Topics

RESEARCH GUIDE ARCHIVE : ORIGINAL GUIDE : Government Business and Privacy : A Bibliography of Selected Publications About Cybersecurity, Cybercrime and Cyberterrorism : APPLE THE FBI AND SURVEILLANCE

 



*


*

RESEARCH GUIDE ARCHIVE : ORIGINAL GUIDE :   

Government Business and Privacy


*


*




.


Government Business and Privacy


.
.
RESEARCH GUIDES : WRITING SKILLS, RESEARCH SKILLS : DATABASE SEARCHING SKILLS : 
LIFE AND EMPLOYMENT TOOLS AND SKILLS FROM RESEARCH GUIDES AND MORE
 





.
NSA releases email in dispute over Snowden 'internal whistleblowing'
Dan Roberts in Washington
Thursday 29 May 2014 16.23 EDT
The Guardian
Snowden tells NBC it was his duty to reveal sprawling NSA surveillance but going home meant 'walking into a jail cell'.
Edward Snowden: 'If I could go anywhere that place would be home'

https://tinyurl.com/ybstewj2
.
INTERNET: LAW LEGAL POLITICAL AND GOVERNMENTAL ISSUES :
PRIVACY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: GOOGLE:
Berlin Court Rules Google Privacy Policy Violates Data Protection Law
Loek Essers
IDG News Service
November 20, 2013 5:05 AM
PC World
.
UNITED STATES: GOVERNMENT :
INFORMATION LEAKS :
ESPIONAGE AND SURVEILLANCE :
SPYS AND SPYING:
Edward Snowden's NSA Leaks Show We Need a Debate
By Eugene Robinson
Published: June 10, 2013
Washington Post
Opinions
http://www.washingtonpost.com/opinions/eugene-robinson-snowdens-
nsa-leaks-show-we-need-a-debate/2013/06/10/002911b6-d203-
11e2-8cbe-1bcbee06f8f8_story.html
http://tinyurl.com/mn5nd46
.
REFERENCE: ENCYCLOPEDIAS: SUBJECT :
BOOKS :
LAW :
GOVERNMENT :
MEDIA :
INTERNET:
Encyclopedia of Privacy
.
Title Encyclopedia of Privacy: A-M
Volume 1 of Encyclopedia of Privacy, William G. Staples, ISBN 0313334773,
9780313334771
Author William G. Staples
Editor William G. Staples
Contributor William G. Staples
Publisher Greenwood Publishing Group, 2007
ISBN 0313334781, 9780313334788
Length 676 pages


.
 
Title Encyclopedia of Privacy: N-Z
Author William G. Staples
Editor William G. Staples
Publisher Greenwood Press., 2006
ISBN 0313334773, 9780313334771
Length 744 pages
.
.
Selected Reviews and Sources Citing or Noting This Encyclopedia and MORE 
FROM Penn State Summon Search:

https://tinyurl.com/y943d2w8


.
.

Encyclopedia of Privacy
by Martin Guha
Reference Reviews,
ISSN 0950-4125,
05/2008, Volume 22, Issue 3, p. 20
 
.
 
REFERENCE & INTERNET
by Anonymous
Choice, ISSN 0009-4978,
06/2011, Volume 48, Issue 10, p. 1861
 
.
 
Compromising confidentiality
by Mary Ellen Quinn
American Libraries,
ISSN 0002-9769,
08/2007, Volume 38, Issue 7, p. 87
More Sources about Compromising Confidentiality
.
 
Prying Eyes: Privacy in the Twenty-first Century
by John Peters
The Booklist,
ISSN 0006-7385,
01/2008, Volume 104, Issue 9/10, p. 70

.
 
Web 2.0, Prosumption, and Surveillance
by Christian Fuchs;
Samhlsvetenskapliga fakulteten; Humanistisk-samhlsvetenskapliga
vetenskapsomret; Uppsala universitet;
Institutionen f informatik och media;
Medier och kommunikation Surveillance & Society,
ISSN 1477-7487,
01/2011, Volume 8, Issue 3, p. 288
.
 
Pride, shame and stigma in private spaces
by Warren, Carol AB
Ethnography,
ISSN 1466-1381,
09/2010, Volume 11, Issue 3, pp. 425 - 442

https://tinyurl.com/y7ssdjcs
 

.
 
Personal information, borders, and the new surveillance studies
by Marx, GT and Muschert,
GW ANNUAL REVIEW OF LAW AND SOCIAL SCIENCE,
ISSN 1550-3585,
2007, Volume 3, Issue 1, pp. 375 - 395

https://tinyurl.com/y7lavh6b

 
.
 
Subject Listings: Social Sciences  Library Journal,
ISSN 0363-0277,
11/2006, Volume 131, Issue 19, p. 15 ...
0-415-97314-7. hc. $695; until 1/31/07, $595. UG GA
Encyclopedia of Privacy. 2 vols. Greenwood. Dec.
672p. ISBN 0-313-33477-3. hc. $199.95. 
.
 
Disclosing or Protecting? Teenagers Online Self-Disclosure
by Walrave, Michel and Heirman,
Wannes Computers,
Privacy and Data Protection: an Element of Choice,
2011, ISBN 9400706405,

.
 
Google Books
 
.
 
Broken promises of privacy: Responding to the surprising failure
of anonymization
Ohm, P
Journal: UCLA law review
ISSN: 0041-5650 Date: 2010
Volume: 57 Page: 1701

https://tinyurl.com/y8b2ttvp
 

.
 
Personal Information, Borders, and the New Surveillance Studies
Marx, Gary T.
Journal: Annual review of law and social science
ISSN: 1550-3585 Date: 12/2007
Volume: 3 Issue: 1 Page: 375
DOI: 10.1146/annurev.lawsocsci.3.081806.112824

.
 
Damages Under the Privacy Act: Is Emotional Harm" Actual"?
Quallen, NM
Journal: North Carolina law review
ISSN: 0029-2524 Date: 2009
Volume: 88 Page: 334

.
 
Sex Offenders: Identification, Risk Assessment, Treatment, and Legal
Issues
Editors Fabian M. Saleh, Albert J. Grudzinskas, John M. Bradford, M.D.,
Daniel J. Brodsky
Edition illustrated
Publisher Oxford University Press US, 2009
ISBN 0195177045, 9780195177046
Length 480 pages
p. 412
 
.
 
An Alternative View of Privacy on Facebook
Fuchs, Christian
Journal: Information
ISSN: 2078-2489 Date: 03/2011
Volume: 2 Issue: 1 Page: 140
DOI: 10.3390/info2010140 

.
 
Disclosing or Protecting? Teenagers Online Self-Disclosure
Walrave, Michel
Book: Computers, Privacy and Data Protection: An Element of Choice
ISBN: 9400706405, 9789400706408 Date: 2011 Page: 285
Place: Dordrecht Publisher: Springer
DOI: 10.1007/978-94-007-0641-5_14

https://tinyurl.com/y7l9q7dk

 
.
 
Information technology in librarianship: new critical approaches
Library and Information Science Series
Author Gloria J. Leckie
Editors Gloria J. Leckie, John Buschman
Publisher ABC-CLIO, 2009
ISBN 1591586291, 9781591586296
Length 297 pages
 
.
 
