Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.
Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.
If you have questions about your required course textbooks, please contact Customer Care at support@waldenu.edu
After clicking on a citation below, enter your myWalden user name and password at the prompt.
Please Ask a Librarian if you have any questions about the links.
Abdo, A. and Shamsi, H. (2011). Privacy and surveillance post 9-11. Human Rights, 38(1), 5-9.
Anonymous (2011). International: Creepy crawlies; Cyber-stalking. The Economist, 399(8730), 63.
Anonymous (2011). Is it legal?: Privacy. Newsletter on Intellectual Freedom, 60(2), 68-71.
Creepy crawlies: Cyber-stalking. (2011). The Economist, 399(8730), 63–64.
Gilman, N. (2009). Hacking goes pro. Engineering & Technology, 4(3), 26-29.
Goldsborough, R. (Oct 2001). Dealing with hate on the Internet. Teacher Librarian, 29(1), 46.
Green, G. (2010). Thinking about white-collar crime and punishment. Criminal Justice, 25(3), 1-5.
Haney, M. (2010) Triptech: Is it safe to surf? Conde Nast’s Traveler, 45(4), 50.
Hu, W. (2010). Legal debate swirls over charges in a student's suicide. New York Times, A, 15.
Hunter, A. (2010). Dying girl Kathleen Edward cyberbullied by 33-year-old neighbor: Why?
Internet Crime Complaint Center (2010). Internet Crime Report.
Jahangiri, A. (2010). The future of cybercrime forensics. Digital Forensics.
Kanable, R. (2009). The face of identity theft. Law Enforcement Technology, 36(4), 28-33.
Kirchheimer, S. (2011). "They stole my name!" The Saturday Evening Post, 283(1), 32–35.
McCarthy, T. and Michels, S. (2009). Lori Drew MySpace suicide hoax conviction thrown out.
Meredith, J.P. (2010). Combating cyberbullying: Emphasizing education over criminalization. Federal Communications Law Journal, 63(1), 311-341.
Mulvihill, G. (2011). In Tyler Clementi’s dorm, tensions were high.
Roberts, P. (2006). iPod, Xbox cyber-crime threats loom. eWeek, 23(4), 43.
Rogers, D. (2006). Map quest. Law Enforcement Technology, 33(1), 60-69.
Shamsi, H., & Abdo, A. (2011). Privacy and surveillance post-9/11.Human Rights, 38(1), 6-9.
Shepard, N. (2009). The government is monitoring Facebook and Twitter.
Stansky, L (2009). Internet law and cybercrime: the future is here. Student Lawyer, 37(6), 8-10.
Swartz, N. (2005). Study reveals consumers’ data worries. Information Management Journal, 39(5), 16.
Yeung, B. (2011). The future of techno crimefighting.