Preventing Identity Theft in Your Business
By Judith M. Collins, Ph.D
Description
Identified by the FBI as the top crime of the 21st century, identity theft is most commonly committed inside the workplace, and the victims are always a company’s employees or customers. Preventing Identity Theft in Your Business presents a comprehensive, four-factor model for implementing an effective information security plan and provides step-by-step guidance on employee selection and training. Rich with real-world case studies illustrating how identity theft is committed and prevented, this resource clearly demonstrates how you and your employees can foster an honest work culture in your workplace.
Highlights include:
- The legal requirements for business
- How to tighten your business borders
- How to recruit your employees for security
- The e-business website
- E-commerce best practices for customers
- HIPPA: Security for healthcare companies
- The security standard checklist
Product Details
Label | Value |
---|---|
ISBN | 0-471-69469-X |
Publisher | John Wiley & Sons Publishing |
Published | Copyright 2005 |
Pages | 245 |
Format | Hardcover |
Table of Contents
Chapter 1 | What Is an “Identity”? |
---|---|
Chapter 2 | Identity Theft: Effects on Victims |
Chapter 3 | Identity Crime Is Entrenched |
Chapter 4 | Identity Crimes Are Escalating |
Chapter 5 | Legal Requirements for Businesses |
Chapter 6 | Caveat Lector. Let the Reader Beware. |
Chapter 7 | The BISP Plan: Tighten Your Business Borders |
Chapter 8 | Begin the Exercises: Identify Your Business Identities |
Chapter 9 | Securing the People Front: The Security Job Analysis |
Chapter 10 | The People Front: Recruitment for Security |
Chapter 11 | The People Front: Personnel Selection for Security |
Chapter 12 | The People Front: Select for Motivation |
Chapter 13 | The People Front: Select for Integrity and Security |
Chapter 14 | The People Front: Select for Interpersonal Skills |
Chapter 15 | The People Front: Socialization, Company Culture, and the Realistic Job Preview |
Chapter 16 | The People Front: Socializing Newcomers to the Honest Company Culture |
Chapter 17 | The People Front: Appraisal and Feedback for Performance and Security |
Chapter 18 | The Process Front: Secure Business Information Processes |
Chapter 19 | The Property Front: The E-Business Web Site |
Chapter 20 | The Customer Security Program |
Chapter 21 | E-Commerce “Best Practices” for Customers |
Chapter 22 | The Legislative Process |
Chapter 23 | The HIPAA Database |
Appendix A | The Security Standard Checklist |
Appendix B | Checklist of Team Prerequisites |
Appendix C | Structured and Formal Brainstorming: Step-by-Step Instructions |
Appendix D | Cause and Effect Analysis: Step-by-Step Instructions |
Appendix E | The Security Focus Group Interview |
Appendix F | The Security Job Description |
Appendix G | Industrial and Organizational Specialists in Test Development and Validation |
Appendix H | One Company’s Short- and Long-Term Strategic Plan |
Appendix I | The Information Process: Definition, Description, and Illustration |
Appendix J | The Pareto Analysis: Definition, Description, and Illustration |
Appendix K | Forerunners in the Support of Identity Theft Legislation |
Ordering and Returns
Satisfaction Guarantee
If you are not 100% satisfied with any ACFE product, you may return it to us, provided it is in excellent condition, for a full refund of the item minus the cost of shipping. Toolkits and bundles may only be returned as a complete set.
Ordering & Returns Policy