|
Bibliography Acar, E., Camtepe, S.A., & Yener, B. (2006, May). Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 213-214. CA: Springer Press. Acohido, B. & Swartz, J. (2006). Cybercrime Flourishes in Online Hacker Forums. Retrieved September 20, 2008, from http://www.usatoday.com/tech/news/computersecurity/infotheft/ 2006-10-11- cybercrime-hacker-forums_x.htm Adamski, A. (1998). Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/ home/oiffi/enlist/resources/HeuniWeb.htm Agnew, R. (2001). Juvenile Delinquency: Causes and Control. CA: Roxbury Publishing. Akers, R. L. (1999). Criminological Theories. IL: Fitzroy Dearborn Publishing. Ashcroft, J., Daniels, D. J., & Hart, S. V. (2004, April). Forensic Examination of Digital Evidence: A Guide for Law Enforcement. National Institute of Justice, USA. Awad, E. M. & Ghaziri, H. M. (2003, February). Knowledge Management. Prentice Hall Publisher. Babbie, E. (1989). The Practice of Social Research (5th Ed.). CA: Wadsworth. Barak, G. (1998). Integrating Criminologies. Boston: Allyn and Bacon. Beebe, N. & Clark, J. (2005). Dealing with terabyte data sets in digital investigations. In Pollitt, M. & Shenoi, S. (Ed.), Advances in Digital Forensics. 3-16. NY: Springer. Ben-Ze’ev, A. (2000). The subtlety of emotions. Cambridge, MA: MIT Press. Best, C., Pouliquen, B., Steinberger, R., Goot, E. V., Blackler, K., Fuart, F., Oellinger, T., & Ignat, C. (2006, May). Towards Automatic Event Tracking. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 26-34. CA: Springer Press. Best, J. & Luckenbill, D. F. (1994). Organizing Deviance, 2nd edition. New Jersey: Prentice Hall. Binder, A., Geis, G., & Bruce, D. D. (2001). Juvenile Delinquency: Hist, Culture and Legal Perspectives. (3rd ed.). OH: Anderson Publishing. Birchwood, M., Trower, P., Brunet, K., Gilbert, P., Iqbal, Z., & Jackson, C. (2007). Social Anxiety and the Shame of Psychosis: A Study in First Episode Psychosis. Behaviour Research and Therapy, 45(5): 1025-1037. Amsterdam: Elsevier Science Publisher. Bocij & Paul. (2004). Cyberstalking: Harassment in the Internet Age and How to Protect Your Family. MN: Praeger Press. Bogdan, R. C. & Biklen, S. K. (1992). Qualitative Research in Education: An Introduction to Theory and Methods (2nd ed.). Boston, MA: Allyn and Bacon. Botchkovar, E. V., & Tittle, C. R. (2005). Crime, Shame and Reintegration in Russia. Theoretical Criminology, 9(4): 401 - 442. CA: Sage Publications. Bott, E. & Sciechert, C. (2003). Windows Security for Windows XP and Windows 2000. Microsoft Press. Boyd, C. & Forster, P. (2004, January). Time and Date Issues in Forensic Computing: A Case Study. Digital Investigation Journal, 1(1): 18-33. Singapore: Elsevier Ltd. Braithwaite, J. (1989). Crime, Shame, and Reintegration. Cambridge: Cambridge University Press. Braithwaite, J. (2007). Standards for Restorative Justice. Retrieved November 10, 2007, from http://www.restorativejustice.org/resources/docs/braithwaite Brian, C. & Eugene, H. S.. (2003). Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2(2): 1-20. Brenner, S. W., Carrier, B., & Henninger, J. (2005). CERIAS Tech Report: The Trojan Horse Defense In Cybercrime Cases. Purdue University, West Lafayette. Brenner, S. (2006). Trojan Horse Defense. Retrieved September 22, 2008, from http://cyb3rcrim3.blogspot.com/2006/06/trojan-horse-defense.html Brown, C. L.T. (2006). Computer Evidence: Collection & Preservation. MA: Charles River Media, INC. Brown, M. F. (2001). Criminal Investigation: Law and Practice (2nd ed.). MA: Butterworth-Heinemann. Brown, R. H. (1989). Textuality, Social Science, and Society. Issues in Integrative Studies, 7: 1-19. Bruce, S. (1999). The Trojan Horse Race. Communications of the ACM, 42(9). Buennemeyer, T., Brooker, J., Sabri, A. & North, C. (2006). Intelligence Analysis Using High Resolution Displays. