Bibliography
http://www.slais.ubc.ca/courses/libr500/01-02-wt1/www/E_George/resourcesfinal.htm
Bissett, Andy, and Geraldine Shipton. “Some Human Dimensions of Computer Virus Creation and Infection.” International Journal of Human-Computer Studies 52 (2000), 899-913.
Brain, Marshall. "How Computer Viruses Work". HowStuffWorks. 2001. <http://www.howstuffworks.com/virus.htm> (26 November 2001).
Cknow.com. "Virus History." Cknow.com Virus Tutorial. 2001. <http://www.cknow.com/vtutor/vthistory.htm> (26 November 2001).
Festa, Paul, and Joe Wilcox. "Experts Estimate Damages in the Billions for Bug." CNET News.com. 2000. <http://news.cnet.com/news/0-1003-200-1814907.html> (5 December 2001).
Grossman, Len. "Attack of the Love Bug." TIME: The Weekly Newsmagazine, 15 May 2000, 37-41.
Highland, Harold Joseph. “A History of Computer Viruses – The Famous ‘Trio’”. Computers & Security, 16 (1997), 416-429.
Kephart, Jeffrey O., Gregory B. Sorkin, David M. Chess, and Steve R. White. Fighting Computer Viruses: Biological Metaphors Offer Insight into Many Aspects of Computer Viruses and Can Inspire Defenses Against Them. 1997. <http://www.sciam.com/1197issue/1197kephart.html> (26 November 2001).
Landesman, Mary. "Excuse Me, How Much Did Your Virus Cost?" About.com. 2001. <http://antivirus.about.com/library/weekly/aa100600a.htm> (5 December 2001).
McAfee, John, and Colin Haynes. Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System. New York: St. Martin's Press, 1989.
Northern Light. Special Edition: Computer Viruses. 2001. <http://special.northernlight.com/compvirus/> (5 December 2001).
Robertson, Robin. "Computer Viruses and the Human Mind." Dynamical Psychology: An International, Interdisciplinary Journal of Complex Mental Processes. 1997. <http://www.goertzel.org/dynapsyc/1997/virus.html> (5 December 2001).
Vamosi, Robert. "Red Cross Solicitation is a Trojan Horse." ZDNet Reviews. 2001. <http://www.zdnet.com/zdnn/stories/news/0,4586,2819741,00.html> (26 November 2001).
Zetter, Kim. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article.asp?aid=32802> (26 November 2001).
Endnotes
1. Kim Zetter. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article/0,aid,32802,pg,4,00.asp> (26 November 2001): The Next Generation.
2. Robin Robertson. "Computer Viruses and the Human Mind." Dynamical Psychology: An International, Interdisciplinary Journal of Complex Mental Processes. 1997. <http://www.goertzel.org/dynapsyc/1997/virus.html> (5 December 2001).
3. Andy Bissett and Geraldine Shipton. “Some Human Dimensions of Computer Virus Creation and Infection,” International Journal of Human-Computer Studies 52 (2000): 900.
4. Ibid., 903.
5. AVERT. McAfee Virus Information Library. 2001. <http://vil.nai.com/vil/virusSummary.asp?virus_k=806> (5 December 2001): Virus Characteristics.
6. Marshall Brain. "How Computer Viruses Work". HowStuffWorks. 2001. <http://www.howstuffworks.com/virus3.htm> (26 November 2001): Virus History.
7. Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess, and Steve R. White. Fighting Computer Viruses: Biological Metaphors Offer Insight into Many Aspects of Computer Viruses and Can Inspire Defenses Against Them. 1997. <http://www.sciam.com/1197issue/1197kephart.html> (26 November 2001): Introduction.
8. Cknow.com. "Virus History." Cknow.com Virus Tutorial. 2001. <http://www.cknow.com/vtutor/vthistory.htm> (26 November 2001): 1981 - The First Virus in the Wild.
9. Mike Sprengelmeyer. "NU Frosh Programs Cloning Achievement: Computer Virus Catchy, Not Fatal." The Daily Northwestern, 12 November 1985. <http://www.skrenta.com/cloner/nu-clone.html> (5 December 2001).
10. Harold Joseph Highland. “A History of Computer Viruses – The Famous ‘Trio’”, Computers & Security 16 (1997): 416.
11. Kim Zetter. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article/0,aid,32802,pg,3,00.asp> (26 November 2001): Melissa's Contribution.