Dredging up the past: Lifelogging, memory, and surveillance
Allen, AL
Journal: The University of Chicago law review
ISSN: 0041-9494 Date: 2008
 
.
 
Pride, shame and stigma in private spaces
Warren, C. A.
Journal: Ethnography
ISSN: 1466-1381 Date: 09/2010
Volume: 11 Issue: 3 Page: 425
DOI: 10.1177/1466138110370495
.

UNITED STATES: GOVERNMENT :
SURVEILLANCE :
PRIVACY :
LIBRARIES: LIBRARIANS:
Librarians Versus the NSA
Your local library is on the front lines against government surveillance.
Zo Carpenter
May 6, 2015
This article appeared in the May 25, 2015 edition of The Nation.
http://www.thenation.com/article/206561/librarians-versus-nsa
.
Computers, Privacy and Data Protection: an Element of Choice
Editors      Serge Gutwirth, Yves Poullet, Paul de Hert, Ronald Leenes
Edition      illustrated
Publisher  Springer Science & Business Media, 2011
ISBN 9400706413, 9789400706415
Length      457 pages
 
 
.
 
No Place to Hide: Edward Snowden, the NSA,
and the U.S. Surveillance State
Author       Glenn Greenwald
Publisher  Metropolitan Books, 2014
ISBN 1627790748, 9781627790741
Length      272 pages
 
 
.
 
Computers, Business, and Security:
The New Role for Security
Author       James A Schweitzer
Publisher  Butterworth-Heinemann, 2014
ISBN 1483144895, 9781483144894
Length      166 pages
 
 
.
 
Protecting Patron Privacy: Safe Practices for Public Computers:
Safe Practices for Public Computers
Author       Matthew Beckstrom
Publisher  ABC-CLIO, 2015
ISBN 1610699971, 9781610699976
Length      104 pages
 
 
.
 
National Security Agency Surveillance:
Reflections and Revelations 2001-2013
Author       Wayne Madsen
Publisher  Lulu.com, 2013
ISBN 1304272133, 9781304272133
 
.
TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
The I-Phone Apple and the FBI

DATABASE SEARCH RESULTS FOR GOVERNMENT OR POLICE AND PRIVACY OR SURRVEILANCE
Google Scholar
Content Sample
About 2,830,000 results (0.09 sec)

[BOOK] Information privacy law

DJ Solove, P Schwartz - 2014 - books.google.com
… Discrimination: Old Responses to New Technology • Paul M. Schwartz, Privacy and the … Care
Information 7 
GOVERNMENT RECORDS A. PUBLIC ACCESS TO GOVERNMENT RECORDS
1 … 3. Constitutional Requirements of Public Access • Los Angeles 
Police Department v …

[BOOK] Theorizing surveillance

D Lyon - 2006 - books.google.com
… moral governance and CCTV Sean P. Hier, Kevin Walby and Josh Greenberg Part 5 Security,
Power, Agency and Resistance 12 
Surveillance, urbanization and the US 'Revolution in Military
Affairs' Stephen Graham 13 Electronic 
government and surveillance-oriented society …

[BOOK] Crypto: How the code rebels beat the government--saving privacy in the digital age

S Levy - 2001 - books.google.com
If you've ever made a secure purchase with your credit card over the Internet, then you have 
seen cryptography, or" crypto", in action. From Stephen Levy—the author who made" 
hackers" a household word—comes this account of a revolution that is already affecting 

A comparison of the effects of posted feedback and increased police surveillance on highway speeding

RV Houten, PA Nau - Journal of applied behavior analysis, 1981 - Wiley Online Library
Abstract A counterbalanced, reversal design was used to compare the effectiveness of 
posted feedback and increased 
police surveillance in reducing speeding on two urban 
highways. Drivers' speeds were measured using a concealed radar unit. During public 

The prevalence and burden of migraine and severe headache in the United States: updated statistics from government health surveillance studies

RC Burch, S Loder, E Loder… - Headache: The Journal …, 2015 - Wiley Online Library
Methods We searched for the most current publicly available summary statistics from the 
National Ambulatory Medical Care Survey, the National Hospital Ambulatory Medical Care 
Survey, and the National Health Interview Survey (NHIS). Summary data from the Defense 

Electronic government and surveillance-oriented society

T Ogura - Theorizing surveillance, 2006 - books.google.com
The purpose of this chapter is to clarify that surveillance technology as an information and 
communication technology (ICT) has brought about significant transformations in the 
characteristics of capitalist nation states that are based on the rule of law. Modern society is 

Joinedup government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part II

C Bellamy, C Raab - Public Administration, 2005 - Wiley Online Library
Abstract The tension between the goals of integrated, seamless public services, requiring 
more extensive data sharing, and of 
privacy protection, now represents a major challenge 
for UK policy-makers, regulators and service managers. In Part I of this article (see Public 

The Kitchen Police: Servant Surveillance and Middle-Class Transgression

BW McCuskey - Victorian Literature and Culture, 2000 - JSTOR
Toward the end of Lady Audley's Secret (1862), the most infamous femme fatale of the 
Victorian novel retires to her dressing room after a long day of committing arson and 
attempting murder. Shamming a headache, Lady Audley sends her maid from the room. The 

Who's watching us now? The nonprofit sector and the new government by surveillance

GI Walden - Nonprofit and Voluntary Sector Quarterly, 2006 - journals.sagepub.com
This article addresses the increasing use by the public sector of compliance monitoring and 
surveillance as modes of governance and the potential impact of it on the nonprofit sector. 
The article traces the origins of this shift in public sector governance to major events in the 

[PDF] Police suicide–a web surveillance of national data

JM Violanti, AF O'Hara - International journal of emergency …, 2009 - researchgate.net
Abstract: Considerable research has been done on suicide in police work. It appears that the 
volume of literature on this topic has led to considerable controversy concerning the 
accuracy and validity of 
police suicide rates. This topic has given rise to a wide variety of 
 
 About 2,830,000 results (0.09 sec)

[BOOK] Information privacy law

DJ Solove, P Schwartz - 2014 - books.google.com
… Discrimination: Old Responses to New Technology • Paul M. Schwartz, Privacy and the … Care
Information 7 
GOVERNMENT RECORDS A. PUBLIC ACCESS TO GOVERNMENT RECORDS
1 … 3. Constitutional Requirements of Public Access • Los Angeles 
Police Department v …

[BOOK] Theorizing surveillance

D Lyon - 2006 - books.google.com
… moral governance and CCTV Sean P. Hier, Kevin Walby and Josh Greenberg Part 5 Security,
Power, Agency and Resistance 12 
Surveillance, urbanization and the US 'Revolution in Military
Affairs' Stephen Graham 13 Electronic 
government and surveillance-oriented society …

[BOOK] Crypto: How the code rebels beat the government--saving privacy in the digital age

S Levy - 2001 - books.google.com
If you've ever made a secure purchase with your credit card over the Internet, then you have 
seen cryptography, or" crypto", in action. From Stephen Levy—the author who made" 
hackers" a household word—comes this account of a revolution that is already affecting 

