Skip to main content

ACRJ 8217 Technological Solutions and 21st Century Crime: Welcome & Course Readings

Welcome to your course guide

Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.

Other Readings

Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.

If you have questions about your required course textbooks, please contact Customer Care at support@waldenu.edu

ACRJ 8217 Course Readings

After clicking on a citation below, enter your myWalden user name and password at the prompt.

Please Ask a Librarian if you have any questions about the links.

Abdo, A. and Shamsi, H. (2011). Privacy and surveillance post 9-11. Human Rights, 38(1), 5-9.

Alison, L., Goodwill, A., Almond, L., van den Heuvel, C., and Winter, J. (2010). Pragmatic solutions to offender profiling and behavioural investigative advice. Legal and Criminological Psychology, 15, 115-132.

Anderson, K., Durbin, E., and Salinger, M. (2008). Identity theft. Journal of Economic Perspectives, 22(2), 171-192.

Anonymous (2011). Franken, Blumenthal introduce mobile privacy legislation. Telecommunications Reports, 77(13), 12-13.

Anonymous (2011). In the face of danger: Facial recognition and the limits of privacy law. Harvard Law Review, 120(7), 1870-1892.

Anonymous (2011). International: Creepy crawlies; Cyber-stalking. The Economist, 399(8730), 63.

Anonymous (2011). Is it legal?: Privacy. Newsletter on Intellectual Freedom, 60(2), 68-71.

Audal, J. Lu, Q. and Roman, P. (2008). Computer crimes. The American Criminal Law Review, 45, (2), 233-274.

Bailey, J. (2004). Private regulation and public policy: Toward effective restriction of internet hate propaganda. McGill Law Journal, 49(1), 59.

Baker, A., Gray, B., Schweber, N., and Shelloh, T. (2010). Private moment made public, then a fatal jump.

Barkacs, L. L. and Barkacs, C. B. (2010). Do you think I’m sexty? Minors and sexting: Teenage fad or child pornography. Journal of Legal, Ethical and Regulatory Issues, 13(2), 23-32.

Barnett, C. (2000). The measurement of white-collar crime using Uniform Crime Reporting (UCR) data (US Dept of Justice, Feb Bur of Investigation).

Basu, S. and Jones, R. (2007). Regulating cyberstalking. Journal of Information, Law and Technology .

Belnap, A. (2011). Tinker at a breaking point: Why the specter of cyberbullying cannot excuse impermissible public school regulation of off-campus student speech. Brigham Young University Law Review, 2011(2), 501-534.

Bichler, G. and Balchak, S. (2007). Address matching bias: ignorance is not bliss. Policing: An International Journal of Police Strategies & Management, 30(1), 32-60.

Bloss, W.P. (2009). Transforming US police surveillance in a new privacy paradigm. Police Practice and Research, 10(3), 225-238. 

Carucci, D., Overhuls,D., and Soares, N. (2011). Computer crimes.  American Criminal Law Review, 48(2), 375-418.

Chainey, S., Tompson, L. and Uhlig, S. (2008). The utility of hotspot mapping for predicting spatial patterns of crime. Security Journal, 21, 4-28.

Coakley, M. (2009). Privacy protection, safety and security: A state law enforcement perspective. The Computer and Internet Lawyer, 26(4), 1-11. 

CoenenCoenen, R. D. Jr., Greenberg, J. H., and Reisinger, P.K. (2011). Intellectual property crimes. American Criminal Law Review, 48(2), 849.

Cooley, A. H. (2011). Guarding against a radical redefinition of liability for Internet misrepresentation: The United States v. Drew prosecution and the Computer Fraud and Abuse Act. Journal of Internet Law, 14(8), 1, 15–28.

Creepy crawlies: Cyber-stalking. (2011). The Economist, 399(8730), 63–64.

Croall, H. (2009). White collar crime, consumers and victimization. Crime, Law and Social Change, 51(1), 127-146.

Cullet, F., Hartman, J., & Jonson, C. (2009). Bad guys: Why the public supports punishing white-collar offenders. Crime, Law and Social Change, 51(1), 31-44.

Diffie, W., & Landau, S. (2009). Communications surveillance: Privacy and security at risk. Communications of the ACM, 52(11), 42–47.

Drogin, E. Y. and Young, K. (2008). Forensic mental health aspects of adolescent "cyber bullying": A jurisprudent science perspective. Journal of Psychiatry & Law, 36(4), 679-693. 

Ebenger, T. (2007). The USA PATRIOT Act: Implications for private e-mail. Journal of Information Technology & Politics, 4(4), 47–64.

Foley, J. (2007). Are Google searches private? An originalist interpretation of the Fourth Amendment in online communication cases. Berkeley Technology Law Journal, 22(1), 447-476.

Ford, A. (2009). School liability: Holding middle schools liable for cyber-bullying despite their implementation of Internet usage contracts.Journal of Law and Education, 38(3), 535-545.

Gillespie, A. A. (2006). Cyber-bullying and harassment of teenagers: The legal response. The Journal of Social Welfare & Family Law, 28(2), 123.

Gilman, N. (2009). Hacking goes pro. Engineering & Technology, 4(3), 26-29.

Goldsborough, R. (Oct 2001). Dealing with hate on the Internet. Teacher Librarian, 29(1), 46.

Gottschalk, P. and Solli-Saether, H. (2010). Computer information systems in financial crime investigations. The Journal of Computer Information Systems, 50(3), 41-49.

Green, G. (2010). Thinking about white-collar crime and punishment. Criminal Justice, 25(3), 1-5.

Groff, E. R., Weisburd, D., and Yang, S.M. (2010). Is it important to examine crime trends at a local ‘‘micro’’ level?:  A longitudinal analysis of street to street variability in crime trajectories. Journal of Quantitative Criminology, 26, 7–32.

Guarino, M. (2010). Card hacker Albert Gonzalez gets 20 years; But cyber crime rising. Christian Science Monitor, 3, 26.

Guichard, A. (Jun 2009). Hate crime in cyberspace: The challenges of substantive criminal law Information & Communications Technology Law, 18(2), 201.

Haney, M. (2010) Triptech: Is it safe to surf? Conde Nast’s Traveler, 45(4), 50.

Harries, K. (1999). Mapping crime: Principle and practice, US Dept of Justice, Office of Justice Programs.

Henson, B., Reyns, B. W., and Fisher, B.S. (2011). Security in the 21st century examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(3), 253-268.

Hu, W. (2010). Legal debate swirls over charges in a student's suicide. New York Times, A, 15.

Huang, X. , Radkowski III, P. and Roman, P. (2007). Computer crimes. The American Criminal Law Review, 44(2), 285-336.

Hunter, A. (2010). Dying girl Kathleen Edward cyberbullied by 33-year-old neighbor: Why?

Internet Crime Complaint Center (2010). Internet Crime Report

Jahangiri, A. (2010). The future of cybercrime forensics. Digital Forensics

Jaishankar, K. (2010). The future of cyber criminology: Challenges and opportunities. International Journal of Cyber Criminology, 4 (1&2), 26–31.

Kahn, S. (2010). "Apps.gov": Assessing privacy in the cloud computing era. North Carolina Journal of Law & Technology, Online Edition, 259.

Kanable, R. (2009). The face of identity theft. Law Enforcement Technology, 36(4), 28-33.

Katel, P. (2005). Identity theft: Can Congress give Americans better protection? CQ Researcher, 15(22), 517-540.

King, A. V. (2010). Constitutionality of cyberbullying laws: Keeping the online playground safe for both teens and free speech. Vanderbilt Law Review63(3), 845-885.

Kirchheimer, S. (2011). "They stole my name!" The Saturday Evening Post, 283(1), 32–35.

Kumar, A. and Kumar, P. (2010). Managing privacy of user generated information in a Web 2.0 world. Journal of Information Privacy & Security,6(2), 3-17.

Levi, M. (2008). White collar, organized and cyber crimes in the media: some contrasts and similarities. Crime, Law and Social Change, 49(5), 365-377.

Li, Q. (2010). Cyberbullying in High Schools: A study of students' behaviors and beliefs about this new phenomenon. Journal of Aggression, Maltreatment & Trauma, 19(4), 372.

Lorentz, D. (2011). The effectiveness of litigation under the CAN-SPAM Act. The Review of Litigation,   30(3), 559-605. 

Martin, J. A., Caramanica, M. R. and Fargo, A. L. (2011). Anonymous speakers and confidential sources: Using shield laws when they overlap online. Communication Law and Policy, 16(1), 89.

