References
Ena, M. (2008). Securing Online Transactions: Crime Prevention Is the Key. Fordham Urban Law Journal, 35(1), 147+.
Guttmann, R. (2002). Cybercash: The Coming Era of Electronic Money. New York: Palgrave Macmillan.
Hyman, J. (2000, September 11). Banks Use Local Firms as On-Line Guard Dogs. The Washington Times, p. 10.
Katz, E. (2005, February). Adapting to Automated Fraud: Fraudsters Are Using Technology to Automate the Fraud Process, and Banks and Financial Institutions Must Prepare for These Challenges. Security Management, 49, 59+.
Kiessig, T. M., Karpf, B. W., & Linkins, J. R. (2006). Financial Institutions Fraud. American Criminal Law Review, 43(2), 527+.
Misra, S. K., Javalgi, R. (., & Scherer, R. F. (2004). Global Electronic Money and Related Issues. Review of Business, 25(2), 15+.
Taylor, P. (2005, June). Auditing for Anomalies: New Software Tools Are Available to Help Companies Scan Transactions for Anomalies That May Signal Internal Fraud. Security Management, 49, 76+.
Wright, M. A. (1994). Protecting Information: Effective Security Controls. Review of Business, 16(2), 24+.