A comparison of the effects of posted feedback and increased police surveillance on highway speeding

RV Houten, PA Nau - Journal of applied behavior analysis, 1981 - Wiley Online Library
Abstract A counterbalanced, reversal design was used to compare the effectiveness of 
posted feedback and increased 
police surveillance in reducing speeding on two urban 
highways. Drivers' speeds were measured using a concealed radar unit. During public 

The prevalence and burden of migraine and severe headache in the United States: updated statistics from government health surveillance studies

RC Burch, S Loder, E Loder… - Headache: The Journal …, 2015 - Wiley Online Library
Methods We searched for the most current publicly available summary statistics from the 
National Ambulatory Medical Care Survey, the National Hospital Ambulatory Medical Care 
Survey, and the National Health Interview Survey (NHIS). Summary data from the Defense 

Electronic government and surveillance-oriented society

T Ogura - Theorizing surveillance, 2006 - books.google.com
The purpose of this chapter is to clarify that surveillance technology as an information and 
communication technology (ICT) has brought about significant transformations in the 
characteristics of capitalist nation states that are based on the rule of law. Modern society is 

Joinedup government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part II

C Bellamy, C Raab - Public Administration, 2005 - Wiley Online Library
Abstract The tension between the goals of integrated, seamless public services, requiring 
more extensive data sharing, and of 
privacy protection, now represents a major challenge 
for UK policy-makers, regulators and service managers. In Part I of this article (see Public 

The Kitchen Police: Servant Surveillance and Middle-Class Transgression

BW McCuskey - Victorian Literature and Culture, 2000 - JSTOR
Toward the end of Lady Audley's Secret (1862), the most infamous femme fatale of the 
Victorian novel retires to her dressing room after a long day of committing arson and 
attempting murder. Shamming a headache, Lady Audley sends her maid from the room. The 

Who's watching us now? The nonprofit sector and the new government by surveillance

GI Walden - Nonprofit and Voluntary Sector Quarterly, 2006 - journals.sagepub.com
This article addresses the increasing use by the public sector of compliance monitoring and 
surveillance as modes of governance and the potential impact of it on the nonprofit sector. 
The article traces the origins of this shift in public sector governance to major events in the 

[PDF] Police suicide–a web surveillance of national data

JM Violanti, AF O'Hara - International journal of emergency …, 2009 - researchgate.net
Abstract: Considerable research has been done on suicide in police work. It appears that the 
volume of literature on this topic has led to considerable controversy concerning the 
accuracy and validity of 
police suicide rates. This topic has given rise to a wide variety of 


.About 2,830,000 results (0.09 sec)

[BOOK] Information privacy law

DJ Solove, P Schwartz - 2014 - books.google.com
… Discrimination: Old Responses to New Technology • Paul M. Schwartz, Privacy and the … Care
Information 7 
GOVERNMENT RECORDS A. PUBLIC ACCESS TO GOVERNMENT RECORDS
1 … 3. Constitutional Requirements of Public Access • Los Angeles 
Police Department v …

[BOOK] Theorizing surveillance

D Lyon - 2006 - books.google.com
… moral governance and CCTV Sean P. Hier, Kevin Walby and Josh Greenberg Part 5 Security,
Power, Agency and Resistance 12 
Surveillance, urbanization and the US 'Revolution in Military
Affairs' Stephen Graham 13 Electronic 
government and surveillance-oriented society …

[BOOK] Crypto: How the code rebels beat the government--saving privacy in the digital age

S Levy - 2001 - books.google.com
If you've ever made a secure purchase with your credit card over the Internet, then you have 
seen cryptography, or" crypto", in action. From Stephen Levy—the author who made" 
hackers" a household word—comes this account of a revolution that is already affecting 

A comparison of the effects of posted feedback and increased police surveillance on highway speeding

RV Houten, PA Nau - Journal of applied behavior analysis, 1981 - Wiley Online Library
Abstract A counterbalanced, reversal design was used to compare the effectiveness of 
posted feedback and increased 
police surveillance in reducing speeding on two urban 
highways. Drivers' speeds were measured using a concealed radar unit. During public 

The prevalence and burden of migraine and severe headache in the United States: updated statistics from government health surveillance studies

RC Burch, S Loder, E Loder… - Headache: The Journal …, 2015 - Wiley Online Library
Methods We searched for the most current publicly available summary statistics from the 
National Ambulatory Medical Care Survey, the National Hospital Ambulatory Medical Care 
Survey, and the National Health Interview Survey (NHIS). Summary data from the Defense 

Electronic government and surveillance-oriented society

T Ogura - Theorizing surveillance, 2006 - books.google.com
The purpose of this chapter is to clarify that surveillance technology as an information and 
communication technology (ICT) has brought about significant transformations in the 
characteristics of capitalist nation states that are based on the rule of law. Modern society is 

Joinedup government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part II

C Bellamy, C Raab - Public Administration, 2005 - Wiley Online Library
Abstract The tension between the goals of integrated, seamless public services, requiring 
more extensive data sharing, and of 
privacy protection, now represents a major challenge 
for UK policy-makers, regulators and service managers. In Part I of this article (see Public 

The Kitchen Police: Servant Surveillance and Middle-Class Transgression

BW McCuskey - Victorian Literature and Culture, 2000 - JSTOR
Toward the end of Lady Audley's Secret (1862), the most infamous femme fatale of the 
Victorian novel retires to her dressing room after a long day of committing arson and 
attempting murder. Shamming a headache, Lady Audley sends her maid from the room. The 

Who's watching us now? The nonprofit sector and the new government by surveillance

GI Walden - Nonprofit and Voluntary Sector Quarterly, 2006 - journals.sagepub.com
This article addresses the increasing use by the public sector of compliance monitoring and 
surveillance as modes of governance and the potential impact of it on the nonprofit sector. 
The article traces the origins of this shift in public sector governance to major events in the 

[PDF] Police suicide–a web surveillance of national data

JM Violanti, AF O'Hara - International journal of emergency …, 2009 - researchgate.net
Abstract: Considerable research has been done on suicide in police work. It appears that the 
volume of literature on this topic has led to considerable controversy concerning the 
accuracy and validity of 
police suicide rates. This topic has given rise to a wide variety of 



 GOOGLE BOOKS
https://tinyurl.com/y88nq6ze
*
GOOGLE SCHOLAR LAW CASES
*
PENN STATE SUMMON SEARCH


GOOGLE DOMAIN LIMITED WEB SEARCH (GOV)

*

YouTube

*

Google Images

*

GOOGLE DOMAIN LIMITED WEB SEARCH (PUBMED)
https://tinyurl.com/y9eql7fb

GOOGLE DOMAIN LIMITED WEB SEARCH (NEWS)
https://tinyurl.com/y8duqnq9

.

.


.

.


(corporations OR business OR government OR nsa OR fbi) AND (iphone OR iphones OR computers 
OR "smart phones" OR "i phones" OR "i phone" OR email) AND (privacy OR snopping OR breaking OR surveillance)


.



A Bibliography of Selected Publications About Cybersecurity, Cybercrime and Cyberterrorism




.

