-
2
-
-
84881815071
-
'The ASRS celebrates its 30th anniversary'
-
ASRS. 19 February, 2010
-
ASRS (2006), 'The ASRS celebrates its 30th anniversary', Callback From NASA's Aviation Safety Reporting System, retrieved 19 February, 2010, from http://asrs.arc.nasa.gov/publications/callback/cb_317.htm
-
(2006)
Callback From NASA's Aviation Safety Reporting System
-
-
-
3
-
-
84881775356
-
-
ASRS, ASRS Program Briefing, retrieved 19 February, 2010
-
ASRS (2008), ASRS Program Briefing, retrieved 19 February, 2010, from http://asrs.arc.nasa.gov/overview/summary.html
-
(2008)
-
-
-
6
-
-
84881736601
-
-
Oxford: Oxford University Press
-
Ayto, J. (2007), A Century of NewWords, Oxford: Oxford University Press.
-
(2007)
A Century of NewWords
-
-
Ayto, J.1
-
8
-
-
84881828283
-
'China denies Pentagon cyber-raid'
-
BBC, 4 September, retrieved 26 September 2007
-
BBC (2007a, 4 September), 'China denies Pentagon cyber-raid', BBC News Online, retrieved 26 September 2007, from http://news.bbc.co.uk/2/hi/americas/6977533.stm
-
(2007)
BBC News Online
-
-
-
9
-
-
84881813615
-
'Estonia hit by Moscow cyber war'
-
BBC, 17 May, retrieved 31 October 2008
-
BBC (2007b, 17 May), 'Estonia hit by "Moscow cyber war"', BBC News Online, retrieved 31 October 2008, from http://news.bbc.co.uk/2/hi/europe/6665145.stm
-
(2007)
BBC News Online
-
-
-
10
-
-
85039853648
-
'Estonia fines man for "cyber war"'
-
BBC, 25 January, retrieved 25 March 2010
-
BBC (2008, 25 January), 'Estonia fines man for "cyber war"', BBC News Online, retrieved 25 March 2010, from http://news.bbc.co.uk/2/hi/technology/7208511.stm
-
(2008)
BBC News Online
-
-
-
11
-
-
85039853529
-
'Taiwan city to screen Kadeer film'
-
BBC, 20 September, retrieved 18 September 2010
-
BBC (2009, 20 September), 'Taiwan city to screen Kadeer film', BBC News Online, retrieved 18 September 2010, from http://news.bbc.co.uk/2/hi/8265259.stm
-
(2009)
BBC News Online
-
-
-
12
-
-
84881814772
-
'Microsoft admits Explorer used in Google China hack'
-
BBC, 15 January, retrieved 18 January 2010
-
BBC (2010, 15 January), 'Microsoft admits Explorer used in Google China hack', BBC News Online, retrieved 18 January 2010, from http:// news.bbc.co.uk/2/hi/technology/8460819.stm
-
(2010)
BBC News Online
-
-
-
14
-
-
21444445390
-
'The politics of police co-operation in the European Union'
-
Benyon, J. (1996), 'The politics of police co-operation in the European Union', Journal of the Sociology of Law, 24, 353-379.
-
(1996)
Journal of the Sociology of Law
, vol.24
, pp. 353-379
-
-
Benyon, J.1
-
16
-
-
84891988264
-
'Attack of the killer bots'
-
6 July, retrieved 21 March 2010
-
Bort, J. (2007, 6 July), 'Attack of the killer bots', NetworkWorld, retrieved 21 March 2010, from http://www.networkworld.com/research/2007/070607-botnets.html
-
(2007)
NetworkWorld
-
-
Bort, J.1
-
19
-
-
33846298538
-
'Responsive regulation and taxation: Introduction'
-
Braithwaite, V. (2007), 'Responsive regulation and taxation: Introduction', Law and Policy, 29(1), 3-10.
-
(2007)
Law and Policy
, vol.29
, Issue.1
, pp. 3-10
-
-
Braithwaite, V.1
-
20
-
-
84863685701
-
'Distributed security: A new model of law enforcement'
-
Brenner, S. (2004), 'Distributed security: A new model of law enforcement', Journal of International Law, 8(5), 7-25.
-
(2004)
Journal of International Law
, vol.8
, Issue.5
, pp. 7-25
-
-
Brenner, S.1
-
21
-
-
34247122686
-
'Cybercrime jurisdiction'
-
Brenner, S. (2006), 'Cybercrime jurisdiction', Crime, Law and Social Change, 46, 189-206.
-
(2006)
Crime, Law and Social Change
, vol.46
, pp. 189-206
-
-
Brenner, S.1
-
27
-
-
0035532916
-
'Not such neat net: some comments on virtual criminality'
-
Capeller, W. (2001), 'Not such neat net: some comments on virtual criminality', Social and Legal Studies, 10, 229-242.
-
(2001)
Social and Legal Studies
, vol.10
, pp. 229-242
-
-
Capeller, W.1
-
28
-
-
0003845462
-
-
Central Intelligence Agency. retrieved 19 March, 2010
-
Central Intelligence Agency. (2010), The World Factbook, retrieved 19 March, 2010, from https://www.cia.gov/library/publications/the-worldfactbook/ index.html
-
(2010)
The World Factbook
-
-
-
29
-
-
84881814835
-
-
Paper presented at the FOSE 2010: Technology Solutions for the Business of Government, retrieved 20 March 2010
-
Chabinsky, S. R. (2010), The cyber threat: Who's doing what to whom?, Paper presented at the FOSE 2010: Technology Solutions for the Business of Government, retrieved 20 March 2010, from http://fose.com/ events/fose-2010/sessions/wednesday/chabinsky.aspx
-
(2010)
The cyber threat: Who's doing what to whom?
-
-
Chabinsky, S.R.1
-
30
-
-
21344433201
-
'The changing definition and image of hacker in popular disclosure'
-
Chandler, A. (1996), 'The changing definition and image of hacker in popular disclosure', International Journal of the Sociology of Law, 24, 229-251.
-
(1996)
International Journal of the Sociology of Law
, vol.24
, pp. 229-251
-
-
Chandler, A.1
-
31
-
-
84886408799
-
'Mutual assistance between Taiwan and China: It is still difficult to repatriate criminals'
-
retrieved 3 January, 2010
-
Chang, G. L. (2010), 'Mutual assistance between Taiwan and China: It is still difficult to repatriate criminals', Chinatimes, retrieved 3 January, 2010, from http://news.chinatimes.com/CMoney/News/News-Pagecontent/ 0,4993,11050701+122010010300163,00.html
-
(2010)
Chinatimes
-
-
Chang, G.L.1
-
32
-
-
85039844102
-
'32 companies signed the selfregulation against malicious software'
-
29 December, retrieved 28 February 2010, from
-
Chang, K. F. (2006, 29 December), '32 companies signed the selfregulation against malicious software', CBINews, retrieved 28 February 2010, from http://www.cbinews.com/inc/showcontent.jsp?articleid=48377
-
(2006)
CBINews
-
-
Chang, K.F.1
-
33
-
-
84881758937
-
'Anti-Chen Shiu-bing: Chinese hackers hack into Taiwanese systems'
-
25 August, retrieved 15 March 2010, from
-
Chang, S. Y. and G. M. Zhao (2006, 25 August), 'Anti-Chen Shiu-bing: Chinese hackers hack into Taiwanese systems', Chinatimes, retrieved 15 March 2010, from http://forum.icst.org.tw/phpbb/viewtopic.php?t=10765
-
(2006)
Chinatimes
-
-
Chang, S.Y.1
Zhao, G.M.2
-
34
-
-
85039861221
-
'The support from China and the legislative Yuan is important in combating telecommunication fraud'
-
5 August, retrieved 21 January 2010, from
-
Chang,Y. C. (2009a, 5 August), 'The support from China and the legislative Yuan is important in combating telecommunication fraud', UDN, retrieved 21 January 2010, from http://www.coolloud.org.tw/node/44183
-
(2009)
UDN
-
-
Chang, Y.C.1
-
35
-
-
84881791178
-
'Wiki' crime prevention - What Routine Activity Theory teaches us about cybercrime prevention
-
Chang, Y. C. (2009b), 'Wiki' crime prevention - What Routine Activity Theory teaches us about cybercrime prevention, Journal of Criminology, 12(2), 87-116.
-
(2009)
Journal of Criminology
, vol.12
, Issue.2
, pp. 87-116
-
-
Chang, Y.C.1
-
36
-
-
84881704058
-
'Cyber-conflict between Taiwan and China'
-
Chang,Y. C. (2011), 'Cyber-conflict between Taiwan and China', Strategic Insight, 10(1), 26-35, available at http://www.nps.edu/Academics/Centers/CCC/Research-Publications/StrategicInsights/2011/Apr/SI-v10-i1-_Chang.pdf
-
(2011)
Strategic Insight
, vol.10
, Issue.1
, pp. 26-35
-
-
Chang, Y.C.1
-
37
-
-
84863179147
-
'Combating cybercrime across the Taiwan Strait: Investigation and prosecution issues'
-
Chang, Y. C. (2012a), 'Combating cybercrime across the Taiwan Strait: Investigation and prosecution issues', Australian Journal of Forensic Sciences, 44(1), 5-14.
