28.10.2016 Views

gender differential paper IJCRB

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ijcrb.webs.com<br />

INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS<br />

JUNE 2011<br />

VOL 3, NO 2<br />

Bult, J.R. and Wansbeek, T. 1995, “Optimal selection for direct mail,” Marketing<br />

Science, Vol.<br />

14, No. 4, pp. 378-394.<br />

Black Cathryn, (2005) Biometric Technology Today January 2005 page 5 3<br />

Chi, T. and Liu, J. (2001) Product life cycle, and market entry and exit decisions under<br />

uncertainty. IIE Transactions 33(9), 695–705.<br />

Clarke Roger (2001) Introduction to Information Security, February 2001<br />

http://www.anu.edu.au/people/Roger.Clarke/EC/IntroSecy.html<br />

Concerns Spur Biometrics Growth, Security: For Buyers of Products, Systems &<br />

Services, December 2001, 38 (12), 7.<br />

Corcoran, David, David Sims, Bob Hillhouse (1999), Smart Cards and Biometrics: The<br />

Cool Way To Make Secure Transactions, Linux Journal, 59 (7).<br />

Connor, T. (2000) A framework for developing competitive strategy ideas. Strategic<br />

Change 9(3), May–June, 156–66.<br />

Clyde Wayne Crews Jr. Human Bar Code: Monitoring Biometric Technologies in a Free<br />

Society.<br />

Congressional testimony of May 20, 1998; in National Biometric Center: Collected<br />

Works, p. 263; www.engr.sjsu.edu/biometrics/nbtccw.pdf.<br />

DeSarbo, W. S. and Ramaswamy, V. 1994, “CRISP: Customer response based iterative<br />

segmentation procedures for response modeling in direct marketing,” Journal of Direct<br />

Marketing, Vol. 8, No. 3, pp. 7-20.<br />

Duhan, D.F. Jphnson, S.D, Wilcox, Jb, and Harrell, G.D 1997. Influences on consumer<br />

use of word-of-mouth recommendation sources. Journal of the Academy of Marketing<br />

Sciences 25 (4), 283-295.<br />

Elizabeth Neill. Rites of Privacy and the Privacy Trade: On the Limits of Protection for<br />

the Self. McGill-Queen’s University Press, 2001.<br />

Fabian Monrose , Aviel D. Rubin, Keystroke dynamics as a biometric for authentication,<br />

Future Generation Computer Systems, v.16 n.4, p.351-359, Feb. 2000<br />

[doi>10.1016/S0167-739X(99)00059-X]<br />

Furger, Roberta (2000), Who’s Watching You on the Web? PC World, 18 (3), 33-34.<br />

Gonul, F. F. and Shi, M. 1998, “Optimal mailing of catalogs: A New methodology using<br />

estimable structural dynamic programming models,” Management Science, Vol. 44, No.<br />

9, pp. 1249-1262.<br />

COPY RIGHT © 2011 Institute of Interdisciplinary Business Research 600

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!