Friday 26 October 2012

[1] Foote D. (2002, March). Good Ethics at Work Lie in the
Hiring. Computerworld. Retrieved July23, 2004 from
http://www.computerworld .com/printthis/2002/0,
4814,68719,00.html
[2] Harvey B. (2004). Computer hacking and ethics. University
of California, Berkeley. Retrieved July23, 2004 from
http://www. cs.berkeley.edu/ ~bh/hackers.html
[3] Internet Stuff. (2004, May, 25). 2004 E-Crime Watch
Survey. Retrieved July23, 2004 from
http://www.cert.org/about/ecrime.html)
[4] Internet Stuff. (2004). Threats and protection by Homeland
Security. Retrieved July23, 2004 from
http://www.dhs.gov/dhspublic/ display?theme
=30&content=3813
[5] Internet stuff. (2004). What is cyber crime. Retrieved July
23, 2004 from http://www.
cybercitizenship.org/crime/crime.html
[6] Khalid A. (2004, March 5). Cyber crime: Business and the
law on different pages. The Star. Retrieved June 28, 2004
from http://www.niser.org.my/news/2004_03_05_01.html
[7] Labuschagne L. (2000, July). Evaluation criteria. Rand
Afrikaans University. Retrieved July23, 2004 from
http://csweb.rau.ac.za/staff/labuschagne/
research/articles/eth_hac.pdf
[8] McCullagh D. (2003, August, 1). Hackers get lesson in the
law. CnetNews. Retrieved July23, 2004 from
http://news.com.com/2100-1009 5058918.html
[9] Raymond, E. (2001). What Is a Hacker? Retrieved July 23
2004 from http://www.catb.org/~esr/faqs/hacker-howto.html
[10] Sager I. (2000, February, 21). Cyber Crime. Businessweek
Online. Retrieved July23, 2004 from http://www.
businessweek. com/2000/00_ 08/b3669001.htm
[11] Wilson M. (2003, April 09). War, ethics and security.
Computerworld. Retrieved July23, 2004 from http://www.
computerworld. com/printthis/ 2003/0, 4814,80185,00.html
[12] Whitman, Michael E. and Mattord, Herbert J. Management
of Information Security. Boston, Massachusetts: Thomson
Course Technology, 2004, 363-375.

No comments:

Post a Comment