home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
cud3
/
cud336c.txt
< prev
next >
Wrap
Text File
|
1992-10-10
|
6KB
|
126 lines
------------------------------
Date: 12 Oct 91 11:21:19 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: Dissertations and Theses
The following come from International Dissertation Abstracts and from
persons who responded to our request for information on theses. The
dissertation list should be fairly complete. It excludes works limited
to computer crime or computer-mediated communication (contact Bitnet's
CMC newsgroup for information on CMC). The thesis list is incomplete
because of the relatively low number of institutions responding. But,
judging from bibliographies and discussions, there seem to be
relatively few CU-related theses. ("Dissertations" are normally done
for a PhD, and "theses" are written for a Master's degree).
++++++++++++++++++++++++
DISSERTATIONS
++++++++++++++++++++++++
Friedman, Batya. 1988. SOCIAL JUDGMENTS AND TECHNOLOGICAL INNOVATION:
ADOLESCENT'S CONCEPTIONS OF COMPUTER PIRACY AND PRIVACY. (Director:
none listed). University of California, Berkeley. 186 pp. Order No.
DA 8916665.
Dunn, Thurman Stanley. 1982. METHODOLOGY FOR THE OPTIMIZATION OF
RESOURCES IN THE DETECTION OF COMPUTER FRAUD. (Directory: Jay F.
Nunamaker). The University of Arizona. 198 pp. Order No. DA 8305976.
Baker, Donald R. 1990. RELATIONSHIP SOF INTERNAL ACCOUNTING CONTROLS
AND OCCURRENCES OF COMPUTER FRAUD. (Chair: Edward A. Becker). Nova
University. 133 pp. Order No. DA 9022334.
Esquerra, Ronald Lee. 1982. PERSONAL PRIVACY IN A COMPUTER
INFORMATION SOCIETY. (Director: Jay F. Nunamaker). The University of
Arizona. 377 pp. Order No. DA 8217495
Honan, Ava Smith. 1988. ANALYSIS OF KEYSTROKE PATTERNS FOR THE
DEVELOPMENT OF A SECURITY SYSTEM FOR VALIDATION OF COMPUTER ACCESS.
(Chair, Saeed Maghsoodloo). Auburn University. 115 pp. Order No. DA
8918795.
Lu, Wen-Pai. 1986. SECURITY OF COMMUNICATION IN COMPUTER NETWORKS.
(Director: Malur K. Sundareshan). The University of Arizona. 282 pp.
Order No. DA 8702350.
Pozzo, Maria Mildred. 1990. TOWARDS COMPUTER VIRUS PREVENTION.
(Chair: David G. Cantor). University of California, Los Angeles. 202
pp. Order No. DA 9033944
Shamp, Scott A. 1989. MECHANOMORPHISM AND THE PERCEPTION OF COMPUTER
COMMUNICATION PARTNERS (University of Utah). Contact: sshamp@uga.bitnet
++++++++++++++++++++++++
MASTERS' THESES
++++++++++++++++++++++++
Meyer, Gordon. 1988. THE SOCIAL ORGANIZATION OF THE
COMPUTER UNDERGROUND. (Chair: James Massey). Northern Illinois
University. Contact: Gordon Meyer: "72307.1502@COMPUSERVE.COM"
Wang, Shenhsien J. 1986. DETECTIVE SECURITY SYSTEM THAT MEASURES AND
PREVENTS NETWORK VIOLATIONS. (Chair: Kenneth C. Kung). Northrop
University. 109 pp. Order No. MA 132853
Lankewicz, Linda Bright. 1986. RESOURCE UTILIZATION AND SECURITY.
(Major Professor: Marino J. Niccolai). University of South Alabama.
190 pp. Order No. ??).
++++++++++++++++++++++++
WORKS IN PROGRESS
++++++++++++++++++++++++
(The following include projects in the planning stage as well as
those nearing completion)
William Curran (Arizona State University). Writing a Masters Thesis on
the introduction of wide area and local nets into the Soviet Union,
combining technological and sociological analysis that summarizes the
changes and prospects for early nineties. Contact:
WCURRAN@CARAT.ARIZONA.EDU
Mark Smith (Sociology, University of California, Los Angeles).
Dissertation (in progress) that focuses on the power and politics of the
"information society". Recurring themes include the role of time/space
compression and surveillance in society. Significant influences include
David Harvey, Michel Foucault, Mark Poster, Herbert expand. One issue
includes the clash between Enlightenment rhetoric and post-modern
technology. Contact: SMITHM@DUVM.BITNET
Peter S. Markham (University of Melbourne, Dept. of Criminology).
Masters' Thesis in progress on a comparative study of the
Criminalisation of Computer Misuse in the United States, United Kingdom
and Australia. Contact: pmark@ARIEL.UCS.UNIMELB.EDU.AU
Elizabeth M. Reid (University of Melbourne). Supervisor: Donna
Merwick. Honours Thesis on computer-Mediated Communication
communication processes in synchronous conferencing, including
computer networks, internet, and electronic mail. The focus is on
cultural themes of communication, including power, interpreting social
contexts, socialization and learning, from a deconstructionist
perspective. ((Moderators' note: We've read a draft, and it's
first-rate)). Contact: "emr%munagin.ee.mu.oz.au@uunet.uu.net"
Paul Taylor (University of Edinburgh). Finishing a dissertation on
hacking/viruses and the politics behind them. Focus includes hackers
and their computer security industry counterparts. Examines the issue
of technological determinism and the "information revolution" and also
the idea of hackers being perhaps an extension or most recent
development of an alternative culture. It also raises the whole issue of
the exact nature of cyberspace and the implications it holds: Are we
entering a new realm of informational colonialism? What is information?
Who has rights over it, and are hackers/the computer underground
fighting a battle of principle the importance of which has passed most
people by? Contact: "p.a.taylor@edinburgh.ac.uk"
Robert Berry (U. of North Carolina at Chapel Hill, Journalism). M.A.
Thesis on the First Amendment implications of computer-based
communication technologies. The focus includes a political analysis
of the history of governmental harassment of hackers and how that
harassment threatens to infringe the First Amendment rights associated
with this new technology. The analysis centers around Operation Sun
Devil and the related prosecutions that have taken place during the
past few years. Contact: rrberry@SHELTIE.CHAPEL-HILL.NC.US