-
(2012)
Australian Journal of Forensic Sciences
, vol.44
, Issue.1
, pp. 5-14
-
-
Chang, Y.C.1
-
38
-
-
84863652088
-
'Responsive regulation and the reporting of information security incidents'
-
Chang, L. Y. C. (2012b), 'Responsive regulation and the reporting of information security incidents', Issues & Studies, 48(1), 93-127.
-
(2012)
Issues & Studies
, vol.48
, Issue.1
, pp. 93-127
-
-
Chang, L.Y.C.1
-
39
-
-
84881779387
-
'A comparative research on cybercrime laws: The experience of International Organizations and Taiwan'
-
Chang, Y. C. and S. Jou (2007), 'A comparative research on cybercrime laws: The experience of International Organizations and Taiwan', Essays on Criminal Justice Policy and Research, 10, 139-158.
-
(2007)
Essays on Criminal Justice Policy and Research
, vol.10
, pp. 139-158
-
-
Chang, Y.C.1
Jou, S.2
-
40
-
-
84863682261
-
'Study on information security incidents reporting and information sharing mechanism in Taiwan - From the viewpoints of the U.S. experience'
-
Chang, Y. C. and J. Wu (2008), 'Study on information security incidents reporting and information sharing mechanism in Taiwan - From the viewpoints of the U.S. experience', Science and Technology Law Review, 20(8), 39-61.
-
(2008)
Science and Technology Law Review
, vol.20
, Issue.8
, pp. 39-61
-
-
Chang, Y.C.1
Wu, J.2
-
41
-
-
84886392588
-
'Google attacks used addresses based in Taiwan'
-
(16 January), retrieved 15 March 2010, from
-
Chao, Y. (2010, 16 January), 'Google attacks used addresses based in Taiwan', Taipei Times, retrieved 15 March 2010, from http://www. taipeitimes.com/News/front/archives/2010/01/16/2003463643
-
(2010)
Taipei Times
-
-
Chao, Y.1
-
42
-
-
13244298648
-
'Secret society and organized crime in contemporary China'
-
Chen, A. (2005), 'Secret society and organized crime in contemporary China', Modern Asian Studies, 39(1), 77-107.
-
(2005)
Modern Asian Studies
, vol.39
, Issue.1
, pp. 77-107
-
-
Chen, A.1
-
43
-
-
85039863963
-
'War on 322 - Chinese hackers shut down the website of DPP's presidential candidate'
-
22 March, retrieved 22 April 2009, from
-
Chen, L. Q. (2008, 22 March), 'War on 322 - Chinese hackers shut down the website of DPP's presidential candidate', NowNews, retrieved 22 April 2009, from http://www.nownews.com/2008/03/22/11480-2249184.htm
-
(2008)
NowNews
-
-
Chen, L.Q.1
-
44
-
-
84881757528
-
'From the "Kinmen Agreement" to the "Agreement on Cross-Strait Mutual Assistance in Crime Matters"'
-
Chen, R. and J. S. Wang (2009), 'From the "Kinmen Agreement" to the "Agreement on Cross-Strait Mutual Assistance in Crime Matters"', Fu-Jen Law Journal, 99, 51-55.
-
(2009)
Fu-Jen Law Journal
, vol.99
, pp. 51-55
-
-
Chen, R.1
Wang, J.S.2
-
45
-
-
84881697287
-
'Taiwan Tea Party website attacked by DDoS'
-
13 June, from
-
Chen, T. Z. (2002, 13 June), 'Taiwan Tea Party website attacked by DDoS', PCzone, from http://www.pczone.com.tw/vbb3/archive/t-47652.html
-
(2002)
PCzone
-
-
Chen, T.Z.1
-
46
-
-
84881705546
-
'Credit card websites are suffering DDoS attack'
-
ChinaByte., 23 September, retrieved 20 September 2008, from
-
ChinaByte. (2004, 23 September), 'Credit card websites are suffering DDoS attack', ChinaByte Online, retrieved 20 September 2008, from http://www.yesky.com/busnews/216485043416072192/20040923/1857545.shtml
-
(2004)
ChinaByte Online
-
-
-
48
-
-
84881722592
-
-
Cisco, San Jose, CA: Cisco Systems Inc
-
Cisco (2009), Infiltrating a Botnet, San Jose, CA: Cisco Systems Inc
-
(2009)
Infiltrating a Botnet
-
-
-
52
-
-
77951629030
-
-
retrieved 21 January, 2010, from
-
Clinton, H. R. (2010), Remarks on Internet Freedom, retrieved 21 January, 2010, from http://www.state.gov/secretary/rm/2010/01/135519.htm
-
(2010)
Remarks on Internet Freedom
-
-
Clinton, H.R.1
-
53
-
-
84881762469
-
-
CNCERT/CC Beijing: CNCERT/CC
-
CNCERT/CC (2008), CECERT/CC Annual Report 2007, Beijing: CNCERT/CC
-
(2008)
CECERT/CC Annual Report 2007
-
-
-
55
-
-
0000204509
-
'Social change and crime rate trends: A routine activity approach'
-
Cohen, L. and M. Felson (1979), 'Social change and crime rate trends: A routine activity approach', American Sociological Review, 44, 588-607.
-
(1979)
American Sociological Review
, vol.44
, pp. 588-607
-
-
Cohen, L.1
Felson, M.2
-
57
-
-
84881773854
-
-
Council of Europe, retrieved 17 November 2009, from
-
Council of Europe (2001a), Convention on Cybercrime, retrieved 17 November 2009, from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
-
(2001)
Convention on Cybercrime
-
-
-
58
-
-
84881829889
-
-
Council of Europe, retrieved 10 November 2009, from
-
Council of Europe (2001b), Convention on Cybercrime: Explanatory Report, retrieved 10 November 2009, from http://conventions.coe.int/ Treaty/en/Reports/Html/185.htm
-
(2001)
Convention on Cybercrime: Explanatory Report
-
-
-
59
-
-
84881707456
-
-
(11 November) Council of Europe, retrieved 11 November, 2009, from
-
Council of Europe (2009, 11 November), Convention on Cybercrime, retrieved 11 November, 2009, from http://conventions.coe.int/Treaty/ Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG
-
(2009)
Convention on Cybercrime
-
-
-
62
-
-
84873184022
-
-
DFAT, retrieved 10 October, 2010, from
-
DFAT (2010a), People's Republic of China country brief, retrieved 10 October, 2010, from http://www.dfat.gov.au/geo/china/china_brief.html
-
(2010)
People's Republic of China country brief
-
-
-
63
-
-
84864089194
-
-
DFAT, retrieved 10 October, 2010, from
-
DFAT (2010b), Taiwan brief, retrieved 10 October, 2010, from http://www.dfat.gov.au/geo/taiwan/taiwan_brief.html
-
(2010)
Taiwan brief
-
-
-
64
-
-
0000953669
-
'The iron cage revisited: institutional isomorphism and collective rationality in organizational fields'
-
DiMaggio, P. J. and W. W. Powell (1983), 'The iron cage revisited: institutional isomorphism and collective rationality in organizational fields', American Sociological Review, 48, 147-160.
-
(1983)
American Sociological Review
, vol.48
, pp. 147-160
-
-
DiMaggio, P.J.1
Powell, W.W.2
-
65
-
-
84881687034
-
'Counting badness'
-
24 July, retrieved 30 August 2009, from
-
Dirro, T. (2009, 24 July), 'Counting badness', McAfee Avert Labs Blog, retrieved 30 August 2009, from http://www.avertlabs.com/research/blog/ index.php/2009/07/24/counting-badness
-
(2009)
McAfee Avert Labs Blog
-
-
Dirro, T.1
-
66
-
-
0036570326
-
'Completeness of notifiable infectious disease reporting in the United States: An analytical literature review'
-
Doyle, T. J. M. K. Glynn and S. L. Groseclose (2002), 'Completeness of notifiable infectious disease reporting in the United States: An analytical literature review', American Journal of Epidemology, 155(9), 866-874.
-
(2002)
American Journal of Epidemology
, vol.155
, Issue.9
, pp. 866-874
-
-
Doyle, T.J.1
Glynn, M.K.2
Groseclose, S.L.3
-
67
-
-
21344451327
-
'Computer crime in the global village: Strategies for control and regulation'
-
Duff, L. and S. Gardiner (1996), 'Computer crime in the global village: Strategies for control and regulation', International Journal of the Sociology of Law, 24, 211-228.
-
(1996)
International Journal of the Sociology of Law
, vol.24
, pp. 211-228
-
-
Duff, L.1
Gardiner, S.2
-
68
-
-
85039847985
-
'Botnet PCs stay infected for year: Trend Micro analysis finds "hidden continent" of zombies'
-
22 September, retrieved 21 March 2010, from
-
Dunn, J. E. (2009, 22 September), 'Botnet PCs stay infected for year: Trend Micro analysis finds "hidden continent" of zombies', Network World, retrieved 21 March 2010, from http://www.networkworld.com/news/ 2009/092209-botnet-pcs-stay-infected-for.html
-
(2009)
Network World
-
-
Dunn, J.E.1
-
69
-
-
85039851191
-
'Storm botnet storms the Net'
-
24 September, retrieved 15 August 2009 from
-
Dvorsky, G. (2007, 24 September), 'Storm botnet storms the Net', IEET Newsletter. retrieved 15 August 2009 from http://ieet.org/index.php/ IEET/more/dvorsky20070927/
-
(2007)
IEET Newsletter
-
-
Dvorsky, G.1
-
70
-
-
84881753281
-
-
ENISA, Heraklion, Greece: European Network and Information Security Agency
-
ENISA (2009), ENISA Inventory of CERT activities in Europe, Heraklion, Greece: European Network and Information Security Agency
-
(2009)
ENISA Inventory of CERT activities in Europe
-
-
-
72
-
-
84881769363
-
-
ERIUM, Paper presented at the Tackling Crime and Achieving Confidence in the On-Line World Parliament and the Internet Conference. Retrieved 27 January 2010, from
-
ERIUM (2007), Cyber-crime reporting and intelligence: How do we know what is happening?, Paper presented at the Tackling Crime and Achieving Confidence in the On-Line World Parliament and the Internet Conference. Retrieved 27 January 2010, from http://www.eurim.org.uk/ activities/ecrime/PIC07_techapp_reporting.pdf
-
(2007)
Cyber-crime reporting and intelligence: How do we know what is happening?