.


CYBERSECURITY : CYBERCRIME : CYBERTERRORISM : COMPUTER AND DEVICE SECURITY: 

A Bibliography of Selected Publications About Cybersecurity, Cybercrime and Cyberterrorism


.


========================================


========================================
 
.
 
CYBERSECURITY : 

CYBERCRIME : 

CYBERTERRORISM : 

COMPUTER AND DEVICE SECURITY: 

A Bibliography of Selected Publications About Cybersecurity, Cybercrime and Cyberterrorism
 
.
 
.
 
What is computer security?
Author: Bishop, M. View Author Profile
Journal: IEEE security & privacy
ISSN: 1540-7993
Date: 01/2003
Volume: 1 Issue: 1 Page: 67-69
DOI: 10.1109/MSECP.2003.1176998
 
 
.
 
Gordon, L. A., and Loeb, M. P.
(2006).
Managing cybersecurity resources: a cost-benefit analysis
(Vol. 1).
New York: McGraw-Hill.
 
 
.
 
Denning, D. E.
(2001).
Activism, hacktivism, and cyberterrorism:
The Internet as a tool for influencing foreign policy.
Networks and netwars: The future of terror, crime, and militancy,
239, 288.
 
 
.
 
Gollmann, D.
(2010).
Computer security.
Wiley Interdisciplinary Reviews:
Computational Statistics, 2(5), 544-554.
 
 
.
 
Studying users' computer security behavior: A health belief perspective
Author: Ng, Boon-Yuen View Author Profile
Journal: Decision Support Systems
Date: 03/2009
Volume: 46   Issue: 4   Page: 815-825
DOI: 10.1016/j.dss.2008.11.010
 
 
.
 
Cybercrime and Society
Author:       Majid Yar   
Cybercrime and Society
Sage Publications Ltd. ©2006
ISBN:1412907535
 
 
.
 
Examining the Applicability of Lifestyle-Routine Activities
Theory for Cybercrime Victimization
Author: Holt, Thomas J. View Author Profile
Journal: Deviant behavior
ISSN: 0163-9625
Date: 11/2008
Volume: 30 Issue: 1 Page: 1-25
DOI: 10.1080/01639620701876577
 
 
.
 
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ...
and Savage, S.
(2013).
Measuring the cost of cybercrime.
In The economics of information security and privacy
(pp. 265-300).
Springer Berlin Heidelberg.
 
 
.
 
Scene of the Cybercrime
Scene of the Cybercrime: Computer Forensics Handbook Series
Authors      Debra Littlejohn Shinder, Michael Cross
Edition        2
Publisher    Syngress, 2008
ISBN  0080486991, 9780080486994
Length        744 pages
 
 
.
 
Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M. G., ...
and Saxena, P.
(2008).
BitBlaze: A new approach to computer security via binary analysis.
In Information systems security
(pp. 1-25).
Springer Berlin Heidelberg.
 
 
.
 
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling
Author: Ten, Chee-Wooi View Author Profile
Journal: IEEE Transactions on Systems, Man, and Cybernetics –
Part A: Systems and Humans
ISSN: 1083-4427
Date: 07/2010
Volume: 40 Issue: 4 Page: 853-865
DOI: 10.1109/TSMCA.2010.2048028
 
 
.
 
Principles of Cybercrime
Author        Jonathan Clough
Edition        2
Publisher    Cambridge University Press, 2015
ISBN  1316409295, 9781316409299
 
 
.
 
Wilson, C.
(2008, January).
Botnets, cybercrime, and cyberterrorism:
Vulnerabilities and policy issues for congress.
LIBRARY OF CONGRESS WASHINGTON DC
CONGRESSIONAL RESEARCH SERVICE.
 
 
.
 
Encyclopedia of Cybercrime
Editor         Samuel C. McQuade
Publisher    Greenwood Press, 2009
Original from       the University of California
Digitized    Sep 10, 2009
ISBN  0313339740, 9780313339745
Length        210 pages
 
 
.
 
 
Cybersecurity: What Everyone Needs to Know
What Everyone Needs To Know
Authors      Peter W. Singer, Allan Friedman
Publisher    OUP USA, 2014
ISBN  0199918112, 9780199918119
Length        306 pages
 
 
.
 
Cybercrime: Investigating High-Technology Computer Crime
Author        Robert Moore
Edition        revised
Publisher    Routledge, 2010
ISBN  1437755836, 9781437755831
Length        312 pages
 
 
.
 
Cybercrime: Security and Surveillance in the Information Age
Editors        Brian D. Loader, Douglas Thomas
Publisher    Routledge, 2013
ISBN  1135122644, 9781135122645
Length        320 pages
 
 
.
 
Cybercrime 2.0 when the cloud turns dark
Author: Provos, Niels
Journal: Communications of the ACM
ISSN: 0001-0782
Date: 04/2009
Volume: 52 Issue: 4 Page: 42
DOI: 10.1145/1498765.1498782
 
 
.
 
Fundamentals of Computer Security
Authors      Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
Edition        illustrated
Publisher    Springer Science & Business Media, 2013
ISBN  3662073242, 9783662073247
Length        677 pages
 
 
.
 
Kshetri, N.
(2010).
The global cybercrime industry:
economic, institutional and strategic perspectives.
Springer Science & Business Media.
 
 
.
 
Cybercrime victimization:
An examination of individual and situational level factors
Author: Ngo, FT View Author Profile
Journal: International journal of cyber criminology
ISSN: 0974-2891
Date: 2011
Volume: 5 Issue: 1 Page: 773
 
 
.
 
Reeder, R. W., Bauer, L., Cranor, L. F., Reiter, M. K., Bacon, K., How, K., and
Strong, H.
(2008, April).
Expandable grids for visualizing and authoring computer security policies.
In Proceedings of the SIGCHI Conference on Human Factors
in Computing Systems
(pp. 1473-1482). ACM.
 
 
.
 
Data Mining and Machine Learning in Cybersecurity
Authors      Sumeet Dua, Xian Du
Edition        illustrated
Publisher    CRC Press, 2011
ISBN  1439839433, 9781439839430
Length        256 pages
 
 
.
 
Cybercrime: Criminal Threats from Cyberspace
Crime, media, and popular culture, ISSN 1549-196X
Author        Susan W. Brenner
Publisher    ABC-CLIO, 2010
ISBN  0313365466, 9780313365461
Length        281 pages
 
 
.
 
Dumitras, T., & Shou, D.
(2011, April).
Toward a standard benchmark for computer security research:
The Worldwide Intelligence Network Environment (WINE).
In Proceedings of the First Workshop on Building Analysis Datasets
and Gathering Experience Returns for Security (pp. 89-96). ACM.
 
 
.
 
Sommer, P., and Brown, I.
(2011).
Reducing systemic cybersecurity risk.
Organisation for Economic Cooperation and Development
Working Paper No. IFP/WKP/FGS (2011), 3.
 
 
.
 
Computer Security
Author        John M. Carroll
Edition        2
Publisher    Butterworth-Heinemann, 2014
ISBN  1483103013, 9781483103013
Length        462 pages
 
 
.
 
