Judith M. Collins
Preventing Identity Theft in Your Business (eBook, ePUB)
How to Protect Your Business, Customers, and Employees
27,99 €
27,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
27,99 €
Als Download kaufen
27,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
27,99 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
0 °P sammeln
Judith M. Collins
Preventing Identity Theft in Your Business (eBook, ePUB)
How to Protect Your Business, Customers, and Employees
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 1.17MB
Andere Kunden interessierten sich auch für
- Judith M. CollinsPreventing Identity Theft in Your Business (eBook, PDF)27,99 €
- Amy KatesDesigning Your Organization (eBook, ePUB)33,99 €
- Matti KurvinenWarranty Fraud Management (eBook, ePUB)32,99 €
- Jean-Paul IssonWin with Advanced Business Analytics (eBook, ePUB)38,99 €
- Richard OwenAnswering the Ultimate Question (eBook, ePUB)19,99 €
- Bryan MaizlishIT (Information Technology) Portfolio Management Step-by-Step (eBook, ePUB)35,99 €
- Robert ScheinfeldBusting Loose From the Business Game (eBook, ePUB)16,99 €
-
-
-
Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in D ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: John Wiley & Sons
- Erscheinungstermin: 27. September 2016
- Englisch
- ISBN-13: 9781119373186
- Artikelnr.: 46753340
- Verlag: John Wiley & Sons
- Erscheinungstermin: 27. September 2016
- Englisch
- ISBN-13: 9781119373186
- Artikelnr.: 46753340
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
JUDITH M. COLLINS, PHD, is Associate Professor of Industrial and Organizational Psychology in the School of Criminal Justice at Michigan State University (MSU), where she teaches information security management. She is also Director of MSU-Business Identity Theft Partnerships in Prevention and the MSU Identity Theft Crime and Research Lab, established in 1999 to work with businesses, law enforcement, and victims of identity theft. She publishes in academic journals, has been a guest on national and local television and radio shows, and is the subject of more than 100 newspaper articles. She is a frequent speaker and conducts law enforcement training throughout the United States.
Preface.
Introduction.
PART I: THE CURRENT STATE OF IDENTITY THEFT.
Chapter 1: What Is an "Identity"?
Chapter 2: Identity Theft: Effects on Victims.
Chapter 3: Identity Crime Is Entrenched.
Chapter 4: Identity Crimes Are Escalating.
Chapter 5: Legal Requirements for Businesses.
Chapter 6: Caveat Lector. Let the Reader Beware.
PART II: IDENTITY THEFT PREVENTION.
Chapter 7: The BISP Plan: Tighten Your Business Borders.
Chapter 8: Begin the Exercises: Identify Your Business Identities.
Chapter 9: Securing the People Front: The Security Job Analysis.
Chapter 10: The People Front: Recruitment for Security.
Chapter 11: The People Front: Personnel Selection for Security.
Chapter 12: The People Front: Select for Motivation.
Chapter 13: The People Front: Select for Integrity and Security.
Chapter 14: The People Front: Select for Interpersonal Skills.
Chapter 15: The People Front: Socialization, Company Culture, and the
Realistic Job Preview.
Chapter 16: The People Front: Socializing Newcomers to the Honest Company
Culture.
Chapter 17: The People Front: Appraisal and Feedback for Performance and
Security.
Chapter 18: The Process Front: Secure Business Information Processes.
Chapter 19: The Property Front: The E-Business Web Site.
PART III: MONITORING IDENTITY THEFT.
Chapter 20: The Customer Security Program.
Chapter 21: E-Commerce "Best Practices" for Customers.
Chapter 22: The Legislative Process.
Chapter 23: The HIPAA Database.
APPENDICES.
Appendix A: The Security Standard Checklist.
Appendix B: Checklist of Team Prerequisites.
Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions.
Appendix D: Cause and Effect Analysis: Step-by-Step Instructions.
Appendix E: The Security Focus Group Interview.
Appendix F: The Security Job Description.
Appendix G: Industrial and Organizational Specialists in Test Development
and Validation.
Appendix H: One Company's Short- and Long-Term Strategic Plan.
Appendix I: The Information Process: Definition, Description, and
Illustration.
Appendix J: The Pareto Analysis: Definition, Description, and Illustration.
Appendix K: Forerunners in the Support of Identity Theft Legislation.
Notes.
Index.
Introduction.
PART I: THE CURRENT STATE OF IDENTITY THEFT.
Chapter 1: What Is an "Identity"?
Chapter 2: Identity Theft: Effects on Victims.
Chapter 3: Identity Crime Is Entrenched.
Chapter 4: Identity Crimes Are Escalating.
Chapter 5: Legal Requirements for Businesses.
Chapter 6: Caveat Lector. Let the Reader Beware.
PART II: IDENTITY THEFT PREVENTION.
Chapter 7: The BISP Plan: Tighten Your Business Borders.
Chapter 8: Begin the Exercises: Identify Your Business Identities.
Chapter 9: Securing the People Front: The Security Job Analysis.
Chapter 10: The People Front: Recruitment for Security.
Chapter 11: The People Front: Personnel Selection for Security.
Chapter 12: The People Front: Select for Motivation.
Chapter 13: The People Front: Select for Integrity and Security.
Chapter 14: The People Front: Select for Interpersonal Skills.
Chapter 15: The People Front: Socialization, Company Culture, and the
Realistic Job Preview.
Chapter 16: The People Front: Socializing Newcomers to the Honest Company
Culture.
Chapter 17: The People Front: Appraisal and Feedback for Performance and
Security.