-
-
-
73
-
-
84881707955
-
'China "tops list" of cyber-hackers seeking UK government secrets'
-
retrieved 26, Sept, 2007, from
-
Evans, M. (2007), 'China "tops list" of cyber-hackers seeking UK government secrets', retrieved 26, Sept, 2007, from http://www.timesonline. co.uk/tol/news/world/asia/article2393979.ece
-
(2007)
-
-
Evans, M.1
-
74
-
-
84881745709
-
'F-Secure Virus Descriptions: CIH'
-
F-Secure, retrieved 10 March, 2010, from
-
F-Secure (2002), 'F-Secure Virus Descriptions: CIH', retrieved 10 March, 2010, from http://www.f-secure.com/v-descs/cih.shtml
-
(2002)
-
-
-
75
-
-
0004570773
-
-
FAA, retrieved 19 February 2010, from
-
FAA (1997), Aviation Safety reporting Program, retrieved 19 February 2010, from http://rgl.faa.gov/REGULATORY_AND_GUIDANCE_LIBRARY/RGADVISORYCIRCULAR.NSF/0/64358057433fe192862569e7006da716/$FILE/AC00-46D.pdf
-
(1997)
Aviation Safety reporting Program
-
-
-
77
-
-
84984351869
-
The new penology: Notes on the emerging strategy of corrections and its implications
-
Feeley, M. M. and J. Simon (1992), The new penology: Notes on the emerging strategy of corrections and its implications, Criminology, 30(4), 449-474.
-
(1992)
Criminology
, vol.30
, Issue.4
, pp. 449-474
-
-
Feeley, M.M.1
Simon, J.2
-
78
-
-
0002553344
-
'Actuarial justice: The emerging new criminal law' in D. Nelkin (ed.)
-
Thousand Oaks, CA: Sage
-
Feeley, M. M. and J. Simon (1994), 'Actuarial justice: The emerging new criminal law' in D. Nelkin (ed.), The Future of Criminology, Thousand Oaks, CA: Sage, pp. 173-201.
-
(1994)
The Future of Criminology
, pp. 173-201
-
-
Feeley, M.M.1
Simon, J.2
-
79
-
-
0004053845
-
-
(G. Hamilton andW. Zheng, trans.), Berkeley, CA: University of California Press
-
Fei, H. T. (1947/2002), From the Soil: The Foundation of Chinese Society (G. Hamilton andW. Zheng, trans.), Berkeley, CA: University of California Press.
-
(1947)
From the Soil: The Foundation of Chinese Society
-
-
Fei, H.T.1
-
80
-
-
0003845892
-
-
([1939]) London: Routledge & Kegan Paul
-
Fei, H. T. (1980 [1939]), Peasant Life in China, London: Routledge & Kegan Paul.
-
(1980)
Peasant Life in China
-
-
Fei, H.T.1
-
82
-
-
34248387461
-
'The routine activity approach: A very versatile theory of crime'
-
R. Paternoster and R. Bachman (eds), Thousand Oaks, CA: Sage
-
Felson, M. (2000), 'The routine activity approach: A very versatile theory of crime', in R. Paternoster and R. Bachman (eds), Explaining Criminals and Crime, Thousand Oaks, CA: Sage, pp. 43-46.
-
(2000)
Explaining Criminals and Crime
, pp. 43-46
-
-
Felson, M.1
-
84
-
-
26644457019
-
'The rise of the risk commonwealth and the challenge for administrative law'
-
Autumn
-
Fisher, L. (2003), 'The rise of the risk commonwealth and the challenge for administrative law', Public Law, Autumn, 455-478.
-
(2003)
Public Law
, pp. 455-478
-
-
Fisher, L.1
-
85
-
-
84881796660
-
'Aviation safety action program'
-
Flight Safety Information
-
Flight Safety Information (2003), 'Aviation safety action program', Flight Safety Information, Q3, 5-6
-
(2003)
Flight Safety Information, Q3
, pp. 5-6
-
-
-
86
-
-
85039862728
-
'Crash of the transportation monitoring system lasts 1.5 hours - Suspiciously caused by cyber attack'
-
24 August, retrieved 24 August 2009, from
-
Fong, J. (2009, 24 August), 'Crash of the transportation monitoring system lasts 1.5 hours - Suspiciously caused by cyber attack', UDN, retrieved 24 August 2009, from http://udn.com/NEWS/NATIONAL/BREAKINGNEWS1/5096528.shtml
-
(2009)
UDN
-
-
Fong, J.1
-
87
-
-
84881719561
-
'Cybercrime and Convention on Cybercrime (I)'
-
Fong, J. G. (2003), 'Cybercrime and Convention on Cybercrime (I)', Taiwan Jurist, 4, 124-136.
-
(2003)
Taiwan Jurist
, vol.4
, pp. 124-136
-
-
Fong, J.G.1
-
88
-
-
0001797456
-
'The interview: From structured questions to negotiated text'
-
N. K. Denzin and Y. S. Lincoln (eds), Thousand Oaks, CA: Sage 645-
-
Fontana, A. and J. H. Frey (2000), 'The interview: From structured questions to negotiated text' in N. K. Denzin and Y. S. Lincoln (eds), Handbook of Qualitative Research, Thousand Oaks, CA: Sage, pp. 645-672.
-
(2000)
Handbook of Qualitative Research
, pp. 672
-
-
Fontana, A.1
Frey, J.H.2
-
89
-
-
84881692201
-
-
Paper presented at the IMF Conference on Second Generation Reforms, retrieved 3 March 2010, from
-
Fukuyama, F. (1999), Social capital and civil society, Paper presented at the IMF Conference on Second Generation Reforms, retrieved 3 March 2010, from http://www.imf.org/external/pubs/ft/seminar/1999/reforms/fukuyama.htm#I
-
(1999)
Social capital and civil society
-
-
Fukuyama, F.1
-
95
-
-
0346175130
-
'The punitive society: Penology, criminology and the history of the present'
-
Garland, D. (1997), 'The punitive society: Penology, criminology and the history of the present', The Edinburgh Law Review, 1, 180-199.
-
(1997)
The Edinburgh Law Review
, vol.1
, pp. 180-199
-
-
Garland, D.1
-
96
-
-
39449092216
-
'The history of international police cooperation: a 150-year evolution in trends and approaches'
-
Gerspacher, N. (2008), 'The history of international police cooperation: a 150-year evolution in trends and approaches', Global Crime, 9(1), 169-184.
-
(2008)
Global Crime
, vol.9
, Issue.1
, pp. 169-184
-
-
Gerspacher, N.1
-
97
-
-
0345321757
-
-
retrieved 15 March, 2010, from
-
Gibson, W. (1982), Burning Chrome, retrieved 15 March, 2010, from http://project.cyberpunk.ru/lib/burning_chrome/
-
(1982)
Burning Chrome
-
-
Gibson, W.1
-
98
-
-
0003954001
-
-
London: Harper Collins
-
Gibson,W. (1984), Neuromancer, London: Harper Collins.
-
(1984)
Neuromancer
-
-
Gibson, W.1
-
100
-
-
31144451886
-
'An introduction to the study of guanxi'
-
T. Gold, D. Guthrie and D.Wank (eds), Cambridge: Cambridge University Press
-
Gold, T., D. Guthrie and D. Wank (2002), 'An introduction to the study of guanxi', in T. Gold, D. Guthrie and D.Wank (eds), Social Connections in China: Institutions, Culture, and the Changing Nature of Guanxi, Cambridge: Cambridge University Press, pp. 1-13.
-
(2002)
Social Connections in China: Institutions, Culture, and the Changing Nature of Guanxi
, pp. 1-13
-
-
Gold, T.1
Guthrie, D.2
Wank, D.3
-
102
-
-
33748930465
-
'On the definition and classification of cybercrime'
-
Gordon, S. and R. Ford (2006), 'On the definition and classification of cybercrime', Journal in Computer Virology, 2(1), 13-20.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.1
, pp. 13-20
-
-
Gordon, S.1
Ford, R.2
-
103
-
-
84881771601
-
-
Government Information Office, Taipei: Government Information Office
-
Government Information Office (2009), The Republic of China Year Book 2009, Taipei: Government Information Office
-
(2009)
The Republic of China Year Book 2009
-
-
-
104
-
-
84994952907
-
'Regulation by reward: On the use of incentives as regulatory instruments'
-
Grabosky, P. (1995), 'Regulation by reward: On the use of incentives as regulatory instruments', Law and Policy, 17(3), 257-282.
