Chapter 12
1. H.G. Gough and P. Bradley, California Psychological Inventory Manual, 3rd ed. (Palto Alto, CA: Consulting Psychologists Press, 1996).
Chapter 13
1. H.G. Gough, “Theory, Development, and Interpretations of the CPI Socialization Scale,” Psychological Reports, Suppl. 1-V75 (1994): 651–700.
Chapter 18
1. These references describe the background and development of the quality management tools (formal brainstorming, cause-and-effect analysis, flow-charting, and Pareto analysis) that, in this book, are adapted to security management and used to complete the exercises throughout: Mary Walton, The Deming Management Method (New York: The Putnam Publishing Group, 1986); H. Gitlow, Planning for Quality, Productivity, and Competitive Position (Homewood, IL: Dow Jones-Irwin, 1990); H. Gitlow, S. Gitlow, A. Oppenheim, and R. Oppenheim, Tools and Methods for the Improvement of Quality (Homewood, IL: Dow Jones-Irwin, 1989); K. Isakawa, Guide to Quality Control (Hong Kong: Asian Productivity Organization, Nordica International Limited (1976; available in the United States from UNIPUB, New York); J.M. Juran, Quality Control Handbook, 3rd ed. (New York: McGraw-Hill, 1979); Amitava Mitra, Fundamentals of Quality Control and Improvement (New York: Macmillan, 1993) (note: requires knowledge of statistics).
Chapter 20
1. J.M. Collins and S.K. Hoffman, First Responders to Identity Theft: Police Officers, Prosecutors, and Judges (Flushing, NY: Looseleaf Law Publications, 2004).
2. J.M. Collins and T. McGinley, “Identity Theft Victims and the Process of Healing,” Michigan State University–Business Identity Theft Partnerships in Prevention, East Lansing, MI 48824), 2001, [email protected] or [email protected].
3. J.M. Collins and S.K. Hoffman, Identity Theft Victims’ Assistance Guide (Flushing, NY: Looseleaf Law Publications, 2004).
Chapter 22
1. Identity Theft and Assumption Deterrence Act of 1998, 105th Congress, Public Law 105-318, October 30,1998. Can be obtained at http://www.ftc.gov/.
Chapter 23
1. Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, 104th Congress (Washington, DC: U.S. Government Printing Office, 1996), www.hhs.gov/ocr/hipaa/.
2. J.M. Collins and S.K. Hoffman, “Identity Theft: Predator Profiles, Based on 1,037 Cases,” Michigan State University–Business Identity Theft Partnerships in Prevention (East Lansing, MI 48824, 2003), [email protected] or [email protected].
3. Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, 104th Congress (Washington, DC: U.S. Government Printing Office, 1996), www.hhs.gov/ocr/hipaa/.
Appendix C
1. See note 1 for Chapter 8.
INDEX
A
Achievement via Independence scale
Achievement Motivation scale Appraisal:
group
individual
organizational
for security
Assembly bills, list of
Assessment, departmental
B
Brainstorming: formal
task statement
Business identities: determining who has access to
identifying
Business identity theft: defined
examples of
Business Information Security Standards (BISP)
Businesses: identity theft effects on
legal requirements for
C
California Psychological Inventory
California Psychological Inventory Motivational scale
Cause-and-Effect Analysis
Cognitive ability
Cognitive ability test
Company culture: assessment
evaluating
Credit agency databases
Customer security program
E
E-Business Web site
E-Commerce, best practices developing
creating a Web page
Employees, guidance for successful use of concepts in this book
Equal Employment Opportunity Commission (EEOC)
Executives, guidance for successful use of concepts in book
F
Federal Trade Commission (FTC)
Flow chart, symbols
Focus group interview
Four-Factor Model of Information Security
G
Government databases
Gramm-Leach-Bliley Act
H
HIPAA database
I
Identity, defined
Identity crime: defined
jurisdictional problems with
Identity theft, defined
Identity Theft First Responder Manual
Identity theft: legislation
personal versus business
police resources for
Identity Theft Act
Identity Theft and Assumption Deterrence Act
Information Process Risk Assessment
Information processes
Integrity
Interpersonal skills test of
J
Job characteristics
Job Competency Checklist
Job Competency Appraisal Instrument
Job set
Job task checklist for
identifying
K
Knowledge, Skills, Abilities (KSAs)
L
Legislation for identity theft important bills
Legislative process
Legislators, list of
M
Mental Measurements Yearbooks
Motivation
Motivation test
O
Outsourcing identities
P
Pareto analysis
Personal identities
Personal identity theft, definition
Police resources for identity theft
Process of healing for identity theft victims
Project team: checklist of team prerequisites
creation
selecting new for standards
Q
Quality to security tools
S
Seal of Information Security
Security: Business Information Security Standards
focus group interview
Four Factor Model of Information Security
Integrity for Security Test
job analysis
job description
performance measurement
personnel selection for
recruitment for
Security Standards checklist
Web site security assessment
Security Orientation Program: defined
designing
Security-sensitive
Security Standard Checklist
Self-appraisal
Senate bills, list of
Snowballing, definition
Socialization
Socialization scale
Socialization theory
Society for Industrial and Organizational Psychology
Specialists, industrial and organizational
T
Technical competency
Test of Interpersonal Skills
Title VII
U
Uniform Guidelines on Employee Selection Procedures
V
Victims’ Assistance Guide
Victims: identity theft effects on
resources for
W
Web site security assessment
Wonderlic Personnel Test (WPT)
Work Group Appraisal Instrument
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.
ter: grayscale(100%); -moz-filter: grayscale(100%); -o-filter: grayscale(100%); -ms-filter: grayscale(100%); filter: grayscale(100%); " class="sharethis-inline-share-buttons">share
Preventing Identity Theft in Your Business Page 23