References
.

Books



[******NOTE******  The information presented in these pages has become somewhat outdated and is best viewed  for historical interest only.  However, security and privacy have continued to be major issues and many solutions are now available to users. An excellent up-to-date discussion of the concepts of Privacy, Security, and "Virtual Private Network" services (VPNs) are offered by IVPN , and by Anonymster.  See PCMagazine's comparison of a number of VPN paid services and their discussion of free VPN's, and Andrey Doichev's analysis of current top free VPN's .  Encrypted storage of information has become a major concern as well, particularly with the proliferation of cloud-based storage (see discussion by PCMagazine for an analysis and comparisons).  Finally, well-informed and articulate presentations of a number of timely security topics can be found in the Information Security Blog published by Comparitech. ************]

Anonymous.  ‘A hacker confirms fears of card fraud.’  Credit Card Management.  Feb. 2000.

Clough, Bryan. Paul Mungo. Approaching Zero. Random House. New York. Copyright 1992.

Denning, Peter J. ed. Computers Under Attack. ACM Press. New York. Copyright 1990.

Dernovsek, Darla.  ‘Managing on-line risk.’  Credit Union Magazine.  Nov. 1999.

Friedman, Matthew.  ‘Fear of hackers keeps businesses off the Internet.’  Computing Canada.  Nov. 9, 1999.

Guisnel, Jean. Cyberwars: Espionage on the Internet. Plenum Press. New York. Copyright 1997. 

Johnson, Deborah G.. Helen Nissenbaum. Computers, Ethics & Social Values. Prentice Hall. Englewood Cliffs, New Jersey. Copyright 1995.

Leininger, Tony. Cerise Vablais Eds.  How The Web Was Won: Conquering the Digital Frontier. Microsoft Press. Redmond, Washington. Copyright 1998.

McCormick, Colleen.  ‘Webbing the customer.’  Forbes.  Sept. 1998.

Platt, Charles. Anarchy Online: net sex/net crime. HarperPrism. New York. Copyright 1996.

Sterling, Bruce. The Hacker Crackdown. Bantam Books. New York. Copyright 1992.

Stern, Dana L. Preventing Computer Fraud. McGraw-Hill, Inc. New York. Copyright 1993.
.

Websites

4Anything - 4Virus

ABC News - Feds Tackle Cybercrime

ABC News - Hacker Tools May Come From Single Source

Anonymizer

AntiOnline - Government Cybercrime Crisis

CNET - The Big Picture

CNET - Keeping Prying Eyes At Bay

CNN - Transcript of Internet Security Chat

CS Monitor - Putting Some Teeth In Cyber Security

Discovery - A Hackers' Glossary

Improving Data Secrecy in Personal Computer Environment Using On-line Encryption

Internet Security Systems

Newsweek - How to Keep From Getting Hacked

PBS - Hacking Around

Virus Bulletin

Re: Quest dot Net - Viruses

Security - Index

Timberwolf Software

Washington Post - Deciphering Encryption

ZDNet - How To Protect Against Computer Viruses
.

This project was produced for PSY 380, Social Psychology of Cyberspace, Spring 2000, at Miami University.  All graphics in these pages are used with permission or under fair use guidelines, are in the public domain, or were created by the authors. Last revised: Wednesday, November 20, 2019 at 12:41: %3  This document has been accessed 1  times since 1 May 2000. 
Comments and Questions to R. Sherman
.