England: New Riders, a division of Pearson Education. Wilder, Clinton. (2015). First Internet bank opens doors. InformationWeek, 30, 28-76. Wolfinbarger, M.F. & Gilly, M.C (2002) .COMQ: Dimensionalizing, measuring and predicting quality ...
Upper Saddle River, New Jersey: Pearson, Prentice Hall. Guardian (2009) [a]. Curtis Warren 'ringleader of Jersey Smugglinggang'. . Accessed on 29 October 2009.
You should cite publications in the text: (Adams, 2006) using the first named author's name or (Adams & Brown, 2006) citing both names of two, or (Adams et al., 2006), when there are three or more authors.
knowledge in databases. Applications such as the internet, intranet, e-mail and groupware can be used to share analytical knowledge. Because analytical knowledge is complex, personal contact may be preferred. Analytical knowledge may ...
Based on integrity and accountability challenges in police forces all over the world, this book discusses the roles and methods of police oversight agencies.
This book presents and assesses the most recent and current research on internet child abuse, addressing: its nature, the behaviour and treatment of its perpetrators, international policy, legislation and protection, and policing.
Annotation This book applies stages of growth model for knowledge management technology, where firms develop from the person-to-tools strategy, via the person-to-person strategy and the person-to-documents strategy.
Tacit and explicit knowledge depend on each other , and they influence each other . ... They suggest the existence of a shared knowledge space that is required in order for individual A to understand individual B's knowledge .
This book reflects on the work by these private fraud examiners in terms of an evaluation of their investigation reports. The book brings an original theoretical and methodological approach to investigations of white-collar crime.
All three factors in the table are significant from a statistical point of view (p ,.05). ... Thomas Hobbes's detectiveentrepreneurin that “working, lurking, and getting results” istheirprimary objective (Hobbs, 1989).
By applying convenience theory to an empirical sample of convicted white-collar criminals, the text teaches criminal justice students and ethics and compliance practitioners to identify and understand how opportunity affects real-world ...
This open access book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime.
Executive positions involved in crime, white-collar crime analysis, response to crime suspicion, corporate social responsibility, and corporate reputation damage and repair are some of the core topics of this book.
By examining white-collar crime scandals using the theory of convenience, Petter Gottschalk offers ways to improve the detection of crime signals and investigative skills in fraud examinations, as well as improve change management measures.
This book makes a novel contribution to the development of convenience theory as a framework to understand and explain ‘white-collar crime’.
What kind of agency management is needed in policing-the-police organisations? These are questions addressed in this book on Policing the Police - Knowledge Management in Law Enforcement.
This book applies a structural model of convenience theory to suspected crime and a maturity model to investigation reports.
Fraud examiners in white-collar crime investigations are in the business of collecting information. ... technology must support organizational strategy, which typically is concerned with safety and security in the client organization.
During this time she was assigned to the money laundering and whitecollar crime unit. She has prior financial industry experience which ... In early 2000, Markopolos was asked by firm partners to reverse-engineer the strategy of Madoff.
This book applies a stages of growth model for knowledge management technology, where firms develop from the person-to-tools strategy, via the person-to-person strategy and the person-to-documents strategy, to the person-to-systems strategy ...