Bibliography: (1) Bowen, Mace. “Computer Crime.” 9/14/99. http://www.guru.net/. Visited: 10/28/00. (2) Edgar, Stacey L. Morality and Machines: Perspectives on Computer Ethics. Sudbury: Jones and Bartlett Publishers, 1997. (3) Jenson, Barbara. Cyberstalking: Crime, Enforcement and Personal Responsibility in the On-line World. New York: Wiley Computer Publishing, 1996. (4) Parker, Donn B. Computer Security. CD-ROM. Encarta Encyclopedia 2000. Microsoft Corporation. 1993-1999. (5) Parker, Donn B. Fighting Computer Crime: A New Framework for Protecting Information. New York: Wiley Computer Publishing, 1998. (6) Tribe, Laurence H. The Constitution in Cyberspace. New York: Warren & Computer Professionals, 1991. (7) U.S. Dept of Justice. “Cyber Crime.” 5/23/00. http://www.cybercrime.gov/. Visited: 10/27/00. Word Count: 2254
Bibliography: (1) Bowen, Mace. “Computer Crime.” 9/14/99. http://www.guru.net/. Visited: 10/28/00. (2) Edgar, Stacey L. Morality and Machines: Perspectives on Computer Ethics. Sudbury: Jones and Bartlett Publishers, 1997. (3) Jenson, Barbara. Cyberstalking: Crime, Enforcement and Personal Responsibility in the On-line World. New York: Wiley Computer Publishing, 1996. (4) Parker, Donn B. Computer Security. CD-ROM. Encarta Encyclopedia 2000. Microsoft Corporation. 1993-1999. (5) Parker, Donn B. Fighting Computer Crime: A New Framework for Protecting Information. New York: Wiley Computer Publishing, 1998. (6) Tribe, Laurence H. The Constitution in Cyberspace. New York: Warren & Computer Professionals, 1991. (7) U.S. Dept of Justice. “Cyber Crime.” 5/23/00. http://www.cybercrime.gov/. Visited: 10/27/00. Word Count: 2254