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 652-653. CA: Springer Press. Buure, J. V. (2001, August). Internet Brigade gets fit for fighting Cyber Crime, Heise Online, Retrieved September 20, 2008, from http://www.heise.de/tp/r4/ artikel/9/9399/1.html Caloyannides, M. A. (2003). Digital Eevidence and Reasonable Doubt. IEEE Security and Privacy, 1(6): 89-91. Caloyannides, M. A. (2003, December). Digital Evidence and Reasonable Doubt. IEEE Security and Privacy: 89-91. Cameron, A. (2009). Law, Justice and Ethics. Retrieved on January 3 2009, from http://www.freewebs.com/alancameron/Signposts 98.pdf Capeller, W. (2001). Not Such a Neat Net: Some Comments on Virtual Criminality. Social & Legal Studies, 10(229): 229-242. Carlson, E.R. & Havelock-Coleman, C.E. (1997). Experimental and Motivational Determinants of the Richness of an Induced Sexual Fantasy. Journal of Personality. 45: 528-541. Carney, M. & Rogers, M. (2004, Spring). The Trojan Made Me Do It: A First Step in Statistical Based Digital forensics Event Reconstruction. International Journal of Digital Evidence, 2(4). Purdue University. Carrier, B. D. (2008). Basic Digital Forensic Investigation Concepts. Retrieved March 10, 2008, from http://www.digital-evidence.org/di_basics.html Carrier, B. & Spafford, E. H. (2003) Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2(2). Casey, E. (2005, December). Case Study: Network Intrusion Investigation – Lessons in Forensic Preparation. Digital Investigation Journal, 2(4): 254-260. Singapore: Elsevier Ltd. Cheung, C. K. & Liu, S. C. (2005). Factors Underlying Junior High School Students' Seeking Help from Social Services. Childhood, 12(1): 55 - 69. CA: Sage Publications. Chisum, W.J. & Turvey, B. (2002, January). Evidence Dynamics: Locard's Exchange Principle & Crime Reconstruction. Journal of Behavioral Profiling, 1(1). Clandos, R. (2003, August). Eye on Cyber-crime. IEEE Security and Privacy: 10-11. Clement, M. (1997). The Juvenile Justice System: Law and Process. MA: Butterworth-Heinemann. Cloward, R. A. & Ohlin, L. E. (1960). Delinquency and Opportunity: A Theory of Delinquent Gangs. In Jacoby J. E. (Ed.), Classics of Criminology: 283-287. IL: Waveland Press. Cohen, A. K. (1955). Delinquent Boys: The Culture of the Gang. Glencoe, IL: Free Press. Cohen, L., & Manion, L. (1986). Research Methods in Education. London: Croom Helm. Cole, E. & Newfield,M. (2002). Security Essentials Toolkit. IN: Sans. Coleman, J. (2000, March). Internet Police Patrol Cyberspace for Child-Sex Stalkers. Associated Press Online. Retrieved September 20, 2008, from http://www.lubbockonline.com/stories/ 031500/ Crawford, R.J. (2001). The Expert Witness – A Manual for Expert. La: 1st Book Library. David, M., Croall, H., & Tyrer, J. (1999). Criminal Justice: An Introduction to the Criminal Justice System in England and Wales (2nd ed.). London: Longman. Dennison, S. M., & Stewart, A. (2006). Facing Rejection: New Relationships, Broken Relationships, Shame, and Stalking. International Journal of Offender Therapy and Comparative Criminology, 50(3): 324-337. Australia: Sage Publications. Denzin, N. (1978) Sociological Methods: A Sourcebook. NY: McGraw Hill, 2nd ed. Desmond, M. (2005). Attack of the PC Zombies. Retrieved March 9, 2008, from http://pcworld.about.com/news/Oct192004id118208.htm DFRWS. (2008). DFRWS 2008 Forensics Challenge Overview. Retrieved March 10, 2008, from http://www.dfrws.org/2008/challenge/submission.shtml Dictionary.com, LLC. (2008). Online. Retrieved September 29, 2008, from http://dictionary.reference.com/ Digital Forensics Research Workshop. (2001). A Road Map for Digital Forensics Research. Retrieved March 9, 2008, from http://www.ijde.org/archives/ 02_fall_art2.html Ellison, L. & Akdeniz, Y. (1998). Cyber-Stalking: the Regulation of Harassment on the Internet. Criminal Law Review, December Special Edition: Crime, Criminal Justice and the Internet: 29-48. Farlex, Inc. (2005). Online Dictionary, Encyclopedia and Thesaurus. Retrieved September 22, 2005, from http://encyclopedia.thefreedictionary.com/ Farrant, F. (2006). Knowledge Production and the Punishment Ethic: The Demise of the Probation Service. Probation Journal, 53(4): 317-333 CA: Sage Publications. Fei, B., Eloff, J., Olivier, M., & Venter, H. (2006, February). Analysis of Web Proxy Logs. IFIP International Conference on Digital Forensics: 247-258. FL: Springer Press. Felson, M. (2006). Crime and Nature. Sage Publications, 125-137. Ferdico, J. N. (1999). Criminal Procedure for the Criminal Justice Professional (7th ed.). CA: Wadsworth Publishing Company. Fujiwara, B. (2006, November). Cyber Security: Threats and Countermeasures. Global Business Dialog on Electronic Commerce (GBDe) 2006 Issue Group. Retrieved December 26, 2008, from http://www.gbd-e.org/pubs/Taipei_ Recommendationl_Nov2006.pdf Fuller, C., Biros, D.P., Adkins, M., Burgoon, J.K., Nunamaker, J.F., & Coulon, S. (2006, May). Detecting Deception in Person-of-Interest Statements. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 504-509. CA: Springer Press. Furnell, S. (2002). Cybercrime: Vandalizing the Information Society. Boston, MA: Addison-Wesley. Fu, T. & Chen, H., (2008). Analysis of Cyberactivism: A Case Study of Online Free Tibet Activities. ISI 2008 Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics: 1-6. Taiwan: Taipei. Garfinkel, S. (2007, March). Anti-Forensics: Techniques, Detection and Countermeasures, The 2nd International Conference on i-Warfare and Security (ICIW). CA : Naval Postgraduate School, Monterey. Gary, L. P. (2001). A Road Map for Digital Forensic Research. Technical Report. Report for the First Digital Forensic Research Workshop (DFRWS). Retrieved April 24, 2005, from http://www.ijde.org/archives/02_fall_art2.html Ghavalas, B. & Philips, A. (2005, June). Trojan Defense: A Forensic View Part II. Digital Investigation Journal, 2(2): 133-136. Singapore: Elsevier Ltd. Giordano, J. & Maciag, C. (2002). Cyber Forensics: A Military Operations Perspective. International Journal of Digital Evidence, 1(2): 1-13. Goodsell, D. (2007). Seeding Art in Science - and Vice Versa. Retrieved March 29, 2008, from http://bioephemera.com/2007/11/28/seeding-art-in-science-and- vice- versa/ Goth, G. (2003). Questions About Strategy To Secure Cyberspace. IEEE Security and Privacy, 1(3): 8-11. Grabosky, P. (2007). Masters Series in Criminology: Electronic Crime. NJ: Pearson. Grimes, R. A. (2001). Malicious Mobile Code. CA: O’Reilly. Grodzinsky, F.S. & Tavani, H.T. (2001). Cyberstalking, Personal Privacy, and Moral Responsibility. CEPE 2001 Conference: 14-16. UK: Lancaster University. Haagman, D. & Ghavalas, B. (2005, February). Trojan Defense: A Forensic View. Digital Investigation Journal, 2(1): 23-30. Singapore: Elsevier Ltd.. Hagan, F. E. (2003). Research Methods in Criminal Justice and Criminology. MA: Pearson. Haigh Y. (2007). Persistence and Desistance: Seductions of Repetition and Responsibility. 20th Annual Australian and New Zealand Society of Criminology Conference. Adelaide: ANZSOC Publications. Hamelink, C.J. (2000). The Ethics of Cyberspace. London: Sage. Harris, R. (2006). Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problem. Proceedings of the 2006 Digital Forensics Research Workshop. Digital Investigation, 3, 44-49. Retrieved September 28, 2008, from http://dfrws.org/2006/ proceedings/6-Harris.pdf Henderson, S.D. & Hodges, S.H. (2007). Music, Song, and the Creation of Community and Community Spirit by a Gay Subculture. Sociological Spectrum, 27(1): 57-80. London: Taylor & Francis Publisher. Hendrix, G. M. (2004). A Test of Reintegrative Shaming Theory's Concepts of Interdependence and Expressed Shame in Restorative Justice Conferencing. Michigan: Michigan State University. Henrique, G. W. (2006, September). Anti Forensics: Making Computer Forensics Hard. Code Breakers III. Brazil: São Paulo. Hirschi, T. (1969). Causes of Delinquency: a Control Theory of Delinquency. In Jacoby J. E. (Ed.), Classics of Criminology: 294-301. IL: Waveland Press. Holt, T.J. (2005). Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers. MO: University Of Missouri - Saint Louis. International Organization on Computer Evidence. (2002). Guidelines for best practice in the forensic examination of digital technology. Retrieved September 22, 2005, from http://www.ioce.org/2002/ioce_bp_exam_ digit_tech.html Internet Crime Complaint Center. (2007). 2006 Internet Crime Report. Retrieved September 20, 2008, from http://www.ic3.gov/media/annualreport/ 2006_IC3Report.pdf Internet Crime Complaint Center. (2008). 