Free Essay

Bibliography

In: Novels

Submitted By samorakubari
Words 1223
Pages 5
Bibliography
Alazab, A, 2013, Crime Toolkits: The Productisation of Cybercrime. Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on. IEEE.
Alazab, M., Layton, R., Venkataraman, S., Watters, P., 2010, Malware detection based on structural and behavioural features of api calls.
Alrabaee, S., Saleem, N., Preda, S., Wang, L., Debbabi, M., 2014, OBA2: an Onion approach to binary code authorship attribution. Digital Investigation, 11, S94-S103.
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... Savage, S., 2013, Measuring the cost of cybercrime. In The economics of information security and privacy (pp. 265-300). Springer Berlin Heidelberg.
Androutsopoulos, Ion, et al., 2000, "Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach." arXiv preprint cs/0009009.
Bagavandas, M., and Manimannan, G., 2008, Style consistency and authorship attribution: A statistical investigation*. Journal of Quantitative Linguistics 15.1: 100-110
Bishop, C. M., 2006, Pattern recognition and machine learning. springer.
Bond, P., 2014, “Sony Hack: Activists to Drop ‘Interview’DVDs over North Korea via Balloon. The Hollywood Reporter, 16.
Bouton, M. E., 2014, "Why behavior change is difficult to sustain." Preventive medicine 68: (p. 29-36)
Brennan, M. R., Greenstadt, R. (2009, July). Practical Attacks Against Authorship Recognition Techniques. In IAAI.
Brennan, M. R., and Greenstadt, R., 2009, Practical Attacks Against Authorship Recognition Techniques. IAAI.
Brennan, M., Afroz, S., Greenstadt, R., 2012, Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Transactions on Information and System Security (TISSEC), 15(3), 12.
Brenner, Susan W., 2007, 'At Light Speed' - Attribution and Response to Cybercrime/Terrorism/Warfare (2007). Journal of Criminal Law and Criminology, Vol. 97, p. 379.
Buitinck, L., Louppe, G., Blondel, M., Pedregosa, F., Mueller, A., Grisel, O., ... Varoquaux, G., 2013, API design for machine learning software: experiences from the scikit-learn project. arXiv preprint arXiv:1309.0238.
Burrows, S., Uitdenbogerd, A. L., Turpin, A., 2014, Comparing techniques for authorship attribution of source code. Software: Practice and Experience, 44(1), 1-32.
Clark, D. D., Landau, S., 2010, The problem isn't attribution: it's multi-stage attacks. In Proceedings of the Re-architecting the Internet Workshop (p. 11). ACM.
Clarke, R. V. G. (Ed.)., 1997, Situational crime prevention (pp. 53-70). Monsey, NY: Criminal Justice Press. de Graaf, D., Shosha, A. F., Gladyshev, P., 2013, BREDOLAB: shopping in the cybercrime underworld. In Digital Forensics and Cyber Crime (pp. 302-313). Springer Berlin Heidelberg.
Dingledine, R., Mathewson, N., Syverson, P., 2004, Tor: The second-generation onion router. Naval Research Lab Washington DC.
Douglas, J. E., and Munn, C., 1992, Violent crime scene analysis: Modus operandi, signature, and staging. FBI Law Enforcement Bulletin 61.2: 1-10
Edwards, C. I. P. M., 2014, An analysis of a cyberattack on a nuclear plant: The stuxnet worm. Critical Infrastructure Protection, 116, 59.
Fidler, D. P., 2011, Was stuxnet an act of war? decoding a cyberattack. IEEE Security Privacy, (4), 56-59.
Frantzeskou, G., Stamatatos, E., Gritzalis, S., Chaski, C. E., Howald, B. S., 2007, Identifying authorship by byte-level n-grams: The source code author profile (scap) method. International Journal of Digital Evidence, 6(1), 1-18.
Galeotti, M., 2014, Global crime today: the changing face of organised crime. Routledge.
Giani, A., De Souza, I. G., Berk, V., Cybenko, G., 2006, Attribution and Aggregation of Network Flows for Security Analysis
Giffin, J., Srivastava, A., 2010, Attribution of malicious behavior. In Information Systems Security (pp. 28-47). Springer Berlin Heidelberg.
Haggard, S., Lindsay, J. R., 2015, North Korea and the Sony Hack: Exporting Instability Through Cyberspace.
John, A., Sivakumar, T., 2009, Ddos: Survey of traceback methods. International Journal of Recent Trends in Engineering, 1(2), 241-245.
