-
2
-
-
33748435812
-
Computer Crime and Security Survey
-
Computer Security Institute and Federal Bureau of Investigation, online
-
Computer Security Institute and Federal Bureau of Investigation. (2006) "Computer Crime and Security Survey", [online], http://www.cybercrime.gov/FBI2006.pdf
-
(2006)
-
-
-
3
-
-
34247732721
-
Grounded Theory Research: Procedures, Canons, and Evaluative Criteria
-
Corbin, J., and Strauss, A. (1990) "Grounded Theory Research: Procedures, Canons, and Evaluative Criteria", Qualitative Sociology Vol. 13, pp. 3-21.
-
(1990)
Qualitative Sociology
, vol.13
, pp. 3-21
-
-
Corbin, J.1
Strauss, A.2
-
4
-
-
0242440508
-
Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
-
J. Arquilla and D. Ronfeldt, editors, Santa Monica, CA, Rand
-
Denning, D.E. (2001) "Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy." In J. Arquilla and D. Ronfeldt, editors, Networks and Netwars: The Future of Terror, Crime, and Militancy, Santa Monica, CA, Rand, pp. 239-288.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
, pp. 239-288
-
-
Denning, D.E.1
-
5
-
-
12844264751
-
Cybercrime: Vandalizing the Information Society
-
Addision-Wesley, Boston
-
Furnell, S. (2002) Cybercrime: Vandalizing the Information Society, Addision-Wesley, Boston.
-
(2002)
-
-
Furnell, S.1
-
6
-
-
11344279136
-
Elites, Lamers, Narcs and Whores: Exploring the Computer Underground
-
L. Cherny and E.R. Weise, editors, WA, Seal Press
-
Gilboa, N. (1996) "Elites, Lamers, Narcs and Whores: Exploring the Computer Underground." In L. Cherny and E.R. Weise, editors, Wired women: Gender and new realities in cyberspace Seattle, WA, Seal Press, pp. 98-113.
-
(1996)
Wired women: Gender and new realities in cyberspace Seattle
, pp. 98-113
-
-
Gilboa, N.1
-
7
-
-
33745758036
-
Virus Writers: The End of the Innocence?
-
online
-
Gordon, S. (2000) "Virus Writers: The End of the Innocence?", [online], http://www.research.ibm.com/antivirus/SciPapers/VB2000SG.pdf
-
(2000)
-
-
Gordon, S.1
-
8
-
-
33745747048
-
Convergence of Virus Writers and Hackers: Fact or Fantasy?
-
Cupertine, CA: Symantec
-
Gordon S, and Qingxiong, M. (2003) Convergence of Virus Writers and Hackers: Fact or Fantasy? Cupertine, CA: Symantec.
-
(2003)
-
-
Gordon, S.1
Qingxiong, M.2
-
9
-
-
55149118856
-
Examining a Transnational Problem: An Analysis of Computer Crime Victimization in Eight Countries From 1999 to 2001
-
171-198, "Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures", Deviant Behavior
-
Holt, T.J. (2003) "Examining a Transnational Problem: An Analysis of Computer Crime Victimization in Eight Countries From 1999 to 2001", International Journal of Comparative and Applied Criminal Justice Vol. 27, No 2, pp. 199-220 (2007) "Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures", Deviant Behavior Vol. 28, No. 2, pp. 171-198.
-
(2003)
International Journal of Comparative and Applied Criminal Justice
, vol.27
, Issue.2
, pp. 199-220
-
-
Holt, T.J.1
-
10
-
-
84925797895
-
Crime, deviance and the disembodied self: transcending the dangers of corporeality
-
Y. Jewkes, editor, Portland, OR, Willan Publishing
-
Jewkes, Y. and Sharp, K. (2003) "Crime, deviance and the disembodied self: transcending the dangers of corporeality." In Y. Jewkes, editor, Dot.cons: Crime, deviance and identity on the Internet, Portland, OR, Willan Publishing, pp. 1-14.
-
(2003)
Dot.cons: Crime, deviance and identity on the Internet
, pp. 1-14
-
-
Jewkes, Y.1
Sharp, K.2
-
12
-
-
84896524020
-
The Classification of Computer Viruses
-
online
-
Kapersky, E.V. 2003. The Classification of Computer Viruses. [online], http://www.avp.ch/avpve/classes/classes.stm
-
(2003)
-
-
Kapersky, E.V.1
-
13
-
-
0005238259
-
Security of the Internet
-
Dekker, M., editor, online
-
Longstaff, T.A., Ellis, J.T., Hernan, S.V., Lipson, H.F., McMillian, R.D., Hutz Pesante, L., et al. 1997. "Security of the Internet." In Dekker, M., editor, The Froehlich/Kent Encyclopedia of Telecommunications (Vol. 15), pp. 231-255. [online], http://www.cert.org/encyc_article/tocencyc.html.
-
(1997)
The Froehlich/Kent Encyclopedia of Telecommunications
, vol.15
, pp. 231-255
-
-
Longstaff, T.A.1
Ellis, J.T.2
Hernan, S.V.3
Lipson, H.F.4
McMillian, R.D.5
Hutz Pesante, L.6
-
14
-
-
0003461534
-
Interpreting Qualitative Data: Methods for Analyzing Talk, Text, and Interaction
-
2nd Edition, SAGE Publications, Thousand Oaks
-
Silverman, D. (2001) Interpreting Qualitative Data: Methods for Analyzing Talk, Text, and Interaction, 2nd Edition, SAGE Publications, Thousand Oaks.
-
(2001)
-
-
Silverman, D.1
-
15
-
-
30644459162
-
Symantec Internet Security Threat Report
-
Symantec Corporation, online
-
Symantec Corporation. (2003) Symantec Internet Security Threat Report, [online], http://enterprisesecurity.symantec.com/content/knowledgelibrary.cfm?EID=0
-
(2003)
-
-
-
16
-
-
0003538357
-
Hackers: Crime in the Digital Sublime
-
New York: Routledge
-
Taylor, P.A. (1999) Hackers: Crime in the Digital Sublime. New York: Routledge.
-
(1999)
-
-
Taylor, P.A.1
-
17
-
-
33846043733
-
Digital Crime and Digital Terrorism
-
Prentice Hall, Upper Saddle River
-
Taylor, R.W., Caeti, T.J., Loper, D.K., Fritsch, E.J., and Liederbach, J. (2006) Digital Crime and Digital Terrorism, Prentice Hall, Upper Saddle River.
-
(2006)
-
-
Taylor, R.W.1
Caeti, T.J.2
Loper, D.K.3
Fritsch, E.J.4
Liederbach, J.5
-
18
-
-
0345257994
-
Hacker Culture
-
University of Minnesota Press, Minneapolis
-
Thomas, D. (2002) Hacker Culture, University of Minnesota Press, Minneapolis.
-
(2002)
-
-
Thomas, D.1
-
19
-
-
70350423437
-
The underground economy: Priceless
-
Thomas, R. and Martin, J. (2006) "The underground economy: Priceless",; login: The Usenix Magazine Vol. 31, No. 6, pp.7-17.
-
(2006)
Login: The Usenix Magazine
, vol.31
, Issue.6
, pp. 7-17
-
-
Thomas, R.1
Martin, J.2
|