Book description
Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, and their employees from the growing problem of identity theft. Real-life examples show managers and executives how to identify business, customer, and employee identity theft, how these crimes are committed, how best to prevent them, and overall, develop an honest company culture. It also covers how to manage this threat in business reorganizations such as mergers, acquisitions, globalization, and outsourcing.Table of contents
- Cover
- Title
- Copyright
- Dedication
- ACKNOWLEDGMENTS
- PREFACE
- INTRODUCTION
- PART I: THE CURRENT STATE OF IDENTITY THEFT
-
PART II: IDENTITY THEFT PREVENTION
- CHAPTER 7: THE BISP PLAN: TIGHTEN YOUR BUSINESS BORDERS
- CHAPTER 8: BEGIN THE EXERCISES: IDENTIFY YOUR BUSINESS IDENTITIES
- CHAPTER 9: SECURING THE PEOPLE FRONT: THE SECURITY JOB ANALYSIS
- CHAPTER 10: THE PEOPLE FRONT: RECRUITMENT FOR SECURITY
- CHAPTER 11: THE PEOPLE FRONT: PERSONNEL SELECTION FOR SECURITY
- CHAPTER 12: THE PEOPLE FRONT: SELECT FOR MOTIVATION
- CHAPTER 13: THE PEOPLE FRONT: SELECT FOR INTEGRITY AND SECURITY
- CHAPTER 14: THE PEOPLE FRONT: SELECT FOR INTERPERSONAL SKILLS
- CHAPTER 15: THE PEOPLE FRONT: SOCIALIZATION, COMPANY CULTURE, AND THE REALISTIC JOB PREVIEW
- CHAPTER 16: THE PEOPLE FRONT: SOCIALIZING NEWCOMERS TO THE HONEST COMPANY CULTURE
- CHAPTER 17: THE PEOPLE FRONT: APPRAISAL AND FEEDBACK FOR PERFORMANCE AND SECURITY
- CHAPTER 18: THE PROCESS FRONT: SECURE BUSINESS INFORMATION PROCESSES
- CHAPTER 19: THE PROPERTY FRONT: THE E-BUSINESS WEB SITE
- PART III: MONITORING IDENTITY THEFT
-
APPENDICES
- APPENDIX A: THE SECURITY STANDARD CHECKLIST
- APPENDIX B: CHECKLIST OF TEAM PREREQUISITES
- APPENDIX C: STRUCTURED AND FORMAL BRAINSTORMING: STEP-BY-STEP INSTRUCTIONS
- APPENDIX D: CAUSE AND EFFECT ANALYSIS: STEP-BY-STEP INSTRUCTIONS
- APPENDIX E: THE SECURITY FOCUS GROUP INTERVIEW
- APPENDIX F: THE SECURITY JOB DESCRIPTION
- APPENDIX G: INDUSTRIAL AND ORGANIZATIONAL SPECIALISTS IN TEST DEVELOPMENT AND VALIDATION
- APPENDIX H: ONE COMPANY’S SHORT- AND LONG-TERM STRATEGIC PLAN
- APPENDIX I: THE INFORMATION PROCESS: DEFINITION, DESCRIPTION, AND ILLUSTRATION
- APPENDIX J: THE PARETO ANALYSIS: DEFINITION, DESCRIPTION, AND ILLUSTRATION
- APPENDIX K: FORERUNNERS IN THE SUPPORT OF IDENTITY THEFT LEGISLATION
- NOTES
- INDEX
- END USER LICENSE AGREEMENT
Product information
- Title: Preventing Identity Theft in Your Business
- Author(s):
- Release date: March 2005
- Publisher(s): Wiley
- ISBN: 9780471694694
You might also like
book
The Truth About Identity Theft
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available …
book
Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime
Protect yourself from identity theft! Nearly 17 million Americans were victimized by identity theft in 2012 …
book
HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT
Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, …
article
Have ChatGPT Ask You Questions
ChatGPT Shortcuts shows future prompt engineers how to harness the full potential of the state-of-the-art AI …