Data Collection Guidelines
-
-
Department Of Justice, U.S.1
-
63
-
-
33846101809
-
-
Vmyths.com, Rhode Island Soft Systems, Inc. Retrieved November 3, 2005, from
-
Vmyths.com. (2003). Truth about computer hysteria. Rhode Island Soft Systems, Inc. Retrieved November 3, 2005, from http://www.vmyths.com/
-
(2003)
Truth about Computer Hysteria
-
-
-
65
-
-
85140528371
-
Cybercrimes and the Internet
-
D. S. Wall (Ed.), London: Routledge.
-
Wall, D. S. (2001). Cybercrimes and the Internet. In D. S. Wall (Ed.), Crime and the Internet (pp. 1-17). London: Routledge.
-
(2001)
Crime and the Internet
, pp. 1-17
-
-
Wall, D.S.1
-
66
-
-
27844511478
-
Insecurity and the policing of cyberspace
-
A. Crawford (Ed.), Portland, OR: Willan.
-
Wall, D. S. (2002). Insecurity and the policing of cyberspace. In A. Crawford (Ed.), Crime and insecurity: The governance of safety in Europe (pp. 186-209). Portland, OR: Willan.
-
(2002)
Crime and Insecurity: The Governance of Safety in Europe
, pp. 186-209
-
-
Wall, D.S.1
-
67
-
-
24144447168
-
-
Aldershot, UK: Dartmouth.
-
Wall, D. S. (2003). Cyberspace crime. Aldershot, UK: Dartmouth.
-
(2003)
Cyberspace Crime
-
-
Wall, D.S.1
-
71
-
-
33846042319
-
Combating unauthorized Internet access
-
Young, L. F. (1995). Combating unauthorized Internet access. Jurimetrics Journal, 35, 257-261.
-
(1995)
Jurimetrics Journal
, vol.35
, pp. 257-261
-
-
Young, L.F.1
|