Normal view MARC view

Preventing identity theft in your business: how to protect your business, customers, and employees

Author: Collins, Judith M. Publisher: Wiley, 2005.Language: EnglishDescription: 245 p. : Graphs/Ill. ; 24 cm.ISBN: 047169469XType of document: BookBibliography/Index: Includes bibliographical references and index
Tags: No tags from this library for this title. Log in to add tags.
Item type Current location Collection Call number Status Date due Barcode Item holds
Book Asia Campus
Main Collection
Print HV7000 .C65 2005
(Browse shelf)
Available 900094222
Total holds: 0

Includes bibliographical references and index


Preventing identity theft in your business Preface Introduction P A R T I: T H E CURRENT STATE OF I D E N T I T Y T H E F T C H A P T E R 1. What Is an "Identity"? C H A P T E R 2. Identity Theft: Effects on Victims C H A P T E R 3. Identity Crime Is Entrenched C H A P T E R 4. Identity Crimes Are Escalating CHAPTER 5 . ' Legal Requirements for Businesses CHAPTER 6. Caveat Lector. Let the Reader Beware P A R T 11: IDENTITY T H E F T PREVENTION 55 CHAPTER 7 . The BISP Plan: Tighten Your Business Borders C H A P T E R 8. Begin the Exercises: Identify Your Business Identities CHAPTER 9. Securing the People Front: The Security Job Analysis CHAPTER 1 0 . The People Front: Recruitment for Security CHAPTER 1 1 . The People Front: Personnel Selection for Security CHAPTER 1 2 . The People Front: Select for Motivation CHAPTER 1 3 . The People Front: Select for Integrity and Security CHAPTER 1 4 . The People Front: Select for Interpersonal Skills CHAPTER 1 5 . The People Front: Socialization, Company Culture, and the Realistic Job Preview I 62 73 89 104 112 C H A P T E R 16. The People Front: Socializing Newcomers to the Honest Company Culture CHAPTER 1 7 . The People Front: Appraisal and Feedback for Performance and Security CHAPTER 1 8 . The Process Front: Secure Business Information Processes CHAPTER 1 9 . The Property Front: The E-Business Web Site P A R T 111: MONITORING IDENTITY THEFT 144 156 CHAPTER 2 0 . The Customer Security Program CHAPTER 21. E-Commerce "Best Practices" for Customers CHAPTER 22. The Legislative Process C H A P T E R 23. The HIPAA Database APPENDICES APPENDIX A The Security Standard Checklist APPENDIX B Checklist of Team Prerequisites APPENDIX C Structured and Formal Brainstorming: Step-by-step Instructions APPENDIX D Cause and Effect Analysis: Step-by-step Instructions APPENDIX E The Security Focus Group Interview APPENDIX F The Security Job Description APPENDIX G Industrial and Organizational Specialists in Test Development and Validation APPENDIX H One Company's Short- and Long-Term Strategic Plan APPENDIX I The Information Process: Definition, Description, and Illustration APPENDIX J The Pareto Analysis: Definition, Description, and Illustration APPENDIX K Forerunners in the Support of Identity Theft Legislation Notes Index

There are no comments for this item.

Log in to your account to post a comment.
Koha 18.11 - INSEAD Catalogue
Home | Contact Us | What's Koha?