[ Pobierz całość w formacie PDF ]

(Accessed 12 August 2003).
Hales, M.G. 1995. Focusing on the 15% of the Pie. Bank Marketing,
Volume 27, No. 4 (April 1995): 29-34.
Humbarger, T. 2002. Where is the ROI in CRM?. [On-line]. Available
WWW: http://www.thcg.biz/Documents/Article%20-
%20Where%20is%20the%20ROI%20in%20CRM%20-%20Apr2002.pdf
(Accessed 12 August 2003).
Koenig, D. 2001. Investigation of Cyber crime and Technology-related
Crime. In. Tully, E.J. ed. Meeting Law Enforcement s Responsibilities -
Solving the Serious Issues of Today: 8-15.
KPMG. 1999. see KPMG Forensic Accounting. 1999.
KPMG. 2000. see KPMG Investigation and Security Inc. 2000.
KPMG. 2001. see KPMG International. 2001.
KPMG Forensic Accounting. 1999. 1998 US Fraud survey. KPMG
Fighting Fraud Magazine, 1(1):12. [On-line]. Available WWW:
http://www.kpmg.co.za/download/ffraud99.pdf (Accessed 12 August 2003).
KPMG see KPMG Investigation and Security Inc. 2000. E Commerce
And Cybercrime In Canada: New Strategies for Managing the Risks of
47
Exploitation. [On-line]. Available WWW:
http://www.kpmg.ca/english/services/docs/fas/ecommercecybercrime.pdf
(Accessed 12 August 2003).
KPMG International 2001. The 2001 e.fr@ud survey. Chapter 3: The
nature of the ecommerce threat. [On-line]. Available WWW:
http://www.kpmg.com/Rut2000_prod/Documents/9/efraud%20survey.pdf
(Accessed 12 August 2003).
Lorenz, M.O. 1905. Methods of Measuring the Concentration of Wealth.
Publications of the American Statistical Association, 9(90), 209-219.
Mann, R.J. 1999. A payments policy for the information age. University
Of Michigan Law School, Paper #00-001. [On-line]. Available WWW:
http://papers.ssrn.com/paper.taf?abstract_id=214632 (Accessed 12 August
2003).
McCardle, H.; Boxhall, J.; Ronderos, J. & Fransisco, R. 2001. Cyber crime
and its Effects on the Asia Pacific Region. Council for Security Co-operation
Asia and Pacific: Transnational Crime Working Group, a Sub Group Report.
[On-line]. Available WWW:
http://www.police.govt.nz/resources/2001/ecrimeforum/
cybercrime_and_its_effects.doc (Accessed 12 August 2003).
McConnell International. 2000. Cyber Crime & and Punishment? Archaic
Laws threaten Global Information. [On-line]. Available WWW:
http://www.iwar.org.uk/law/resources/cyber crime/mcconnell/Cyber crime.pdf
(Accessed 12 August 2003).
Messmer, E. 2002. President s advisor predicts cyber-catastrophes unless
security improves. Network World Fusion, 9 July 2002. [On-line].
Available WWW: http://www.nwfusion.com/news/2002/0709schmidt.html
(Accessed 12 August 2003).
Pareto, V. 1906. Manuale di economia politica. Milano : Società Editrice
Libraria.
PCB see Philippsohn Crawfords Berwald, Inc.
Philippsohn Crawfords Berwald, Inc. 2001a. An Overview of the Electronic
Crimes of the 21st Century. [On-line]. Available WWW:
http://www.pcbsols.com/links/overview_of_e-crime.htm (Accessed 12
August 2003).
Philippsohn Crawfords Berwald, Inc. 2001b. COMPSEC 2001: Recent
Cases of Electronic Fraud and Recovery. [On-line]. Available WWW:
http://www.pcbsols.com/links/compsec_2001.htm (Accessed 12 August
2003).
48
PMSEIC Working Group see Prime Minister's Science, Engineering and
Innovation Council, Working Group on Science, Crime Prevention & Law
Enforcement.
Pollitt, M.M 1997. Cyberterrorism - Fact or Fancy? Proceedings of the
20th National Information Systems Security Conference, October 1997. [On-
line]. Available WWW:
http://www.cs.georgetown.edu/~denning/infosec/pollitt.html (Accessed 12
August 2003).
Prime Minister's Science, Engineering and Innovation Council - Working
Group on Science, Crime Prevention & Law Enforcement. 2000. Science,
Crime Prevention and Law Enforcement. Prime Minister's Science,
Engineering and Innovation Council, Fifth Meeting - 2 June 2000. Sydney :
Prime Minister s office. [On-line]. Available WWW:
http://www.dest.gov.au/science/pmseic/meetings/5thmeeting.htm (Accessed
12 August 2003).
Reichheld, F.F. & Sasser, W.E. 1990. Zero Defections: Quality Comes to
Services. Harvard Business Review 68(5), September-October 1990, p.
105-111.
Schneier, B. 2003. Automated Denial-of-Service Attack Using the U.S.
Post Office. Cryptogram, April 15, 2003. [On-line]. Available WWW:
http://www.counterpane.com/crypto-gram-0304.html (Accessed 12 August
2003).
Scutt, A. 2001. Fast-track your eBusiness in Europe - Click to Ship. [On-
line]. Available WWW: http://www.clicktoship-
europe.com/presentations/ClearCommerce.pdf (Accessed 12 August 2003).
Settle, J.C. 2000. The Mag (nificent) Ten: How to Secure Your Networks -
ISW 2000 Position Paper. [On-line]. Available WWW: [ Pobierz całość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • fopke.keep.pl