Professional Documents
Culture Documents
Computer Crimes 2
Computer Crimes 2
3 S. Zuboff, In the Age of the Smart Machine, New York; 1992.Michael Gemignani,
Viruses And
Criminal Law. Reprinted in Lance Hoffman, Rogue Programs: Viruses, Worms and Tr
ojan Horses,
New York, 1990.4 Lauren Wiener, Digital Woes, 1993.5 John Perry Barlow, "The Eco
nomy of
Ideas", Wired, March 1994.6 Martin Sprouse, "Sabotage in the American Workplace:
Anecdotes
of Dissatisfaction, Mischief, and Revenge", New York; 1992. (Bank of America Em
ployee who
planted a logic bomb in the company computer system).
7 Curtis E.A. Karnow, Recombinant Culture: Crime In The Digital Network. (Speec
h, Defcon
II, Los Vegas), 1994.
------------------
Works Cited
Addison-Wesley, Bernard. How the Internet Came to Be. New York: Vinton Cer
f, 1993.
Communications Decency Act. Enacted by the U.S. Congress on February 1, 199
6.
Computer Fraud and Abuse Statute. Section 1030: Fraud and related activity i
n connection
with computers.
Denning, Dorothy. "Concerning Hackers Who Break into Computer Systems". Speec
h presented
at the 13th National Computer Security Conference, Washington, DC, 1990.
Gates, Bill. The Road Ahead. New York: Penguin Books USA, inc, 1995.
The Gatsby. "A Hackers Guide to the Internet". Phrack. Issue 33, File 7; 15
September
1991.
Icove, David, Karl Seger, and William VonStorch. Fighting Computer Crime. USA
: O'Reilly
Books, 1996.
Time Life Books. Revolution in Science. Virginia: Time Life Books, inc., 19
87.
Wallich, Paul. "A Rouge's Routing." Scientific American. May 1995, pp. 31.