د/ايمان زغلول قاسم

استاذ تكنولوجيا التعليم المشارك بكلية التربية بالزلفي

جرائم الانترنت32

ثانيا- المراجع الاجنبية:

  1. Adsit, C. Kristin. (1999). Internet Pornography Addiction.[Online].                                                                                     Available: http://www.chemistry.vt.edu/chem-dept/%20dessy/honors%20/papers99/adsit.htm  [9.3.2001].

  2. Highley, Reid. (1999). Viruses: The Internet’s Illness.[Online]. Available: http://www.chemistry.vt.edu/chem-dept/dessy/honors%20/papers99/highleh.htm  [9.3.2001].

  3. Koerner, B. I. (1999,November 22). Only you can prevent computer intrusions. U.S. News and World Report, 127, pp. 50.

  4. Morningstar, Steve. (1998). Internet Crime and Criminal Procedures. [Online].                                                           Available: http://www.prevent-abuse-now.com/index.html  [13.10.2001].

  5. Nanoart. (2000) [Online].                                                                      Available: http://www.nanoart.f2s.com/hack/ [15.11.2000].

  6. NUA Internet Surveys. (1998,June). How Many Online? [Online]. Available: http://www.nua.ie/surveys/howmayonline/index.html [26.10.2000].

  7. Rapalus, P.(2000,May). Ninety percent of survey respondents detect cyber attacks. Computer Security Institute. [Online]. Available: http://www.gocsi.com/prelen_000321.htm [11.10.2001]

  8. Reuvid, Jonathan. (1998). The Regulation and Prevention of Economic Crime, London: Kogan, 14. 

  9. Skinner, W. F., & Fream, A. M. (1997, November). A social learning theory analysis of computer crime among college students. Journal of research in Crime and Delinquency, 34 (4), 495-519.

  10. Staff. ( 2000, April 2). The Business of Technology. Available:http://www.redherring.com/mag/issue7/news-security.html [11.10.2001].

  11. Thomas, P. (2000, February 23). Insufficient computer security threatens doing business. [Online]. Available:http://www.cnn.com/2000/TECK/computing/02/23/credir.card.thefts/index.html  [11.11.2001].

  12. Thompson, R. ( 1999, February). Chasing after petty computer crime. IEEE Potentials, 18 (1), 20-22.

  13. Vacca, John. (1996). Internet Security Secrets.USA:IDG Book. Worldwide Inc.

  14. Wilson, c. (2000) Holding management accountable: a new policy for protect against computer crime. Proceedings of the National Aerospace and Electronics Conference, USA 2000, 272-281.

 


 

 

الوقت من ذهب

اذكر الله


المصحف الالكتروني