Profiling under conditions of ambiguity—An application in the financial services industry
暂无分享,去创建一个
[1] Serge Gutwirth,et al. Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .
[2] J. Harvey. An Evaluation of Money Laundering Policies , 2005 .
[3] Kevin Fickenscher. The new frontier of data mining. , 2005, Health management technology.
[4] Bruce Eckfeldt,et al. What does RFID do for the consumer? , 2005, CACM.
[5] Chip Heath,et al. Idea Habitats: How the Prevalence of Environmental Cues Influences the Success of Ideas , 2005, Cogn. Sci..
[6] Dionysios S. Demetis,et al. Systems thinking about anti-money laundering: considering the Greek case , 2005 .
[7] Pernilla Gripenberg,et al. ICT and the Shaping of Society: Exploring Human -ICT Relationships in Everyday Life (summary section only) , 2005 .
[8] S. Durlauf. Racial profiling as a public policy question: efficiency, equity, and ambiguity , 2005 .
[9] A. Lever. Why Racial Profiling Is Hard to Justify: A Response to Risse and Zeckhauser , 2005 .
[10] Victor Maojo,et al. Domain-Specific Particularities of Data Mining: Lessons Learned , 2004, ISBMDA.
[11] B.H.M. Custers,et al. 'The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology , 2004 .
[12] L. Webb. A survey of money laundering reporting officers and their attitudes towards money laundering regulations , 2004 .
[13] Guy H. Gessner,et al. Holistic Compliance with Sarbanes-Oxley , 2004, Commun. Assoc. Inf. Syst..
[14] M. Levi,et al. Technologies, Security, and Privacy in the Post-9/11 European Information Society , 2004 .
[15] Jean Hartley,et al. Case study research , 2004 .
[16] David Lewis,et al. Information Systems and Nongovernmental Development Organizations: Advocacy, Organizational Learning, and Accountability , 2004, Inf. Soc..
[17] David C. Yen,et al. Critical factors influencing the adoption of data warehouse technology: a study of the banking industry in Taiwan , 2004, Decis. Support Syst..
[18] J. Backhouse,et al. Anti-money laundering - avoiding the technology trap , 2004 .
[19] Frank Veyder. Case study: Where is the risk in transaction monitoring? , 2003 .
[20] Shu-Chen Kao,et al. The Effect of Organizational Attributes on the Adoption of Data Mining Techniques in the Financial Service Industry: An Empirical Study in Taiwan , 2003 .
[21] M. Gill,et al. Can Information Technology Help in the Search for Money Laundering? The Views of Financial Companies , 2003 .
[22] Sideek Mohamed. Legal instruments to combat money laundering in the EU financial market , 2003 .
[23] Frederick Schauer,et al. Profiles, Probabilities, and Stereotypes , 2006 .
[24] Bruce Lewis,et al. A Basic Primer on Data Mining , 2002, Inf. Syst. Manag..
[25] Howard Kunreuther,et al. Risk Analysis and Risk Management in an Uncertain World 1 , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[26] Ron Kohavi,et al. Emerging trends in business analytics , 2002, CACM.
[27] Padhraic Smyth,et al. Business applications of data mining , 2002, CACM.
[28] R. E. Bell. An Introductory Who's Who for Money Laundering Investigators , 2002 .
[29] Steven Philippsohn,et al. Money Laundering on the Internet , 2001, Comput. Secur..
[30] Jim Underwood,et al. Translation, Betrayal and Ambiguity in IS Development , 2001, Organizational Semiotics.
[31] Umberto Filotto,et al. Money Laundering Regulation and Bank Compliance Costs: What Do Your Customers Know? Economics and the Italian Experience , 2001 .
[32] S. Dibb. New millennium, new segments: moving towards the segment of one? , 2001 .
[33] M J Pazzani,et al. Acceptance of Rules Generated by Machine Learning among Medical Experts , 2001, Methods of Information in Medicine.
[34] Ian Witten,et al. Data Mining , 2000 .
[35] Michael J. Pazzani,et al. Knowledge discovery from data? , 2000, IEEE Intell. Syst..
[36] Kecheng Liu,et al. Understanding the roles of signs and norms in organizations - a semiotic approach to information systems design , 2000, Behav. Inf. Technol..
[37] O. Hanseth,et al. From Control to Drift: The Dynamics of Corporate Information Infrastructures , 2000 .
[38] Kecheng Liu,et al. Semiotics in Information Systems Engineering , 2000 .
[39] Paul Gray,et al. Special Section: Data Mining , 1999, J. Manag. Inf. Syst..
[40] Amitai Etzioni,et al. The Limits Of Privacy , 1999 .
[41] Lucas D. Introna. Management, information and power: A narrative of the involved manager , 1997 .
[42] Gregory Piatetsky-Shapiro,et al. The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.
[43] James Backhouse,et al. Risks in the use of information technology within organizations , 1996 .
[44] David A. Bell,et al. The role of domain knowledge in data mining , 1995, CIKM '95.
[45] Tawfik Jelassi,et al. Strategic information systems: a European perspective , 1994 .
[46] R. Yin. Yin, Robert K., Case Study Research: Design and Methods, 2nd ed. Newbury Park, CA: Sage, 1994. , 1994 .
[47] Tomasz Imielinski,et al. Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..
[48] James Backhouse,et al. Understanding Information: An Introduction , 1990 .
[49] R. Westrum. The Social Construction of Technological Systems , 1989 .
[50] R. Yin. Case Study Research: Design and Methods , 1984 .
[51] M. Lynne Markus,et al. Power, politics, and MIS implementation , 1987, CACM.
[52] Liz Spencer,et al. Integration and Regulation in Organizations: A Contextual Approach , 1979 .
[53] John W. Creswell,et al. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2010 .
[54] J. S. Burn. Henley-on-Thames , 1856 .