-
(1995)
Law and Policy
, vol.17
, Issue.3
, pp. 257-282
-
-
Grabosky, P.1
-
105
-
-
34247160604
-
-
Upper Saddle River, NJ: Pearson
-
Grabosky, P. (2007), Electronic Crime, Upper Saddle River, NJ: Pearson.
-
(2007)
Electronic Crime
-
-
Grabosky, P.1
-
107
-
-
84881802556
-
'FAQ: The Kneber botnet revealed
-
18 January, retrieved 21 January 2010, from
-
Greene, T. (2010, 18 January), 'FAQ: The Kneber botnet revealed', Networkworld, retrieved 21 January 2010, from http://www.networkworld.com/news/2010/021810-kneber-botnet-faq.html
-
(2010)
Networkworld
-
-
Greene, T.1
-
109
-
-
0000268518
-
'The population ecology of organizations'
-
Hannan, M. T. and J. Freeman (1977), 'The population ecology of organizations', The American Journal of Sociology, 82(5), 929-964.
-
(1977)
The American Journal of Sociology
, vol.82
, Issue.5
, pp. 929-964
-
-
Hannan, M.T.1
Freeman, J.2
-
110
-
-
84881727660
-
'No sorry from Love Bug author'
-
11 May, retrieved 8 February 2010, from
-
Hayes, P. (2005, 11 May), 'No "sorry" from Love Bug author', The Register, retrieved 8 February 2010, from http://www.theregister.co.uk/2005/05/11/love_bug_author/
-
(2005)
The Register
-
-
Hayes, P.1
-
111
-
-
84881831650
-
'Beijing's rising hacker stars How does mother China react?
-
Fall
-
Henderson, S. (2008)' 'Beijing's rising hacker stars ? How does mother China react?, IO Sphere, Fall, 25-30.
-
(2008)
IO Sphere
, pp. 25-30
-
-
Henderson, S.1
-
112
-
-
84881733683
-
'Botmaster: It's all about infecting, selling big batches of bots'
-
20 August, retrieved 24 August 2009, from
-
Higgins, K. J. (2009a, 20 August), 'Botmaster: It's all about infecting, selling big batches of bots', InformationWeek, retrieved 24 August 2009, from http://www.darkreading.com/security/client/showArticle.jhtml? articleID=219400902&cid=RSSfeed
-
(2009)
InformationWeek
-
-
Higgins, K.J.1
-
113
-
-
85039872692
-
'Storm botnet makes a comeback: Researchers confirm "Waledac" is the work of new and improved Storm'
-
14 January, retrieved 24 Aug 2009, from
-
Higgins, K. J. (2009b, 14 January), 'Storm botnet makes a comeback: Researchers confirm "Waledac" is the work of new and improved Storm', InformationWeek, retrieved 24 Aug 2009, from http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=212900543
-
(2009)
InformationWeek
-
-
Higgins, K.J.1
-
114
-
-
0005208953
-
'Sociology without social structure: Neoinstitutional theory meets brave new world'
-
Hirsch, P. (1997), 'Sociology without social structure: Neoinstitutional theory meets brave new world', American Journal of Sociology, 102, 1702-1723.
-
(1997)
American Journal of Sociology
, vol.102
, pp. 1702-1723
-
-
Hirsch, P.1
-
115
-
-
0033246727
-
'Institutional evolution and change: Environmentalism and the U.S Chemical Industry'
-
Hoffman, A. J. (1999), 'Institutional evolution and change: Environmentalism and the U.S Chemical Industry', The Academy of Management Journal, 42(4), 351-371.
-
(1999)
The Academy of Management Journal
, vol.42
, Issue.4
, pp. 351-371
-
-
Hoffman, A.J.1
-
117
-
-
84881725314
-
'An engineer sells hacking program'
-
25 August 2007, retrieved 18 September 2010, from
-
Huang, D. S. (2007, 25 August 2007), 'An engineer sells hacking program', Libertytimes, retrieved 18 September 2010, from http://www.liberty times.com.tw/2007/new/aug/25/today-life6.htm
-
(2007)
Libertytimes
-
-
Huang, D.S.1
-
118
-
-
85039846896
-
'False reports hurt farmers'
-
11 January, retrieved 2 January 2009, from
-
Huang, J. L. (2007, 11 January), 'False reports hurt farmers', Liberty Times, retrieved 2 January 2009, from http://www.libertytimes.com.tw/2007/ new/jan/11/today-life12.htm
-
(2007)
Liberty Times
-
-
Huang, J.L.1
-
119
-
-
84936628470
-
'Face and favor: The Chinese power game'
-
Huang, K. (1987), 'Face and favor: The Chinese power game', American Journal of Sociology, 92(4), 944-974.
-
(1987)
American Journal of Sociology
, vol.92
, Issue.4
, pp. 944-974
-
-
Huang, K.1
-
120
-
-
84881695017
-
'The KinmenAgreement is becoming an important foundation for sending back the stowaway'
-
Huaxia, 23 August, retrieved 15 January 2010, from
-
Huaxia (2007, 23 August), 'The KinmenAgreement is becoming an important foundation for sending back the stowaway', Huaxia, retrieved 15 January 2010, from http://hk.huaxia.com/thpl/wzzdlj/2007/08/34796.html
-
(2007)
Huaxia
-
-
-
122
-
-
85039841916
-
'Betting websites blackmailed with child pornography'
-
27 October, retrieved 13 July 2009, from
-
Ilett, D. (2004, 27 October), 'Betting websites blackmailed with child pornography', Silicon.com, retrieved 13 July 2009, from http:// software.silicon.com/malware/0,3800003100,39125346,00.htm
-
(2004)
Silicon.com
-
-
Ilett, D.1
-
124
-
-
84881745559
-
-
ITU, Geneva: International Telecommunication Union
-
ITU (2009), ITU Toolkit for Cybercrime Legislation, Geneva: International Telecommunication Union
-
(2009)
ITU Toolkit for Cybercrime Legislation
-
-
-
125
-
-
84972273745
-
'A preliminary model of particularistic tie in Chinese political alliance: Kan-ch'ing and kuan-hsi in a rural Taiwanese township'
-
Jacobs, J. B. (1979), 'A preliminary model of particularistic tie in Chinese political alliance: Kan-ch'ing and kuan-hsi in a rural Taiwanese township', The China Quarterly, 78, 237-273.
-
(1979)
The China Quarterly
, vol.78
, pp. 237-273
-
-
Jacobs, J.B.1
-
126
-
-
0037453078
-
'Mandatory reporting of HIV infection and opt-out prenatal screening for HIV infection: effect on testing rates'
-
Jayaraman, G. C., J. K. Preiksaitis and B. Larke (2003), 'Mandatory reporting of HIV infection and opt-out prenatal screening for HIV infection: effect on testing rates', Canadian Medical Association Journal, 168(6), 679-682.
-
(2003)
Canadian Medical Association Journal
, vol.168
, Issue.6
, pp. 679-682
-
-
Jayaraman, G.C.1
Preiksaitis, J.K.2
Larke, B.3
-
127
-
-
84970417659
-
'Obstacles to the development of research in crime and delinquency'
-
Jeffery, C. R. (1993), 'Obstacles to the development of research in crime and delinquency', Journal of Research in Crime and Delinquency, 30(4), 491-497.
-
(1993)
Journal of Research in Crime and Delinquency
, vol.30
, Issue.4
, pp. 491-497
-
-
Jeffery, C.R.1
-
128
-
-
84881836234
-
'Mutual assistance between Taiwan and China. C.I.B.: Institutionalised the collaboration of combating crime'
-
26 April, retrieved 18 January 2010, from
-
Jen, M. H. (2009, 26 April), 'Mutual assistance between Taiwan and China. C.I.B.: Institutionalised the collaboration of combating crime', Central News Agency, retrieved 18 January 2010, from http://www.rti.com.tw/big5/topic/2009/0426/news_090426-07.aspx
-
(2009)
Central News Agency
-
-
Jen, M.H.1
-
130
-
-
84886405916
-
'Issues of Hacking and Extradition will all be included in the Jiang-Chen Meeting'
-
31 March, retrieved 17 January 2010, from
-
Jiang, J.Y. (2009, 31 March), 'Issues of Hacking and Extradition will all be included in the Jiang-Chen Meeting', Haixiainfo, retrieved 17 January 2010, from http://www.haixiainfo.com.tw/44565.html
-
(2009)
Haixiainfo
-
-
Jiang, J.Y.1
-
131
-
-
84881697262
-
'Book Review: Richard Ericson's Crime in an Insecure World'
-
Jou, S. (2008), 'Book Review: Richard Ericson's Crime in an Insecure World', Taiwanese Journal of Sociology, 40, 141-149.
-
(2008)
Taiwanese Journal of Sociology
, vol.40
, pp. 141-149
-
-
Jou, S.1
-
132
-
-
84881798914
-
'Google hack leaked to Internet; security experts urge vigilance
-
18 January, retrieved 18 January 2010, from
-
Kaplan, J. A. (2010, 18 January), 'Google hack leaked to Internet; security experts urge vigilance', FOXNews, retrieved 18 January 2010, from http://www.foxnews.com/scitech/2010/01/18/google-exploit-leakedinternet-security-experts-urge-vigilance/
-
(2010)
FOXNews
-
-
Kaplan, J.A.1
-
133
-
-
0742311431
-
'Digital architecture as crime control'
-
Katyal, N. K. (2003), 'Digital architecture as crime control', Yale Law Journal, 112(8), 2261-2289.
