REFERENCES
- Armstrong , I. 2000 . Computer Crime Spreads . SC Info Security , 11 ( 4 ) : 26 – 26 .
- Bequai , A. 1987 . Technocrimes , Lexington, MA : D.C. Heath and Company .
- Bologna , J. 1993 . Handbook on Corporate Fraud , Boston : Butterworth-Heinemann .
- Buckland , J. , ed. 1992 . Combating Computer Crime: Prevention, Detection, Investigation , New York : McGraw Hill, Inc. .
- Carter , D.L. and Katz , A. 1996 . Computer Crime: An Emerging Challenge for Law Enforcement . FBI Law Enforcement Bulletin , [On-line]. Available: www.fbi.gov/leb/dec961.txt.
- Clark , F. and Diliberto , K. 1996 . Investigating Computer Crime , Boca Raton, FL : CRC Press .
- Collins , J.E. 1987 . Demand for Computer Crime Investigation Increases . Data Management , April : 9 – 10 .
- Conly , C.H. 1989 . Organizing for Computer Crime Investigation and Prosecution , Washington, DC : United States Department of Justice, National Institute of Justice .
- Coutorie , L.E. 1995 . The Future of High-Technology Crime: A Parallel Delphi Study . Journal of Criminal Justice , 23 : 13 – 27 .
- Gemignani , M.C. 1987 . What is Computer Crime, and Why Should We Care? . University of Arkansas at Little Rock Law Journal , 10 : 55 – 67 .
- Groover , R.S. 1996 . Overcoming Obstacles: Preparing for Computer-Related Crime . FBI Law Enforcement Bulletin , [On-line]. Available: www.fbi.gov/leb/aug962
- Icove , D. , Seger , K. and VonStorch , W. 1995 . Computer Crime: A Crimefighter's Handbook , Sebastopol, CA : O'Reilly & Associates, Inc. .
- Kovacich , G.L. and Boni , W.C. 2000 . High Technology Crime Investigator's Handbook: Working in the Global Information Environment , Boston : Butterworth-Heinemann .
- Malinowski , M. and Tafoya , W. 1997 . Is Your Network Secure? . Crime & Justice International , [On-line]. Available: www.acsp.uic.edu/oicj/pubs/cjintl/1304/130408.shtml
- McEwen , J.T. 1989 . Dedicated Computer Crime Units , Washington, DC : United States Department of Justice, National Institute of Justice .
- Myers , L.B. 1994 . The Evaluation of Criminal Justice Programs: Assessment of Evolving Standards in Context . Journal of Criminal Justice Education , 5 : 31 – 48 .
- Myers , L.B. and Myers , L.J. 1995 . Criminal Justice Computer Literacy: Implications for the Twenty-First Century . Journal of Criminal Justice Education , 6 : 281 – 297 .
- Myers , L.J. 2000 . “ High Technology Crime Investigation: A Curricular Needs Assessment of the Largest Criminal Justice and Criminology Programs in the United States ” . In Doctoral dissertation , College Station, TX : Texas A&M University .
- Myers , L.J. and Beatty , P.T. 2001 . Computer Information Systems and the High Technology Offender: The Need for an Interdisciplinary Approach in Higher Education Curricula . ACJS Today , 12 ( 1 ) : 1 – 1 . 4–6
- National Center for Education Statistics. 1999. “Integrated Postsecondary Education Data System (IPEDS).” [On-line]. Available nces.ed.gov/Ipeds
- Parker , D.B. 1989 . Computer Crime: Criminal Justice Resource Manual , Second Edition , Washington, DC : United States Department of Justice, National Institute of Justice .
- Parker , D.B. 1998 . Fighting Computer Crime: A New Framework for Protecting Information , New York : John Wiley & Sons, Inc. .
- President's Commission on Critical Infrastructure Protection . 1997 . Critical Foundations: Protecting America's Infrastructures , Washington, DC : United States President's Commission on Critical Infrastructure Protection .
- Rosenblatt , K. 1995 . High-Technology Crime: Investigating Cases Involving Computers , San Jose, CA : KSK Publications .
- Sharrar , K. and Granado , J. 1997 . Confessions of a Hard Drive: Computer Security . Security Management , 41 : 73 – 78 .
- Soskis , J.H. 1990 . “ Computer Technology and the Criminal Justice Agency: Assessing Costs and Benefits ” . In Computers in Criminal Justice: Issues and Applications , Edited by: Schmalleger , F. 125 – 150 . Bristol, IN : Wyndham Hall . In
- Tafoya , W.L. 1986 . “ A Delphi Forecast of the Future of Law Enforcement ” . In Doctoral dissertation , College Park, MD : The University of Maryland .
- Nations Manual on the Prevention and Control of Computer-Related Crime.” [On-line]. Available www.ifs.univie.ac.at/~pr2gql/rev4344.html
- U.S. Department of Labor. 1996. “The Occupational Information Network.” [On-line]. Available www.doleta.gov/programs/onet
- White , A. and Charney , S. 1995 . “ Search and Seizure of Computers: Key Legal and Practical Issues ” . In Technical Bulletin , Sacramento, CA : SEARCH, The National Consortium for Justice Information and Statistics .
- Witkin , B.R. 1984 . Assessing Needs in Educational and Social Programs , San Francisco : Jossey-Bass Inc., Publishers .