------------------------------ Date: 12 Oct 91 11:21:19 CDT From: Moderators Subject: Dissertations and Theses The following come from International Dissertation Abstracts and from persons who responded to our request for information on theses. The dissertation list should be fairly complete. It excludes works limited to computer crime or computer-mediated communication (contact Bitnet's CMC newsgroup for information on CMC). The thesis list is incomplete because of the relatively low number of institutions responding. But, judging from bibliographies and discussions, there seem to be relatively few CU-related theses. ("Dissertations" are normally done for a PhD, and "theses" are written for a Master's degree). ++++++++++++++++++++++++ DISSERTATIONS ++++++++++++++++++++++++ Friedman, Batya. 1988. SOCIAL JUDGMENTS AND TECHNOLOGICAL INNOVATION: ADOLESCENT'S CONCEPTIONS OF COMPUTER PIRACY AND PRIVACY. (Director: none listed). University of California, Berkeley. 186 pp. Order No. DA 8916665. Dunn, Thurman Stanley. 1982. METHODOLOGY FOR THE OPTIMIZATION OF RESOURCES IN THE DETECTION OF COMPUTER FRAUD. (Directory: Jay F. Nunamaker). The University of Arizona. 198 pp. Order No. DA 8305976. Baker, Donald R. 1990. RELATIONSHIP SOF INTERNAL ACCOUNTING CONTROLS AND OCCURRENCES OF COMPUTER FRAUD. (Chair: Edward A. Becker). Nova University. 133 pp. Order No. DA 9022334. Esquerra, Ronald Lee. 1982. PERSONAL PRIVACY IN A COMPUTER INFORMATION SOCIETY. (Director: Jay F. Nunamaker). The University of Arizona. 377 pp. Order No. DA 8217495 Honan, Ava Smith. 1988. ANALYSIS OF KEYSTROKE PATTERNS FOR THE DEVELOPMENT OF A SECURITY SYSTEM FOR VALIDATION OF COMPUTER ACCESS. (Chair, Saeed Maghsoodloo). Auburn University. 115 pp. Order No. DA 8918795. Lu, Wen-Pai. 1986. SECURITY OF COMMUNICATION IN COMPUTER NETWORKS. (Director: Malur K. Sundareshan). The University of Arizona. 282 pp. Order No. DA 8702350. Pozzo, Maria Mildred. 1990. TOWARDS COMPUTER VIRUS PREVENTION. (Chair: David G. Cantor). University of California, Los Angeles. 202 pp. Order No. DA 9033944 Shamp, Scott A. 1989. MECHANOMORPHISM AND THE PERCEPTION OF COMPUTER COMMUNICATION PARTNERS (University of Utah). Contact: sshamp@uga.bitnet ++++++++++++++++++++++++ MASTERS' THESES ++++++++++++++++++++++++ Meyer, Gordon. 1988. THE SOCIAL ORGANIZATION OF THE COMPUTER UNDERGROUND. (Chair: James Massey). Northern Illinois University. Contact: Gordon Meyer: "72307.1502@COMPUSERVE.COM" Wang, Shenhsien J. 1986. DETECTIVE SECURITY SYSTEM THAT MEASURES AND PREVENTS NETWORK VIOLATIONS. (Chair: Kenneth C. Kung). Northrop University. 109 pp. Order No. MA 132853 Lankewicz, Linda Bright. 1986. RESOURCE UTILIZATION AND SECURITY. (Major Professor: Marino J. Niccolai). University of South Alabama. 190 pp. Order No. ??). ++++++++++++++++++++++++ WORKS IN PROGRESS ++++++++++++++++++++++++ (The following include projects in the planning stage as well as those nearing completion) William Curran (Arizona State University). Writing a Masters Thesis on the introduction of wide area and local nets into the Soviet Union, combining technological and sociological analysis that summarizes the changes and prospects for early nineties. Contact: WCURRAN@CARAT.ARIZONA.EDU Mark Smith (Sociology, University of California, Los Angeles). Dissertation (in progress) that focuses on the power and politics of the "information society". Recurring themes include the role of time/space compression and surveillance in society. Significant influences include David Harvey, Michel Foucault, Mark Poster, Herbert expand. One issue includes the clash between Enlightenment rhetoric and post-modern technology. Contact: SMITHM@DUVM.BITNET Peter S. Markham (University of Melbourne, Dept. of Criminology). Masters' Thesis in progress on a comparative study of the Criminalisation of Computer Misuse in the United States, United Kingdom and Australia. Contact: pmark@ARIEL.UCS.UNIMELB.EDU.AU Elizabeth M. Reid (University of Melbourne). Supervisor: Donna Merwick. Honours Thesis on computer-Mediated Communication communication processes in synchronous conferencing, including computer networks, internet, and electronic mail. The focus is on cultural themes of communication, including power, interpreting social contexts, socialization and learning, from a deconstructionist perspective. ((Moderators' note: We've read a draft, and it's first-rate)). Contact: "emr%munagin.ee.mu.oz.au@uunet.uu.net" Paul Taylor (University of Edinburgh). Finishing a dissertation on hacking/viruses and the politics behind them. Focus includes hackers and their computer security industry counterparts. Examines the issue of technological determinism and the "information revolution" and also the idea of hackers being perhaps an extension or most recent development of an alternative culture. It also raises the whole issue of the exact nature of cyberspace and the implications it holds: Are we entering a new realm of informational colonialism? What is information? Who has rights over it, and are hackers/the computer underground fighting a battle of principle the importance of which has passed most people by? Contact: "p.a.taylor@edinburgh.ac.uk" Robert Berry (U. of North Carolina at Chapel Hill, Journalism). M.A. Thesis on the First Amendment implications of computer-based communication technologies. The focus includes a political analysis of the history of governmental harassment of hackers and how that harassment threatens to infringe the First Amendment rights associated with this new technology. The analysis centers around Operation Sun Devil and the related prosecutions that have taken place during the past few years. Contact: rrberry@SHELTIE.CHAPEL-HILL.NC.US