Winkler, V. J.
(2011).
Securing the Cloud: Cloud computer Security techniques and tactics.
Elsevier.
 
 
.
 
Cybersecurity: Stakeholder incentives, externalities, and policy options
Author: Bauer, Johannes M. View Author Profile
Journal: Telecommunications policy
ISSN: 0308-5961
Date: 11/2009
Volume: 33 Issue: 10-11 Page: 706-719
DOI: 10.1016/j.telpol.2009.09.001
 
 
.
 
Cybersecurity Strategies: The QuERIES Methodology
Author: Carin, Lawrence View Author Profile
Journal: Computer (Long Beach, Calif.)
ISSN: 0018-9162
Date: 08/2008
Volume: 41 Issue: 8 Page: 20-26
DOI: 10.1109/MC.2008.295
 
 
.
 
Against cyberterrorism
Author: Conway, Maura
Journal: Communications of the ACM
ISSN: 0001-0782
Date: 02/2011
Volume: 54 Issue: 2 Page: 26
DOI: 10.1145/1897816.1897829
 
 
.
 
Takahashi, T., Kadobayashi, Y., and Fujiwara, H.
(2010, September).
Ontological approach toward cybersecurity in cloud computing.
In Proceedings of the 3rd international conference on
Security of information and networks (pp. 100-109). ACM.
 
 
.
 
Computer Security Fundamentals
Author        William (Chuck) Easttom II
Edition        2
Publisher    Pearson Education, 2011
ISBN  0132828324, 9780132828321
Length        550 pages
 
 
.
 
The growing phenomenon of crime and the internet:
A cybercrime execution and analysis model
Author: Hunton, Paul View Author Profile
Journal: Computer law & security review
ISSN: 0267-3649
Date: 11/2009
Volume: 25 Issue: 6 Page: 528-535
DOI: 10.1016/j.clsr.2009.09.005
 
 
.
 
Whitty, M. T., and Buchanan, T.
(2012).
The online romance scam: A serious cybercrime.
CyberPsychology, Behavior, and Social Networking, 15(3), 181-183.
 
 
.
 
Gable, K. A.
(2010).
Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism
and Using Universal Jurisdiction as a Deterrent.
Vand. J. Transnat'l L., 43, 57.
 
 
.
 
Wash, R.
(2010, July).
Folk models of home computer security.
In Proceedings of the Sixth Symposium on Usable Privacy and Security
(p. 11). ACM.
 
 
.
 
Higgins, G. E.
(2010).
Cybercrime: An introduction to an emerging phenomenon
(p. 3).
McGraw-Hill Higher Education.
 
 
.
 
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
EBSCO ebook academic collection
Authors      Lillian Ablon, Martin C. Libicki, Andrea A. Golay
Publisher    Rand Corporation, 2014
ISBN  0833085743, 9780833085740
Length        82 pages
 
 
.
 
Cybercrime and the Culture Of Fear
Social science fiction(s) and the production of knowledge about cybercrime
Author: Wall, David S. View Author Profile
Journal: Information, Communication and Society
Date: 09/2008
  Volume: 11   Issue: 6   Page: 861-884
DOI: 10.1080/13691180802007788
 
 
.
 
Kontostathis, A., Edwards, L., and Leatherman, A.
(2010).
Text mining and cybercrime. Text Mining: Applications and Theory.
John Wiley & Sons, Ltd, Chichester, UK.
 
 
.
 
For Immediate ReleaseFebruary 12, 2013
Executive Order -- Improving Critical Infrastructure Cybersecurity
 
EXECUTIVE ORDER
 
- - - - - - -
 
IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY
 
 
OR
 
 
By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:
 
Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. The national and economic security of the United States depends on the reliable functioning of the Nation's critical infrastructure in the face of such threats. It is the policy of the United States to enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. We can achieve these goals through a partnership with the owners and operators of critical infrastructure to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards.
 
Sec. 2. Critical Infrastructure. As used in this order, the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.
 
Sec. 3. Policy Coordination. Policy coordination, guidance, dispute resolution, and periodic in-progress reviews for the functions and programs described and assigned herein shall be provided through the interagency process established in Presidential Policy Directive-1 of February 13, 2009 (Organization of the National Security Council System), or any successor.
 
Sec. 4. Cybersecurity Information Sharing. (a) It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Within 120 days of the date of this order, the Attorney General, the Secretary of Homeland Security (the "Secretary"), and the Director of National Intelligence shall each issue instructions consistent with their authorities and with the requirements of section 12(c) of this order to ensure the timely production of unclassified reports of cyber threats to the U.S. homeland that identify a specific targeted entity. The instructions shall address the need to protect intelligence and law enforcement sources, methods, operations, and investigations.
 
(b) The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a process that rapidly disseminates the reports produced pursuant to section 4(a) of this order to the targeted entity. Such process shall also, consistent with the need to protect national security information, include the dissemination of classified reports to critical infrastructure entities authorized to receive them. The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a system for tracking the production, dissemination, and disposition of these reports.
 
(c) To assist the owners and operators of critical infrastructure in protecting their systems from unauthorized access, exploitation, or harm, the Secretary, consistent with 6 U.S.C. 143 and in collaboration with the Secretary of Defense, shall, within 120 days of the date of this order, establish procedures to expand the Enhanced Cybersecurity Services program to all critical infrastructure sectors. This voluntary information sharing program will provide classified cyber threat and technical information from the Government to eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.
 
(d) The Secretary, as the Executive Agent for the Classified National Security Information Program created under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities), shall expedite the processing of security clearances to appropriate personnel employed by critical infrastructure owners and operators, prioritizing the critical infrastructure identified in section 9 of this order.
 
(e) In order to maximize the utility of cyber threat information sharing with the private sector, the Secretary shall expand the use of programs that bring private sector subject-matter experts into Federal service on a temporary basis. These subject matter experts should provide advice regarding the content, structure, and types of information most useful to critical infrastructure owners and operators in reducing and mitigating cyber risks.
 
Sec. 5. Privacy and Civil Liberties Protections. (a) Agencies shall coordinate their activities under this order with their senior agency officials for privacy and civil liberties and ensure that privacy and civil liberties protections are incorporated into such activities. Such protections shall be based upon the Fair Information Practice Principles and other privacy and civil liberties policies, principles, and frameworks as they apply to each agency's activities.
 
(b) The Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of the Department of Homeland Security (DHS) shall assess the privacy and civil liberties risks of the functions and programs undertaken by DHS as called for in this order and shall recommend to the Secretary ways to minimize or mitigate such risks, in a publicly available report, to be released within 1 year of the date of this order. Senior agency privacy and civil liberties officials for other agencies engaged in activities under this order shall conduct assessments of their agency activities and provide those assessments to DHS for consideration and inclusion in the report. The report shall be reviewed on an annual basis and revised as necessary. The report may contain a classified annex if necessary. Assessments shall include evaluation of activities against the Fair Information Practice Principles and other applicable privacy and civil liberties policies, principles, and frameworks. Agencies shall consider the assessments and recommendations of the report in implementing privacy and civil liberties protections for agency activities.
 
