Skip to main content

PPPA 8217 Technological Solutions and 21st Century Crime: Welcome & Course Readings

Welcome to your course guide

Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.

PPPA 8217 Course Readings

After clicking on a citation below, enter your myWalden user name and password at the prompt.

Please Ask a Librarian if you have any questions about the links.

Aleem, S. (2016). Bullying behavior among school students: A review. Indian Journal of Health and Wellbeing, 7(10), 976-981.

Ashiq, S., Majeed, S., & Malik, F. (2016). Psychological predictors of cyber bullying in early adulthood. Health Science Journal, 10(3), 1-9.

Awan, I. (2016). Islamophobia on social media: A qualitative analysis of the Facebook's walls of hate. International Journal of Cyber Criminology, 10(1), 1-20.

Balica, R. (2017). The criminalization of online hate speech: It’s complicated. Contemporary Readings in Law and Social Justice, 9(2), 184-190.

Brinckerhoff, R. (2018). Social network or social nightmare: How California courts can prevent Facebook's frightening foray into facial recognition technology from haunting consumer privacy rights forever. Federal Communications Law Journal, 70(1), 105-156.

Burnap, P., & Williams, M. L. (2016). Us and them: Identifying cyber hate on twitter across multiple protected characteristics. EPJ Data Science, 5(1), 1-15.

Chapin, J. (2016). Adolescents and cyber bullying: The precaution adoption process model. Education and Information Technologies, 21(4), 719-728.

Cooley, A. H. (2011). Guarding against a radical redefinition of liability for Internet misrepresentation: The United States v. Drew prosecution and the Computer Fraud and Abuse Act. Journal of Internet Law, 14(8), 1, 15–28. 

Cross, C. (2017). ‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime. Security Journal, 30(1), 74-88.

Daras, N. J., & Alexopoulos, A. (2017). Mathematical description of cyber-attacks and proactive defences. Journal of Applied Mathematics and Bioinformatics, 7(1), 71-142.

Dardis, C. M., Strauss, C. V., & Gidycz, C. A. (2018). The psychological toll of unwanted pursuit behaviors and intimate partner violence on undergraduate women: A dominance analysis. Psychology of Violence. doi:10.1037/vio0000189.

DeMatteo, D., Wagage, S., & Fairfax-Columbo, J. (2017). Cyberstalking: Are we on the same (web)page? A comparison of statutes, case law, and public perception. Journal of Aggression, Conflict and Peace Research, 9(2), 83-94.

Fast, A. A., Olson, K. R., & Mandel, G. N. (2016). Experimental investigations on the basis for intellectual property rights. Law and Human Behavior, 40(4), 458-476.

Goyal, N., & Goyal, D. (2017). Cyber crime in the society: Security issues, preventions and challenges. Research Journal of Engineering and Technology, 8(2), 73-80.

Graves, P. E., & Sexton, R. L. (2017). Optimal public policy against identity theft. American Economist, 62(2), 217-221.

Gupta, P., & Mata-Toledo, R. (2016). Cybercrime: In disguise crimes. Journal of Information Systems & Operations Management, 10(1), 1-10.

Hanzelka, J., & Schmidt, I. (2017). Dynamics of cyber hate in social media: A comparative analysis of anti-Muslim movements in the Czech republic and Germany. International Journal of Cyber Criminology, 11(1), 143-160.

Hao, J., & Dai, H. (2016). Social media content and sentiment analysis on consumer security breaches. Journal of Financial Crime, 23(4), 855-869.

KaƄciak, A. (2016). An analysis of the legal systems and mechanisms introduced in the European Union in the fight against cyberspace threats 1. Internal Security, 8(2), 195-224.

Kaur, M., & Kaur, I. (2016). Cyber victimization: Dark side of virtual world. Indian Journal of Health and Wellbeing, 7(11), 1067-1070.

Kugler, M. B., & Strahilevitz, L. J. (2017). The myth of fourth amendment circularity. The University of Chicago Law Review, 84(4), 1747-1812.

Lavorgna, A., & Sergi, A. (2016). Serious, therefore organised? A critique of the emerging "cyber-organised crime" rhetoric in the United Kingdom. International Journal of Cyber Criminology, 10(2), 170-187.

Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime, Law and Social Change, 67(1), 3-20.