-
(2003)
Yale Law Journal
, vol.112
, Issue.8
, pp. 2261-2289
-
-
Katyal, N.K.1
-
135
-
-
84934563463
-
'Kuan-hsi and network building: A sociological interpretation'
-
King, A. Y.-C. (1991), 'Kuan-hsi and network building: A sociological interpretation', Daedalus, 120(2), 63-84.
-
(1991)
Daedalus
, vol.120
, Issue.2
, pp. 63-84
-
-
King, A.-C.1
-
136
-
-
84881767167
-
'China denies any role in "GhostNet" computer hacking'
-
31 March, retrieved 20 August 2009, from
-
Klayman, A. (2009, 31 March), 'China denies any role in "GhostNet" computer hacking', VOANews.com, retrieved 20 August 2009, from http://www1.voanews.com/english/news/a-13-2009-03-31-voa12-68812997.html
-
(2009)
VOANews.com
-
-
Klayman, A.1
-
137
-
-
0021350045
-
'The underreporting of disease and physicians' knowledge of reporting requirements'
-
Konowitz, P. M., G. A. Petrossian and D. N. Rose (1984), 'The underreporting of disease and physicians' knowledge of reporting requirements', Public Health Report, 99, 91-35.
-
(1984)
Public Health Report
, vol.99
, pp. 35-91
-
-
Konowitz, P.M.1
Petrossian, G.A.2
Rose, D.N.3
-
138
-
-
52649121965
-
'No There there: Why cyberspace isn't'
-
Koppell, J. G. S. (2000), 'No "There" there: Why cyberspace isn't', The Atlantic Monthly, 286, 16-18.
-
(2000)
The Atlantic Monthly
, vol.286
, pp. 16-18
-
-
Koppell, J.G.S.1
-
139
-
-
84881744731
-
'Bringing botnets out of the shadows: Online volunteers monitor illegal computer networks'
-
21 March, retrieved 22 August 2009, from
-
Krebs, B. (2006, 21 March), 'Bringing botnets out of the shadows: Online volunteers monitor illegal computer networks', The Washington Post, retrieved 22 August 2009, from http://www.washingtonpost.com/wpdyn/content/article/2006/03/21/AR2006032100279.html
-
(2006)
The Washington Post
-
-
Krebs, B.1
-
141
-
-
85039864888
-
'New attacking methods - DNS recursive'
-
13 April, retrieved 10 May 2009, from
-
Lan, S. L. (2006, 13 April), 'New attacking methods - DNS recursive', lslnet.com, retrieved 10 May 2009, from http://www.lslnet.com/linux/f/docs/linux-4795.htm
-
(2006)
lslnet.com
-
-
Lan, S.L.1
-
142
-
-
0039903416
-
'Digital fears emerge after data siege in Estonia'
-
29 May, retrieved 15 February 2008, from
-
Landler,M. and J. Markoff (2007, 29 May), 'Digital fears emerge after data siege in Estonia', New York Times, retrieved 15 February 2008, from http://www.nytimes.com/2007/05/29/technology/29estonia.html
-
(2007)
New York Times
-
-
Landler, M.1
Markoff, J.2
-
144
-
-
84886432690
-
'Judicial mutual assistance safeguards the rights and interests of citizens in both sides'
-
29 December, retrieved 22 January 2010, from
-
Lee, H. F. and J. H. Wu (2009, 29 December), 'Judicial mutual assistance safeguards the rights and interests of citizens in both sides', Xinhuanet, retrieved 22 January 2010, from http://news.xinhuanet.com/tw/2009-12/30/content_12728447.htm
-
(2009)
Xinhuanet
-
-
Lee, H.F.1
Wu, J.H.2
-
145
-
-
85039867601
-
'China is suffering serious cyber attack'
-
22 May, retrieved 10 June 2009, from
-
Lee, J. (2009, 22 May), 'China is suffering serious cyber attack', Xinhuanet, retrieved 10 June 2009, from http://news.xinhuanet.com/zgjx/2009-05/ 22/content_11416880.htm
-
(2009)
Xinhuanet
-
-
Lee, J.1
-
146
-
-
84881696209
-
'Hackers attack KMT's websites'
-
13 December, retrieved 23 April 2008, from
-
Lee, M. S. and L. J. Feng (2007, 13 December), 'Hackers attack KMT's websites', UDN, retrieved 23 April 2008, from http://www.itis.tw/node/1323
-
(2007)
UDN
-
-
Lee, M.S.1
Feng, L.J.2
-
147
-
-
34948866915
-
'Air carrier safety and culture: An investigation of Taiwan's adaption to western incident reporting programs'
-
Lee, P. I. and T. R. Weitzel (2005), 'Air carrier safety and culture: An investigation of Taiwan's adaption to western incident reporting programs', Journal of Air Transportation, 10(1), 20-37.
-
(2005)
Journal of Air Transportation
, vol.10
, Issue.1
, pp. 20-37
-
-
Lee, P.I.1
Weitzel, T.R.2
-
148
-
-
84881710044
-
'Partial amendment on the Criminal Law'
-
Legislative Yuan
-
Legislative Yuan (1997), 'Partial amendment on the Criminal Law', Gazette of the Legislative Yuan, 86(31), 298-305
-
(1997)
Gazette of the Legislative Yuan
, vol.86
, Issue.31
, pp. 298-305
-
-
-
149
-
-
84881805259
-
'Partial amendment of the Criminal Law'
-
Legislative Yuan
-
Legislative Yuan (1999), 'Partial amendment of the Criminal Law', Gazette of the Legislative Yuan, 88(13), 77-219
-
(1999)
Gazette of the Legislative Yuan
, vol.88
, Issue.13
, pp. 77-219
-
-
-
150
-
-
84881770978
-
'Offences relating to the abuse of computers'
-
Legislative Yuan
-
Legislative Yuan (2003), 'Offences relating to the abuse of computers', Gazette of the Legislative Yuan, 92(29), 137-152
-
(2003)
Gazette of the Legislative Yuan
, vol.92
, Issue.29
, pp. 137-152
-
-
-
151
-
-
85039840291
-
'In less than six hours Thursday, Love spread worldwide'
-
5 May, retrieved 8 February 2010, from
-
Lemos, R. (2000, 5 May), 'In less than six hours Thursday, Love spread worldwide', ZDNet, retrieved 8 February 2010, from http://news. zdnet.com/2100-9595_22-107344.html
-
(2000)
ZDNet
-
-
Lemos, R.1
-
153
-
-
33645653056
-
'Conducting fieldwork in China: observations on collecting primary data regarding crime, law, and criminal justice system'
-
Liang, B. and H. Lu, H. (2006), 'Conducting fieldwork in China: observations on collecting primary data regarding crime, law, and criminal justice system', Journal of Contemporary Criminal Justice, 22(2), 157-172.
-
(2006)
Journal of Contemporary Criminal Justice
, vol.22
, Issue.2
, pp. 157-172
-
-
Liang, B.1
Lu, H.H.2
-
154
-
-
84863123071
-
'Analysis of computer crime characteristics'
-
Liao, Y. (2001), 'Analysis of computer crime characteristics', Journal of Information, Technology and Society, 1, 119-133.
-
(2001)
Journal of Information, Technology and Society
, vol.1
, pp. 119-133
-
-
Liao, Y.1
-
155
-
-
33745799873
-
'Analysis of computer crime characteristics in Taiwan'
-
H. Chen, F.-Y. Wang, C. C. Yang, D. Zeng, M. Chau and K.Chang (eds), Proceedings, Heidelberg: Springer
-
Liao,Y. and C. Tsai (2006), 'Analysis of computer crime characteristics in Taiwan', in H. Chen, F.-Y. Wang, C. C. Yang, D. Zeng, M. Chau and K.Chang (eds), Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings, Heidelberg: Springer, pp. 49-57.
-
(2006)
Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006
, pp. 49-57
-
-
Liao, Y.1
Tsai, C.2
-
156
-
-
84881809542
-
'Neo-Nazi forum hacked'
-
1 September, retrieved 10 April 2010, from
-
Libbenga, J. (2008, 1 September), 'Neo-Nazi forum hacked', The Register, retrieved 10 April 2010, from http://www.theregister.co.uk/2008/09/01/ neo_nazi_forum_hacked/
-
(2008)
The Register
-
-
Libbenga, J.1
-
158
-
-
84881789743
-
-
Beijing: Beijing University Press
-
Liu, S. F., C. Fang, H. J.Yeh, S. S. Fang, C.Wang, L. H. Shen et al. (2006). Study on the Cyber Criminal Law under the Technology, Beijing: Beijing University Press.
-
(2006)
Study on the Cyber Criminal Law under the Technology
-
-
Liu, S.F.1
Fang, C.2
Yeh, H.J.3
Fang, S.S.4
Wang, C.5
Shen, L.H.6
-
159
-
-
84881756242
-
'Spam: made in Taiwan?'