Juola, P., 2006, Authorship attribution. Foundations and Trends in information Retrieval, 1(3), 233-334.
Kešelj, V., Peng, F., Cercone, N., Thomas, C., 2003, N-gram-based author profiles for authorship attribution. In Proceedings of the conference pacific association for computational linguistics, PACLING (Vol. 3, pp. 255-264).
Koppel, M., Schler, J., Argamon, S., 2011, Authorship attribution in the wild. Language Resources and Evaluation, 45(1), 83-94.
Kosba, A. E., 2014, ADAM: automated detection and attribution of malicious webpages. Information Security Applications. Springer International Publishing. 3-16.
Layton, R., Watters, P. A., 2014, A methodology for estimating the tangible cost of data breaches. Journal of Information Security and Applications, 19(6), 321-330.
Layton, R., 2015, Learning Data Mining in Python. Packt Publishing
Layton, R., and Ahmad A., 2014, Authorship analysis of the Zeus botnet source code. Cybercrime and Trustworthy Computing Conference (CTC), 2014 Fifth. IEEE.
Layton, R., and Watters, P. A, 2014, Indirect attribution in cyberspace. Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance.
Layton, R., Watters, P., Dazeley, R., 2012, Unsupervised authorship analysis of phishing webpages. In Communications and Information Technologies (ISCIT), 2012 International Symposium on (pp. 1104-1109). IEEE.
Layton, R., Watters, P., Dazeley, R., 2013, Automated unsupervised authorship analysis using evidence accumulation clustering. Natural Language Engineering, 19(01), 95-120.
Lee, I., Jeong, S., Yeo, S., Moon, J., 2012, A novel method for SQL injection attack detection based on removing SQL query attribute values. Mathematical and Computer Modelling, 55(1), 58-68.
Lowd, Daniel, and Christopher Meek., 2005, “Good Word Attacks on Statistical Spam Filters." CEAS.
McCombie, S., Pieprzyk, J., Watters, P., 2009, Cybercrime attribution: an Eastern European case study.
McRae, C. M., and Vaughn, R. B., 2007, Phighting the phisher: Using web bugs and honeytokens to investigate the source of phishing attacks. System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on. IEEE, 2007.
Murdoch, S. J., and Danezis, G., 2005, Low-cost traffic analysis of Tor. Security and Privacy, 2005 IEEE Symposium on. IEEE.
Parker, T., 2011, Stuxnet Redux: Malware Attribution Lessons Learned. Black Hat DC 2011–URL: www. blackhat. com/html/bh-dc-11/bh-dc-11-archives. html# Parker.
Perez, C., Birregah, B., Layton, R., Lemercier, M., Watters, P., 2014, REPLOT: Retrieving Profile Links On Twitter for malicious campagaign discovery. IA Communications (à paraître).
Pilli, E. S., Joshi, R. C., Niyogi, R., 2010, Network forensic frameworks: Survey and research challenges. Digital Investigation, 7(1), 14–27.
Rogers, M., 2003, The role of criminal profiling in the computer forensics process. Computers Security, 22(4), 292-298.
Rosenblum, N., Zhu, X., Miller, B. P., 2011, Who wrote this code? identifying the authors of program binaries. In Computer Security–ESORICS 2011 (pp. 172-189). Springer Berlin Heidelberg.
Solove, D. J., 2007, 'I've got nothing to hide' and other misunderstandings of privacy. San Diego law review, 44, 745.
Stolerman, A., Overdorf, R., Afroz, S., Greenstadt, R., 2013, Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution. In IFIP Working Group (Vol. 11).
Sutanto, P. J., Leedham, G., Pervouchine, V., 2003, Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter? a?. In null (p. 1091). IEEE.
Torney, R., Yearwood, J., Vamplew, P., Kelarev, A. V., 2012, Applications of Machine Learning for Linguistic Analysis of Texts. Machine Learning Algorithms for Problem Solving in Computational Applications: Intelligent Techniques: Intelligent Techniques, 133.
Turvey, B. E., 2011, Criminal profiling: An introduction to behavioral evidence analysis. Academic press.
Whitten, A., Tygar, J. D., 1999, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Usenix Security (Vol. 1999).…...

