Preventing identity theft in your business : how to protect your business, customers, and employees / / Judith M. Collins.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2005
Language:English
Online Access:
Physical Description:x, 245 p.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 500226593
ctrlnum (MiAaPQ)500226593
(Au-PeEL)EBL226593
(CaPaEBR)ebr10114184
(CaONFJC)MIL25503
(OCoLC)559961860
collection bib_alma
record_format marc
spelling Collins, Judith M.
Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins.
Hoboken, N.J. : Wiley, c2005.
x, 245 p.
Includes bibliographical references and index.
What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Identity theft United States Prevention.
Electronic books.
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=226593 Click to View
language English
format Electronic
eBook
author Collins, Judith M.
spellingShingle Collins, Judith M.
Preventing identity theft in your business how to protect your business, customers, and employees /
What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.
author_facet Collins, Judith M.
ProQuest (Firm)
ProQuest (Firm)
author_variant j m c jm jmc
author2 ProQuest (Firm)
author2_role TeilnehmendeR
author_corporate ProQuest (Firm)
author_sort Collins, Judith M.
title Preventing identity theft in your business how to protect your business, customers, and employees /
title_sub how to protect your business, customers, and employees /
title_full Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins.
title_fullStr Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins.
title_full_unstemmed Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins.
title_auth Preventing identity theft in your business how to protect your business, customers, and employees /
title_new Preventing identity theft in your business
title_sort preventing identity theft in your business how to protect your business, customers, and employees /
publisher Wiley,
publishDate 2005
physical x, 245 p.
contents What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6679
callnumber-sort HV 46679 C653 42005
genre Electronic books.
genre_facet Electronic books.
geographic_facet United States
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=226593
illustrated Not Illustrated
dewey-hundreds 600 - Technology
dewey-tens 650 - Management & public relations
dewey-ones 658 - General management
dewey-full 658.4/72
dewey-sort 3658.4 272
dewey-raw 658.4/72
dewey-search 658.4/72
oclc_num 559961860
work_keys_str_mv AT collinsjudithm preventingidentitytheftinyourbusinesshowtoprotectyourbusinesscustomersandemployees
AT proquestfirm preventingidentitytheftinyourbusinesshowtoprotectyourbusinesscustomersandemployees
status_str n
ids_txt_mv (MiAaPQ)500226593
(Au-PeEL)EBL226593
(CaPaEBR)ebr10114184
(CaONFJC)MIL25503
(OCoLC)559961860
is_hierarchy_title Preventing identity theft in your business how to protect your business, customers, and employees /
author2_original_writing_str_mv noLinkedField
_version_ 1792330670052212736
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02363nam a22003614a 4500</leader><controlfield tag="001">500226593</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">040921s2005 nju sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2004022093</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">047169469X (cloth)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500226593</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL226593</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10114184</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL25503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559961860</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6679</subfield><subfield code="b">.C653 2005</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">658.4/72</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Collins, Judith M.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Preventing identity theft in your business</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">how to protect your business, customers, and employees /</subfield><subfield code="c">Judith M. Collins.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hoboken, N.J. :</subfield><subfield code="b">Wiley,</subfield><subfield code="c">c2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 245 p.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Identity theft</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=226593</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>