Li, J. X. (2017). Cyber crime and legal countermeasures: A historical analysis. International Journal of Criminal Justice Sciences, 12(2), 196-207.

Mackinnon, A., Marcum, C. D., & Higgins, G. E. (2016). Identity theft reports of adolescents. Journal of Financial Crime, 23(4), 965-973.

Mandala, M. (2016). Policing cybercrime and cyberterror. Security Journal, 29(3), e13-e15.

Marcum, C. D., Higgins, G. E., & Nicholson, J. (2017). I'm watching you: Cyberstalking behaviors of university students in romantic relationships. American Journal of Criminal Justice, 42(2), 373-388.

Margulies, P. (2017). Global cybersecurity, surveillance, and privacy: The obama Administration’s conflicted legacy. Indiana Journal of Global Legal Studies, 24(2), 459-495.

Mason, G., & Czapski, N. (2017). Regulating cyber-racism. Melbourne University Law Review, 41(1), 284-340.

McQuade, B. I. (2016). Police and the post-9/11 surveillance surge: “technological dramas” in “the bureaucratic field.” Surveillance & Society, 14(1), 1-19.

Michel, C. (2016). Violent street crime versus harmful white-collar crime: A comparison of perceived seriousness and punitiveness. Critical Criminology, 24(1), 127-143.

Michel, C., Heide, K. M., & Cochran, J. K. (2016). The consequences of knowledge about elite deviance. American Journal of Criminal Justice, 41(2), 359-382.

Michel, C., Cochran, J. K., & Heide, K. M. (2016). Public knowledge about white-collar crime: An exploratory study. Crime, Law and Social Change, 65(1-2), 67-91.

Mittal, S., & Sharma, P. (2017). Enough law of horses and elephants debated…Let’s discuss the cyber law seriously. International Journal of Advanced Research in Computer Science, 8(5), 1343-1348.

Musharraf, S., & Anis-ul-Haque, M. (2018). Cyberbullying in different participant roles: Exploring differences in psychopathology and well-being in university students. Pakistan Journal of Medical Research, 57(1), 33-39.

Nawafleh, Y., Nawafleh, A., & Nawafleh, S. (2016). Cybercrimes: Concept, forms, and their civil liabilities. International Journal of Arts & Sciences, 9(1), 211-234.

Ngo, F., & Jaishankar, K. (2017). Commemorating a decade in existence of the international journal of cyber criminology: A research agenda to advance the scholarship on cyber crime. International Journal of Cyber Criminology, 11(1), 1-9.

Ngo, F., Jaishankar, K., & Agustina, J. R. (2017). Sexting: Current research gaps and legislative issues. International Journal of Cyber Criminology, 11(2), 161-168.

O'Connor, K., Drouin, M., Yergens, N., & Newsham, G. (2017). Sexting legislation in the united states and abroad: A call for uniformity. International Journal of Cyber Criminology, 11(2), 218-245.

O'Shea, B. (2017). A new method to address cyberbullying in the united states: The application of a notice-and- takedown model as a restriction on cyberbullying speech. Federal Communications Law Journal, 69(2), 119-145.

Rajesh, K. V. N., & Ramesh, K. V. N. (2016). Computer forensics: An overview. Journal on Software Engineering, 10(4), 1-5.

Sabillon, R., Cano, J., Cavaller, V., & Serra, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6), 165-176.

Safner, R. (2016). The perils of copyright regulation. Review of Austrian Economics, 29(2), 121-137.

Spitzberg, B. H. (2017). Acknowledgment of unwanted pursuit, threats, assault, and stalking in a college population. Psychology of Violence, 7(2), 265-275.

Tokson, M. (2016). Knowledge and Fourth Amendment privacy. Northwestern University Law Review, 111(1), 139-204.

Trottier, D. (2017). Digital vigilantism as weaponisation of visibility. Philosophy & Technology, 30(1), 55-72.

Urban, J. (2018). What is the eye in the sky actually looking at and who is controlling it? An international comparative analysis on how to fill the cybersecurity and privacy gaps to strengthen existing U.S. drone laws. Federal Communications Law Journal, 70(1), 1-76.

Zajko, M. (2018). Security against surveillance: IT security as resistance to pervasive surveillance. Surveillance & Society, 16(1), 39-52.

Other Readings

Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.

If you have questions about your required course textbooks, please contact Customer Care at