Similar Documents

Premium Essay

Bibliography

...Nicolas Romero THEO201 B29 Short Essay # 1 Short Essay on Bibliography Bibliology from the Greek word βιβλιογραφία, bibliographia, is book writing. On its own it simply means the study of the bible. With it come the ideas of inspirations and inerrancy. The Bible is both and can be seen in its content. Being a once three time born-again Catholic, did all the steps while living with my parents, I can relate to having to be confident that what the bible says is true to its nature. The authority of the Bible comes from the Bible itself. We must begin with the beginning. Like it says in the Bible the beginning of all is with God. So with this we must begin with God himself. This is evident in Exodus 4:22 (New American Standard Bible), ‘…Thus says the Lord,’ and many other verses just like it. This happens numerous times in the bible that no one can take away anything different than that. Also, it says in Hebrews 6:13, ‘for when God made the promise to Abraham, since He could swear by no one greater, He swore by Himself.’ This is what makes God authority over everything. This direct quote explains who God really is and where he gets his authority from. Thus the Bible being the spoken words of God this also makes the Bible have authority. Inspiration as defined by Towns(Theology for Today, 897) is, ‘the supernatural guidance of the writers of Scripture by the Spirit of God, whereby what they wrote became the divine Word of God, transcribed accurately, reliably...

Words: 911 - Pages: 4

Premium Essay

Bibliography

...Annotated Bibliography Borden, L. A., Martens, M. P., McBride, M. A., Sheline, K. T., Bloch, K. K., & Dude, K. (2011). The role of college students' use of protective behavioral strategies in the relation between binge drinking and alcohol-related problems. Psychology Of Addictive Behaviors, 25(2), 346-351. doi:10.1037/a0022678 “The role of college students' use of protective behavioral strategies in the relation between binge drinking and alcohol-related problems.” This is a study performed on 4,154 students at 13 mid-western universities. The purpose of the present study was to extend previous literature to examine the moderating effect of PBS (protective behavioral strategies) on the relationship between binge drinking and alcohol-related problems. Findings indicated that PBS moderated the binge drinking-alcohol problems relationship for each of the four measures of binge drinking. I will be using this source because it explains the psychological effects that could cause college or university students to start binge drinking. It also explains the problems binge drinking can cause students. The source is a very reliable source that has multiple authors who are either college or university professors or department of education, giving me respectful and reliable information. Ryan, J. J., Kreiner, D. S., Chapman, M. D., & Stark-Wroblewski, K. (2010). Virtual Reality Cues for Binge Drinking in College Students. Cyberpsychology, Behavior & Social Networking,......

