Profiling under conditions of ambiguity—An application in the financial services industry

[1]  Serge Gutwirth,et al.  Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .

[2]  J. Harvey An Evaluation of Money Laundering Policies , 2005 .

[3]  Kevin Fickenscher The new frontier of data mining. , 2005, Health management technology.

[4]  Bruce Eckfeldt,et al.  What does RFID do for the consumer? , 2005, CACM.

[5]  Chip Heath,et al.  Idea Habitats: How the Prevalence of Environmental Cues Influences the Success of Ideas , 2005, Cogn. Sci..

[6]  Dionysios S. Demetis,et al.  Systems thinking about anti-money laundering: considering the Greek case , 2005 .

[7]  Pernilla Gripenberg,et al.  ICT and the Shaping of Society: Exploring Human -ICT Relationships in Everyday Life (summary section only) , 2005 .

[8]  S. Durlauf Racial profiling as a public policy question: efficiency, equity, and ambiguity , 2005 .

[9]  A. Lever Why Racial Profiling Is Hard to Justify: A Response to Risse and Zeckhauser , 2005 .

[10]  Victor Maojo,et al.  Domain-Specific Particularities of Data Mining: Lessons Learned , 2004, ISBMDA.

[11]  B.H.M. Custers,et al.  'The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology , 2004 .

[12]  L. Webb A survey of money laundering reporting officers and their attitudes towards money laundering regulations , 2004 .

[13]  Guy H. Gessner,et al.  Holistic Compliance with Sarbanes-Oxley , 2004, Commun. Assoc. Inf. Syst..

[14]  M. Levi,et al.  Technologies, Security, and Privacy in the Post-9/11 European Information Society , 2004 .

[15]  Jean Hartley,et al.  Case study research , 2004 .

[16]  David Lewis,et al.  Information Systems and Nongovernmental Development Organizations: Advocacy, Organizational Learning, and Accountability , 2004, Inf. Soc..

[17]  David C. Yen,et al.  Critical factors influencing the adoption of data warehouse technology: a study of the banking industry in Taiwan , 2004, Decis. Support Syst..

[18]  J. Backhouse,et al.  Anti-money laundering - avoiding the technology trap , 2004 .

[19]  Frank Veyder Case study: Where is the risk in transaction monitoring? , 2003 .

[20]  Shu-Chen Kao,et al.  The Effect of Organizational Attributes on the Adoption of Data Mining Techniques in the Financial Service Industry: An Empirical Study in Taiwan , 2003 .

[21]  M. Gill,et al.  Can Information Technology Help in the Search for Money Laundering? The Views of Financial Companies , 2003 .

[22]  Sideek Mohamed Legal instruments to combat money laundering in the EU financial market , 2003 .

[23]  Frederick Schauer,et al.  Profiles, Probabilities, and Stereotypes , 2006 .

[24]  Bruce Lewis,et al.  A Basic Primer on Data Mining , 2002, Inf. Syst. Manag..

[25]  Howard Kunreuther,et al.  Risk Analysis and Risk Management in an Uncertain World 1 , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[26]  Ron Kohavi,et al.  Emerging trends in business analytics , 2002, CACM.

[27]  Padhraic Smyth,et al.  Business applications of data mining , 2002, CACM.

[28]  R. E. Bell An Introductory Who's Who for Money Laundering Investigators , 2002 .

[29]  Steven Philippsohn,et al.  Money Laundering on the Internet , 2001, Comput. Secur..

[30]  Jim Underwood,et al.  Translation, Betrayal and Ambiguity in IS Development , 2001, Organizational Semiotics.

[31]  Umberto Filotto,et al.  Money Laundering Regulation and Bank Compliance Costs: What Do Your Customers Know? Economics and the Italian Experience , 2001 .

[32]  S. Dibb New millennium, new segments: moving towards the segment of one? , 2001 .

[33]  M J Pazzani,et al.  Acceptance of Rules Generated by Machine Learning among Medical Experts , 2001, Methods of Information in Medicine.

[34]  Ian Witten,et al.  Data Mining , 2000 .

[35]  Michael J. Pazzani,et al.  Knowledge discovery from data? , 2000, IEEE Intell. Syst..

[36]  Kecheng Liu,et al.  Understanding the roles of signs and norms in organizations - a semiotic approach to information systems design , 2000, Behav. Inf. Technol..

[37]  O. Hanseth,et al.  From Control to Drift: The Dynamics of Corporate Information Infrastructures , 2000 .

[38]  Kecheng Liu,et al.  Semiotics in Information Systems Engineering , 2000 .

[39]  Paul Gray,et al.  Special Section: Data Mining , 1999, J. Manag. Inf. Syst..

[40]  Amitai Etzioni,et al.  The Limits Of Privacy , 1999 .

[41]  Lucas D. Introna Management, information and power: A narrative of the involved manager , 1997 .

[42]  Gregory Piatetsky-Shapiro,et al.  The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.

[43]  James Backhouse,et al.  Risks in the use of information technology within organizations , 1996 .

[44]  David A. Bell,et al.  The role of domain knowledge in data mining , 1995, CIKM '95.

[45]  Tawfik Jelassi,et al.  Strategic information systems: a European perspective , 1994 .

[46]  R. Yin Yin, Robert K., Case Study Research: Design and Methods, 2nd ed. Newbury Park, CA: Sage, 1994. , 1994 .

[47]  Tomasz Imielinski,et al.  Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..

[48]  James Backhouse,et al.  Understanding Information: An Introduction , 1990 .

[49]  R. Westrum The Social Construction of Technological Systems , 1989 .

[50]  R. Yin Case Study Research: Design and Methods , 1984 .

[51]  M. Lynne Markus,et al.  Power, politics, and MIS implementation , 1987, CACM.

[52]  Liz Spencer,et al.  Integration and Regulation in Organizations: A Contextual Approach , 1979 .

[53]  John W. Creswell,et al.  Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2010 .

[54]  J. S. Burn Henley-on-Thames , 1856 .