-
9 June, retrieved 31 August 2009, from
-
Lombardi, C. (2006, 9 June), 'Spam: made in Taiwan?', CNET, retrieved 31 August 2009, from http://news.cnet.com/2100-7349_3-6082377.html
-
(2006)
CNET
-
-
Lombardi, C.1
-
161
-
-
84881815348
-
'Money or hacking'
-
12 June, retrieved 10 May 2008, from
-
Lui, J. P. (2006, 12 June), 'Money or hacking', Xinhuanews, retrieved 10 May 2008, from http://big5.xinhuanet.com/gate/big5/news.xinhuanet.com/politics/2006-06/12/content_4685002.htm
-
(2006)
Xinhuanews
-
-
Lui, J.P.1
-
162
-
-
85053488310
-
'Praise, pride and corporate compliance'
-
Makkai, T. and J. Braithwaite (1983), 'Praise, pride and corporate compliance', International Journal of the Sociology of Law, 21, 73-91.
-
(1983)
International Journal of the Sociology of Law
, vol.21
, pp. 73-91
-
-
Makkai, T.1
Braithwaite, J.2
-
163
-
-
85039856166
-
'Malicious software infects computers'
-
18 February, retrieved 19 February 2010, from
-
Markoff, J. (2010, 18 February), 'Malicious software infects computers', New York Times, retrieved 19 February 2010, from http://www.nytimes. com/2010/02/19/technology/19cyber.html?emc=eta1
-
(2010)
New York Times
-
-
Markoff, J.1
-
164
-
-
84881794558
-
'Viruses, phishing, and Trojans for profit'
-
24 June, retrieved 10 July 2009, from
-
Martin, K. (2006, 24 June), 'Viruses, phishing, and Trojans for profit', SecurityFocus, retrieved 10 July 2009, from http://www.securityfocus.com/columnists/419
-
(2006)
SecurityFocus
-
-
Martin, K.1
-
166
-
-
84881756528
-
'Global cybercrime treaty rejected'
-
23 April, retrieved 21 September 2010 from
-
Masters, G. (2010, 23 April), 'Global cybercrime treaty rejected', SC Magazine, retrieved 21 September 2010, from http://www.scmagazineus.com/global-cybercrime-treaty-rejected-at-un/article/168630/
-
(2010)
SC Magazine
-
-
Masters, G.1
-
167
-
-
84881730230
-
'The art of (cyber) war'
-
retrieved 18 September, 2010, from
-
Mazanec, B. M. (2009), 'The art of (cyber) war', retrieved 18 September, 2010, from http://www.securityaffairs.org/issues/2009/16/index16.php
-
(2009)
-
-
Mazanec, B.M.1
-
169
-
-
0012751814
-
'Understanding theories of criminal victimization'
-
Meier, R. F. and T. D. Miethe (1993), 'Understanding theories of criminal victimization', Crime and Justice, 17, 459-499.
-
(1993)
Crime and Justice
, vol.17
, pp. 459-499
-
-
Meier, R.F.1
Miethe, T.D.2
-
171
-
-
84881699485
-
-
Ministry of Justice, retrieved 12 December, 2009, from
-
Ministry of Justice (2000), Ministry of Justice Bulletin, retrieved 12 December, 2009, from http://gaz.ncl.edu.tw/detail.jsp?sysid=E0006245
-
(2000)
Ministry of Justice Bulletin
-
-
-
172
-
-
84970763122
-
'The significance of saturation'
-
Morse, J. M. (1995), 'The significance of saturation', Qualitative Health Research, 5, 147-149.
-
(1995)
Qualitative Health Research
, vol.5
, pp. 147-149
-
-
Morse, J.M.1
-
173
-
-
84894833818
-
'Estonia computers blitzed, possibly by the Russians'
-
19 May, retrieved 15 February 2008, from
-
Myers, S. L. (2007, 19 May), 'Estonia computers blitzed, possibly by the Russians', New York Times, retrieved 15 February 2008, from http:// www.nytimes.com/2007/05/19/world/europe/19russia.html
-
(2007)
New York Times
-
-
Myers, S.L.1
-
174
-
-
0344559509
-
-
National Infrastructure Advisory Council, Washington, DC: White House
-
National Infrastructure Advisory Council (2003), The National Strategy to Secure Cyberspace,Washington, DC: White House
-
(2003)
The National Strategy to Secure Cyberspace
-
-
-
175
-
-
84881692029
-
-
National Transportation Safety Board, Washington, DC: National Transportation Safety Board
-
National Transportation Safety Board (1974), Aircraft Incident Report, Washington, DC: National Transportation Safety Board
-
(1974)
Aircraft Incident Report
-
-
-
178
-
-
84933486345
-
'Risk, power and crime prevention'
-
O'Malley, P. (1992), 'Risk, power and crime prevention', Economy and Society, 21(3), 252-275.
-
(1992)
Economy and Society
, vol.21
, Issue.3
, pp. 252-275
-
-
O'Malley, P.1
-
179
-
-
43649092900
-
'Reinventing prevention: why did "crime prevention" develop so late?'
-
O'Malley, P. and S. Hutchinson (2007), 'Reinventing prevention: why did "crime prevention" develop so late?', British Journal of Criminology, 47, 373-389.
-
(2007)
British Journal of Criminology
, vol.47
, pp. 373-389
-
-
O'Malley, P.1
Hutchinson, S.2
-
180
-
-
32944461928
-
'Interview elites'
-
J. Gubrium and J. Holstein (eds), London: Sage
-
Odendahl, T. and A. Shaw (2001), 'Interview elites', in J. Gubrium and J. Holstein (eds), Handbook of Interview Research: Context and Method, London: Sage, pp. 299-310.
-
(2001)
Handbook of Interview Research: Context and Method
, pp. 299-310
-
-
Odendahl, T.1
Shaw, A.2
-
182
-
-
85039854257
-
'China tightens Internet controls: Content under scrutiny in run-up to sensitive Communist Party Congress'
-
14 October, retrieved 23 March 2009, from
-
Olesen, A. (2007, 14 October), 'China tightens Internet controls: Content under scrutiny in run-up to sensitive Communist Party Congress', Associated Press, retrieved 23 March 2009, from http://www.msnbc.msn.com/id/21268635
-
(2007)
Associated Press
-
-
Olesen, A.1
-
183
-
-
84881730410
-
'1H 2009: Malware threat grows ever larger'
-
14 August, retrieved 31 August 2009, from
-
Osena, M. (2009, 14 August), '1H 2009: Malware threat grows ever larger', TrendLabs Malware Blog, retrieved 31 August 2009, from http:// blog.trendmicro.com/wp-content/uploads/2009/08/2009-08-07-blog1.jpg
-
(2009)
TrendLabs Malware Blog
-
-
Osena, M.1
-
184
-
-
84881689382
-
-
Taipei: Ministry of Justice
-
Pan,W. T.,Y. Y. Chen, C. S.Yeh, S. C. Fa andY. A. Hsu (2008), An Analysis on the Collection and Preservation Procedure of Digital Evidence, Taipei: Ministry of Justice.
-
(2008)
An Analysis on the Collection and Preservation Procedure of Digital Evidence
-
-
Pan, W.T.1
Chen, Y.Y.2
Yeh, C.S.3
Fa, S.C.4
Hsu, Y.A.5
-
186
-
-
84881827907
-
'On the measures of ordering to offer electronic evidence in criminal investigation'
-
Pi, Y. (2005), 'On the measures of ordering to offer electronic evidence in criminal investigation', Journal of Shangdong Police College, 80, 53-58.
-
(2005)
Journal of Shangdong Police College
, vol.80
, pp. 53-58
-
-
Pi, Y.1
-
187
-
-
84881818845
-
-
Beijing: Chinese People's Public Security University
-
Pi, Y. (2008), Research on Cyber-Security law, Beijing: Chinese People's Public Security University.
-
(2008)
Research on Cyber-Security law
-
-
Pi, Y.1
-
189
-
-
84881805931
-
'On Cybercrime legislation in China - And on Cybercrime legislation in amendment 7th of China Penal Code'
-
Pi, Y. (2009b), 'On Cybercrime legislation in China - And on Cybercrime legislation in amendment 7th of China Penal Code', Hebei Law Science, 27(6), 49-57.
-
(2009)
Hebei Law Science
, vol.27
, Issue.6
, pp. 49-57
-
-
Pi, Y.1
-
190
-
-
84881681666
-
'On the legislation of Cybercrime in amendment VII to the Criminal Law of the People's Republic of China'
-
Pi, Y. (2009c), 'On the legislation of Cybercrime in amendment VII to the Criminal Law of the People's Republic of China', Journal of Shangdong Police College, 104, 15-20.