Words: 559 - Pages: 3

Premium Essay

Bibliography

...BIBLIOGRAPHY * Fricana C. Ponce, (1996) “Occupational Interest of Selected Freshman Students and their Academic Performance: A Correlational Study”. * Abdon, Eva Maria S. Villaddres, (2008) “Correlation between interest and academic performance as predictors to effective related learning experience: basis clinical counselling”. * TeodoraSalubaybay (1994), “The predictors of academic success of the freshmen college s tudents” (M.A thesis Philippine Normal University) * Rosemary Thompson, “School Counseling Renewal” (Indiana, USA: Accelerated Development Inc.,1992). * Richard S. Sharf, “Applying Career Development Theory in Counseling” (Pacific Grove, California: Brooks Cole Publishing Company,1992),pp.254-273, Citing Ann Roe, “Personality Development and Career Choice” (New York: D.Browe&Brown, and Association, 1990) pp.68-100 * Ibid., Citing L.S. Gottfredson, “Consumptions and Compromise A. Development Theory of Occupational Operartion” Journal of Counseling Psychology. 28 (1981), pp.548-579 * Andrew J. Durbin, “Human Relations for Career and Personal Success” (New Jersey: Vrentice Hall Inc.,1992),p.25 * 8.Davis Mener And Duane Brown, “Predicting the Occupational Aspirations, Occupational Expectations, and Career Maturity of Black and White Female 10th Graders” Vocational Guidance Quarterly XXXII, No.1 (Sept.1983),p.29 * G.C. Ironico , “Testing Interest and Vocational Adjustment in Vocational Guidance”, Filipino Teacher ......

Words: 907 - Pages: 4

Free Essay

Bibliography

...Bibliography Chaiboonsri, T. L. (2012, april 21). Factors Affecting Thailand’s Major Agricultural Exports Using Panel Cointegration Method. Retrieved 3 25, 2013, from sv.libarts.psu.ac.th: http://sv.libarts.psu.ac.th/conference5/proceedings/Proceedings4/article/6pdf/007.pdf Chavez, E. J. (2012, August). ASEAN and Global Rice Situation and Outlook. Retrieved 3 25, 2013, from seacouncil.org: http://www.seacouncil.org/seacon/images/stories/pdf2013/adb_rice2012.pdf Dechachete, T. (2011, April). Composite Index of Market Access for the export of rice from Thailand. Retrieved 3 2013, from ictsd.org: http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=24&cad=rja&ved=0CEwQFjADOBQ&url=http%3A%2F%2Fmercury.ethz.ch%2Fserviceengine%2FFiles%2FISN%2F138439%2Fipublicationdocument_singledocument%2F39518f4c-4885-41ed-9f1d-300876bdb483%2Fen%2Fthai_cima_rice.pdf&ei=gDpQUeOAOoiErQeUy4HgAg&usg=AFQjCNHlY_KB539QcK9l2nntAYhBCC_fHQ&sig2=kMEJVnn_RDfRuJIUjDZvzg Food and Agriculture Organization of the United Nations . (2011, nov). Rice market monitor. Retrieved 3 25, 2013, from fao.org: http://www.fao.org/docrep/014/am945e/am945e00.pdf Kittisak Jermsittiparsert, T. S. (2012). The “Populism” Policy and Building/Diminishing Economic “Inequality” and “Unfairness”: Empirical Suggestion on Pork-Barrel in Thailand’s Rice Trading Business. Retrieved 3 25, 2013, from ipedr.com: http://www.ipedr.com/vol28/37-ICEMM2012-G00004.pdf Kittisak......

Words: 461 - Pages: 2

Premium Essay

Bibliography

...Assignment: Annotated Bibliography Jermarious Spencer 4/3/2013 McCombs, B., & Steller, T. (2011, Feb 20). Gun rights vs. gun control. McClatchy - Tribune Business News. Retrieved from http://search.proquest.com/docview/852873644?accountid=35812 Despite every gun law the government enforces there has not been any proven way to control guns. Every day there are guns purchased legally by people with mental illnesses. “How could a person with apparently serious mental problems so easily buy a semiautomatic pistol and an extended ammunition magazine and carry it legally without a permit?” McCombs, B,. & Stellar, T. If people who was been diagnose with mental illnesses can have gun privileges restored but a person who only one criminal offense cannot get their rights restored to protect their self, what about the 2nd Amendment ,,,”the right to bear arms”. Melendres, J. (2004, Jun 30). Gun control or control the gun. Ability Magazine, 2004, 64-64. Retrieved from http://search.proquest.com/docview/201330220?accountid=35812 The Americans for Gun Safety Foundation (AGSF) has surveyed how gun theft has played an important role in many homicides and other horrible crimes involving guns. From statistics viewed by the AGSF there were large numbers of stolen guns reported each year and later used in several different other crimes. So while gun control advocates try to stricken gun laws the dangers of those laws point to interfering with a person’s right to own a......