McCarthy, T. and Michels, S. (2009). Lori Drew MySpace suicide hoax conviction thrown out. 

McCuistion, J.G. (2011). Culpable discord: Defining the limitations of contributory liability in Internet based file-sharing. The University of Memphis Law Review, 41(3), 597-635.

McPhee, M., Schabner, D., and Battiste, N. (2010). ‘Craigslist Killer’ Philip Markoff commits suicide.

 

Meredith, J.P. (2010). Combating cyberbullying: Emphasizing education over criminalizationFederal Communications Law Journal63(1), 311-341.

Mulvihill, G. (2011). In Tyler Clementi’s dorm, tensions were high.

Nemes, I. (2002). Regulating hate speech in cyberspace: Issues of desirability and efficacy. Information & Communications Technology Law, 11(3), 193.

Perry, B., & Olsson, P. (2009). Cyberhate: The globalization of hate. Information & Communications Technology Law, 18(2), 185–199.

Pilcher, J. (2010). Growing use of Twitter raises customer security concerns. American Bankers Association. ABA Banking Journal, 102(1), 27-28.

Ratcliffe, J. (2004). Crime mapping and the training needs of law enforcement. European Journal on Criminal Policy and Research, 10(1), 65-83.

Rees, A. (2006). Cybercrimes of the United States. Computer Crime and Intellectual Property Section, U.S. Department of Justice. 

Reyns, B. W. (2010). A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety, 12(2), 99-119. 

Roberts, L. (2008). Jurisdictional and definitional concerns with computer-mediated interpersonal crimes: An analysis on cyber stalking.International Journal of Cyber Criminology, 2(1) 271-286.

Roberts, P. (2006). iPod, Xbox cyber-crime threats loom. eWeek, 23(4), 43.

Rogers, D. (2006). Map quest. Law Enforcement Technology, 33(1), 60-69.

Shah, J. R., White, G. L., and Cook, J. R. (2007). Privacy protection overseas as perceived by USA-based IT professionals. Journal of Global Information Management, 15(1), 68-82.

Shamsi, H., & Abdo, A. (2011). Privacy and surveillance post-9/11.Human Rights, 38(1), 6-9.

Shepard, N. (2009). The government is monitoring Facebook and Twitter. 

Shekhter, S. (2011). Every step you take, they'll be watching you: The legal and practical implications of lifetime GPS monitoring of sex offenders. Hastings Constitutional Law Quarterly, 38(1085), 1-30.

Smith-Mason, J. (2011). Privacy rights…versus public safety after 9/11. Phi Kappa Phi Forum, 91 (3), 14-16.

Stansky, L (2009). Internet law and cybercrime: the future is here. Student Lawyer, 37(6), 8-10. 

Stewart, R. (2007). Commentary: Legal effect of revealing private information in the US and abroad. Information Systems Management, 24(4), 343-345.

Stoddart, J. (2011). Privacy in the era of social networking: Legal obligations of social media sites. Saskatchewan Law Review, 74(2), 263-274.

Swartz, N. (2005). Study reveals consumers’ data worries. Information Management Journal, 39(5), 16.

Trager, D. B. (2009). New tricks for old dogs: The Tinker standard applied to cyber-bullying. Journal of Law and Education, 38(3), 553-562. Law Journal, 63(1), 311-341.

Tsesis, A. (2001). Hate in cyberspace: Regulating hate speech on the Internet. The San Diego Law Review38(3), 817.

USA.gov. Internet fraud.  

US Department of Justice, Federal Bureau of Investigation (2010) Uniform Crime Reports: Crime in the United States. 

Wallace, A. (2009). Mapping city crime and the new aesthetic of danger. Journal of Visual Culture, 8(1), 5–24.

Yeh, B. T. (2008) CRS Report for Congress, Intellectual Property rights violations: Federal civil remedies and criminal penalties related to copyrights, trademarks and patents. 

Yeung, B. (2011). The future of techno crimefighting.

Young, M. (2011). Electronic surveillance in an era of modern technology and evolving threats to national security. Stanford Law and Policy Review, 22(1), 11-39. 

Yu, P. K. (2011). Digital copyright and confuzzling rhetoric. Vanderbilt Journal of Entertainment and Technology Law, 13(4), 881–939.