28.10.2016 Views

gender differential paper IJCRB

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ijcrb.webs.com<br />

JUNE 2011<br />

INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS VOL 3, NO 2<br />

Policy Analysis, 452: 1–20, 9/17/2002. Jennifer D’Alessandro. Biometric ID To Become<br />

Part Of Passports. varBusiness, 8/26/03. http://www.varbusiness.com/<br />

sections/governmentvar/govt.asp?articleid=43467.<br />

Parliamentary Office of Science and Technology (POST) (London). Biometrics and<br />

Security. Postnote, 165, November 2001.<br />

Pons, Alexander (2006), Biometric Marketing: Targeting the Online Consumer,<br />

Communications of the ACM, 49 (8), 61-65.<br />

Porter, M.E. (1985) Technology and competitive advantage. The Journal of Business<br />

Strategy 5(3), 60–78.<br />

Porter, M.E. (2001) Strategy and the internet. Harvard Business Review 79(3), 63–78.<br />

P. Jonathan Phillips, Patrick Grother, Ross J. Michaels, Duane M. Blackburn, Elham<br />

Tabassi and Mike Bone. Face Recognition<br />

Pyun, C.S., Scruggs, L. and Nam, K. (2002) Internet banking in the US, Japan and<br />

Europe. Multinational Business Review 10(2), 73–82.<br />

RobertM. Baird et al., editors, Cyberethics: Social and Moral Issues in the Computer<br />

Age, pp. 200–212. Prometheus Books, Amherst, NY, 2000.<br />

Richard E. Norton. Response to Notice of Proposed Rule Making 12 CFR Part 216.<br />

Letter of March 29, 2000. www. ibia.org/fedglbcomments32900.htm.<br />

Richard E. Norton. Privacy 1. Letter of March 30, 2001. www.<br />

ibia.org/hhsprivacycomments033001.htm.<br />

Rood Hendrik, (2000) What's in a name, what's in a number: some characteristics of<br />

identifiers on electronic networks Telecommunications Policy 24 (2000) 533}552<br />

Schultz Eugene, (2003) Security Views. Computers & Security Vol 22, No 7<br />

Stephen C. Shih and H. Joseph Wen (2005) E-enterprise security management life cycle<br />

Information Management & Computer Security Vol. 13 No. 2, 2005<br />

Stuart F. H. Allison, Amie M. Schuck, Kim Michelle Lersch, (2005) Exploring the crime<br />

of identity theft: Prevalence, clearance rates, and victim/offender characteristics Journal<br />

of Criminal Justice 33 (2005) 19--29 Texas Law Review, Vol. 80, pp. 89--134, 2001<br />

Tod Newcombe. Biometric Breakdown. Government Technology, May 2001, p. 036.<br />

Turle, Marcus (2007), Know the Legalities of Biometrics, Computer Weekly, (February<br />

20), 26-28.<br />

Tynan, Dan (2007), Watch Out for Online Ads That Watch You, PC World, 25 (3), 26.<br />

Vendor Test 2002: Overview and Summary. Report by DARPA, National Institute of<br />

Standards and Technology, DoD Counterdrug Technology Development Program Office,<br />

NAVSEA Crane Division, 2002<br />

COPY RIGHT © 2011 Institute of Interdisciplinary Business Research 603

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!