References


AusCERT. (2003). 2003 Australian computer crime and security survey. Auscert Report.

Brammer, M. (2000). New South Wales police service response to matters of interest “ CJC inquiry into release of confidential information . [Report]/ Om. Sydney: NSWPS Internal Affairs.

Caelli, W., Longley, D., & Shain, M. (1989). Information security for managers . New York: Stockton Press.

Chantler, A. (1995). Risk: The profile of the computer hacker PhD Thesis. Curtin Business School, Australia.

Coldwell, R. (1994, February 28-March 2). Perceptions of computer crime. In Proceedings of the Australian Institute of Criminology Conference, Crime Against Business, Melbourne. Retrieved from: http://www.aic.gov.au/conferences/business/coldwell.pdf

Coldwell, R. (1995). Australian attitudes toward legal intervention into hacking. Communications of the ACM , 38 (11).

Dreyfus, S. (1997). Underground: Tales of hacking, madness and obsession on the electronic frontier . Melbourne: Random House.

Enders, M., & Enders, L. (2000, November 11-12). Cops, computers, and the right to privacy in the information age: Unauthorised access and inappropriate disclosure of information complaints in New South Wales. In Proceedings of the Second Australian Institute of Computer Ethics Conference, Canberra, Australia. Retrieved from: http://www.businessit.bf.rmit.edu.au/aice/Main/resources/AICE2000/papers/end.pdf

Hughes, G. (1990). Computer crime: The liability of hackers. Australian Computer Journal , 22 (2).

Kamay, V., & Adams, T. (1992). The 1992 profile of computer abuse in Australia . Melbourne: Australian Computer Abuse Research Bureau (ACARB).

Kingsley, P. (2002). Queen v. Boden . ACISP 2002 Forensic Computer Workshop, Melbourne.

Levy, S. (1994). Hackers: Heroes of the computer revolution . Penguin.

Lopez-Fernandez, M., & Warren, M.J. (2002). An overview of Australian hacking . School of IT technical report “ TRC 12.08. Geelong, Vic.: School of Information Systems, Deakin University.

New South Wales Ombudsman. (1992). NSW Ombudsman 1991-92 Annual Report . Sydney: NSW Ombudsman.

New South Wales Ombudsman. (1993). NSW Ombudsman 1992-93 Annual Report . Sydney: NSW Ombudsman.

New South Wales Ombudsman. (2000). NSW Ombudsman 1999-2000 Annual Report . Sydney: NSW Ombudsman.

Sterling, B. (1993). The hacker crackdown: Law and disorder on the electronic frontier . Bantam.

Valli, C. (2001, November). A byte of prevention is worth a terabyte of remedy. 2nd Working with e-Business (We-B) Conference , Scarborough, Western Australia. Retrieved from: http://bizbytes.bpm.ecu.edu.au/mismedia/pdf/0032.pdf

Valli, C. (2002). The non business of the World Wide Web in three Western Australian organisations. Proceedings of International Network Conference (INC) 2002 , Plymouth, UK.




Electronic Monitoring in the Workplace. Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions
ISBN: 1591404568
EAN: 2147483647
Year: 2005
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net