Preventing identity theft in your business : how to protect your business, customers, and employees / / Judith M. Collins.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2005 |
Language: | English |
Online Access: | |
Physical Description: | x, 245 p. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500226593 |
---|---|
ctrlnum |
(MiAaPQ)500226593 (Au-PeEL)EBL226593 (CaPaEBR)ebr10114184 (CaONFJC)MIL25503 (OCoLC)559961860 |
collection |
bib_alma |
record_format |
marc |
spelling |
Collins, Judith M. Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins. Hoboken, N.J. : Wiley, c2005. x, 245 p. Includes bibliographical references and index. What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Identity theft United States Prevention. Electronic books. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=226593 Click to View |
language |
English |
format |
Electronic eBook |
author |
Collins, Judith M. |
spellingShingle |
Collins, Judith M. Preventing identity theft in your business how to protect your business, customers, and employees / What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies. |
author_facet |
Collins, Judith M. ProQuest (Firm) ProQuest (Firm) |
author_variant |
j m c jm jmc |
author2 |
ProQuest (Firm) |
author2_role |
TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Collins, Judith M. |
title |
Preventing identity theft in your business how to protect your business, customers, and employees / |
title_sub |
how to protect your business, customers, and employees / |
title_full |
Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins. |
title_fullStr |
Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins. |
title_full_unstemmed |
Preventing identity theft in your business [electronic resource] : how to protect your business, customers, and employees / Judith M. Collins. |
title_auth |
Preventing identity theft in your business how to protect your business, customers, and employees / |
title_new |
Preventing identity theft in your business |
title_sort |
preventing identity theft in your business how to protect your business, customers, and employees / |
publisher |
Wiley, |
publishDate |
2005 |
physical |
x, 245 p. |
contents |
What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies. |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6679 |
callnumber-sort |
HV 46679 C653 42005 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
geographic_facet |
United States |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=226593 |
illustrated |
Not Illustrated |
dewey-hundreds |
600 - Technology |
dewey-tens |
650 - Management & public relations |
dewey-ones |
658 - General management |
dewey-full |
658.4/72 |
dewey-sort |
3658.4 272 |
dewey-raw |
658.4/72 |
dewey-search |
658.4/72 |
oclc_num |
559961860 |
work_keys_str_mv |
AT collinsjudithm preventingidentitytheftinyourbusinesshowtoprotectyourbusinesscustomersandemployees AT proquestfirm preventingidentitytheftinyourbusinesshowtoprotectyourbusinesscustomersandemployees |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500226593 (Au-PeEL)EBL226593 (CaPaEBR)ebr10114184 (CaONFJC)MIL25503 (OCoLC)559961860 |
is_hierarchy_title |
Preventing identity theft in your business how to protect your business, customers, and employees / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1792330670052212736 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02363nam a22003614a 4500</leader><controlfield tag="001">500226593</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">040921s2005 nju sb 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2004022093</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">047169469X (cloth)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500226593</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL226593</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10114184</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL25503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559961860</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6679</subfield><subfield code="b">.C653 2005</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">658.4/72</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Collins, Judith M.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Preventing identity theft in your business</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">how to protect your business, customers, and employees /</subfield><subfield code="c">Judith M. Collins.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hoboken, N.J. :</subfield><subfield code="b">Wiley,</subfield><subfield code="c">c2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 245 p.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Identity theft</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=226593</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |