Bibliography

http://www.slais.ubc.ca/courses/libr500/01-02-wt1/www/E_George/resourcesfinal.htm

Bissett, Andy, and Geraldine Shipton. “Some Human Dimensions of Computer Virus Creation and Infection.” International Journal of Human-Computer Studies 52 (2000), 899-913.

 Brain, Marshall. "How Computer Viruses Work". HowStuffWorks. 2001. <http://www.howstuffworks.com/virus.htm> (26 November 2001). 

Cknow.com. "Virus History."  Cknow.com Virus Tutorial.  2001. <http://www.cknow.com/vtutor/vthistory.htm> (26 November 2001).

Festa, Paul, and Joe Wilcox. "Experts Estimate Damages in the Billions for Bug." CNET News.com. 2000. <http://news.cnet.com/news/0-1003-200-1814907.html> (5 December 2001).

Grossman, Len. "Attack of the Love Bug." TIME: The Weekly Newsmagazine, 15 May 2000, 37-41.

Highland, Harold Joseph. “A History of Computer Viruses – The Famous ‘Trio’”. Computers & Security, 16 (1997), 416-429.

Kephart, Jeffrey O., Gregory B. Sorkin, David M. Chess, and Steve R. White. Fighting Computer Viruses: Biological Metaphors Offer Insight into Many Aspects of Computer Viruses and Can Inspire Defenses Against Them. 1997. <http://www.sciam.com/1197issue/1197kephart.html> (26 November 2001).

Landesman, Mary. "Excuse Me, How Much Did Your Virus Cost?"  About.com. 2001. <http://antivirus.about.com/library/weekly/aa100600a.htm> (5 December 2001).

McAfee, John, and Colin Haynes. Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System. New York: St. Martin's Press, 1989.

Northern Light. Special Edition: Computer Viruses. 2001. <http://special.northernlight.com/compvirus/> (5 December 2001).

Robertson, Robin. "Computer Viruses and the Human Mind." Dynamical Psychology: An International, Interdisciplinary Journal of Complex Mental Processes. 1997. <http://www.goertzel.org/dynapsyc/1997/virus.html> (5 December 2001).

Vamosi, Robert. "Red Cross Solicitation is a Trojan Horse." ZDNet Reviews. 2001. <http://www.zdnet.com/zdnn/stories/news/0,4586,2819741,00.html> (26 November 2001).

Zetter, Kim. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article.asp?aid=32802> (26 November 2001). 

[TOP]

Endnotes

1. Kim Zetter. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article/0,aid,32802,pg,4,00.asp> (26 November 2001): The Next Generation.

2. Robin Robertson. "Computer Viruses and the Human Mind." Dynamical Psychology: An International, Interdisciplinary Journal of Complex Mental Processes. 1997. <http://www.goertzel.org/dynapsyc/1997/virus.html> (5 December 2001).

3. Andy Bissett and Geraldine Shipton. “Some Human Dimensions of Computer Virus Creation and Infection,” International Journal of Human-Computer Studies 52 (2000): 900.

4. Ibid., 903.

5. AVERT. McAfee Virus Information Library. 2001. <http://vil.nai.com/vil/virusSummary.asp?virus_k=806> (5 December 2001): Virus Characteristics.

6. Marshall Brain. "How Computer Viruses Work". HowStuffWorks. 2001. <http://www.howstuffworks.com/virus3.htm> (26 November 2001): Virus History.

7. Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess, and Steve R. White. Fighting Computer Viruses: Biological Metaphors Offer Insight into Many Aspects of Computer Viruses and Can Inspire Defenses Against Them. 1997. <http://www.sciam.com/1197issue/1197kephart.html> (26 November 2001): Introduction.

8. Cknow.com. "Virus History." Cknow.com Virus Tutorial.  2001. <http://www.cknow.com/vtutor/vthistory.htm> (26 November 2001): 1981 - The First Virus in the Wild.

9. Mike Sprengelmeyer. "NU Frosh Programs Cloning Achievement: Computer Virus Catchy, Not Fatal." The Daily Northwestern, 12 November 1985. <http://www.skrenta.com/cloner/nu-clone.html> (5 December 2001).

10. Harold Joseph Highland. “A History of Computer Viruses – The Famous ‘Trio’”, Computers & Security 16 (1997): 416.

11. Kim Zetter. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article/0,aid,32802,pg,3,00.asp> (26 November 2001): Melissa's Contribution.

12. Kim Zetter. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article/0,aid,32802,pg,1,00.asp> (26 November 2001): Wednesday, May 3, 2000.

13. Robert Vamosi. "Red Cross Solicitation is a Trojan Horse." ZDNet Reviews. 2001. <http://www.zdnet.com/zdnn/stories/news/0,4586,2819741,00.html> (26 November 2001): How It Works.

14. Len Grossman. "Attack of the Love Bug." TIME: The Weekly Newsmagazine 15 May 2000, 37.

15. Rey Q. Carolino. "Love Letter Virus - A Simple Program That Rocks the World." Newsflash. 2000. <http://www.newsflash.org/2000/05/hl/hl012106.htm> (5 December 2001): Cyberspace, May 8, 2000.

16.  David Radin. "Code Red Virus No Big Threat Despite Reports." Post-Gazette.com Business. 2001. <http://www.post-gazette.com/interact/20010816radin0816p4.asp> (5 December 2001).

17. Security Response. "CodeRed Worm." Symantec. 2001. <http://www.symantec.com/avcenter/venc/data/codered.worm.html> (5 December 2001): Technical Description.

18. Radin, Code Red Virus.

19. CBC News. "'Goner' Computer Virus Disables Defences." CBC.ca. 2001. <http://www.cbc.ca/cgi-bin/templates/view.cgi?/news/2001/12/05/goner_011205> (5 December 2001).

20. Ibid.

[TOP]

Referenced and Linked Websites

Bioscience Network. <http://www.bioscinet.bbsrc.ac.uk/heal.html> (26 November    2001).

FOLDOC: Free On-Line Dictionary of Computing. <http://foldoc.doc.ic.ac.uk/foldoc/index.html> (26 November 2001).

HowStuffWorks.<http://www.howstuffworks.com/virus.htm> (26 November 2001). 

Incidents.org.<http://www.incidents.org/> (5 December 2001).

Information Security.<http://www.infosecuritymag.com/> (5 December 2001).

McAfee Virus Information Library. <http://vil.nai.com/vil/default.asp> (5 December 2001).

McAfee.com. <http://www.mcafee.com> (5 December 2001).

McAfee.com: Virus Glossary of Terms. <http://www.mcafee.com/anti-virus/virus_glossary.asp?> (5 December 2001).

PC Pitstop. <http://www.pcpitstop.com/> (5 December 2001).

PCWorld.Com. <http://pcworld.com/> (5 December 2001).

SANS Institute online: A Cooperative Education & Research Organization. <http://www.sans.org/newlook/home.htm> (5 December 2001).

School of Library, Archival and Information Studies. <http://www.slais.ubc.ca> (5 December 2001).

Symantec. <http://www.symantec.com/> (5 December 2001).

Symantec: Security Response. <http://securityresponse.symantec.com/avcenter/vinfodb.html> (5 December 2001).

TechWeb: The Business Technology Network: Tech Encyclopedia. <http://www.techweb.com/encyclopedia/> (5 December 2001).

The WildList Organization International. <http://www.wildlist.org/> (5 December 2001).

Trend Micro. <http://www.antivirus.com> (5 December 2001).

Trend Micro: Glossary of Virus Terms. <http://www.antivirus.com/vinfo/virusencyclo/glossary.asp> (5 December 2001).

Trend Micro: Virus Encyclopedia. <http://www.antivirus.com/vinfo/virusencyclo/> (5 December 2001).

University of British Columbia. <http://www.ubc.ca> (5 December 2001).

[TOP]

Sources for Images and Graphics

Absolute Background Textures Archive. <http://www.grsites.com/textures> (23 November 2001).

Art Today. <http://www.arttoday.com/> (28 November 2001).

CoolArchive. <http://www.coolarchive.com/index.cfm> (26 November 2001).

Gif Art.com. <http://gifart.com/public/index.shtml> (26 November 2001).

GIFS.cc. <http://www.gifs.cc/lines.htm> (26 November 2001).

Microsoft Office Design Gallery Live. <http://dgl.microsoft.com/> (5 December 2001).

ObjectsFusion.<http://www.objectsfusion.com> (26 November 2001).