Published 2005
Table of Contents:
“…-- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front:
recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization,
company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest
company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care
companies.…”
Call Number:
Loading…
Located:
Loading…
An electronic book accessible through the World Wide Web; click to view
Electronic
eBook