Chapter 18: The Process Front: Secure Business Information Processes.
Chapter 19: The Property Front: The E-Business Web Site.
PART III: MONITORING IDENTITY THEFT.
Chapter 20: The Customer Security Program.
Chapter 21: E-Commerce "Best Practices" for Customers.
Chapter 22: The Legislative Process.
Chapter 23: The HIPAA Database.
APPENDICES.
Appendix A: The Security Standard Checklist.
Appendix B: Checklist of Team Prerequisites.
Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions.
Appendix D: Cause and Effect Analysis: Step-by-Step Instructions.
Appendix E: The Security Focus Group Interview.
Appendix F: The Security Job Description.
Appendix G: Industrial and Organizational Specialists in Test Development
and Validation.
Appendix H: One Company's Short- and Long-Term Strategic Plan.
Appendix I: The Information Process: Definition, Description, and
Illustration.
Appendix J: The Pareto Analysis: Definition, Description, and Illustration.
Appendix K: Forerunners in the Support of Identity Theft Legislation.
Notes.
Index.
Preface.
Introduction.
PART I: THE CURRENT STATE OF IDENTITY THEFT.
Chapter 1: What Is an "Identity"?
Chapter 2: Identity Theft: Effects on Victims.
Chapter 3: Identity Crime Is Entrenched.
Chapter 4: Identity Crimes Are Escalating.
Chapter 5: Legal Requirements for Businesses.
Chapter 6: Caveat Lector. Let the Reader Beware.
PART II: IDENTITY THEFT PREVENTION.
Chapter 7: The BISP Plan: Tighten Your Business Borders.
Chapter 8: Begin the Exercises: Identify Your Business Identities.
Chapter 9: Securing the People Front: The Security Job Analysis.
Chapter 10: The People Front: Recruitment for Security.
Chapter 11: The People Front: Personnel Selection for Security.
Chapter 12: The People Front: Select for Motivation.
Chapter 13: The People Front: Select for Integrity and Security.
Chapter 14: The People Front: Select for Interpersonal Skills.
Chapter 15: The People Front: Socialization, Company Culture, and the
Realistic Job Preview.
Chapter 16: The People Front: Socializing Newcomers to the Honest Company
Culture.
Chapter 17: The People Front: Appraisal and Feedback for Performance and
Security.
Chapter 18: The Process Front: Secure Business Information Processes.
Chapter 19: The Property Front: The E-Business Web Site.
PART III: MONITORING IDENTITY THEFT.
Chapter 20: The Customer Security Program.
Chapter 21: E-Commerce "Best Practices" for Customers.
Chapter 22: The Legislative Process.
Chapter 23: The HIPAA Database.
APPENDICES.
Appendix A: The Security Standard Checklist.
Appendix B: Checklist of Team Prerequisites.
Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions.
Appendix D: Cause and Effect Analysis: Step-by-Step Instructions.
Appendix E: The Security Focus Group Interview.
Appendix F: The Security Job Description.
Appendix G: Industrial and Organizational Specialists in Test Development
and Validation.
Appendix H: One Company's Short- and Long-Term Strategic Plan.
Appendix I: The Information Process: Definition, Description, and
Illustration.
Appendix J: The Pareto Analysis: Definition, Description, and Illustration.
Appendix K: Forerunners in the Support of Identity Theft Legislation.
Notes.
Index.
Introduction.
PART I: THE CURRENT STATE OF IDENTITY THEFT.
Chapter 1: What Is an "Identity"?
Chapter 2: Identity Theft: Effects on Victims.
Chapter 3: Identity Crime Is Entrenched.
Chapter 4: Identity Crimes Are Escalating.
Chapter 5: Legal Requirements for Businesses.
Chapter 6: Caveat Lector. Let the Reader Beware.
PART II: IDENTITY THEFT PREVENTION.
Chapter 7: The BISP Plan: Tighten Your Business Borders.
Chapter 8: Begin the Exercises: Identify Your Business Identities.
Chapter 9: Securing the People Front: The Security Job Analysis.
Chapter 10: The People Front: Recruitment for Security.
Chapter 11: The People Front: Personnel Selection for Security.
Chapter 12: The People Front: Select for Motivation.
Chapter 13: The People Front: Select for Integrity and Security.
Chapter 14: The People Front: Select for Interpersonal Skills.
Chapter 15: The People Front: Socialization, Company Culture, and the
Realistic Job Preview.
Chapter 16: The People Front: Socializing Newcomers to the Honest Company
Culture.
Chapter 17: The People Front: Appraisal and Feedback for Performance and
Security.
Chapter 18: The Process Front: Secure Business Information Processes.
Chapter 19: The Property Front: The E-Business Web Site.
PART III: MONITORING IDENTITY THEFT.
Chapter 20: The Customer Security Program.
Chapter 21: E-Commerce "Best Practices" for Customers.
Chapter 22: The Legislative Process.
Chapter 23: The HIPAA Database.
APPENDICES.
Appendix A: The Security Standard Checklist.
Appendix B: Checklist of Team Prerequisites.
Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions.
Appendix D: Cause and Effect Analysis: Step-by-Step Instructions.
Appendix E: The Security Focus Group Interview.
Appendix F: The Security Job Description.
Appendix G: Industrial and Organizational Specialists in Test Development
and Validation.
Appendix H: One Company's Short- and Long-Term Strategic Plan.
Appendix I: The Information Process: Definition, Description, and
Illustration.
Appendix J: The Pareto Analysis: Definition, Description, and Illustration.
Appendix K: Forerunners in the Support of Identity Theft Legislation.
Notes.
Index.