2007 Internet Crime Report. Retrieved September 20, 2008, from http://www.ic3.gov/media/annualreport/2007_ IC3Report.pdf Ishii, M. (2006). Criminal Regulation of Anti-forensic Tools in Japan. IFIP International Conference on Digital Forensics: 357-364. FL: Springer Press. Jacoby, J. E. (2004). Classics of Criminology. IL: Waveland Press. Jaishankar, K. (2007). Cyber Criminology: Evolving a Novel Discipline with a New Journal. International Journal of Cyber Criminology, 1(1). Retrieved on March 6 2008, from http://www40.brinkster.com/ccjournal/editorial.htm Jame, S. H. & Nordby, J. J. (2003). Forensic Science – An Introduction to Scientific and Investigative Technique. Boca Raton: CRC Press. James, S. H. & Nordby, J. J. (2005). Forensic Science: an Introduction to Scientific and Investigative Techniques (2nd Ed.), FL: CRC Press. Jenson, B. (1996). Cyberstalking: Crime, Enforcement and Personal Responsibility of the On-Line World. Retrieved September10, 2008, from http://www.sgrm.com/art-8.htm Johannesen, R. L. (2002). A Role for Shame in Communication Ethics. Seventh National Communication Ethics Conference. IL: Western Michigan University Press. Retrieved from http://www.wmich.edu/communication/ethics/keynote.pdf Jone, K.J., Bejtlich, R. & Rose, C.W. (2006). Real Digital Forensics: Computer Security and Incident Response. New York: Person Education. Jones, R. (2006). Internet Forensics. O’Reilly Inc. Jupp, V., Davies P., & Francis P. (2000). Doing Criminal Research. CA: Sage. Kahai, P., Srinivasan, M., Namuduri, K, & Pendse, R. (2005). Forensic Profiling System. IFIP International Conference on Digital Forensics: 153-164. FL: Springer Press. Kao, D. Y., Huang, F .F. Y., & Wang, S. J. (2007, September). Maturity and Shame: Bringing Computer Ethics to Taiwan’s Juvenile Delinquents. Australian and New Zealand Society criminology, the 20th Annual ANZSOC Conference. Australia: Adelaide. Kao, D. Y., Huang, F. F. Y., & Liao, Y. L. (2008, November). The Retest of Reintegrative Shaming Theory and Its Implications on Taiwanese Juvenile Hackers. Reinvigorating Theory through Diversity and Inclusiveness (2008 ASC Annual Meeting): 410. OH: The American Society of Criminology. MO: St. Louis. Kao, D. Y. & Lee, H. C. (2005, November). The Forensic Examination of P2P Copyright Infringement. 2005 International Forensic Science Symposium (2005-IFSS). Taiwan: Taipei. Kao, D. Y. & Wang, S. J. (2005, August). Evidences and Forensics at IP Address Clue in Cyber-crime. 17th Meeting of the International Association of Forensic Sciences, Hong-Kong. Kao, D. Y., Wang, S. J., & Huang, F .F. Y. (2006, December). An Information Based Management on the Analysis of Internet Perpetrators. The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong. Kao, D. Y., Wang, S. J., & Huang, F .F. Y. (2006, May). Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2006): 644-646. CA: Springer Press. Kao, D. Y., Wang, S. J., Huang, F .F. Y., & Bhatia, S. (2008, June). Dataset Analyses of Proxy Logs to Detect and Prevent Future Network Attacks. IEEE International Conference on Intelligence and Security Informatics (IEEE ISI-2008): 245-250. NY: Springer Press. Taiwan: Taipei. Kao, D. Y., Wang, S. J., Mathur, K., Jain, S., & Huang, F .F. Y. (2008, December). Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. IEEE The First International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-08). Taiwan: Yilan. Kao, D. Y., Wang, S. J., Huang, F .F. Y., & Chang, Y. H. (2006, December). Inferring Social Network from Forensic Asessment Model of P2P Copyright Infrigement. The 3th Asia-Pacific International Conference on Knowledge management (KMAP2006), Hong Kong. Kemmis, S. & McTaggart, R. (1988). The Action Research Structurener (3rd Ed.). Deakin University Press. Keppel, R. D. (2000). Serial Offending by Children and Adolescents. In Schlesinger, L. B. (Ed.), Serial Offenders: Current Though, Recent Findings: 289-308. FL: CRC Press. Kessler, G.C. (2007, December). Anti-forensics and the Digital Investigator. In C. Valli & A. Woodward (Ed.), Proceedings of the 5th Australian Digital Forensics Conference. Western Australia: Edith Cowan University. Kizza, J. M. (2003). Ethical