» Other Cross-Cutting Issues
Anthes, Gary H. "Killer Apps." Computerworld, July 7 1997, 73-74.
Barrett, Daniel J. Bandits on the Information Superhighway. 1st ed. Sebastopol, CA: O'Reilly & Associates, 1996.
Cringely, Robert X. "When Disaster Strikes IS," Forbes ASAP, August 29 (1994): 4.
Denning, Dorothy E., and Jr. William E. Baugh. "Hiding Crimes in Cyberspace." Information, Communication and Society 2, no. 3 (1999): 251-76.
Ellison, Carl, and Bruce Schneier. Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure, http://www.antioffline.com/pki.txt. Gibbs, W. Wayt. "Software's Chronic Crisis." Scientific American 273, no. 3 (1994): 86- 95.
Gilder, George F. Life after Television. [S.l.]: Whittle Direct Books, 1990.
Lane, Carole A. Naked in Cyberspace: How to Find Personal Information Online. Wilton, CT: Information Today, 1997.
Oz, Effy. "When Professional Standards Are Lax: The Confirm Failure and Its Lessons." Communications of the ACM 37, no. 10 (1994): 29-36.
* Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. New York: Wiley, 2000.
Schwartau, Winn. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists, and Weapons of Mass Disruption. New York: Thunder's Mouth Press, 2000.
Spafford, Gene. "Acceptance Speech for the National Computer Systems Security Award." Paper presented at the National Information Systems Security Conference, October 16 2000.