Words: 773 - Pages: 4

Free Essay

Bibliography

...How to Make a Bibliography - A Handy Guideline -- Based on the 6th Edition of MLA Handbook for Writers of Research Papers. A BIBLIOGRAPHY is a list of sources used by the writer of a research paper, including books, encyclopedias, newspapers, magazines, pamphlets, interviews, and electronic media.  All the sources used are listed alphabetically.      NOTE:  Book titles must be either underlined: Ants or italicized: Ants.  NOTE:  Pay attention to spacing, capitalization and punctuation. NOTE: When more than one publication location is cited on the title page, the first city should be the one noted on your bibliopgraphy. Place of publication usually includes the Name of the City, and the abbreviation of the State: Greenwood, CT. NOTE: The information for your bibliography should come from the Title Page of each book, NOT THE COVER, the SPINE or other sources (such as WebCat.) BOOKS  ONE AUTHOR  Overbeck, Cynthia.  Ants.  Minneapolis:  Lerner Publication         Company, 1982.   Author's last name, Author's first name.  Title.  Place of publication:  Publisher, copyright date.   TWO OR THREE AUTHORS   Sewell, Barbara and Patrick Lynch.  A First Look at Ants.  New York:           Walker & Company, 1992. First Author's last name, First Author's first name and Full Names of 2nd and 3rd Authors. Title. Place of publication: Publisher, copyright date.    MORE THAN THREE AUTHORS Anderson, Norman D., et al. Ants : using biological indicators to......

Words: 2414 - Pages: 10

Free Essay

Bibliography

...Bibliography References * Automotive Logistics. 2009. Nano is moving by rail. http://www.automotivelogisticsmagazine.com/news/nano-is-moving-by-rail (accessed Septmeber 29, 2013) * Automotive Logistics. 2009. Tata Nano could be saving grace for supply chain. http://www.automotivelogisticsmagazine.com/news/tata-nano-could-be-saving-grace-for-supply-chain (accessed September 29, 2013) * Engineerlive. n.d. How Tata has built a car that costs less than a motorbike. http://www.engineerlive.com/content/20338 (accessed September 28, 2013) * Moneycontrol. 2013. CNBC-TV18: Tata Motors initiates organisation rejig. http://www.moneycontrol.com/news/cnbc-tv18-comments/tata-motors-initiates-organisation-rejig_808190.html?utm_source=ref_article (accessed September 26, 2013) * Muralidhar, S. 2013. Rough ride for Tata Motors. http://www.thehindubusinessline.com/opinion/rough-ride-for-tata-motors/article4610740.ece (accessed September 28, 2013) * Scanlon, J., 2009. What Can Tata's Nano Teach Detroit? http://www.businessweek.com/innovate/content/mar2009/id20090318_012120.htm (accessed September 28, 2013) * Tata. 2010. Cracking the cost code. http://www.tata.com/media/reports/inside.aspx?artid=8M7LPPCLbzs (accessed 26 September, 2013 * Tata. 2013. Tata Motors announces HORIZONEXT. http://www.tata.com/media/releases/inside.aspx?artid=PnkwCmxL7fU= (accessed September 27, 2013) * Tata. 2013. Tata Motors launches Tata Motors Service for passenger vehicles......

