Books
in black and white
Main menu
Share a book About us Home
Books
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics
Ads

Fraud Exprosed Whot you Dont Could Cost your company millions - Joseph W.

Joseph W. Fraud Exprosed Whot you Dont Could Cost your company millions - Wiley Publishing, 2003. - 289 p.
ISBN: 0-471-27475-5
Download (direct link): fraudexposedwhatyoudont2003.pdf
Previous << 1 .. 136 137 138 139 140 141 < 142 > 143 144 145 146 .. 147 >> Next

Chapter 11
1. Natalie Angier, “The Urge to Punish Cheats: It Isn’t Merely Vengeance,” The New York Times (January 22, 2002), F-1.
ENDNOTES
2. Paul H. Rubin, “The Death Penalty and Deterrence,” Phi Kappa Phi Forum 82, no.1 (Winter 2002), 11. Becker’s work is found at Gary Becker, “Crime and Punishment: An Economic Approach,” Journal Of Political Economy 76, no. 2 (1968), 169-217. Reprinted from Phi Kappa Phi Forum 82, no. 1 (Winter 2002). Copyright by Paul H. Rubin, reprinted by permission of the publishers.
3. Id., 11.
4. American Society of Criminology Web site (www.ACH41.com). Accessed March 4, 2002.
5. “Racial Profiling Is More Than a Black & White Issue,” The Law Enforcement News 27, no. 567, 568 (December 15-31, 2002), 11. Reprinted with permission of Law Enforcement News (John Jay College of Criminal Justice, New York: 2002).
6. Al Baker, “Commissioner Bans Profiling Using Race by the Police,” The New York Times (March 14, 2002), B-3.
7. Religion and Ethics Newsweekly, Public Television Stations (April 21, 2002), 6:30 p.m.
8. Jack Douglas and Mark Olshaher Mindhunter (New York: Scribner, 1995).
9. See note 8, 101-124, for a description of this interview process.
10. Quentin Hardy, “Where Everybody Knows Your Name,” Forbes (May 27, 2002), 79-82.
11. Steven L. Scott, “All You Need Is Bayes’ Rule or, How This Probability Theorem Can Help Your Business,” Marshall Magazine, University of Southern California (Spring, 2002), 56.
12. Id., 56-68.
13. Beth Robliner, “Borrower Beware: Credit Scorers Are Watching,” The New York Times (April
21, 2002), BU-8.
14. Michael J. Whalen, “Supreme Court Rulings Acknowledge Practical Considerations of Law Enforcement,” The Police Chief (April 2002), 11. The Supreme Court ruling cited is United States v. Arvizu 122 S. Ct. 744 (2002).
15. Id.
16. Jennifer S. Lee, “Welcome to the Database Lounge,” The New York Times (March 21, 2002), G-1.
17. Id.
18. Edward Ip, “Data Takes Shape,” Marshall Magazine, University of Southern California (Spring, 2002), 49-53.
19. Wendy Taylor and Marty Jerome, “Expose Yourself: Consumers Will Tell You Anything If You Make It Worth Their While,” SMARTBUSINESSMAG.COM (May 2002), 17.
20. Id.
21. “A Neglected Law Enforcement Asset,” The New York Times (editorial) (May 9, 2002), A-38.
22. Albrecht, “Employee Fraud,” 33.
23. Id., 35.
24. Id., 35-36.
25. “Security and Civil Liberties,” speech by Jacob Perry, former Director of General Security Services, State of “Israel, at Israel’s Security Industry: Technologies and Strategies for Homeland Defense and Counter-Terrorism” (conference), New York City, February 19, 2002.
26. David Stout, “9 Hijackers Drew Scrutiny on Sept. 11, Officials Say,” The New York Times (March 3, 2002), 20.
27. “Workplace Security,” The Wall Street Journal Reports, The Wall Street Journal (March 11, 2002), R-1-16.
ENDNOTES
28. Curtis C. Verschoor, “Reflections on the Audit Committee’s Role,” Internal Auditor (April 2002), 30.
29. Wayne C. Manus, Vivian L. Polak, A. John P. Mancini, and John M. Nonna, “Now More Than Ever, Cybersecurity Audits Are Key,” The National Law Journal (March 11, 2002), C-8.
30. Ernst & Young LLP, Global Information Security Survey 2002 (March 2002).
31. Carpenter and Mahoney, “Analyzing Organizational Fraud,” 37-38.
32. Jeffrey Rosen, “Silicon Valley’s Spy Game,” The New York Times Magazine (April 14, 2002), 46.
33. “Letters,” The New York Times Magazine (April 28, 2002), 14-16.
34. All references and attributions are found in Sandra Blakeslee, “Hijacking the Brain Circuits with a Nickel Slot Machine,” The New York Times (February 10, 2002), F-1.
35. Id., F-5.
36. “Persuasion,” The Economist (May 4, 2002), 77-78.
37. See note 34.
38. Id.
39. Id.
40. Adler, “The Thrill of Theft,” 51-52.
41. Emily Eakin, “Penetrating the Mind by Metaphor,” The New York Times (February 23, 2002), B-9.
42. Id., B-11.
43. Id., B-9.
44. Sylvia Nasar, A Beautiful Mind (New York: Simon & Schuster, 1995), 115-122.
45. Hal R. Varian, “Economic Scene,” The New York Times (April 11, 2002), C-2.
46. Frederick S. Hillier and Gerald J. Lieberman, Introduction to Operations Research (New York: McGraw-Hill, 1995), 470.
47. See note 44, 14. Nasar’s reference to Cournot is based on Harold Kuhn (ed.), Classics in Game Theory (Princeton, NJ: Princeton University Press, 1997); John Eatwell, Murray Milgate, and Peter Newman, The New Palgrave: Game Theory (New York: Norton, 1987); and Avinash K. Dixit and Barry J. Nalebuff, Thinking Strategically (New York: Norton, 1991).
48. Martin Gardner, The Colossal Book of Mathematics, (New York: W.W. Norton & Co., 2001), 471.
49. See note 45, C-2.
50. See note 44, 374.
51. Christopher Oster, “Can the Risk of Terrorism Be Calculated by Insurers? ‘Game Theory’ Might Do It,” The Wall Street Journal (April 8, 2002), C-1.
52. See note 46, 485-486.
Previous << 1 .. 136 137 138 139 140 141 < 142 > 143 144 145 146 .. 147 >> Next