home *** CD-ROM | disk | FTP | other *** search
- ------------------------------
-
- Date: 12 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: Dissertations and Theses
-
- The following come from International Dissertation Abstracts and from
- persons who responded to our request for information on theses. The
- dissertation list should be fairly complete. It excludes works limited
- to computer crime or computer-mediated communication (contact Bitnet's
- CMC newsgroup for information on CMC). The thesis list is incomplete
- because of the relatively low number of institutions responding. But,
- judging from bibliographies and discussions, there seem to be
- relatively few CU-related theses. ("Dissertations" are normally done
- for a PhD, and "theses" are written for a Master's degree).
-
- ++++++++++++++++++++++++
- DISSERTATIONS
- ++++++++++++++++++++++++
-
- Friedman, Batya. 1988. SOCIAL JUDGMENTS AND TECHNOLOGICAL INNOVATION:
- ADOLESCENT'S CONCEPTIONS OF COMPUTER PIRACY AND PRIVACY. (Director:
- none listed). University of California, Berkeley. 186 pp. Order No.
- DA 8916665.
-
- Dunn, Thurman Stanley. 1982. METHODOLOGY FOR THE OPTIMIZATION OF
- RESOURCES IN THE DETECTION OF COMPUTER FRAUD. (Directory: Jay F.
- Nunamaker). The University of Arizona. 198 pp. Order No. DA 8305976.
-
- Baker, Donald R. 1990. RELATIONSHIP SOF INTERNAL ACCOUNTING CONTROLS
- AND OCCURRENCES OF COMPUTER FRAUD. (Chair: Edward A. Becker). Nova
- University. 133 pp. Order No. DA 9022334.
-
- Esquerra, Ronald Lee. 1982. PERSONAL PRIVACY IN A COMPUTER
- INFORMATION SOCIETY. (Director: Jay F. Nunamaker). The University of
- Arizona. 377 pp. Order No. DA 8217495
-
- Honan, Ava Smith. 1988. ANALYSIS OF KEYSTROKE PATTERNS FOR THE
- DEVELOPMENT OF A SECURITY SYSTEM FOR VALIDATION OF COMPUTER ACCESS.
- (Chair, Saeed Maghsoodloo). Auburn University. 115 pp. Order No. DA
- 8918795.
-
- Lu, Wen-Pai. 1986. SECURITY OF COMMUNICATION IN COMPUTER NETWORKS.
- (Director: Malur K. Sundareshan). The University of Arizona. 282 pp.
- Order No. DA 8702350.
-
- Pozzo, Maria Mildred. 1990. TOWARDS COMPUTER VIRUS PREVENTION.
- (Chair: David G. Cantor). University of California, Los Angeles. 202
- pp. Order No. DA 9033944
-
- Shamp, Scott A. 1989. MECHANOMORPHISM AND THE PERCEPTION OF COMPUTER
- COMMUNICATION PARTNERS (University of Utah). Contact: sshamp@uga.bitnet
-
- ++++++++++++++++++++++++
- MASTERS' THESES
- ++++++++++++++++++++++++
-
- Meyer, Gordon. 1988. THE SOCIAL ORGANIZATION OF THE
- COMPUTER UNDERGROUND. (Chair: James Massey). Northern Illinois
- University. Contact: Gordon Meyer: "72307.1502@COMPUSERVE.COM"
-
- Wang, Shenhsien J. 1986. DETECTIVE SECURITY SYSTEM THAT MEASURES AND
- PREVENTS NETWORK VIOLATIONS. (Chair: Kenneth C. Kung). Northrop
- University. 109 pp. Order No. MA 132853
-
- Lankewicz, Linda Bright. 1986. RESOURCE UTILIZATION AND SECURITY.
- (Major Professor: Marino J. Niccolai). University of South Alabama.
- 190 pp. Order No. ??).
-
- ++++++++++++++++++++++++
- WORKS IN PROGRESS
- ++++++++++++++++++++++++
-
- (The following include projects in the planning stage as well as
- those nearing completion)
-
- William Curran (Arizona State University). Writing a Masters Thesis on
- the introduction of wide area and local nets into the Soviet Union,
- combining technological and sociological analysis that summarizes the
- changes and prospects for early nineties. Contact:
- WCURRAN@CARAT.ARIZONA.EDU
-
- Mark Smith (Sociology, University of California, Los Angeles).
- Dissertation (in progress) that focuses on the power and politics of the
- "information society". Recurring themes include the role of time/space
- compression and surveillance in society. Significant influences include
- David Harvey, Michel Foucault, Mark Poster, Herbert expand. One issue
- includes the clash between Enlightenment rhetoric and post-modern
- technology. Contact: SMITHM@DUVM.BITNET
-
- Peter S. Markham (University of Melbourne, Dept. of Criminology).
- Masters' Thesis in progress on a comparative study of the
- Criminalisation of Computer Misuse in the United States, United Kingdom
- and Australia. Contact: pmark@ARIEL.UCS.UNIMELB.EDU.AU
-
- Elizabeth M. Reid (University of Melbourne). Supervisor: Donna
- Merwick. Honours Thesis on computer-Mediated Communication
- communication processes in synchronous conferencing, including
- computer networks, internet, and electronic mail. The focus is on
- cultural themes of communication, including power, interpreting social
- contexts, socialization and learning, from a deconstructionist
- perspective. ((Moderators' note: We've read a draft, and it's
- first-rate)). Contact: "emr%munagin.ee.mu.oz.au@uunet.uu.net"
-
- Paul Taylor (University of Edinburgh). Finishing a dissertation on
- hacking/viruses and the politics behind them. Focus includes hackers
- and their computer security industry counterparts. Examines the issue
- of technological determinism and the "information revolution" and also
- the idea of hackers being perhaps an extension or most recent
- development of an alternative culture. It also raises the whole issue of
- the exact nature of cyberspace and the implications it holds: Are we
- entering a new realm of informational colonialism? What is information?
- Who has rights over it, and are hackers/the computer underground
- fighting a battle of principle the importance of which has passed most
- people by? Contact: "p.a.taylor@edinburgh.ac.uk"
-
- Robert Berry (U. of North Carolina at Chapel Hill, Journalism). M.A.
- Thesis on the First Amendment implications of computer-based
- communication technologies. The focus includes a political analysis
- of the history of governmental harassment of hackers and how that
- harassment threatens to infringe the First Amendment rights associated
- with this new technology. The analysis centers around Operation Sun
- Devil and the related prosecutions that have taken place during the
- past few years. Contact: rrberry@SHELTIE.CHAPEL-HILL.NC.US
-
-