(c) In producing the report required under subsection (b) of this section, the Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of DHS shall consult with the Privacy and Civil Liberties Oversight Board and coordinate with the Office of Management and Budget (OMB).
 
(d) Information submitted voluntarily in accordance with 6 U.S.C. 133 by private entities under this order shall be protected from disclosure to the fullest extent permitted by law.
 
Sec. 6. Consultative Process. The Secretary shall establish a consultative process to coordinate improvements to the cybersecurity of critical infrastructure. As part of the consultative process, the Secretary shall engage and consider the advice, on matters set forth in this order, of the Critical Infrastructure Partnership Advisory Council; Sector Coordinating Councils; critical infrastructure owners and operators; Sector-Specific Agencies; other relevant agencies; independent regulatory agencies; State, local, territorial, and tribal governments; universities; and outside experts.
 
Sec. 7. Baseline Framework to Reduce Cyber Risk to Critical Infrastructure. (a) The Secretary of Commerce shall direct the Director of the National Institute of Standards and Technology (the "Director") to lead the development of a framework to reduce cyber risks to critical infrastructure (the "Cybersecurity Framework"). The Cybersecurity Framework shall include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks. The Cybersecurity Framework shall incorporate voluntary consensus standards and industry best practices to the fullest extent possible. The Cybersecurity Framework shall be consistent with voluntary international standards when such international standards will advance the objectives of this order, and shall meet the requirements of the National Institute of Standards and Technology Act, as amended (15 U.S.C. 271 et seq.), the National Technology Transfer and Advancement Act of 1995 (Public Law 104-113), and OMB Circular A-119, as revised.
 
(b) The Cybersecurity Framework shall provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess, and manage cyber risk. The Cybersecurity Framework shall focus on identifying cross-sector security standards and guidelines applicable to critical infrastructure. The Cybersecurity Framework will also identify areas for improvement that should be addressed through future collaboration with particular sectors and standards-developing organizations. To enable technical innovation and account for organizational differences, the Cybersecurity Framework will provide guidance that is technology neutral and that enables critical infrastructure sectors to benefit from a competitive market for products and services that meet the standards, methodologies, procedures, and processes developed to address cyber risks. The Cybersecurity Framework shall include guidance for measuring the performance of an entity in implementing the Cybersecurity Framework.
 
(c) The Cybersecurity Framework shall include methodologies to identify and mitigate impacts of the Cybersecurity Framework and associated information security measures or controls on business confidentiality, and to protect individual privacy and civil liberties.
 
(d) In developing the Cybersecurity Framework, the Director shall engage in an open public review and comment process. The Director shall also consult with the Secretary, the National Security Agency, Sector-Specific Agencies and other interested agencies including OMB, owners and operators of critical infrastructure, and other stakeholders through the consultative process established in section 6 of this order. The Secretary, the Director of National Intelligence, and the heads of other relevant agencies shall provide threat and vulnerability information and technical expertise to inform the development of the Cybersecurity Framework. The Secretary shall provide performance goals for the Cybersecurity Framework informed by work under section 9 of this order.
 
(e) Within 240 days of the date of this order, the Director shall publish a preliminary version of the Cybersecurity Framework (the "preliminary Framework"). Within 1 year of the date of this order, and after coordination with the Secretary to ensure suitability under section 8 of this order, the Director shall publish a final version of the Cybersecurity Framework (the "final Framework").
 
(f) Consistent with statutory responsibilities, the Director will ensure the Cybersecurity Framework and related guidance is reviewed and updated as necessary, taking into consideration technological changes, changes in cyber risks, operational feedback from owners and operators of critical infrastructure, experience from the implementation of section 8 of this order, and any other relevant factors.
 
Sec. 8. Voluntary Critical Infrastructure Cybersecurity Program. (a) The Secretary, in coordination with Sector-Specific Agencies, shall establish a voluntary program to support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure and any other interested entities (the "Program").
 
(b) Sector-Specific Agencies, in consultation with the Secretary and other interested agencies, shall coordinate with the Sector Coordinating Councils to review the Cybersecurity Framework and, if necessary, develop implementation guidance or supplemental materials to address sector-specific risks and operating environments.
 
(c) Sector-Specific Agencies shall report annually to the President, through the Secretary, on the extent to which owners and operators notified under section 9 of this order are participating in the Program.
 
(d) The Secretary shall coordinate establishment of a set of incentives designed to promote participation in the Program. Within 120 days of the date of this order, the Secretary and the Secretaries of the Treasury and Commerce each shall make recommendations separately to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs, that shall include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants in the Program.
 
(e) Within 120 days of the date of this order, the Secretary of Defense and the Administrator of General Services, in consultation with the Secretary and the Federal Acquisition Regulatory Council, shall make recommendations to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs, on the feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration. The report shall address what steps can be taken to harmonize and make consistent existing procurement requirements related to cybersecurity.
 
Sec. 9. Identification of Critical Infrastructure at Greatest Risk. (a) Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. In identifying critical infrastructure for this purpose, the Secretary shall use the consultative process established in section 6 of this order and draw upon the expertise of Sector-Specific Agencies. The Secretary shall apply consistent, objective criteria in identifying such critical infrastructure. The Secretary shall not identify any commercial information technology products or consumer information technology services under this section. The Secretary shall review and update the list of identified critical infrastructure under this section on an annual basis, and provide such list to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs.
 
(b) Heads of Sector-Specific Agencies and other relevant agencies shall provide the Secretary with information necessary to carry out the responsibilities under this section. The Secretary shall develop a process for other relevant stakeholders to submit information to assist in making the identifications required in subsection (a) of this section.
 
(c) The Secretary, in coordination with Sector-Specific Agencies, shall confidentially notify owners and operators of critical infrastructure identified under subsection (a) of this section that they have been so identified, and ensure identified owners and operators are provided the basis for the determination. The Secretary shall establish a process through which owners and operators of critical infrastructure may submit relevant information and request reconsideration of identifications under subsection (a) of this section.
 
Sec. 10. Adoption of Framework. (a) Agencies with responsibility for regulating the security of critical infrastructure shall engage in a consultative process with DHS, OMB, and the National Security Staff to review the preliminary Cybersecurity Framework and determine if current cybersecurity regulatory requirements are sufficient given current and projected risks. In making such determination, these agencies shall consider the identification of critical infrastructure required under section 9 of this order. Within 90 days of the publication of the preliminary Framework, these agencies shall submit a report to the President, through the Assistant to the President for Homeland Security and Counterterrorism, the Director of OMB, and the Assistant to the President for Economic Affairs, that states whether or not the agency has clear authority to establish requirements based upon the Cybersecurity Framework to sufficiently address current and projected cyber risks to critical infrastructure, the existing authorities identified, and any additional authority required.
 
(b) If current regulatory requirements are deemed to be insufficient, within 90 days of publication of the final Framework, agencies identified in subsection (a) of this section shall propose prioritized, risk-based, efficient, and coordinated actions, consistent with Executive Order 12866 of September 30, 1993 (Regulatory Planning and Review), Executive Order 13563 of January 18, 2011 (Improving Regulation and Regulatory Review), and Executive Order 13609 of May 1, 2012 (Promoting International Regulatory Cooperation), to mitigate cyber risk.
 