Words: 321 - Pages: 2

Premium Essay

Bibliography

...Annotated Bibliography Shin, Grace. "Video Games: A Cause of Violence and Aggression." Serendip. N.p., 4 Jan. 2010. Web. 19 July 2010. . This is a good article for my paper because it discusses how video games cause more violent tendencies in people who play violent video games than people who don’t. It states, with several other good references that people who play violent video games are more prone to repeat what they see in the game. If the game is violent then their heart rate and adrenaline increase which could cause hostility. Sometimes, people actually get desensitized to killing because they do it in video games. Fagin, Claire, Pam Maraldo, and Dianna Mason. "Increasing Public Understanding of Nursing." NursingAdvocacy.org. N.p., 4 Jan. 2007. Web. 19 July 2010. . This article expresses that shows like House M.D., E.R. and Grey’s Anatomy give people a skewed perception of how doctors and nurses actually work. It makes people think that doctors just sit around all day and work on a single case or that nurses don’t really do anything useful. Shelton, Donald E. "The 'CSI Effect': Does It Really Exist?." ojp.usdoj.gov. N.p., 17 Mar. 2008. Web. 19 July 2010. . This article explains what is called the CSI Effect. It is an increase of expectations in jurors due to watching too many CSI and Law and Order type shows. This supports my theory because it means that guilty suspects could and possibly are being set free due to the police not doing......

Words: 268 - Pages: 2

Free Essay

Bibliography

...Bibliography Attridge, M. (2009). Measuring and managing employee work engagement: a review of the research and business literature. Journal of Workplace Behavioral Health, 24(4), 383-398. Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=45542631&site=ehost-live Bassi, L, and McMurrer, D. (2007 March). Maximizing your return on people. Harvard Business Review, 85(3), 115-123. Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=23927003&site=ehost-live Bates, S. (2003, December). The metrics maze. HR Magazine, 48(12), 50-55. Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=11700506&site=ehost-live Dunkel, L. (2007). The soft stuff is the hard stuff. Leadership Excellence, 24(7), 14-15. Retrieved from: http://web.ebscohost.com.proxy.devry.edu/ehost/pdfviewer/pdfviewer?vid=9&hid=12&sid=e4c0f247-7c4e-420b-9284-266a51c054e3%40sessionmgr15 Echols, M. E. (2005, February). Engaging employees to impact performance. Chief Learning Officer, 4(2), 44-48. Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=15842756&site=ehost-live Fox, A. (2010, May). Raising engagement. HR Magazine, 55(5), 34-40. Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=50502677&site=ehost-live Furness, V. (2008, April). Engagement defined. Employee Benefits,56-57. Retrieved from:......

Words: 413 - Pages: 2

Premium Essay

Bibliography

... |124.68 |343.20 |249.39 |1,260.28 | |Operating expenses |135.55 |31.12 |85.67 |62.25 |314.59 | |Operating income |407.46 |93.56 |257.53 |187.14 |945.69 | |Net operating income |407.46 |93.56 |257.53 |187.14 |945.69 | |Off-Shore-Banking Unit |- |- |- |- |13.50 | |Net operating income |407.46 |93.56 |257.53 |187.14 |959.19 | Bibliography 1. Bahar, M. H. (1989). An Evaluation of Banks in Bangladesh: An Exploratory Approach. Bank Parikrama (Vol. XIV, pp. 89-95). Dhaka: BIBM, Seminar Proceedings Special Issue. 2. Bangladesh Bank. (2012). Banking Regulation and Policy Department. BRPD Circular No.02. Dhaka. 3. Bangladesh Bureau of Statistics. (1992). Statistical Yearbook of Bangladesh. Dhaka: BBS, Ministry of Planning. 4. Chowdhury, L. R. (2006). A Text Book on Foreign Exchange. 2nd Edition. Dhaka: Fair Publication. 5. Debnath, Dr. R. M. (2004). Business of Banking. 1st Edition. 68/69, Pyari Das Road, Dhaka-1100: Lotus Publishers. 6. Khan, Dr. A. R. (2009). Bank Management: A Fund Emphasis. 1st Edition. Nilkhet, Dhaka: Brothers Publication. 7. NBL, Annual......