and Social Issues in the Information Age (2nd ed.). UK: Springer. Kleen, L. J. (2001). Malicious Hackers: A Framework for Analysis and Case Study. Retrieved March 10, 2008, from http://www.iwar.org.uk/iwar/resources/usaf/ maxwell/students/ 2001/afit-gor-ens-01m-09.pdf Klotter, J. C. (2000). Criminal Evidence (7th Ed.). Anderson Publishing Co. Kocsis, R. N. (2007). Criminal Profiling: International Theory, Research, and Practical. OH: Humana Press. Kruse, W. G. & Heiser J. G. (2002). Computer Forensics: Incident Response Essentials, Addison-Wesley Inc. Ku, C. & Jacobson, H. K. (2003). Democratic Accountability and the Use of Force in International Law. Cambridge: Cambridge University Press. Laub, J. H., & Sampson, R. J. (2003). Shared Beginnings, Divergent Lives: Delinquent Boys to Age 70. MA: Harvard. Laurie, B. (2004). Network Forensics. ACM Queue, 2(4), 52-56. Layfield, R., Kantarcioglu, M. & Thuraisingham, B. (2008, June). Simulating Bioterrorism through Epidemiology Approximation. ISI 2008 Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics: 82-87. Taiwan: Taipei. Le, D.P., Bonnecaze, A. & Gabillon, A. (2008). Signtiming Scheme Based on Aggregate Signatures. ISI 2008 Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics: 145-149. Taiwan: Taipei. Lee, H. C. & Kao, D. Y. (2005, March). A Forensic Analysis of Reverse Peep Attack. 2005 Internet Cyber Security Engineering Conference, Taipei. Lemart, E. M. (1967). Human Deviance, Social Problems, and Social Control. Englewood Cliffs, New Jersey: Prentice Hall. Levy, E. & Arce, I. (2004). Criminals Become Tech Savvy. IEEE Security and Privacy, 2(2): 65-68. Leyden, I. (2005). Webcam Trojan Suspect Arrested in Spain. Retrieved September10, 2008, from http://www.theregister.co.uk/2005/01/20/webcam_trojan_arrest/ Li, L., Lin, C., Wu, Z., Wu, S., Rotheram-Borus, M.J., Detels, R., & Jia, M. (2007). Stigmatization and Shame: Consequences of Caring for HIV/AIDS Patients in China. AIDS CARE, 19(2): 258-263. London: Taylor & Francis Publisher. Littlewood, A. (2003) Cyberporn and Moral Panic: an Evaluation of Press Reactions to Pornography on the Internet. Library and Information Research, 27(86): 8–18. Liu, V. & Brown, F. (2006, April). Bleeding-Edge Anti-Forensics. Infosec World Conference & Expo, MIS Training Institute. Retrieved September 9, 2007, from http://stachliu.com/files/InfoSecWorld_2006-K2-Bleeding_Edge_ AntiForensics.ppt Loewy, A. H. (2003). Criminal Law (4th ed.). MN: West Group. Loper, D. K. (2001). The Criminology of Computer Hackers: A Qualitative and Quantitative Analysis. MI: Michigan State University. Lu, C., Jen, W., Chang, W., & Chou, S. (2006, September) Cybercrime & Cybercriminals: An Overview of the Taiwan Experience. Journal of Computers, 1(6). 11-18. Retrieved September 22, 2008, from http://academypublisher.com/jcp/vol01/no06/jcp01061118.pdf Lu, F. (2003, June). Law Gets Tough on Cybercrimes. Retrieved December 26, 2008, from http://www.taipeitimes.com/News/taiwan/archives/2003/06/04/ 2003053865 Mandia, K., Prosise, C., & Pepe, M. (2003). Incident Response & Computer Forensics – 2nd Ed., CA: McGraw-Hill Companies Inc. Mann, David and Sutton, Mike, (1998). NetCrime. More Change in the Organisation of Thieving, British Journal of Criminology, 38(2). Marcella, A. J. & Greenfield, R.S. (2002). Computer Forensics: a Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. FL: CRC Press. Mark, R., Clint, C., & Gregg, G. (2002). An Examination of Digital Forensic Models International. Journal of Digital Evidence, 1(3). Marshall, B. & Chen, H. (2006, May). Using Importance Flooding to Identify Interesting Networks of Criminal Activity. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 14-25. CA: Springer Press. Matza, D. & Sykes, G. (1961). Juvenile Delinquency and Subterranean Values. American Sociological Review. 26(5). 