Norm Archer, Susan Sproule, Yufei Yuan, Ken Guo, Junlian Xiang
Identity Theft and Fraud
Evaluating and Managing Risk
Norm Archer, Susan Sproule, Yufei Yuan, Ken Guo, Junlian Xiang
Identity Theft and Fraud
Evaluating and Managing Risk
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
A practical guide to evaluating and managing identity theft and fraud risks for Canadian businesses, organizations and individuals.
Andere Kunden interessierten sich auch für
- Sezer Bozkus KahyaogluUniversity Auditing in the Digital Era56,99 €
- Priti SikdarStrong Security Governance through Integration and Automation56,99 €
- Kerry Ann AndersonThe Frugal Ciso58,99 €
- Ian DavidsonPrinciples of Equity Valuation114,99 €
- Anne KohnkeThe Complete Guide to Cybersecurity Risks and Controls55,99 €
- First LastTrue Odds15,99 €
- Toby DerocheAgile Audit Transformation and Beyond53,99 €
-
-
-
A practical guide to evaluating and managing identity theft and fraud risks for Canadian businesses, organizations and individuals.
Produktdetails
- Produktdetails
- Verlag: Les Presses de l'Universite d'Ottawa/University of Ottawa Press
- Seitenzahl: 368
- Erscheinungstermin: 30. Juni 2012
- Englisch
- Abmessung: 201mm x 127mm x 18mm
- Gewicht: 340g
- ISBN-13: 9780776607771
- ISBN-10: 0776607774
- Artikelnr.: 35708907
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Les Presses de l'Universite d'Ottawa/University of Ottawa Press
- Seitenzahl: 368
- Erscheinungstermin: 30. Juni 2012
- Englisch
- Abmessung: 201mm x 127mm x 18mm
- Gewicht: 340g
- ISBN-13: 9780776607771
- ISBN-10: 0776607774
- Artikelnr.: 35708907
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Norm Archer is professor emeritus of the DeGroote School of Business, McMaster University. He has published widely on eGovernment, eBusiness and eHealth. Susan Sproule is assistant professor of Information Systems at Brock University and a professional engineer. Yufei Yuan is professor of Information Systems at the DeGroote School of Business, McMaster University. He has published in many areas including electronic commerce, emergency response systems, security and privacy, and information systems in health care. Ken Guo is assistant professor of Accounting at the College of Business, Western New England University and a certified management accountant. Junlian Xiang is assistant professor at the Ted Rogers School of Business, Ryerson University.
Chapter 1: Introduction
Chapter 2: Understanding Identity Theft and Fraud
Chapter 3: Risk and Trust
Chapter 4: Information Sources for Identity Theft and Fraud
Chapter 5: The Nature and Scope of Identity Theft and Fraud
Chapter 6: Measuring Identity Theft and Fraud
Chapter 7: Managing the Risks of Data Theft, Identity Theft, and Fraud
Chapter 8: A Life Cycle Approach to Identity Asset Protection
Chapter 9: Employee Responsibility for Risks to Identity Assets
Chapter 10: Consumer and Business Perspectives
Chapter 11: Technical Perspectives on Security
Chapter 12: Evaluating and Managing Organizational Readiness for Security
and Identity Theft and Fraud Risks
Chapter 13: A Research Agenda for Identity Theft and Fraud Risks
Chapter 14: Monitoring Trends -- Indexes of Identity Theft and Fraud
Chapter 15: Overview and a Glimpse of the Future
Glossary
Index
Chapter 2: Understanding Identity Theft and Fraud
Chapter 3: Risk and Trust
Chapter 4: Information Sources for Identity Theft and Fraud
Chapter 5: The Nature and Scope of Identity Theft and Fraud
Chapter 6: Measuring Identity Theft and Fraud
Chapter 7: Managing the Risks of Data Theft, Identity Theft, and Fraud
Chapter 8: A Life Cycle Approach to Identity Asset Protection
Chapter 9: Employee Responsibility for Risks to Identity Assets
Chapter 10: Consumer and Business Perspectives
Chapter 11: Technical Perspectives on Security
Chapter 12: Evaluating and Managing Organizational Readiness for Security
and Identity Theft and Fraud Risks
Chapter 13: A Research Agenda for Identity Theft and Fraud Risks
Chapter 14: Monitoring Trends -- Indexes of Identity Theft and Fraud
Chapter 15: Overview and a Glimpse of the Future
Glossary
Index
Chapter 1: Introduction
Chapter 2: Understanding Identity Theft and Fraud
Chapter 3: Risk and Trust
Chapter 4: Information Sources for Identity Theft and Fraud
Chapter 5: The Nature and Scope of Identity Theft and Fraud
Chapter 6: Measuring Identity Theft and Fraud
Chapter 7: Managing the Risks of Data Theft, Identity Theft, and Fraud
Chapter 8: A Life Cycle Approach to Identity Asset Protection
Chapter 9: Employee Responsibility for Risks to Identity Assets
Chapter 10: Consumer and Business Perspectives
Chapter 11: Technical Perspectives on Security
Chapter 12: Evaluating and Managing Organizational Readiness for Security
and Identity Theft and Fraud Risks
Chapter 13: A Research Agenda for Identity Theft and Fraud Risks
Chapter 14: Monitoring Trends -- Indexes of Identity Theft and Fraud
Chapter 15: Overview and a Glimpse of the Future
Glossary
Index
Chapter 2: Understanding Identity Theft and Fraud
Chapter 3: Risk and Trust
Chapter 4: Information Sources for Identity Theft and Fraud
Chapter 5: The Nature and Scope of Identity Theft and Fraud
Chapter 6: Measuring Identity Theft and Fraud
Chapter 7: Managing the Risks of Data Theft, Identity Theft, and Fraud
Chapter 8: A Life Cycle Approach to Identity Asset Protection
Chapter 9: Employee Responsibility for Risks to Identity Assets
Chapter 10: Consumer and Business Perspectives
Chapter 11: Technical Perspectives on Security
Chapter 12: Evaluating and Managing Organizational Readiness for Security
and Identity Theft and Fraud Risks
Chapter 13: A Research Agenda for Identity Theft and Fraud Risks
Chapter 14: Monitoring Trends -- Indexes of Identity Theft and Fraud
Chapter 15: Overview and a Glimpse of the Future
Glossary
Index