Words: 808 - Pages: 4

Premium Essay

Bibliography

...bTanea Savage Preliminary Thesis: Truman Capote’s “In Cold Blood” conveys true crime and the portrayal of the killers. Throughout the novel, Perry and Dick are transformed from heartless, cold-blooded monsters, whose actions seem to be motiveless evil, into the troubled, pitiful, and human individuals they are at the end of the book. The crime itself is reduced to many emotional responses. Preliminary Bibliography Capote, Truman. In Cold Blood: Random House. Alan. U. Schwartz. New York, 1965. Print. ------------------------------------------------- Primary Source Corregido, Jeronimo. "A Study of Genre in In Cold Blood: A Formal Perspective." A Study of Genre in “In Cold Blood”: A Formal Perspective. N.p., n.d. Web. 21 Jan. 2015:Academia.edu. swales, john. M. Massachusetts, 1990. Cambridge University. ------------------------------------------------- This essay conveys the death and crime which the book portrays. This relates to my primary source, “In Cold Blood” which portrays sudden death and crime upon the family. "In Cold Blood :: Character Analysis, Perry Smith. "In Cold Blood :: Character Analysis, Perry Smith. N.p., n.d. Web. 23 Jan. 2015. ------------------------------------------------- This essay “Cold Blood” shows the traumatic story from the killers’ perspective. It also conveys how the killers’ background effected how they proceeded in life. Hemingway, Ernest. "Short Stories of Ernest Hemingway Study Guide: “The Killers” Summary and......

Words: 378 - Pages: 2

Premium Essay

Bibliography

...Bibliography BLOCHER, JOSEPH. "Gun Rights Talk." Boston University Law Review 94.3 (2014): 813-833. Academic Search Complete. Web. 17 Nov. 2014 "Comparisons of Crime in OECD Countries." Comparisons of Crime in OECD Countries (n.d.): n. pag. Http://www.civitas.org.uk. Harrendorf S, Heiskanen M, Malby S,International Statistics on Crime and Justice, European Institute for Crime Prevention and Control, Affiliated with the United Nations, 2010. Web. 22 Nov. 2014. Faria Jr., Miguel A. "Shooting Rampages, Mental Health, and the Sensationalization of Violence." Surgical Neurology International 4.1 (2013): 85-92. Academic Search Complete. Web. 20 Nov. 2014. FLEMING, JAMES E., and LINDA C. MCCLAIN. "Ordered Gun Liberty: Rights with Responsibilities and Regulation." Boston University Law Review 94.3 (2014): 849-892. Academic Search Complete. Web. 21 Nov. 2014. Isaacs, David. "Children and Guns: A Call to Disarm." Journal of Paediatrics & Child Health 49.9 (2013): 699-700. Academic Search Complete. Web. 16 Nov. 2014. Kopel, David B. "The Great Gun Control War of the Twentieth Century-And Its Lessons for Gun Laws Today." Fordham Urban Law Journal 39.5 (2012): 1527-1616. Academic Search Complete. Web. 16 Nov. 2014. Mehalko, Laura. "This Is Gun Country: The International Implications Of U.S. Gun Control Policy." Boston College International & Comparative Law Review 35.1 (2012): 297-330. Academic Search Complete. Web. 18 Nov. 2014. Moorhouse, John C., and Brent Wanner.......