712-719. Maxfield, M. G. & Babbie, E. (2001). Research Methods for Criminal Justice and Criminology. CA: Wadsworth/Thomson. Mendell, R.L, (1998). Investigative Computer Crime: A Primer for Security Managers. Il: Charles. Messner, S. F., Krohn, M.D., & Liska, A. E. (1989). Theoretical Integration in the Study of Deviance and Crime Problems and Prospects. Albany: State University of New York. Meyer, G. R. (1989). The Social Organization of the Computer Underground. Retrieved March10, 2008, from http://csrc.nist.gov/secpubs/hacker.txt McAlinden, A. M. (2006). Managing Risk: from Regulation to the Reintegration of Sexual Offenders. Criminology and Criminal Justice, 6 (2):197-218. McCarty, B. (2004). Honeypot Forensics Part I: Analyzing the Network. IEEE Security and Privacy, 2(4): 72-78. McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households Using the Routine Activity Approach. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/ childsafety/index.html McGuire, S. (2008). Young Hackers Are Just Curious. Retrieved March 19, 2008, from http://www.infoniac.com/hi-tech/young-hackers-are-just-curious.html Meinel, C.P. (2004). Cyber-crime Treaty Could Chill Research. IEEE Security and Privacy, 2(4): 28-32. Memon, N & Larsen, H. L. (2006, May). Practical Algorithms for Destabilizing Terrorist Networks. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 389-400. CA: Springer Press. Mendell, R.L, (1998). Investigative Computer Crime: A Primer for Security Managers. IL: Charles. Merton, R. K. (1938). Social Structure and Anomie. American Sociological Review 3: 672-682. Messerschmidt, J. W. (1997). Crime as Structured Action: Gender, Race, Class and Crime in the Making. CA:Sage. Meyers, M. & Rogers, M. (2005, February). Digital Forensics: Meeting the Challenges of Scientific Evidence. IFIP International Conference on Digital Forensics: 43-50. FL: Orlando. Michael, A. C. (2001). Computer Forensics and Privacy. MA: Artech. Michael, J. L. (2002). Forensic Analysis in a Digital World. Retrieved April 24, 2005, from http://www.advtechnologies.com/Forensic.pdf Michael, N., Mark, M. P., & Lawrence, P. (2000). Recovering and Examining Computer Forensic Evidence. Forensic Science Communications, 2(4). Microsoft Corporation. (2004). International Botnet Task Forse Initial Meeting and Training Conference Proceeding. Seattle: Microsoft Corporation. Microsoft Corporation. (2005, April). International Botnet Task Forse Training Conference Proceeding. Prague: Microsoft Corporation. Middleton, B. (2002). Cyber Crime Investigator’s Field Guide. Auerbach Publications. Motion Picture Association of America. (2005). Anti-piracy. Retrieved September 22, 2005, from http://www.mpaa.org/anti Dpiracy/ Muncie, J. & McLaughlin, E. (2001). The Problem of Crime (2nd ed.). London: Sage Publishing. National Institute of Justice. (2001). Electronic Crime Scene Investigation: A Guide for First Responders. Retrieved April 24, 2005, from http://www.ncjrs.org/pdffiles1/nij/187736.pdf National Highway Safety Administration. (2004). Washington: Cape Horn Corridor Traffic Safety Project. Traffic Safety Digest, 2. Retrieved November 10, 2008, from http://www.nhtsa.dot.gov/people/outreach/safedige/Volume-2-2004/ Vol2_04_ W04_WA.htm Nelson, B. & Philips, A. (2004). Computer Forensics and Investigations. Thomson Course Technology. Nelson, B., Phillips, A., Enfinger, F., & Steuart, C. (2004). Computer Forensics and Investigations. NY: Thomson Press. Ness, D. W. V. & Strong, K. H. (2002). Restoring Justice (2nd). OH: Anderson Publishing Co. Orebaugh, A. (2004). Etheral Packet Sniffing. MA: Syngress Publishing Inc. Osterburg, J. W. & Ward, R. H. (2000). Criminal Investigation (3rd ed.). OH: Anderson Publishing. Palermo, G. B. & Kocsis, R. N. (2005). Offender Profiling: an Introduction to the Sociopsychological Analysis of Violence Crime. Charles C Thomas Publisher Ltd. Parker, T., Shaw, E., Stroz, E., Devost, M. G., & Sachs, M. H. (2004). Cyber Adversary Characterization: Auditing the Hacker Mind. MA: Syngress. Persaud, A. & Guan, Y. (2005). A Framework for Email Investigations – Automated Information Extraction and Linkage Discovery. IFIP International Conference on Digital Forensics: 79-90. FL: Springer Press. Pollitt, M. & Whitledge, A. (2006, February). Exploring Big Haystacks – Data Mining and Knowledge Management. IFIP International Conference on Digital Forensics: 247-258. FL: Springer Press. Quinney, R. (1977). Class, State, and