Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2012 or ¨ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . Commission File No. 000-22513 AMAZON.COM, INC. (Exact name of registrant as specified in its
Words: 69727 - Pages: 279
A Structured Analysis of PHISHING By Prasath Manimaran ID: 20038303 Table of Contents Chapter One – Introduction 1. Research Questions and Objectives……………….…………………………………………….5 Chapter Two – Literature Review & Definition of Phishing 2.1. Literature Review…………………………………………………………………………………………..8 2.1.2. Definitions of Phishing……………………………………………………………………..8 2.1.3. Outcomes of this Study…………………………………………………………………….16 2.2. Research Details 2.2.1. Scope of
Words: 15039 - Pages: 61
CHAPTER ONE The Organization 1.0 Introduction United Commercial Bank Limited (UCBL) is a Bangladesh based private commercial bank that provides banking services. The services include corporate and retail banking, loans, credit cards, online banking and money transfer services. The bank operates in Bangladesh having its headquarter in Gulshan, Dhaka. UCBL has its firm commitment towards the society for the economic development of the country. Their position is 6th among the 52 banks which
Words: 7110 - Pages: 29
the success enjoyed by countries such as China, Thailand and India. The government in 1997 identified the software sector as a thrust sector for the overall economic growth of the country. Accordingly, a commission was formed under the ministry of commerce (later called JRC commission) to formulate some recommendations for the rapid growth of the software industry in Bangladesh. The commission identified four problematic functional areas namely: fiscal, human resource, infrastructure, and marketing
Words: 11826 - Pages: 48
can technology and what ethical issues are involved in the use of secondary data? AUTHOR'S NOTES: CHAPTER FOCUS This chapter provides an overview of secondary data. Secondary data are defined and their advantages, disadvantages, and evaluations discussed. A classification of secondary data is presented. Internal sources, published external sources, and computerized databases are discussed. Applications of secondary data in the context of a buying power index and computer mapping are
Words: 4683 - Pages: 19
transformed the whole world into a global village. Now social life has moved to online. People are using discussion board, blogs and social networking sites through web-based technology to communicate digitally. World Wide Web, digital library, e-commerce and computer based distance learning have made our life easier. The advancement of information communication technology in developed country, education field should take advantage to upgrade their learning and management techniques. Students should
Words: 22831 - Pages: 92
Implementing Mobile TV service In Bangladesh Internship Report On “Implementing Mobile TV Services in Bangladesh” Submitted to: MD. Jabir Al Mursalin Asst. professor BRAC Business School BRAC University Submitted by Nusrat Zahan ID: 10104172 BRAC Business School BRAC University 10th September, 2014 Letter of Transmittal 10th September, 2014 MD. Jabir Al Mursalin Asst. professor BRAC Business School BRAC University 66, Mohakhali, Dhaka Subject: Letter of Transmittal
Words: 9970 - Pages: 40
EXECUTIVE SUMMARY: The report intends to provide the CEO of Yahoo! Inc with a marketing and financial plan to turnaround the company. Yahoo! Inc is facing significant threat from rival companies such as Google, MSN, AOL, Face book etc. The report has provided an overview of the company and the industry in which it is operating. The industry analysis has been done using porters five forces analysis. The analysis indicates that Yahoo! Inc is facing a moderate threat of new entrants. The industry has
Words: 5733 - Pages: 23
[pic] Incident Response Plan Template for Breach of Personal Information Notice to Readers Acknowledgments Introduction Incident Response Plan Incident Response Team Incident Response Team Members Incident Response Team Roles and Responsibilities Incident Response Team Notification Types of Incidents Breach of Personal Information – Overview Definitions of a Security Breach Requirements Data Owner Responsibilities Location Manager Responsibilities
Words: 8476 - Pages: 34
Research Center (PARC). Many of his publications and presentations are on his website (http://www.johnseelybrown.com). Richard P. Adler is a Research Affiliate at the Institute for the Future in Palo Alto and Principal of People & Technology, a research and consulting firm in Cupertino, California. © 2 0 0 8 J o h n S e e l y B r o w n a n d R i c h a r d P. A d l e r Te x t i l l u s t r a t i o n s © 2 0 0 8 S u s a n E . H a v i l
Words: 6700 - Pages: 27