Wiley.com
Print this page Share

Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees

ISBN: 978-0-471-69469-4
Hardcover
256 pages
March 2005
List Price: US $39.95
Government Price: US $20.37
Enter Quantity:   Buy
Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees (047169469X) cover image
This is a Print-on-Demand title. It will be printed specifically to fill your order. Please allow an additional 10-15 days delivery time. The book is not returnable.

Preface.

Introduction.

PART I: THE CURRENT STATE OF IDENTITY THEFT.

Chapter 1: What Is an “Identity”?

Chapter 2: Identity Theft: Effects on Victims.

Chapter 3: Identity Crime Is Entrenched.

Chapter 4: Identity Crimes Are Escalating.

Chapter 5: Legal Requirements for Businesses.

Chapter 6: Caveat Lector. Let the Reader Beware.

PART II: IDENTITY THEFT PREVENTION.

Chapter 7: The BISP Plan: Tighten Your Business Borders.

Chapter 8: Begin the Exercises: Identify Your Business Identities.

Chapter 9: Securing the People Front: The Security Job Analysis.

Chapter 10: The People Front: Recruitment for Security.

Chapter 11: The People Front: Personnel Selection for Security.

Chapter 12: The People Front: Select for Motivation.

Chapter 13: The People Front: Select for Integrity and Security.

Chapter 14: The People Front: Select for Interpersonal Skills.

Chapter 15: The People Front: Socialization, Company Culture, and the Realistic Job Preview.

Chapter 16: The People Front: Socializing Newcomers to the Honest Company Culture.

Chapter 17: The People Front: Appraisal and Feedback for Performance and Security.

Chapter 18: The Process Front: Secure Business Information Processes.

Chapter 19: The Property Front: The E-Business Web Site.

PART III: MONITORING IDENTITY THEFT.

Chapter 20: The Customer Security Program.

Chapter 21: E-Commerce “Best Practices” for Customers.

Chapter 22: The Legislative Process.

Chapter 23: The HIPAA Database.

APPENDICES.

Appendix A: The Security Standard Checklist.

Appendix B: Checklist of Team Prerequisites.

Appendix C: Structured and Formal Brainstorming: Step-by-Step Instructions.

Appendix D: Cause and Effect Analysis: Step-by-Step Instructions.

Appendix E: The Security Focus Group Interview.

Appendix F: The Security Job Description.

Appendix G: Industrial and Organizational Specialists in Test Development and Validation.

Appendix H: One Company’s Short- and Long-Term Strategic Plan.

Appendix I: The Information Process: Definition, Description, and Illustration.

Appendix J: The Pareto Analysis: Definition, Description, and Illustration.

Appendix K: Forerunners in the Support of Identity Theft Legislation.

Notes.

Index.

Back to Top