Limit search to available items
Book Cover
Book
Author Hollinger, Richard C.

Title Crime, deviance, and the computer / edited by Richard C. Hollinger
Published Aldershot ; Brookfield, Vt., USA : Dartmouth, [1997]
©1997

Copies

Location Call no. Vol. Availability
 W'PONDS  364.168 Hol/Cda  AVAILABLE
Description xli, 573 pages : illustrations ; 25 cm
Series The international library of criminology, criminal justice, and penology
International library of criminology, criminal justice & penology.
Contents 14. Raymond L. Hansen (1990), ̀The Computer Virus Eradication Act of 1989 : The War Against Computer Crime Continues', Software Law Journal, 3, pp. 717-47. -- 15. W. John Moore (1992), ̀Taming Cyberspace', National Journal, 24, pp. 745-9. -- 16. James A. Fagin (1991), ̀Computer Crime: A Technology Gap', International Journal of Comparative and Applied Criminal Justice, 15, pp. 285-97. -- 17. Anne W. Branscomb (1990), ̀Rogue Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime', Rutgers Computer and Technology Law Journal, 16, pp. 1-61. -- 18. Brenda Nelson (1991), ̀Straining the Capacity of the Law: The Idea of Computer Crime in the Age of the Computer Worm', Computer/Law Journal, XI, pp. 299-321. -- 19. Kenneth Rosenblatt (1990), ̀Deterring Computer Crime', Technology Review, 93, pp. 34-40. -- 20. Sanford Sherizen (1990), ̀Criminological Concepts and Research Findings Relevant for Improving Computer Crime Control', Computers and Security, 9, pp. 215-21. -- 21. Barry J. Hurewitz and Allen M. Lo (1993), ̀Computer-Related Crimes', American Criminal Law Review, 30, pp. 495-521. -- 22. Scott Charney (1994), ̀Computer Crime: Law Enforcement's Shift from aCorporeal Environment to the Intangible, Electronic World of Cyberspace', Federal Bar News & Journal, 41, pp. 489-94. -- 23. Steve Shackelford (1992), ̀Computer-Related Crime: An International Problem in Need of an International Solution', Texas International Law Journal, 27, pp. 479-505. -- 24. Andrew Rigby (1994), ̀Computer Crime : Computer Hacking and Misuse is Now a Criminal Offence', Solicitors Journal, 138, pp. 624-5. --
PART I THE DISCOVERY OF COMPUTER ABUSE (1946-76) -- 1. Lenny Siegel (1986),'Microcomputers: From Movement to Industry', Monthly Review, 38, pp. 110--17. -- 2. Steven Levy (1984), ̀The Hacker Ethic', in his Hackers: Heroes of the Computer Revolution, New York: Anchor Press/Doubleday, pp. 26-36. -- 3. Donn B. Parker (1976), ̀Computer Abuse', in his Crime by Computer, New York: Charles Scribner's Sons, pp. 12-22. -- 4. J.J. Buck BloomBecker (1990), ̀Computer Crime. and Abuse', The EDP Auditor Journal, II, pp. 34-41. -- 5. Paul Saffo (1989), ̀Consensual Realities in Cyberspace', Communications of the ACM, 32, pp. 664-5. -- 6. Richard C. Hollinger (1991), ̀Hackers: Computer Heroes or Electronic Highwaymen?', Computers and Society, 21, pp. 6-17. -- PART II THE CRIMINALIZATION OF COMPUTER CRIME (1977-87) -- 7. Richard C. Hollinger and Lonn Lanza-Kaduce (1988), ̀The Process of Criminalization:, The Case of Computer Crime Laws', Criminology, 26, pp. 101-26. -- 8. Raymond J. Michalowski and Erdwin H. Pfuhl (1991), ̀Technology, Property, and Law: The Case of Computer Crime', Crime, Law and Social Change, 15, pp. 