-
1
-
-
33847278229
-
-
ACM, available at: http://delivery.acm.org/10.1145/1150000/1145288/p60- pons.html?key1=1145288&key2= 2631460611&coll=GUIDE&dl= GUIDE&CFID=3098048&CFTOKEN=77215439
-
ACM (2006), "Biometric marketing: targeting the online customer", available at: http://delivery.acm.org/10.1145/1150000/1145288/ p60-pons.html?key1=1145288&key2= 2631460611&coll=GUIDE&dl= GUIDE&CFID=3098048&CFTOKEN=77215439.
-
(2006)
Biometric marketing: Targeting the online customer
-
-
-
2
-
-
33847321446
-
-
BBC, available at: http://news.bbc.co.uk/1/hi/technology/5414696.stm
-
BBC (2006), "Net crime big fear for Britons", available at: http://news.bbc.co.uk/1/hi/technology/5414696.stm.
-
(2006)
Net crime big fear for Britons
-
-
-
3
-
-
33847294562
-
-
Biometric Technology Today, available at: www.ingentaconnect.com/content/ els/09694765//00000011/00000006/art06018
-
Biometric Technology Today (2003), "Selling biometrics to the retail sector", available at: www.ingentaconnect.com/content/els/09694765// 00000011/00000006/art06018.
-
(2003)
Selling biometrics to the retail sector
-
-
-
4
-
-
33847264766
-
-
available at: www.history.und.ac.za/Sempapers/Breckenridge2005. pdf#search=%22towards%20the%20theory% 20of%20the%20biometric%20state%22
-
Breckenridge, K. (2005), "Towards the theory of the Biometric State", available at: www.history.und.ac.za/Sempapers/Breckenridge2005. pdf#search=%22towards%20the%20theory% 20of%20the%20biometric%20state%22.
-
(2005)
Towards the theory of the Biometric State
-
-
Breckenridge, K.1
-
5
-
-
62749206446
-
-
Caslon Analytics, available at: www.caslon.com.au/biometricsnote.htm
-
Caslon Analytics (2005), "Biometrics", available at: www.caslon.com.au/biometricsnote.htm.
-
(2005)
Biometrics
-
-
-
6
-
-
33847308472
-
-
CPSecure, available at: www.cpsecure.com/library/documents/Retail-ID- Theft-Spyware-0512081.pdf
-
CPSecure (2006), "Fighting spyware and real identity theft", available at: www.cpsecure.com/library/documents/Retail-ID-Theft-Spyware- 0512081.pdf.
-
(2006)
Fighting spyware and real identity theft
-
-
-
7
-
-
33847287152
-
-
available at: www.optimizemag.com/article/showArticle.jhtml;jsessionid= M0BKGIH2JEMSAUQSNDLPCKH0CJUNN2 JVN?printableArticle= true&articleId= 188100767& queryText=
-
Gaur, N. and Gilliland, W. (2006), "New customer touch points", available at: www.optimizemag.com/article/showArticle.jhtml;jsessionid= M0BKGIH2JEMSAUQSNDLPCKH0CJUNN2 JVN?printableArticle= true&articleId= 188100767& queryText=.
-
(2006)
New customer touch points
-
-
Gaur, N.1
Gilliland, W.2
-
10
-
-
33847321882
-
-
National Consumer Council, available at: www.ncc.org.uk/ protectingconsumers/ID-theft.pdf#search=%22NCC%20identity%20theft%22
-
National Consumer Council (2006), "Identity theft: victim support", available at: www.ncc.org.uk/protectingconsumers/ID-theft. pdf#search=%22NCC%20identity%20theft%22.
-
(2006)
Identity theft: Victim support
-
-
-
11
-
-
33847322371
-
-
Schwartz Communications, available at: biz.yahoo.com/prnews/060807/ nem015.html?.v=52&printer=1
-
Schwartz Communications (2006), "Zvetco and Vitani add biometric security to 350 Fakta retail stores", available at: biz.yahoo.com/prnews/ 060807/nem015.html?.v=52&printer=1.
-
(2006)
Zvetco and Vitani add biometric security to 350 Fakta retail stores
-
-
-
12
-
-
8844245768
-
Retail applications of signature verification
-
Jain, A.K. Ratha, N.K.
-
Zimmermann, T.G., Russell, G.F., Heipler, A., Smith, B.A., Hu, J., Markham, D., Graham, J.E. and Drews, C. (2004), "Retail applications of signature verification", in Jain, A.K. and Ratha, N.K. (Eds), Biometric Technology for Human Identification, Proceedings of the SPIE, Vol. 5404, pp. 206-14.
-
(2004)
Biometric Technology for Human Identification, Proceedings of the SPIE
, vol.5404
, pp. 206-14
-
-
Zimmermann, T.G.1
Russell, G.F.2
Heipler, A.3
Smith, B.A.4
Hu, J.5
Markham, D.6
Graham, J.E.7
Drews, C.8
|