Preventing identity theft in your business: how to protect your business, customers, and employees
Author: Collins, Judith M. Publisher: Wiley, 2005.Language: EnglishDescription: 245 p. : Graphs/Ill. ; 24 cm.ISBN: 047169469XType of document: BookBibliography/Index: Includes bibliographical references and indexItem type | Current location | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
Asia Campus Main Collection |
HV7000 .C65 2005
(Browse shelf) 900094222 |
Available | 900094222 |
Includes bibliographical references and index
Digitized
Preventing identity theft in your business Preface Introduction P A R T I: T H E CURRENT STATE OF I D E N T I T Y T H E F T C H A P T E R 1. What Is an "Identity"? C H A P T E R 2. Identity Theft: Effects on Victims C H A P T E R 3. Identity Crime Is Entrenched C H A P T E R 4. Identity Crimes Are Escalating CHAPTER 5 . ' Legal Requirements for Businesses CHAPTER 6. Caveat Lector. Let the Reader Beware P A R T 11: IDENTITY T H E F T PREVENTION 55 CHAPTER 7 . The BISP Plan: Tighten Your Business Borders C H A P T E R 8. Begin the Exercises: Identify Your Business Identities CHAPTER 9. Securing the People Front: The Security Job Analysis CHAPTER 1 0 . The People Front: Recruitment for Security CHAPTER 1 1 . The People Front: Personnel Selection for Security CHAPTER 1 2 . The People Front: Select for Motivation CHAPTER 1 3 . The People Front: Select for Integrity and Security CHAPTER 1 4 . The People Front: Select for Interpersonal Skills CHAPTER 1 5 . The People Front: Socialization, Company Culture, and the Realistic Job Preview I 62 73 89 104 112 C H A P T E R 16. The People Front: Socializing Newcomers to the Honest Company Culture CHAPTER 1 7 . The People Front: Appraisal and Feedback for Performance and Security CHAPTER 1 8 . The Process Front: Secure Business Information Processes CHAPTER 1 9 . The Property Front: The E-Business Web Site P A R T 111: MONITORING IDENTITY THEFT 144 156 CHAPTER 2 0 . The Customer Security Program CHAPTER 21. E-Commerce "Best Practices" for Customers CHAPTER 22. The Legislative Process C H A P T E R 23. The HIPAA Database APPENDICES APPENDIX A The Security Standard Checklist APPENDIX B Checklist of Team Prerequisites APPENDIX C Structured and Formal Brainstorming: Step-by-step Instructions APPENDIX D Cause and Effect Analysis: Step-by-step Instructions APPENDIX E The Security Focus Group Interview APPENDIX F The Security Job Description APPENDIX G Industrial and Organizational Specialists in Test Development and Validation APPENDIX H One Company's Short- and Long-Term Strategic Plan APPENDIX I The Information Process: Definition, Description, and Illustration APPENDIX J The Pareto Analysis: Definition, Description, and Illustration APPENDIX K Forerunners in the Support of Identity Theft Legislation Notes Index
There are no comments for this item.