LEADER 00894nam0-2200325---450- 001 990008675960403321 005 20151123104609.0 035 $a000867596 035 $aFED01000867596 035 $a(Aleph)000867596FED01 035 $a000867596 100 $a20080620d1979----km-y0itay50------ba 101 1 $aita$ceng 102 $aIT 105 $ay-------001yy 200 1 $aGuida per i perplessi$fE. F. Schumacher 210 $aMilano$cArnoldo Mondadori editore$d1979 215 $a173 p.$d21 cm 225 1 $aSaggi$v113 454 0$12001$a<>guide for the perplexed$91499635 700 1$aSchumacher,$bErnst Friedrich$032478 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008675960403321 952 $aXIII 196$fDFD 952 $aLAN 66$b269/2015$fDARPU 959 $aDFD 959 $aDARPU 996 $aGuide for the perplexed$91499635 997 $aUNINA LEADER 01108nam--2200385---450- 001 990000752790203316 005 20060308101944.0 010 $a0-415-17475-9 035 $a0075279 035 $aUSA010075279 035 $a(ALEPH)000075279USA01 035 $a0075279 100 $a20011120d2000----km-y0itay0103----ba 101 0 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aIntertextuality$fGraham Allen 210 $aLondon ; New York$cRoutledge$d2000 215 $aVIII, 238 p.$d20 cm 225 2 $a<> new critical idiom 410 0$12001$a<> new critical idiom 606 $aLetteratura$xAnalisi strutturale 676 $a809 700 1$aALLEN,$bGraham$0174998 801 0$aIT$bsalbc$gISBD 912 $a990000752790203316 951 $aVIII.3. 1004(V C 1801)$b160562 L.M.$cV C$d00078365 959 $aBK 969 $auma 979 $aCHIARA$b40$c20011120$lUSA01$h0959 979 $c20020403$lUSA01$h1723 979 $aPATRY$b90$c20040406$lUSA01$h1652 979 $aCOPAT5$b90$c20060308$lUSA01$h1019 996 $aIntertextuality$9540480 997 $aUNISA LEADER 03457nam 2200649 a 450 001 9910464967103321 005 20200520144314.0 010 $a0-8047-7715-2 024 7 $a10.1515/9780804777155 035 $a(CKB)2560000000072236 035 $a(EBL)683265 035 $a(OCoLC)714569452 035 $a(MiAaPQ)EBC683265 035 $a(DE-B1597)564648 035 $a(DE-B1597)9780804777155 035 $a(Au-PeEL)EBL683265 035 $a(CaPaEBR)ebr10459573 035 $a(OCoLC)1198930590 035 $a(EXLCZ)992560000000072236 100 $a20101021d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aOn flexibility$b[electronic resource] $erecovery from technological and doctrinal surprise on the battlefield /$fMeir Finkel ; translated by Moshe Tlamim 210 $aStanford, Calif. $cStanford Security Studies$d2011 215 $a1 online resource (337 p.) 300 $aDescription based upon print version of record. 311 $a0-8047-7488-9 311 $a0-8047-7489-7 320 $aIncludes bibliographical references and index. 327 $aPrediction and intelligence : the dominant approach in force planning and its failure to answer the challenge of technological and doctrinal surprise -- Conceptual and doctrinal flexibility -- Organizational and technological flexibility -- Cognitive and command and control (C2) flexibility -- The mechanism for lesson learning and rapid dissemination -- The German recovery from the surprise of British chaff -- The German recovery from the Soviet T-34 tank surprise -- The Israeli recovery from the Egyptian Sagger missile surprise -- The Israeli air force recovery from the Arab anti-aircraft missile surprise -- The slow British recovery from the German armor and anti-tank tactics -- The slow Soviet recovery from the surprise of low-intensity conflict in Afghanistan -- The French failure to recover from the surprise of the German blitzkrieg. 330 $aThis book addresses one of the basic questions in military studies: How can armies cope effectively with technological and doctrinal surprises-ones that leave them vulnerable to new weapons systems and/or combat doctrines? Author Meir Finkel contends that the current paradigm-with its over-dependence on intelligence and an all-out effort to predict the nature of the future battlefield and the enemy's capabilities-generally doesn't work. Based on historical case analysis of successful ""under-fire"" recovery and failure to recover, he identifies the variables that have dete 606 $aMilitary readiness 606 $aMilitary doctrine 606 $aMilitary art and science 606 $aSurprise (Military science) 606 $aMilitary history, Modern$y20th century 606 $aTechnology$xMilitary aspects 608 $aElectronic books. 615 0$aMilitary readiness. 615 0$aMilitary doctrine. 615 0$aMilitary art and science. 615 0$aSurprise (Military science) 615 0$aMilitary history, Modern 615 0$aTechnology$xMilitary aspects. 676 $a355.02 700 $aFinkel$b Meir$f1968-$01026554 701 $aTlamim$b Moshe$01026555 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910464967103321 996 $aOn flexibility$92441517 997 $aUNINA LEADER 05920nam 2200721 450 001 9910807275403321 005 20200520144314.0 010 $a1-118-23397-2 010 $a1-118-88616-X 010 $a1-118-22032-3 035 $a(CKB)3710000000093193 035 $a(EBL)836562 035 $a(SSID)ssj0001131735 035 $a(PQKBManifestationID)11729002 035 $a(PQKBTitleCode)TC0001131735 035 $a(PQKBWorkID)11146314 035 $a(PQKB)11165347 035 $a(OCoLC)865544039 035 $a(DLC) 2013049994 035 $a(Au-PeEL)EBL836562 035 $a(CaPaEBR)ebr10849286 035 $a(CaSebORM)9780470494394 035 $a(MiAaPQ)EBC836562 035 $a(EXLCZ)993710000000093193 100 $a20140327h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBank fraud $eusing technology to combat losses /$fRevathi Subramanian 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d2014. 