255-75. -- 9. Erdwin H. Pfuhl, Jr. (1987), ̀Computer Abuse: Problems of Instrumental Control', Deviant Behavior, 8, pp. 113-30. -- 10. Karen A. Forcht, Daphyne Thomas and Karen Wigginton (1989), ̀Computer Crime: Assessing the Lawyer's Perspective', Journal of Business Ethics, 8, pp. 243-51. -- 11. Pamela Samuelson (1989), ̀Legally Speaking: Can Hackers Be Sued for Damages Caused by Computer Viruses?', Communications of the ACM, 32, pp. 666-9. -- 12. Michael Gemignani (1989), ̀Viruses and Criminal Law', Communications of the ACM, 32, pp. 669-71. -- 13. Christopher D. Chen (1990), ̀Computer Crime and the Computer Fraud and Abuse Act of 1986', Computer/Law Journal, X, pp. 71-86. --
PART III THE DEMONIZATION OF HACKERS (1988-92) -- 25. Mary B. Williams, David Ermann and Glaudio Gutierrez (1989), ̀Cautionary Tales and the Impacts of Computers on Society', Computers and Society, 19, pp. 23-31. -- 26. Richard C. Hollinger (1988), ̀Computer Hackers Follow a Guttman-Like Progression', Sociology and Social Research, 72, pp. 199-200. -- 27. W.R. Swinyard, H. Rinne and A. Keng Kau (1990), ̀The Morality of Software Piracy: A Cross-Cultural Analysis', Journal of Business Ethics, 9, pp. 655-64. -- 28. Richard C. Hollinger (1993), ̀Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access', Security Journal, 4, pp. 2-12. -- 29. R.A. Coldwell (1993), ̀University Students' Attitudes Towards Computer Crime: A Research Note', Computers and Society, 23, pp. 11-14. -- 30. Tony Fainberg (1989), ̀The Night the Network Failed', New Scientist, 121, pp. 38-42. -- 31. Eugene H. Spafford (1989), ̀The Internet Worm: Crisis and Aftermath', Communications of the ACM, 32, pp. 678-87. -- 32. Katie Hafner (1990), ̀Computer Crimes and Misdemeanors. Morris Code', The New Republic, 202, pp. 15-16.-- 33. Harper's Magazine (1990), ̀Is Computer Hacking a Crime? A Debate from the Electronic Underground', Harper's Magazine, March, pp. 45-55, 57. -- 34. Deborah G. Johnson (1994), ̀Crime, Abuse, and Hacker Ethics', in her Computer Ethics, New Jersey: Prentice Hall, pp. 103-23. --
PART IV THE CENSORSHIP PERIOD (1993-present) -- 35. Dorothy E. Denning (1991), ̀The United States vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights and Hacking', Communications of the ACM, 34, pp. 24-43. -- 36. John Perry Barlow (1990), ̀Crime and Puzzlement: Desperados of the DataSphere', Whole Earth Review, 68, pp. 1-24. -- 37. Bruce Sterling (1995), ̀Good Cop, Bad Hacker', Wired, 3, pp. 122, 124-9. -- 38. Tom Forernski (1992), ̀Computer Crime, United States Laws and Law Enforcement', International Yearbook of Law Computers and Technology, 6, pp. 121-7 -- 39. Dorothy E. Denning (1995), ̀Crime and Crypto on the Information Superhighway', Journal of Criminal Justice Education, 6, pp. 323-36. -- 40. Anne Wells Branscomb (1995), ̀Internet Babylon? Does the Carnegie Mellon Study of Pornography on the Information Superhighway Reveal a Threat to the Stability of Society?', The Georgetown Law Journal, 83, pp. 1935-57
Bibliography Includes bibliographical references and index
Subject Computer crimes -- United States.
Computer crimes.
Computers -- Social aspects.
Author Hollinger, Richard C.
LC no. 96041975
ISBN 1855214679 (hard)