Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing. Judith M. Collins (East Lansing, MI) is Associate Professor of Industrial and…mehr
Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing. Judith M. Collins (East Lansing, MI) is Associate Professor of Industrial and Organizational Psychology at the School of Criminal Justice at Michigan State University. She is also the Director of the Michigan State University Identity Theft Partnership in Prevention.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dr. Liam Collins is the executive director of the Madison Policy Forum, a senior fellow with New America, and a permanent member with the Council on Foreign Relations. Colonel (retired) Collins served in the US Army for 27 years. As a career Special Forces officer, he conducted multiple operational and combat deployments to Afghanistan, Iraq, Bosnia, South America, and the Horn of Africa. In Iraq, Liam conducted operations in Baghdad, Fallujah, Ramadi, and many other cities. Liam retired from the military in 2019 as the founding director of the Modern War Institute and the director of the Department of Military Instruction at the United States Military Academy at West Point. He holds a Bachelor of Science degree in Mechanical Engineering (Aerospace) from the United States Military Academy, and a Master's in Public Affairs and a PhD from Princeton University's School of Public and International Affairs.
Inhaltsangabe
Preface. Introduction. PART I: THE CURRENT STATE OF IDENTITY THEFT. Chapter 1: What Is an "Identity"? Chapter 2: Identity Theft: Effects on Victims. Chapter 3: Identity Crime Is Entrenched. Chapter 4: Identity Crimes Are Escalating. Chapter 5: Legal Requirements for Businesses. Chapter 6: Caveat Lector. Let the Reader Beware. PART II: IDENTITY THEFT PREVENTION. Chapter 7: The BISP Plan: Tighten Your Business Borders. Chapter 8: Begin the Exercises: Identify Your Business Identities. Chapter 9: Securing the People Front: The Security Job Analysis. Chapter 10: The People Front: Recruitment for Security. Chapter 11: The People Front: Personnel Selection for Security. Chapter 12: The People Front: Select for Motivation. Chapter 13: The People Front: Select for Integrity and Security. Chapter 14: The People Front: Select for Interpersonal Skills. Chapter 15: The People Front: Socialization, Company Culture, and the Realistic Job Preview. Chapter 16: The People Front: Socializing Newcomers to the Honest Company Culture. Chapter 17: The People Front: Appraisal and Feedback for Performance and Security. Chapter 18: The Process Front: Secure Business Information Processes. Chapter 19: The Property Front: The E-Business Web Site. PART III: MONITORING IDENTITY THEFT. Chapter 20: The Customer Security Program. Chapter 21: E-Commerce "Best Practices" for Customers. Chapter 22: The Legislative Process. Chapter 23: The HIPAA Database. APPENDICES. Appendix A: The Security Standard Checklist. Appendix B: Checklist of Team Prerequisites. Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions. Appendix D: Cause and Effect Analysis: Step-by-Step Instructions. Appendix E: The Security Focus Group Interview. Appendix F: The Security Job Description. Appendix G: Industrial and Organizational Specialists in Test Development and Validation. Appendix H: One Company's Short- and Long-Term Strategic Plan. Appendix I: The Information Process: Definition, Description, and Illustration. Appendix J: The Pareto Analysis: Definition, Description, and Illustration. Appendix K: Forerunners in the Support of Identity Theft Legislation. Notes. Index.
Preface. Introduction. PART I: THE CURRENT STATE OF IDENTITY THEFT. Chapter 1: What Is an "Identity"? Chapter 2: Identity Theft: Effects on Victims. Chapter 3: Identity Crime Is Entrenched. Chapter 4: Identity Crimes Are Escalating. Chapter 5: Legal Requirements for Businesses. Chapter 6: Caveat Lector. Let the Reader Beware. PART II: IDENTITY THEFT PREVENTION. Chapter 7: The BISP Plan: Tighten Your Business Borders. Chapter 8: Begin the Exercises: Identify Your Business Identities. Chapter 9: Securing the People Front: The Security Job Analysis. Chapter 10: The People Front: Recruitment for Security. Chapter 11: The People Front: Personnel Selection for Security. Chapter 12: The People Front: Select for Motivation. Chapter 13: The People Front: Select for Integrity and Security. Chapter 14: The People Front: Select for Interpersonal Skills. Chapter 15: The People Front: Socialization, Company Culture, and the Realistic Job Preview. Chapter 16: The People Front: Socializing Newcomers to the Honest Company Culture. Chapter 17: The People Front: Appraisal and Feedback for Performance and Security. Chapter 18: The Process Front: Secure Business Information Processes. Chapter 19: The Property Front: The E-Business Web Site. PART III: MONITORING IDENTITY THEFT. Chapter 20: The Customer Security Program. Chapter 21: E-Commerce "Best Practices" for Customers. Chapter 22: The Legislative Process. Chapter 23: The HIPAA Database. APPENDICES. Appendix A: The Security Standard Checklist. Appendix B: Checklist of Team Prerequisites. Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions. Appendix D: Cause and Effect Analysis: Step-by-Step Instructions. Appendix E: The Security Focus Group Interview. Appendix F: The Security Job Description. Appendix G: Industrial and Organizational Specialists in Test Development and Validation. Appendix H: One Company's Short- and Long-Term Strategic Plan. Appendix I: The Information Process: Definition, Description, and Illustration. Appendix J: The Pareto Analysis: Definition, Description, and Illustration. Appendix K: Forerunners in the Support of Identity Theft Legislation. Notes. Index.
Rezensionen
"plenty to spark introspection and debate" ( Accounting Technician , 25 th September 2005)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497