-
(2009)
Journal of Shangdong Police College
, vol.104
, pp. 15-20
-
-
Pi, Y.1
-
191
-
-
56649098628
-
-
Paper presented at the HotBots 2007, retrieved 24 August 2009, from
-
Rajab, M. A., J. Zarfoss, F. Monrose and A. Terzis (2007), My botnet is bigger than yours (maybe, better than yours), Paper presented at the HotBots 2007, retrieved 24 August 2009, from https://www.usenix.org/events/leet08/tech/full_papers/zhuang/zhuang.pdf
-
(2007)
My botnet is bigger than yours (maybe, better than yours)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
192
-
-
84881831542
-
'North Korea blamed for DDoS attacks on United States and South Korea'
-
retrieved 18 September, 2010, from
-
Raywood, D. (2009), 'North Korea blamed for DDoS attacks on United States and South Korea', retrieved 18 September, 2010, from http:// www.scmagazineuk.com/north-korea-blamed-for-ddos-attacks-onunited-states-and-south-korea/article/139764/
-
(2009)
-
-
Raywood, D.1
-
194
-
-
84881733081
-
'France blames China for hack attacks'
-
retrieved 26, Sept, 2007, from
-
Register, T. (2007), 'France blames China for hack attacks', retrieved 26, Sept, 2007, from http://www.theregister.co.uk/2007/09/12/french_cyberattacks/
-
(2007)
-
-
Register, T.1
-
197
-
-
0033242857
-
'Risk society and actuarial criminology: Perspective for a critical disclosure'
-
Rigakos, G. (1999), 'Risk society and actuarial criminology: Perspective for a critical disclosure', Canadian Journal of Criminology, 41(2), 137-150.
-
(1999)
Canadian Journal of Criminology
, vol.41
, Issue.2
, pp. 137-150
-
-
Rigakos, G.1
-
199
-
-
0018927944
-
'Reporting of gonorrhea by private physicians:A behaviour study'
-
Rothenberg, R., D. C. Bross and T. M. Vernon (1980), 'Reporting of gonorrhea by private physicians:A behaviour study' American Journal of Public Health, 70, 983-986.
-
(1980)
American Journal of Public Health
, vol.70
, pp. 983-986
-
-
Rothenberg, R.1
Bross, D.C.2
Vernon, T.M.3
-
200
-
-
84881778964
-
(2010, 18 January), 'New computer virus will create a backdoor'
-
RTI, retrieved 8 February 2010, from
-
RTI (2010, 18 January), 'New computer virus will create a backdoor', SinaNews, retrieved 8 February 2010, from http://news.sina.com.tw/ article/20100118/2696582.html
-
SinaNews
-
-
-
202
-
-
85039857248
-
'Virus poses as nude Jennifer Lopez photos'
-
31 May, retrieved 10 March 2010, from
-
Sandoval, G. (2001, 31 May), 'Virus poses as nude Jennifer Lopez photos', CNET, retrieved 10 March 2010, from http://news.cnet.com/2100-1001-267644.html
-
(2001)
CNET
-
-
Sandoval, G.1
-
204
-
-
84881833055
-
-
retrieved 18 September, 2010, from
-
Schneier, B. (2008), The Truth About Chinese Hackers, retrieved 18 September, 2010, from http://dsc.discovery.com/technology/my-take/computer-hackers-china.html
-
(2008)
The Truth About Chinese Hackers
-
-
Schneier, B.1
-
205
-
-
0025978823
-
'The surveillance of communicable disease in Vermont: who reports?'
-
Schramm, M., R. L. Vogt and M. Mamolen (1991), 'The surveillance of communicable disease in Vermont: who reports?', Public Health Report, 106, 95-97.
-
(1991)
Public Health Report
, vol.106
, pp. 95-97
-
-
Schramm, M.1
Vogt, R.L.2
Mamolen, M.3
-
207
-
-
84863168583
-
-
Beijing: Peking University Press
-
Shau, J. M., B. H. Yu, R. Huang, L. J. Wong, H. J. Jheng, S. P. Jou et al. (2005), The Evolution of Crime, Beijing: Peking University Press.
-
(2005)
The Evolution of Crime
-
-
Shau, J.M.1
Yu, B.H.2
Huang, R.3
Wong, L.J.4
Jheng, H.J.5
Jou, S.P.6
-
208
-
-
85039845188
-
'Taipei becomes the headquarters of bots in the Asia and Pacific Region'
-
20 April, retrieved 25 August 2009, from
-
Shi,W.B. (2009, 20 April), 'Taipei becomes the headquarters of bots in the Asia and Pacific Region', IThome Online, retrieved 25 August 2009, from http://www.ithome.com.tw/itadm/article.php?c=54571
-
(2009)
IThome Online
-
-
Shi, W.B.1
-
210
-
-
84881673897
-
'38,936 persons have been repatriated under the Kinmen Agreement'
-
SinaNews, 10 Februrary, retrieved 18 January 2010, from
-
SinaNews (2009, 10 Februrary), '38,936 persons have been repatriated under the Kinmen Agreement', SinaNews, retrieved 18 January 2010, from http://news.sina.com/c/2009-02-11/111617192947.shtml
-
(2009)
SinaNews
-
-
-
211
-
-
85167861900
-
-
Berkeley, CA: University of California Press
-
Sklar, L. (1977), Space, Time, and Spacetime, Berkeley, CA: University of California Press.
-
(1977)
Space, Time, and Spacetime
-
-
Sklar, L.1
-
212
-
-
21144465983
-
'Gift, bribes, and guanxi:A reconsideration of Bourdieu's social capital'
-
Smart, A. (1993), 'Gift, bribes, and guanxi:A reconsideration of Bourdieu's social capital', Cultural Anthropology, 8(3), 388-408.
-
(1993)
Cultural Anthropology
, vol.8
, Issue.3
, pp. 388-408
-
-
Smart, A.1
-
216
-
-
74049154670
-
-
Paper presented at the 16th ACM Conference on Computer and Communications Security, retrieved 30 August 2009, from
-
Stone-Gross, B., C. Marco, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel et al. (2009), Your botnet is my botnet: Analysis of a botnet takeover, Paper presented at the 16th ACM Conference on Computer and Communications Security, retrieved 30 August 2009, from http://www.cs.ucsb.edu/~seclab/projects/torpig/torpig.pdf
-
(2009)
Your botnet is my botnet: Analysis of a botnet takeover
-
-
Stone-Gross, B.1
Marco, C.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
-
217
-
-
84881717599
-
'Asia enterprises more vulnerable to cybercrime'
-
23 September, retrieved 24 September 2009, from
-
Storey, R. O. (2009, 23 September), 'Asia enterprises more vulnerable to cybercrime', Network World, retrieved 24 September 2009, from http:// www.networkworld.com/news/2009/092309-asia-enterprises-morevulnerable-to.html
-
(2009)
Network World
-
-
Storey, R.O.1
-
218
-
-
85039843165
-
'Golden Shield Project - Everyone in China is under the surveillance'
-
9 December, retrieved 15 March 2009, from
-
Su, J. Y. (2008, 9 December), 'Golden Shield Project - Everyone in China is under the surveillance', Liberty Times, retrieved 15 March 2009, from http://www.libertytimes.com.tw/2008/new/dec/9/today-fo5.htm
-
(2008)
Liberty Times
-
-
Su, J.Y.1
-
231
-
-
27644477777
-
'From hackers to hacktivists: Speed bumps on the global superhighway'
-
Taylor, P. A. (2005), 'From hackers to hacktivists: Speed bumps on the global superhighway', New Media Society, 7(5), 625-646.
-
(2005)
New Media Society
, vol.7
, Issue.5
, pp. 625-646
-
-
Taylor, P.A.1
-
232
-
-
84881726377
-
'Cyberattacks are "existential threat" to U.S., FBI says
-
24 March, retrieved 25 March 2010 from
-
Thibodeau, P. (2010, 24 March), 'Cyberattacks are "existential threat" to U.S., FBI says, Computerworld, retrieved 25 March 2010 from http://www.networkworld.com/news/2010/032410-cyberattacks-areexistential-threat-to.html?source=NWWNLE_nlt_compliance_2010-03-26
-
(2010)
Computerworld
-
-
Thibodeau, P.1
-
233
-
-
34249860028
-
'Bot Countermeasures'
-
Thomas, V. and N. Jyoti (2007), 'Bot Countermeasures', Journal in Computer Virology, 3(1), 103-111.
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.1
, pp. 103-111
-
-
Thomas, V.1
Jyoti, N.2
-
234
-
-
39749156010
-
'The invasion of the Chinese cyberspies'
-
retrieved 15 March, 2010, from
-
Thornburgh, N. (2005), 'The invasion of the Chinese cyberspies', retrieved 15 March, 2010, from http://www.time.com/time/magazine/article/0,9171,1098961,00.html
-
(2005)
-
-
Thornburgh, N.1
-
235
-
-
84886439219
-
'An analysis on the judicial agreement between Taiwan and China'
-
3 May, retrieved 21 January 2010, from
-
Tong,W. S. (2009, 3 May), 'An analysis on the judicial agreement between Taiwan and China', EpochTimes, retrieved 21 January 2010, from http://www.dajiyuan.com/b5/9/5/3/n2514809.htm
-
(2009)
EpochTimes
-
-
Tong, W.S.1
-
237
-
-
84881735251
-
'Chinese hack into film festival site'
-
26 July 2009, retrieved 18 September 2010, from
-
Toy, M.-A. (2009, 26 July 2009), 'Chinese hack into film festival site', The Age, retrieved 18 September 2010, from http://www.theage.com.au/national/chinese-hack-into-film-festival-site-20090725-dwvx.html
-
(2009)
The Age
-
-
Toy, M.-A.1
-
238
-
-
39749115454
-
'Russia accused of unleashing cyberwar to disable Estonia'
-
17 May, retrieved 23 September 2009, from
-
Traynor, I. (2007, 17 May), 'Russia accused of unleashing cyberwar to disable Estonia', Guardian, retrieved 23 September 2009, from http://www.guardian.co.uk/russia/article/0,2081438,00.html
-
(2007)
Guardian
-
-
Traynor, I.1
-
240
-
-
57649135065
-
'An intervention to improve notifiable disease reporting using ambulatory clinics'
-
Trepka, M. J., G. Zhang and F. Leguen (2009), 'An intervention to improve notifiable disease reporting using ambulatory clinics', Epidemiology and Infection, 137, 22-29.
