IUKL Library

Preventing identity theft in your business (Record no. 43442)

000 -LEADER
fixed length control field 02276nam a22003134a 4500
001 - CONTROL NUMBER
control field ebr10114184
003 - CONTROL NUMBER IDENTIFIER
control field CaPaEBR
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 040921s2005 nju sb 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2004022093
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 047169469X (cloth)
040 ## - CATALOGING SOURCE
Original cataloging agency CaPaEBR
Transcribing agency CaPaEBR
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)647474701
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6679
Item number .C653 2005eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/72
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Collins, Judith M.
245 10 - TITLE STATEMENT
Title Preventing identity theft in your business
Medium [electronic resource] :
Remainder of title how to protect your business, customers, and employees /
Statement of responsibility, etc Judith M. Collins.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, N.J. :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc c2005.
300 ## - PHYSICAL DESCRIPTION
Extent x, 245 p. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction Palo Alto, Calif. :
Agency responsible for reproduction ebrary,
Date of reproduction 2009.
Note about reproduction Available via World Wide Web.
-- Access may be limited to ebrary affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Identity theft
Geographic subdivision United States
General subdivision Prevention.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ebrary, Inc.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://site.ebrary.com/lib/kliuc/Doc?id=10114184
Public note An electronic book accessible through the World Wide Web; click to view

No items available.

The Library's homepage is at http://library.iukl.edu.my/.