Agre P. ( 1995). The Network Observer (TNO) [On-line]. Available: email@example.com
Agreement on trade-related aspects of intellectual property rights, including trade in counterfeit goods [On-line]. ( 1994). Available: http://itl.irv.uit.no/trade__ law
Aho J. ( 1994). This thing of darkness: A sociology of the enemy. Seattle & London: University of Washington Press.
Aldrich J. ( 1990). Push button felonies. The Epic Project [On-line]. Available: firstname.lastname@example.org.
Alexander M. ( 1989, February 20). Hacker victims heartened by convictions. Computerworld, 23, 1, 12.
Alexander M. ( 1989, February 20). Prison term for first U.S. hacker-law convict. Computerworld, 23, 1, 12.
Alexander M. ( 1990, March 12). Computer crime: Ugly secret for business. Computerworld, 24, 1, 104.
Alexander M. ( 1990, March 19). Complex crimes stall enforcers. Computerworld, 24,4.
Alexander M. ( 1991). Hackers paradise? Computerworld, 24 (Suppl.), S26-S27.
Alexander M. ( 1991, January 21). Morris case impact slight. Computerworld, 25, 1,4.
Alexander M. ( 1991, June 24). Hackers promote better image. Computerworld, 25, 124.
Alexander M. ( 1991, September 16). Hacker may have penetrated Pentagon. Computerworld, 25, 14.
Alford W. P. ( 1992). Intellectual property, trade and Taiwan: A GATT-fly's view. Columbia Business Law Review, 97-107.
Alford W. P. ( 1995). To steal a book is an elegant offense: Intellectual property law in Chinese civilizations. Stanford, CA: Stanford University Press.