Crime. New York: David McKay. Rantala, R. R. (2004, March). Cybercrime against Businesses: Pilot Test Results, 2001 Computer Security Survey. Retrieved September 20, 2008, from http://www.ojp.usdoj.gov/bjs/abstract/ cb.htm Rantala, R. R. (2008, September). Cybercrime against Businesses, 2005. Retrieved September 20, 2008, from http://www.ojp.usdoj.gov/bjs/abstract/cb05.htm Raymond, E. S. (2008). How to Become a Hacker. Retrieved March 9, 2008, from http://www.catb.org/~esr/faqs/hacker-howto.html Raymond, E. S. (2008). The New Hacker's Dictionary - The Jargon File. Retrieved March 9, 2008, from http://www.catb.org/jargon/html/H/hacker-ethic.html Reason & Bradbury. (2001). Handbook of Action Research. London: Sage. Redding, S. (2005). Using Peer-To-Peer Technology for Network Forensics. IFIP International Conference on Digital Forensics: 141-152. FL: Springer Press. Reid, S. T. (2003). Crime and Criminology (10th ed.). NY: McGraw-Hill Co. Reith, M., Carr, C., & Gunsch, G.. (2002), An Examination of Digital Forensic Models. International Journal of Digital Evidence, 1(3). Rogers, M. (2006, March). Panel Session at CERIAS 2006 Information Security Symposium. Retrieved September 28, 2008, from http://www.cerias.purdue.edu/symposium/2006/ materials/dfs/antiforensics.pdf Rokach, A. (1990). Content Analysis of Sexual Fantasies of Males and Females. Journal of Pediatric Psychology, 124: 427-436. Rosenheim, M. R., Zimring, F. E., Tanenhaus D. S., & Dohrn B. (2002). A Century of Juvenile Justice. Chicago: The University of Chicago. Sahakian, W. S. & Sahakian, M. L. (1993). Ideas of the Great Philosophers. Barnes and Noble Books. Samenow, S. E. (2004). Inside the Criminal Mind. (2nd ed.). NY: Crown Publisher. Sammes, T. & Jenkinson, B. (2000). Forensic Computing – A Practitioner’s Guide. UK: Springer. Schell, B. H., Dodge, J. L., & Moutsatsos, S. S. (2002). The Hacking of America: Who’s Doing it, Why, and How. Westport, CT: Quorum Books. Seier, S., Greer, G., & Manes, G. (2006). Linking Individuals to Digital Information. IFIP International Conference on Digital Forensics:131-140. FL: Orlando. Shaw, C. R. & Mckay, H. D. (1969). Juvenile Delinquency and Urban Areas. Chicago: University of Chicago Press. Sheridan, L.P. & Grant, T. (2007). Is Cyberstalking Different. Psychology, Crime & Law, 13(6): 627-640. UK: University of Leicester. Shifreen, R. (2006). Defeating the Hacker: A Non-technical Guide to Computer Security. UK: John Wiley & Sons Ltd. Siegel, L. J., Welsh, B. C., & Senna, J. J. (2003). Juvenile Delinquency: Theory, Practice, and Law (8th ed.) CA: Thomson Learning Inc. Singer, P. (1993). Practical Ethics (2nd Ed.). Cambrdige: Cambridge University Press. Smith N. (2007). Predicting Reoffending in Juvenile and Adult Offenders Given Noncustodial Sanctions. 20th Annual Australian and New Zealand Society of Criminology Conference. Adelaide: ANZSOC. Smith, R. G. (2002). Crime in the Professions. England: Ashgate. Solm, S. V., Louwrens, C., Reekie, C., & Grobler, T. (2006). A Control Framework for Digital Forensics. IFIP International Conference on Digital Forensics: 343-355. FL: Orlando. Spafford, E. (2006). Some Challenges in Digital Forensics. IFIP International Conference on Digital Forensics: 3-9. FL: Orlando. Spitzner, L. (2003). Honeypots – Tracking hackers. MA: Pearson. Starnes, R. (2003, December). The Trojan Defense. Network Security:8. Singapore: Elsevier. Stevens, D. J. (2001). Inside the Minds of Sexual Offenders: Predatory Rapists, Pedophiles, and Criminal Profiles. New York: Authors Choice Press. Sutherland, E. H. (1947). Criminology. (4th ed.). Philadelphia, PA: Lippincott. Swanson, C. R., Chamelin, N. C., & Territo L. (2000). Criminal Investigation (7th Ed.). McGraw-Hill Companies. Taiwan Criminal Investigation Bureau. (2008). Criminal Investigation Bureau News. Retrieved March 10, 2008, from http://www.cib.gov.tw/ Tanenbaum, A. S. (1996). Computer Networks. New Jersey: Prentice Hall PTR Inc. Tawil, D. D. (2000). ”Ready? Induce. Sting!”: Arguing for the Government’s Burden of Proving Readiness in Entrapment Cases. Michigan Law Review, 98(7). Taylor, P. A. (1999). Hackers: Crime in the Digital Sublime. London: MPG Books Ltd. Teichmann, J & Evans, K. C., (1999). Philosophy: a Beginner's Guide. Blackwell Publishing. Thomas, D. & Loader, B. (2000). Cyber-crime: Law Enforcement, Security and Surveillance in the Information Age. London: Routledge. Tittle, C. R. (1995). Control Balance: Toward a General Theory of Deviance. Boulder, CO: Westview. Tonry, M. (2003). Confronting Crime: Crime Control Policy under New Labour. UK: Willan Publishing. TPRC. (2008). Stopping Digital Copyright Infringement without Stopping Innovation. Retrieved May 10, 2008, from http://tprc.org/papers/2003/277/ United States Department of Justice. (2007, February). Prosecuting Computer Crimes. Retrieved May 10, 2008, from http://www.usdoj.gov/criminal/ Cyber-crime/ccmanual/ index.html University of Wisconsin-Eau Clair. (2009). Definition of Cognitive Distortions. Retrieved April 20, 2005, from http://www.uwec.edu/counsel/pubs/defn.htm USCERT. (2008). Computer Forensics. Retrieved September 28, 2008, from http://www.us-cert.gov/reading_room/forensics.pdf U.S. Department of Justice. (2002). Creating an Effective Stalking Protocol. Retrieved September10, 2008, from http://www.cops.usdoj.gov Wang, G., Chen, H., & Atabakhsh, H. (2004). Automatically Detecting Deceptive Criminal Identities. Communications of the ACM, 47: 71-76. Wang, H. M. (2004). Contingency Planning: Emergency Preparedness for Terrorist Attacks. Aerospace and Electronic Systems Magazine, 19(3): 21-25. Wang, S. J. & Kao, D. Y. (2004, November). Strategies to Combat the Invasion of Cyberspace from Within. 2004 Conference of Criminal Investigation and Forensics Science, Taiwan Academy of Forensic Sciences. Taiwan: TaoYuan. Wang, S. J. & Kao, D. Y. (2004, June). Cyber-crime Myths in the Justice System. The 15th Information Security Conference 2005 (ISC2005), Taiwan: Kaoshiung. Wang, S. J. & Kao, D. Y. (2007, May). Internet Forensics on the Basis of Evidence Gathering with Peep Attacks. International Journal Computer Standards & Interfaces, 29(4): 423-429. CA: Elsevier. Wang, S. J., Kao, D. Y., & Huang, F .F. Y. (Accepted on 28 September 2008). Procedure Guidance for Internet Forensics Coping with Copyright Arguments of Client-Server-Based P2P Models. International Journal Computer Standards & Interfaces. CA: Elsevier. WHO@ - Working to Halt Online Abuse. (2008). Online Harassment Statistics. Retrieved September 10, 2008, from http://www.haltabuse.org/ resources/stats/index.shtml Hopone Internet Corporation (2008). Webster Dictionary. March 10, 2008, from http://www.webster-dictionary.net Williams, M. (2006). Virtually Criminal: Crime, Deviance and Regulation Online. New York: Routledge Publisher. Williams, P. (2001). Russian Organized Crime, Russian Hacking, and U.S. Security. Retrieved March 10, 2008, from http://www.cert.org/research/isw/isw2001/papers/Williams-06-09.pdf Wilson, J. Q. & Herrnstein, R. J. (1985). Crime and Human Nature. New York: Simon and Schuster. Wikimedia Foundation, Inc. (2008). Wikipedia, the Free Encyclopedia. Retrieved April 20, 2005, from http://en.wikipedia.org/wiki/Main_Page Wilson, J. P., Drozdek B., & Turkovic, D. (2006). Prottraumatic Shame and Guilt. Trauma, Violence, & Abuse, 7(2). 122-141. Wysocki, M. D. (2003). Cracking the Hacker code: An Analysis of the Computer Hacker Ethics from Multiple Perspectives. IL: Northwestern University. Yang, C. C., Shi, X., & Wei, C. P. (2006, May). Tracing the Event Evolution of Terror Attacks from On-Line News. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006. : 343-354. CA: Springer Press. Yar, M. (2005). The Novelty of ‘Cyber-crime’: An Assessment in Light of Routine Activity Theory. European Journal of Criminology, 2 (4): 407–427: Yeung, D. & Lowrance, J. (2006). Computer-Mediated Collaborative Reasoning and Intelligence Analysis. In S. Mehrotra et al. (Eds.): IEEE International Conference on Intelligence and Security Informatics, ISI 2006: 1-13. CA: Springer Press. Zhang, L. & Zhang, S. (2004). Reintegrative Shaming and Predatory Delinquency. Journal of Research in Crime and Delinquency, 41(4): 433 - 453. CA: Sage Publications.
|