Linked e-resources
Details
Table of Contents
What is an "identity"?
Identity theft: effects on victims
Identity crime is entrenched
Identity crimes are escalating
Legal requirements for business
Caveat lector. let the reader beware
Your business identities
Tighten your business borders
Securing the people front: the security job analysis
The people front: recruitment for security
The people front: personnel selection for security
The people front: select for motivation
The people front: select for integrity and security
The people front: select for interpersonal skills
Socialization, company culture, and the realistic job preview
The security orientation program: socializing newcomers to the honest company culture
The people front: appraisal and feedback for performance and security
The process front: secure business information processes
The property front: the e-business web site
The customer security program
E-commerce "best practices" for customers
The legislative process
HIPAA: security for health care companies.
Identity theft: effects on victims
Identity crime is entrenched
Identity crimes are escalating
Legal requirements for business
Caveat lector. let the reader beware
Your business identities
Tighten your business borders
Securing the people front: the security job analysis
The people front: recruitment for security
The people front: personnel selection for security
The people front: select for motivation
The people front: select for integrity and security
The people front: select for interpersonal skills
Socialization, company culture, and the realistic job preview
The security orientation program: socializing newcomers to the honest company culture
The people front: appraisal and feedback for performance and security
The process front: secure business information processes
The property front: the e-business web site
The customer security program
E-commerce "best practices" for customers
The legislative process
HIPAA: security for health care companies.