1. Bandura, A. (2001). Social cognitive theory of mass communication. Media Psychology, 3,265-299.
2. Baron, L. S. (1988). Legitimate violence, violent attitudes, and rape: A test of cultural spillover theory. Annals of the New York Academy of Sciences, 528(1), 79-110. DOI: 10.1111/j.1749-6632.1988.tb50853.x.
3. Furnell, S. (2002).Cyber crime: Vandalizing the information society. London: Addison Wesley.
4. Gordon, M. P., Loef, M. P., Lucyshyn, W., & Richardson, R. (2004). CSI/FBI computer crime and security survey. Los Angeles: Computer Security Institute.
5. Grabosky, P., & Smith, R. (2001). Telecommunication fraud in the digital age: The convergence of technologies. In D. Wall (Ed.) Crime and the Internet (pp. 23-45). London: Routledge.Jaishankar, K. (2008). Space transition theory of cyber crimes. In F. Schmalleger & M.
6. Pittaro (Eds.), Crimes of the Internet (pp. 283−301). Upper Saddle River, NJ: Prentice Hall.
7. RUSSEL
G. SMITH
ET
AL, CYBER
CRIMINALS
ON
TRIAL
5 (2004)
D. PARKER, FIGHTING
COMPUTER
CRIME
242
(1988)
8. Computer
Misuse
Act
(1990),
ch.
18,
the
full
text
of
it
is
available
at:
http://www.opsi.gov.uk/acts/acts1990/Ukpga_19900018_en_1.htm
(last
accessed
14
June
2010).Robert
Ditzion
et
al.,
Computer
Crimes,
40
AMERICAN
CRIMINAL
LAW
REVIEW
(AM. CRIM. L. REV.)285
(2003),
286.
9. Julie A.Tower, Hacking
Vermont's
Computer
Crimes
Statute,
25
VERMONT
LAW
REVIEW 945
(2001),
950
(citing
National
Institute
of
Justice,
U.S.
Department
of
Justice,
Computer
Crime:
Criminal
Justice
Resource
Manual
2
(1989)).
10. Brian
C.
Lewis,
Prevention
of
Computer
Crime
Amidst
International
Anarchy,
AMERICAN
CRIMINAL
LAW
REVIEW (AM.CRIM. L. REV.) 1353
(2004(,
1355)
11. Elizabeth
A.
Glynn,Computer
Abuse:
The
Emerging
Crime
and
the
Need
for
Legislation,12
FORDHAM
URBAN
LAW
JOURNAL
(FORDHAM
URB. L.J.)
73
(1984),
74‐5.
12. BERNADETTE
H. SCHNELL
& CLEMENS
MARTIN, CYBERCRIME
– A REFERENCE
HANDBOOK
XII
(2004)