(c) Within 2 years after publication of the final Framework, consistent with Executive Order 13563 and Executive Order 13610 of May 10, 2012 (Identifying and Reducing Regulatory Burdens), agencies identified in subsection (a) of this section shall, in consultation with owners and operators of critical infrastructure, report to OMB on any critical infrastructure subject to ineffective, conflicting, or excessively burdensome cybersecurity requirements. This report shall describe efforts made by agencies, and make recommendations for further actions, to minimize or eliminate such requirements.
 
(d) The Secretary shall coordinate the provision of technical assistance to agencies identified in subsection (a) of this section on the development of their cybersecurity workforce and programs.
 
(e) Independent regulatory agencies with responsibility for regulating the security of critical infrastructure are encouraged to engage in a consultative process with the Secretary, relevant Sector-Specific Agencies, and other affected parties to consider prioritized actions to mitigate cyber risks for critical infrastructure consistent with their authorities.
 
Sec. 11. Definitions. (a) "Agency" means any authority of the United States that is an "agency" under 44 U.S.C. 3502(1), other than those considered to be independent regulatory agencies, as defined in 44 U.S.C. 3502(5).
 
(b) "Critical Infrastructure Partnership Advisory Council" means the council established by DHS under 6 U.S.C. 451 to facilitate effective interaction and coordination of critical infrastructure protection activities among the Federal Government; the private sector; and State, local, territorial, and tribal governments.
 
(c) "Fair Information Practice Principles" means the eight principles set forth in Appendix A of the National Strategy for Trusted Identities in Cyberspace.
 
(d) "Independent regulatory agency" has the meaning given the term in 44 U.S.C. 3502(5).
 
(e) "Sector Coordinating Council" means a private sector coordinating council composed of representatives of owners and operators within a particular sector of critical infrastructure established by the National Infrastructure Protection Plan or any successor.
 
(f) "Sector-Specific Agency" has the meaning given the term in Presidential Policy Directive-21 of February 12, 2013 (Critical Infrastructure Security and Resilience), or any successor.
 
Sec. 12. General Provisions. (a) This order shall be implemented consistent with applicable law and subject to the availability of appropriations. Nothing in this order shall be construed to provide an agency with authority for regulating the security of critical infrastructure in addition to or to a greater extent than the authority the agency has under existing law. Nothing in this order shall be construed to alter or limit any authority or responsibility of an agency under existing law.
 
(b) Nothing in this order shall be construed to impair or otherwise affect the functions of the Director of OMB relating to budgetary, administrative, or legislative proposals.
 
(c) All actions taken pursuant to this order shall be consistent with requirements and authorities to protect intelligence and law enforcement sources and methods. Nothing in this order shall be interpreted to supersede measures established under authority of law to protect the security and integrity of specific activities and associations that are in direct support of intelligence and law enforcement operations.
 
(d) This order shall be implemented consistent with U.S. international obligations.
 
(e) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
 
BARACK OBAMA
 
.
 
.
 
 
Cybercrime, media and insecurity:
The shaping of public perceptions of cybercrime1
Author: Wall*, David S. View Author Profile
Journal: International review of law, computers & technology
ISSN: 1360-0869
Date: 07/2008
Volume: 22 Issue: 1-2 Page: 45-63
DOI: 10.1080/13600860801924907
 
 
.
 
Burstein, A. J.
(2008).
Conducting Cybersecurity Research Legally and Ethically.
LEET, 8, 1-8.
 
 
.
 
Moore, T.
(2010).
The economics of cybersecurity: principles and policy options.
International Journal of Critical infrastructure Protection, 3(3), 103-117.
 
 
.
 
Brito, J., and Watkins, T.
(2011).
Loving the Cyber Bomb-The Dangers of Threat Inflation in Cybersecurity Policy.
Harv. Nat'l Sec. J., 3, 39.
 
 
.
 
Thierer, A. D.
(2013).
Technopanics, threat inflation, and the danger of
an information technology precautionary principle.
Minnesota Journal of Law, Science and Technology, 14(1), 12-09.
 
 
.
 
Yan, C.
(2011, October).
Cybercrime forensic system in cloud computing.
In Image Analysis and Signal Processing (IASP),
2011 International Conference on (pp. 612-615). IEEE.
 
 
.
 
The need for a national cybersecurity research and development agenda
Author: Maughan, Douglas
Journal: Communications of the ACM
ISSN: 0001-0782
Date: 02/2010
Volume: 53 Issue: 2 Page: 29
DOI: 10.1145/1646353.1646365
 
 
.
 
The need for a national cybersecurity research and development agenda
Author: Maughan, Douglas
Journal: Communications of the ACM
ISSN: 0001-0782
Date: 02/2010
Volume: 53 Issue: 2 Page: 29
DOI: 10.1145/1646353.1646365
 
 
.
 
Lachow, I.
(2009).
Cyber terrorism: Menace or myth.
Cyberpower and national security, 434-467.
 
 
.
 
Holt, T. J.
(2012).
Exploring the intersections of technology, crime, and terror.
Terrorism and Political Violence, 24(2), 337-354.
 
 
.
 
Nojeim, G. T.
(2010).
Cybersecurity and Freedom on the Internet.
J. Nat'l Sec. L. and Pol'y, 4, 119.
 
 
.
 
Decision support for Cybersecurity risk planning
Author: Rees, Loren Paul View Author Profile
Journal: Decision Support Systems
Date: 06/2011
 Volume: 51   Issue: 3   Page: 493-505
DOI: 10.1016/j.dss.2011.02.013
 
 
.
 
The Seven Scam Types: Mapping the Terrain of Cybercrime
Author: Stabek, Amber
Book: Cybercrime and Trustworthy Computing Workshop (CTC),
2010 Second
ISBN: 1-4244-8054-X, 978-1-4244-8054-8
Date: 07/2010
Page: 41-51
DOI: 10.1109/CTC.2010.14
 
 
.
 
.
 
WEBBIB1516
 
 
.
 
.



.

.

APPLE THE FBI AND SURVEILLANCE

The I-Phone Apple and the FBI

.



.
========================================


========================================
.

.

TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
Apple Attorney: Unlocking San Bernardino Shooter's I-phone
Would Open 'Pandora's Box'
Christopher Goffard
2/21/2016
Los Angeles Times
A shorter URL for the above link:
.


TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Apple to FBI: Weakening iPhone Security
Could Make the Power Grid More Hackable
Tom Simonite
March 7, 2016
MIT Technology Review
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
In Apple vs. the FBI, There Is No Technical Middle Ground
by David Talbot
March 2, 2016
MIT Technology Review
https://www.technologyreview.com/s/600923/
in-apple-vs-the-fbi-there-is-no-technical-middle-ground/
A shorter URL for the above link:
.
TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Apples Stand Against the FBI Gets Weak Backing from Other Tech Giants
CEO Tim Cook roared in defiance of a court order demanding he unlock
a terrorists iPhone, but other companies have been muted or silent on the matter.
by Tom Simonite
February 18, 2016
MIT Technology Review 
A shorter URL for the above link:
.
TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Judge Rejects FBI Bid to Order Apple to Unlock Drug Dealer's iPhone
March 01, 2016
Democracy Now
AND
Judge Sides With Apple in Encryption Battle
Howard Mintz
March 1, 2016
Source: San Jose Mercury News
Officer.com
.
TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
US Government Files Appeal in New York Iphone Unlocking Case
Move is part of a campaign to show that Apple has assisted law
enforcement in dozens of similar cases, and is thus able to help
the FBI gather evidence
Danny Yadron in San Francisco
Monday 7 March 2016 20.27 EST
The Guardian

SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS :
UNITED STATES: CONSTITUTION :
LAW CASES:
DOJ Appeals New York Pro-Apple Court Order
DOJ says it cannot try to unlock a seized iPhone
without risking erasing data
By John Ribeiro
IDG News Service
March 8, 2016 3:13 AM PT
Computer World
TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
How a 1789 Law Impacts Your Iphone
PUBLISHED: TUESDAY, MARCH 8, 2016 AT 12:30 AM
Los Angeles Times
Daily News
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Apple vs. FBI: What's Really Going On?
by Edd Gent
Live Science
March 08, 2016 12:10pm ET
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Snowden: FBI's Claim that it Requires Apple's Help
to Unlock IPhone is 'Bullshit'
by BRYAN CLARK
TNW News
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
One of the FBIs Major Claims in the iPhone Case Is Fraudulent
By Daniel Kahn Gillmor
Technology Fellow, ACLU Speech, Privacy, and Technology Project
MARCH 7, 2016 | 3:30 PM
American Civil Liberties Union (ACLU)
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Why the NSA is Staying out of Apple's Fight with the FBI
Apples court fight has exposed a deep rift in how
the two agencies deal with technology
By Russell Brandom
March 9, 2016 01:44 pm
The Verge
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS :
TECHNOLOGY: HISTORY :
TELECOMMUNICATIONS: HISTORY:
At Supreme Court, Debate Over Phone Privacy Has A Long History
Updated March 8, 20161:42 PM ET
Published March 8, 20161:13 PM ET
NAOMI LACHANCE
NPR
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS :
INTERVIEWS:
Why Digital Security Is An 'Arms Race' Between Firms And The Feds
Updated March 8, 201611:32 AM ET
Published March 7, 20165:13 PM ET
NPR
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Apple VP: The FBI Wants to Roll Back Safeguards
that Keep Us a Step Ahead of Criminals
By Craig Federighi
March 6, 2016
Washington Post
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Eddy Cue Fears Surveillance State if FBI Wins iPhone Unlock Case
Thursday March 10, 2016 1:40 AM PST
by Tim Hardwick
Mac Rumors (BLOG)
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS :
CIVIL LIBERTIES:
Black Lives Matter Activists Say FBI Fight
to Break IPhone Encryption Threatens Civil Liberties
By Mikey Campbell
Tuesday, March 08, 2016, 07:12 pm PT (10:12 pm ET)
Apple Insider (BLOG)
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
U.S. Attorney General Says iPhone Unlock Request Won't Lead
to Widespread Privacy Breaches
Friday March 11, 2016 7:49 AM PST
by Mitchel Broussard
MAC Rumors
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
The Tone Between Apple and the FBI is Now Openly Hostile
"It seems like disagreeing with the Department of Justice means you must be evil and anti-American."
By Chris Welch
March 10, 2016 07:00 pm
The Verge
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Apple: DOJ 'Desperate,' Brief Reads Like Indictment
Jacob Pramuk
CNBC News
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
Obama Weighs in on Apple v. FBI: "You Can't Take an Absolutist View"
"I'm not a software engineer... we need the tech community to help us solve [this issue]."
by Sam Machkovech
March 11, 2016 5:35pm EST
Ars Technica
.
TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS: Another Point in
Apples Court; Ex CIA Director Against FBI
Ex-CIA Director indirectly takes Apples side while hinting that
The FBI doesnt seem to be only after the information,
but there's something else as well
By: Anusha Asif
March 12, 2016 at 10:42 am EST
Tech News Today.com
.

TECHNOLOGY :
SECURITY :
TELECOMMUNICATIONS: SMART PHONES :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
COMPUTER: HACKING AND HACKERS:
FBI Misleads Public in Demanding Courts Order Apple Access
March 12, 2016
By Gordon L. Weil
Notes from a Corner of the Country: News that affects Mainers
.

TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
Apple Employees Threaten to Quit if Forced to Build GovtOS, Report Says
By Mikey Campbell
Thursday, March 17, 2016, 03:23 pm PT (06:23 pm ET)
Apple Insider
.

BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
Heres the Full Transcript of TIMEs Interview With Apple CEO Tim Cook
Nancy Gibbs and Lev Grossman
Time
http://time.com/4261796/tim-cook-transcript/ 

.
FBI: We May not Need Apple’s Help with That Iphone, 
but We Didn’t Lie About It
TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
FBI: We May not Need Apple's Help with That Iphone,
but We Didn't Lie About It
By Andrea Peterson
March 24, 2016  at 1:36 PM
Washington Post
.
TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
FBI Director Says Fight with Apple about Terrorism, not Setting Precedent
"You are simply wrong to assert that the FBI and the Justice Department lied...."
by David Kravets -
March 24, 2016 1:30pm EDT
Ars Technica
TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY : PRIVACY:
F.B.I. Clash With Apple
Loosed a Torrent of Possible Ways to Hack an iPhone
By KATIE BENNER
March 23, 2016
New York Times
.
TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
Why Apple Won Round 1 vs. the FBI, and What Comes Next
by  Jeff John Roberts
March 23, 2016, 9:03 AM EDT
Fortune
.

TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
Here Are 63 Other Cases Where The Government
Asked For Help To Unlock A Smartphone
Matt Drange
Forbes Tech
The Little Black Book of Billionaire Secrets
March 30, 2016 @ 06:00 AM

TECHNOLOGY : BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
Apple vs. FBI: What Happened?
March 30, 2016
Baltimore Sun
.
TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL BUREAU OF INVESTIGATION (FBI) :
INTERNET: SECURITY :
PRIVACY:
Did the FBI Just Win Its Fight Against Apple? Not Really.
Susan Hennessey
The FBIs hacking feat with the San Bernadino phone does nothing
to solve the larger issues. Instead, the debate will be settled over time
by many small compromises and trade-offs.
March 29, 2016
MIT Technology Review
.

TECHNOLOGY :
BUSINESS: CORPORATIONS: NAMED CORPORATIONS: APPLE :
UNITED STATES: GOVERNMENT: FEDERAL COMMUNICATIONS COMMISSION (FCC) :
INTERNET: SECURITY :
PRIVACY:
FCC Votes To Propose New Privacy Rules For Internet Service Providers
March 31, 2016    5:27 PM ET
NPR
.

.



.
.

WEBBIB1516

.

.




David Dillard



NET-GOLD
 
 
Research Guides
 
 
Research Paper Writing

Internships
 
Blog
 
Twitter: davidpdillard
 
Sport-Med