-
(2009)
Epidemiology and Infection
, vol.137
, pp. 22-29
-
-
Trepka, M.J.1
Zhang, G.2
Leguen, F.3
-
248
-
-
84881823140
-
'Online service foils ransom plot'
-
retrieved 6 April 2009, from
-
Wakefield, J. (2005), 'Online service foils ransom plot', BBC News Online, retrieved 6 April 2009, from http://news.bbc.co.uk/1/hi/technology/ 4579623.stm
-
(2005)
BBC News Online
-
-
Wakefield, J.1
-
249
-
-
84972217835
-
'Organized dependency and cultures of authority in Chinese industry'
-
Walder, A. G. (1983), 'Organized dependency and cultures of authority in Chinese industry', Journal of Asian Studies, 63(1), 51-75.
-
(1983)
Journal of Asian Studies
, vol.63
, Issue.1
, pp. 51-75
-
-
Walder, A.G.1
-
251
-
-
84949564522
-
'The Internet as a conduit for criminal activity'
-
A. Pattavian (ed.), Thousand Oaks, CA: Sage
-
Wall, D. S. (2005), 'The Internet as a conduit for criminal activity' in A. Pattavian (ed.), Information Technology and the Criminal Justice System, Thousand Oaks, CA: Sage, pp. 77-98.
-
(2005)
Information Technology and the Criminal Justice System
, pp. 77-98
-
-
Wall, D.S.1
-
252
-
-
24144472881
-
-
Cambridge: Polity Press
-
Wall, D. S. (2007), Cybercrime, Cambridge: Polity Press.
-
(2007)
Cybercrime
-
-
Wall, D.S.1
-
253
-
-
51949085108
-
'Cybercrime, Media and Insecurity: the shaping of public perceptions of cybercrime'
-
Wall, D. S. (2008), 'Cybercrime, Media and Insecurity: the shaping of public perceptions of cybercrime', International Review of Law, Computers and Technology, 22, 45-63.
-
(2008)
International Review of Law, Computers and Technology
, vol.22
, pp. 45-63
-
-
Wall, D.S.1
-
254
-
-
51949117093
-
(2008/2010), 'Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about Cybercrime' (revised May 2010)
-
Wall, D. S. (2008/2010), 'Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about Cybercrime' (revised May 2010), Information, Communication & Society, 11(6), 861-884.
-
Information, Communication & Society
, vol.11
, Issue.6
, pp. 861-884
-
-
Wall, D.S.1
-
255
-
-
84881811124
-
-
Paper presented at the First Workshop on Hot Topics in Understanding Botnets, retrieved 20 July 2009, from
-
Wang, P., S. Sparks and C. C. Zou (2007), An advanced hybrid peer-to-peer botnet, Paper presented at the First Workshop on Hot Topics in Understanding Botnets, retrieved 20 July 2009, from http://www.usenix.org/event/hotbots07/tech/full_papers/wang/wang.pdf
-
(2007)
An advanced hybrid peer-to-peer botnet
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
256
-
-
84881778084
-
'PayEasy were hacked with a leaking of 5,400 personal information'
-
12 December, retrieved 3 March 2010, from
-
Wang, P. L. (2007, 12 December), 'PayEasy were hacked with a leaking of 5,400 personal information', Liberty Times, retrieved 3 March 2010, from http://www.itis.tw/node/1313
-
(2007)
Liberty Times
-
-
Wang, P.L.1
-
257
-
-
84881689770
-
'The Panda with burning incense: profit-oriented virus'
-
14 February, retrieved 20 March 2009, from
-
Wang, S. R. (2007, 14 February), 'The Panda with burning incense: profit-oriented virus', China's First Financial Daily, retrieved 20 March 2009, from http://hacker.cn/News/aqwh/2007-2/14/0721409031215205_2.shtml
-
(2007)
China's First Financial Daily
-
-
Wang, S.R.1
-
258
-
-
84881821474
-
-
retrieved 18 September, 2010, from
-
Westervelt, R. (2009), DDoS attacks hit U.S., South Korean government websites, retrieved 18 September, 2010, from http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1361258,00.html
-
(2009)
DDoS attacks hit U.S., South Korean government websites
-
-
Westervelt, R.1
-
259
-
-
84881739970
-
-
Washington, DC: The Federation of American Scientists
-
Wilson, C. (2008), Botnet, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,Washington, DC: The Federation of American Scientists.
-
(2008)
Botnet, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
-
-
Wilson, C.1
-
261
-
-
84881825180
-
'Nearly 600 arrested in Asian Swindling Ring'
-
10 June, retrieved 26 September 2011, from
-
Wines, M. (2011, 10 June), 'Nearly 600 arrested in Asian Swindling Ring', New York Times, retrieved 26 September 2011, from http://www.nytimes.com/2011/06/11/world/asia/11taiwan.html
-
(2011)
New York Times
-
-
Wines, M.1
-
263
-
-
33749596400
-
-
World Health Organization, retrieved 4 February, 2010, from
-
World Health Organization (2005), Avian influenza frequently asked questions, retrieved 4 February, 2010, from http://www.who.int/csr/disease/ avian_influenza/avian_faqs/en/
-
(2005)
Avian influenza frequently asked questions
-
-
-
264
-
-
84881775835
-
'Mainland's Taiwan affairs chief says economic co-op priority for cross-straits relations'
-
Xinhua, 26 April, retrieved 19 January 2010, from
-
Xinhua (2009, 26 April), 'Mainland's Taiwan affairs chief says economic co-op priority for cross-straits relations', Xinhuanews, retrieved 19 January 2010, from http://www.gwytb.gov.cn:8088/detail.asp?table=headlines&title=Headlines&offset=75&m_id=1001
-
(2009)
Xinhuanews
-
-
-
265
-
-
84886446431
-
'Over 3,100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army'
-
24 March, retrieved 21 September 2010, from
-
Xu, S. C. (2009, 24 March), 'Over 3,100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army', Liberty Times, retrieved 21 September 2010, from http://www.libertytimes.com.tw/2009/new/mar/24/today-fo2.htm
-
(2009)
Liberty Times
-
-
Xu, S.C.1
-
266
-
-
85005345968
-
'The modernity of power in the Chinese socialist order'
-
Yang, M. M. (1988), 'The modernity of power in the Chinese socialist order', Cultural Anthopology, 3(4), 408-427.
-
(1988)
Cultural Anthopology
, vol.3
, Issue.4
, pp. 408-427
-
-
Yang, M.M.1
-
267
-
-
84881821816
-
'Online gaming companies suffer DDoS attacks from Chinese hackers'
-
30 April, retrieved 25 August 2009, from
-
Yang, Y. Z. (2008, 30 April), 'Online gaming companies suffer DDoS attacks from Chinese hackers', UDN, retrieved 25 August 2009, from http://mag.udn.com/mag/digital/storypage.jsp?f_MAIN_ID=319&f_SUB_ID=2941&f_ART_ID=123192
-
(2008)
UDN
-
-
Yang, Y.Z.1
-
268
-
-
34247657469
-
'The novelty of "Cybercrime": An assessment in light of routine activity theory'
-
Yar, M. (2005), 'The novelty of "Cybercrime": An assessment in light of routine activity theory', European Journal of Criminology, 2(4), 407-427.
-
(2005)
European Journal of Criminology
, vol.2
, Issue.4
, pp. 407-427
-
-
Yar, M.1
-
269
-
-
84881806428
-
'Specific modelling model found which is targeting Taiwan only'
-
5 September, retrieved 27 August 2009, from
-
Yau,Y. S. (2006, 5 September), 'Specific modelling model found which is targeting Taiwan only', IThome Online, retrieved 27 August 2009, from http://www.ithome.com.tw/itadm/article.php?c=39235
-
(2006)
IThome Online
-
-
Yau, Y.S.1
-
270
-
-
79961077465
-
'Google hack attack was ultra sophisticated, new details show'
-
14 January, retrieved 18 January 2010, from
-
Zetter, K. (2010, 14 January), 'Google hack attack was ultra sophisticated, new details show', Wired News, retrieved 18 January 2010, from http://www.wired.com/threatlevel/2010/01/operation-aurora
-
(2010)
Wired News
-
-
Zetter, K.1
-
271
-
-
84886401545
-
'Taiwanese net-armies are targeting China'
-
1 November, from
-
Zhang, H. Y. (2007, 1 November), 'Taiwanese net-armies are targeting China', People, from http://tw.people.com.cn/BIG5/88649/6468348.html
-
(2007)
People
-
-
Zhang, H.Y.1
-
272
-
-
0002086749
-
'Organisation as institutions'
-
S. B. Bacharach (ed.), Greenwich, CT: JAI Press
-
Zucker, L. G. (1983), 'Organisation as institutions', in S. B. Bacharach (ed.), Research in the Sociology of Organizations (Vol. 2), Greenwich, CT: JAI Press.
-
(1983)
Research in the Sociology of Organizations
, vol.2
-
-
Zucker, L.G.1
|