Words: 325 - Pages: 2

Premium Essay

Bibliography

...Creating APA Style Annotated Bibliographies, 6th Ed. Annotated bibliographies are not specifically addressed in the Publication Manual of the American Psychological Association, 6th ed. We have taken the example given online at the OWL at Purdue1 as the basis for formatting. It is a good idea to take careful note of any directions given in your assignment, and to check with your professor if you have specific questions. Contents 1. 2. 3. Guidelines Sample Annotated Bibliography Sample Standard Reference List/Bibliography Guidelines The following is a summary of things to know when creating an APA style annotated bibliography:  The annotated bibliography consists of two elements o Citation in current APA style format o Annotation The annotation will follow the citation on the next line. There is not an extra space— double spacing is used throughout. An annotation is different from an abstract. It should have several sentences summarizing the main points or ideas found in the item. It should then include your own statement evaluating the quality of the item and/or relating the item to your own research topic. For a longer annotated bibliography, it is appropriate to divide into sections or topics, and to title those sections as seems fitting.    Note: These annotations are for illustrative purposes only and have no relationship to the content of the sources. The citations are from the sample list found at the......

Words: 594 - Pages: 3

Premium Essay

Bibliography

...------------------------------------------------- Annotated Bibliography Kelly DeBolt August 30, 2015 NUR/403 Tricia Proctor August 30, 2015 NUR/403 Tricia Proctor Annotated Bibliography Baillie, L. (2005, January). An exploration of nurse-patient relationships in accident and emergency. Accident and Emergency Nursing, 13(1), 9-14. This article discusses the nurse-patient relationships in the accident and emergency. It looks into nursing theory and research about three distinct experiences from the author. I found the article to be of interest in regards to the topic of barriers in forming the nurse-patient relationship in the emergency setting. Being an ER nurse I can relate to the authors thinking. It can be difficult to establish a relationship due to the limited time spent with the patient. Most relationships can be viewed as “superficial” or “if existing at all”. The nurse could also experience a short but memorable and intense relationship in the emergency setting. The author discusses three distinct relationships and examines them using nursing theory. Cara, C. (2003). A Pragmatic View of Jean Watson's Caring Theory. International Journal for Human Caring, 7(3), 51-61. The article discusses essential components of Watson’s caring theory and the use in the clinical setting, application, and show how to apply it to the practice setting. It gives a brief overview of the caring theory and gives background information about Jean Watson. ...

Words: 531 - Pages: 3

Premium Essay

Bibliography

...Bibliography Alexie, Sherman. "The Joy of Reading and Writing: Superman and Me." Http://www.qcounty.com/SCC/Spring10/Eng305_10035/Readings/ShermanAlexie--Superman.pdf. Web. Allen, James P. "Ethnic Geography Dynamics: Clues From Los Angeles." Yearbook Of The Association Of Pacific Coast Geographers 67. (2005): 97-116. Academic Search Premier. Web. 29 Oct. 2013. Alpert, Emily. "Many Asian Americans Are as Segregated by Neighborhood as Latinos." Los Angeles Times 25 June. 2013. Web. 28 Oct. 2013. Didion, Joan. "Why I Write." (1976): 4-8. Print. Dweck, Carol. "The Perils and Promises of Praises." Print. <http://www.ascd.org/publications/educational-leadership/oct07/vol65/num02/The-Perils-and-Promises-of-Praise.aspx>. Elbow, Peter. "Freewriting." (1973): n. pag. Print. Gruwell, Erin. The Freedom Writers. New York: Broadway, 1999. Print. Gurnee, Kim. Success Strategies. California: Impact, 2013. Print. Hughes, Langston. “Theme for English B.” The Presence of Others: Voices and Images That Call for Response. Eds. Lunsford, Andrea A., and John J. Ruszkiewicz. Boston: Bedford/St. Martin's, 2000. 484-485. Print. Rose, Mike. “Lives on the Boundary.” The Presence of Others: Voices and Images That Call for Response. Eds. Lunsford, Andrea A., and John J. Ruszkiewicz. Boston: Bedford/St. Martin's, 2000. 90-102. Print. Hurston, Zora Neale. “How It Feels to Be Colored Me.” The Presence of Others: Voices and Images That Call for Response. Eds. Lunsford, Andrea A., and John J....

Words: 294 - Pages: 2