80
Views
2
CrossRef citations to date
0
Altmetric
Articles

Preparing for high technology crime: An educational assessment of criminal justice and criminology academic programs

&
Pages 251-271 | Published online: 18 Aug 2006

REFERENCES

  • Armstrong , I. 2000 . Computer Crime Spreads . SC Info Security , 11 ( 4 ) : 26 – 26 .
  • Bequai , A. 1987 . Technocrimes , Lexington, MA : D.C. Heath and Company .
  • Bologna , J. 1993 . Handbook on Corporate Fraud , Boston : Butterworth-Heinemann .
  • Buckland , J. , ed. 1992 . Combating Computer Crime: Prevention, Detection, Investigation , New York : McGraw Hill, Inc. .
  • Carter , D.L. and Katz , A. 1996 . Computer Crime: An Emerging Challenge for Law Enforcement . FBI Law Enforcement Bulletin , [On-line]. Available: www.fbi.gov/leb/dec961.txt.
  • Clark , F. and Diliberto , K. 1996 . Investigating Computer Crime , Boca Raton, FL : CRC Press .
  • Collins , J.E. 1987 . Demand for Computer Crime Investigation Increases . Data Management , April : 9 – 10 .
  • Conly , C.H. 1989 . Organizing for Computer Crime Investigation and Prosecution , Washington, DC : United States Department of Justice, National Institute of Justice .
  • Coutorie , L.E. 1995 . The Future of High-Technology Crime: A Parallel Delphi Study . Journal of Criminal Justice , 23 : 13 – 27 .
  • Gemignani , M.C. 1987 . What is Computer Crime, and Why Should We Care? . University of Arkansas at Little Rock Law Journal , 10 : 55 – 67 .
  • Groover , R.S. 1996 . Overcoming Obstacles: Preparing for Computer-Related Crime . FBI Law Enforcement Bulletin , [On-line]. Available: www.fbi.gov/leb/aug962
  • Icove , D. , Seger , K. and VonStorch , W. 1995 . Computer Crime: A Crimefighter's Handbook , Sebastopol, CA : O'Reilly & Associates, Inc. .
  • Kovacich , G.L. and Boni , W.C. 2000 . High Technology Crime Investigator's Handbook: Working in the Global Information Environment , Boston : Butterworth-Heinemann .
  • Malinowski , M. and Tafoya , W. 1997 . Is Your Network Secure? . Crime & Justice International , [On-line]. Available: www.acsp.uic.edu/oicj/pubs/cjintl/1304/130408.shtml
  • McEwen , J.T. 1989 . Dedicated Computer Crime Units , Washington, DC : United States Department of Justice, National Institute of Justice .
  • Myers , L.B. 1994 . The Evaluation of Criminal Justice Programs: Assessment of Evolving Standards in Context . Journal of Criminal Justice Education , 5 : 31 – 48 .
  • Myers , L.B. and Myers , L.J. 1995 . Criminal Justice Computer Literacy: Implications for the Twenty-First Century . Journal of Criminal Justice Education , 6 : 281 – 297 .
  • Myers , L.J. 2000 . “ High Technology Crime Investigation: A Curricular Needs Assessment of the Largest Criminal Justice and Criminology Programs in the United States ” . In Doctoral dissertation , College Station, TX : Texas A&M University .
  • Myers , L.J. and Beatty , P.T. 2001 . Computer Information Systems and the High Technology Offender: The Need for an Interdisciplinary Approach in Higher Education Curricula . ACJS Today , 12 ( 1 ) : 1 – 1 . 4–6
  • National Center for Education Statistics. 1999. “Integrated Postsecondary Education Data System (IPEDS).” [On-line]. Available nces.ed.gov/Ipeds
  • Parker , D.B. 1989 . Computer Crime: Criminal Justice Resource Manual , Second Edition , Washington, DC : United States Department of Justice, National Institute of Justice .
  • Parker , D.B. 1998 . Fighting Computer Crime: A New Framework for Protecting Information , New York : John Wiley & Sons, Inc. .
  • President's Commission on Critical Infrastructure Protection . 1997 . Critical Foundations: Protecting America's Infrastructures , Washington, DC : United States President's Commission on Critical Infrastructure Protection .
  • Rosenblatt , K. 1995 . High-Technology Crime: Investigating Cases Involving Computers , San Jose, CA : KSK Publications .
  • Sharrar , K. and Granado , J. 1997 . Confessions of a Hard Drive: Computer Security . Security Management , 41 : 73 – 78 .
  • Soskis , J.H. 1990 . “ Computer Technology and the Criminal Justice Agency: Assessing Costs and Benefits ” . In Computers in Criminal Justice: Issues and Applications , Edited by: Schmalleger , F. 125 – 150 . Bristol, IN : Wyndham Hall . In
  • Tafoya , W.L. 1986 . “ A Delphi Forecast of the Future of Law Enforcement ” . In Doctoral dissertation , College Park, MD : The University of Maryland .
  • Nations Manual on the Prevention and Control of Computer-Related Crime.” [On-line]. Available www.ifs.univie.ac.at/~pr2gql/rev4344.html
  • U.S. Department of Labor. 1996. “The Occupational Information Network.” [On-line]. Available www.doleta.gov/programs/onet
  • White , A. and Charney , S. 1995 . “ Search and Seizure of Computers: Key Legal and Practical Issues ” . In Technical Bulletin , Sacramento, CA : SEARCH, The National Consortium for Justice Information and Statistics .
  • Witkin , B.R. 1984 . Assessing Needs in Educational and Social Programs , San Francisco : Jossey-Bass Inc., Publishers .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.