12. Kim Zetter. "Viruses: The Next Generation." PCWorld.com. 2000. <http://www.pcworld.com/features/article/0,aid,32802,pg,1,00.asp> (26 November 2001): Wednesday, May 3, 2000.
13. Robert Vamosi. "Red Cross Solicitation is a Trojan Horse." ZDNet Reviews. 2001. <http://www.zdnet.com/zdnn/stories/news/0,4586,2819741,00.html> (26 November 2001): How It Works.
14. Len Grossman. "Attack of the Love Bug." TIME: The Weekly Newsmagazine 15 May 2000, 37.
15. Rey Q. Carolino. "Love Letter Virus - A Simple Program That Rocks the World." Newsflash. 2000. <http://www.newsflash.org/2000/05/hl/hl012106.htm> (5 December 2001): Cyberspace, May 8, 2000.
16. David Radin. "Code Red Virus No Big Threat Despite Reports." Post-Gazette.com Business. 2001. <http://www.post-gazette.com/interact/20010816radin0816p4.asp> (5 December 2001).
17. Security Response. "CodeRed Worm." Symantec. 2001. <http://www.symantec.com/avcenter/venc/data/codered.worm.html> (5 December 2001): Technical Description.
18. Radin, Code Red Virus.
19. CBC News. "'Goner' Computer Virus Disables Defences." CBC.ca. 2001. <http://www.cbc.ca/cgi-bin/templates/view.cgi?/news/2001/12/05/goner_011205> (5 December 2001).
20. Ibid.
Referenced and Linked Websites
Bioscience Network. <http://www.bioscinet.bbsrc.ac.uk/heal.html> (26 November 2001).
FOLDOC: Free On-Line Dictionary of Computing. <http://foldoc.doc.ic.ac.uk/foldoc/index.html> (26 November 2001).
HowStuffWorks.<http://www.howstuffworks.com/virus.htm> (26 November 2001).
Incidents.org.<http://www.incidents.org/> (5 December 2001).
Information Security.<http://www.infosecuritymag.com/> (5 December 2001).
McAfee Virus Information Library. <http://vil.nai.com/vil/default.asp> (5 December 2001).
McAfee.com. <http://www.mcafee.com> (5 December 2001).
McAfee.com: Virus Glossary of Terms. <http://www.mcafee.com/anti-virus/virus_glossary.asp?> (5 December 2001).
PC Pitstop. <http://www.pcpitstop.com/> (5 December 2001).
PCWorld.Com. <http://pcworld.com/> (5 December 2001).
SANS Institute online: A Cooperative Education & Research Organization. <http://www.sans.org/newlook/home.htm> (5 December 2001).
School of Library, Archival and Information Studies. <http://www.slais.ubc.ca> (5 December 2001).
Symantec. <http://www.symantec.com/> (5 December 2001).
Symantec: Security Response. <http://securityresponse.symantec.com/avcenter/vinfodb.html> (5 December 2001).
TechWeb: The Business Technology Network: Tech Encyclopedia. <http://www.techweb.com/encyclopedia/> (5 December 2001).
The WildList Organization International. <http://www.wildlist.org/> (5 December 2001).
Trend Micro. <http://www.antivirus.com> (5 December 2001).
Trend Micro: Glossary of Virus Terms. <http://www.antivirus.com/vinfo/virusencyclo/glossary.asp> (5 December 2001).
Trend Micro: Virus Encyclopedia. <http://www.antivirus.com/vinfo/virusencyclo/> (5 December 2001).
University of British Columbia. <http://www.ubc.ca> (5 December 2001).
Sources for Images and Graphics
Absolute Background Textures Archive. <http://www.grsites.com/textures> (23 November 2001).
Art Today. <http://www.arttoday.com/> (28 November 2001).
CoolArchive. <http://www.coolarchive.com/index.cfm> (26 November 2001).
Gif Art.com. <http://gifart.com/public/index.shtml> (26 November 2001).
GIFS.cc. <http://www.gifs.cc/lines.htm> (26 November 2001).
Microsoft Office Design Gallery Live. <http://dgl.microsoft.com/> (5 December 2001).
ObjectsFusion.<http://www.objectsfusion.com> (26 November 2001).