210 4$dİ2014 215 $a1 online resource (193 p.) 225 1 $aWiley & SAS Business Series 300 $aIncludes index. 311 $a0-470-49439-5 320 $aIncludes bibliographical references and index. 327 $aBank Fraud; Contents; Preface; Acknowledgments; About the Author; CHAPTER 1 Bank Fraud: Then and Now; THE EVOLUTION OF FRAUD; Fraud in the Present Day; Risk and Reward; Secured Lending versus Unsecured Lending; Statistical Models and the Problem of Prediction; THE EVOLUTION OF FRAUD ANALYSIS; Early Credit Card Fraud; Separating the Wheat from the Chaff; The Advent of Nonlinear Statistical Models; Tackling Fraud with Technology; SUMMARY; CHAPTER 2 Quantifying Fraud: Whose Loss Is It Anyway?; Data Storage and Statistical Thinking; Understanding Non-Fraud Behavior; Quantifying Potential Risk 327 $aRecording the Fraud EpisodeSupervised versus Unsupervised Modeling; The Importance of Accurate Data; FRAUD IN THE CREDIT CARD INDUSTRY; Early Charge and Credit Cards; Lost-and-Stolen Fraud: The Beginnings of Fraud in Credit Cards; Card-Not-Present Fraud and Changes in the Marketplace; THE ADVENT OF BEHAVIORAL MODELS; FRAUD MANAGEMENT: AN EVOLVING CHALLENGE; FRAUD DETECTION ACROSS DOMAINS; USING FRAUD DETECTION EFFECTIVELY; SUMMARY; CHAPTER 3 In God We Trust. The Rest Bring Data!; DATA ANALYSIS AND CAUSAL RELATIONSHIPS; BEHAVIORAL MODELING IN FINANCIAL INSTITUTIONS 327 $aCustomer Expectations versus Standards of PrivacyThe Importance of Data in Implementing Good Behavioral Models; SETTING UP A DATA ENVIRONMENT; 1. Know Your Data; 2. Collect All the Data You Can from Day One; 3. Allow for Additions as the Data Grows; 4. If You Cannot Integrate the Data, You Cannot Integrate the Businesses; 5. When You Want to Change the Definition of a Field, It Is Best to Augment and Not Modify; 6. Document the Data You Have as Well as the Data You Lost; 7. When Change Happens, Document It; 8. ETL: "Extract, Translate, Load" (Not "Extract, Taint, Lose") 327 $a9. A Data Model Is an Impressionist Painting10. The Top Two Assets of Any Business Today Are People and Data; UNDERSTANDING TEXT DATA; SUMMARY; CHAPTER 4 Tackling Fraud: The Ten Commandments; 1. DATA: GARBAGE IN; GARBAGE OUT; 2. NO DOCUMENTATION? NO CHANGE!; 3. KEY EMPLOYEES ARE NOT A SUBSTITUTE FOR GOOD DOCUMENTATION; 4. RULES: MORE DOESN'T MEAN BETTER; 5. SCORE: NEVER REST ON YOUR LAURELS; 6. SCORE + RULES = WINNING STRATEGY; 7. FRAUD: IT IS EVERYONE'S PROBLEM; 8. CONTINUAL ASSESSMENT IS THE KEY; 9. FRAUD CONTROL SYSTEMS: IF THEY REST, THEY RUST 327 $a10. CONTINUAL IMPROVEMENT: THE CYCLE NEVER ENDSSUMMARY; CHAPTER 5 It Is Not Real Progress Until It Is Operational; THE IMPORTANCE OF PRESENTING A SOLID PICTURE; BUILDING AN EFFECTIVE MODEL; 1. Operations Personnel Need to Understand the Concept of a Fraud Score; 2. The Score Development Process Must Take into Consideration Operational Use and Constraints; 3. In General, Fraud Strategies Should Complement and Not Compete with the Fraud Score; 4. Fraud Strategies and Operational Processes Should Be Well Documented; SUMMARY; CHAPTER 6 The Chain Is Only as Strong as Its Weakest Link 327 $aDISTINCT STAGES OF A DATA-DRIVEN FRAUD MANAGEMENT SYSTEM 330 $a"Capitalize on technology to halt bank fraudExamining the technology that is needed to combat bank fraud, Bank Fraud: Using Technology to Combat Losses equips corporate security and loss prevention managers with the necessary tools to determine an organization's unique technology needs. Looks at the technology needed to handle data intelligence Provides guidance to assess the technology necessary to battle fraud Features unique coverage of the history of fraud detection and prevention in banking Explores the challenges of fraud detection in a financial services environment; understanding corporate risk exposure; losses per assets; trending over time; benefits of technology Focusing on the financial crimes and insider frauds in operation nationally and internationally, Bank Fraud: Using Technology to Combat Losses arms fraud prevention professionals with authoritative guidance to detect and prevent such crimes in future"--$cProvided by publisher. 410 0$aWiley and SAS business series. 606 $aBanks and banking$xSecurity measures 606 $aBank fraud$xPrevention 606 $aBank fraud$xPrevention$xTechnological innovation 615 0$aBanks and banking$xSecurity measures. 615 0$aBank fraud$xPrevention. 615 0$aBank fraud$xPrevention$xTechnological innovation. 676 $a332.1068/4 686 $aBUS027000$2bisacsh 700 $aSubramanian$b Revathi$01606891 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910807275403321 996 $aBank fraud$93932877 997 $aUNINA