Preventing Identity Theft in Your Business

Home > Other > Preventing Identity Theft in Your Business > Page 23
Preventing Identity Theft in Your Business Page 23

by Judith M. Collins


  Chapter 12

  1. H.G. Gough and P. Bradley, California Psychological Inventory Manual, 3rd ed. (Palto Alto, CA: Consulting Psychologists Press, 1996).

  Chapter 13

  1. H.G. Gough, “Theory, Development, and Interpretations of the CPI Socialization Scale,” Psychological Reports, Suppl. 1-V75 (1994): 651–700.

  Chapter 18

  1. These references describe the background and development of the quality management tools (formal brainstorming, cause-and-effect analysis, flow-charting, and Pareto analysis) that, in this book, are adapted to security management and used to complete the exercises throughout: Mary Walton, The Deming Management Method (New York: The Putnam Publishing Group, 1986); H. Gitlow, Planning for Quality, Productivity, and Competitive Position (Homewood, IL: Dow Jones-Irwin, 1990); H. Gitlow, S. Gitlow, A. Oppenheim, and R. Oppenheim, Tools and Methods for the Improvement of Quality (Homewood, IL: Dow Jones-Irwin, 1989); K. Isakawa, Guide to Quality Control (Hong Kong: Asian Productivity Organization, Nordica International Limited (1976; available in the United States from UNIPUB, New York); J.M. Juran, Quality Control Handbook, 3rd ed. (New York: McGraw-Hill, 1979); Amitava Mitra, Fundamentals of Quality Control and Improvement (New York: Macmillan, 1993) (note: requires knowledge of statistics).

  Chapter 20

  1. J.M. Collins and S.K. Hoffman, First Responders to Identity Theft: Police Officers, Prosecutors, and Judges (Flushing, NY: Looseleaf Law Publications, 2004).

  2. J.M. Collins and T. McGinley, “Identity Theft Victims and the Process of Healing,” Michigan State University–Business Identity Theft Partnerships in Prevention, East Lansing, MI 48824), 2001, [email protected] or [email protected].

  3. J.M. Collins and S.K. Hoffman, Identity Theft Victims’ Assistance Guide (Flushing, NY: Looseleaf Law Publications, 2004).

  Chapter 22

  1. Identity Theft and Assumption Deterrence Act of 1998, 105th Congress, Public Law 105-318, October 30,1998. Can be obtained at http://www.ftc.gov/.

  Chapter 23

  1. Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, 104th Congress (Washington, DC: U.S. Government Printing Office, 1996), www.hhs.gov/ocr/hipaa/.

  2. J.M. Collins and S.K. Hoffman, “Identity Theft: Predator Profiles, Based on 1,037 Cases,” Michigan State University–Business Identity Theft Partnerships in Prevention (East Lansing, MI 48824, 2003), [email protected] or [email protected].

  3. Health Insurance Portability and Accountability Act of 1996, Public Law 104-191, 104th Congress (Washington, DC: U.S. Government Printing Office, 1996), www.hhs.gov/ocr/hipaa/.

  Appendix C

  1. See note 1 for Chapter 8.

  INDEX

  A

  Achievement via Independence scale

  Achievement Motivation scale Appraisal:

  group

  individual

  organizational

  for security

  Assembly bills, list of

  Assessment, departmental

  B

  Brainstorming: formal

  task statement

  Business identities: determining who has access to

  identifying

  Business identity theft: defined

  examples of

  Business Information Security Standards (BISP)

  Businesses: identity theft effects on

  legal requirements for

  C

  California Psychological Inventory

  California Psychological Inventory Motivational scale

  Cause-and-Effect Analysis

  Cognitive ability

  Cognitive ability test

  Company culture: assessment

  evaluating

  Credit agency databases

  Customer security program

  E

  E-Business Web site

  E-Commerce, best practices developing

  creating a Web page

  Employees, guidance for successful use of concepts in this book

  Equal Employment Opportunity Commission (EEOC)

  Executives, guidance for successful use of concepts in book

  F

  Federal Trade Commission (FTC)

  Flow chart, symbols

  Focus group interview

  Four-Factor Model of Information Security

  G

  Government databases

  Gramm-Leach-Bliley Act

  H

  HIPAA database

  I

  Identity, defined

  Identity crime: defined

  jurisdictional problems with

  Identity theft, defined

  Identity Theft First Responder Manual

  Identity theft: legislation

  personal versus business

  police resources for

  Identity Theft Act

  Identity Theft and Assumption Deterrence Act

  Information Process Risk Assessment

  Information processes

  Integrity

  Interpersonal skills test of

  J

  Job characteristics

  Job Competency Checklist

  Job Competency Appraisal Instrument

  Job set

  Job task checklist for

  identifying

  K

  Knowledge, Skills, Abilities (KSAs)

  L

  Legislation for identity theft important bills

  Legislative process

  Legislators, list of

  M

  Mental Measurements Yearbooks

  Motivation

  Motivation test

  O

  Outsourcing identities

  P

  Pareto analysis

  Personal identities

  Personal identity theft, definition

  Police resources for identity theft

  Process of healing for identity theft victims

  Project team: checklist of team prerequisites

  creation

  selecting new for standards

  Q

  Quality to security tools

  S

  Seal of Information Security

  Security: Business Information Security Standards

  focus group interview

  Four Factor Model of Information Security

  Integrity for Security Test

  job analysis

  job description

  performance measurement

  personnel selection for

  recruitment for

  Security Standards checklist

  Web site security assessment

  Security Orientation Program: defined

  designing

  Security-sensitive

  Security Standard Checklist

  Self-appraisal

  Senate bills, list of

  Snowballing, definition

  Socialization

  Socialization scale

  Socialization theory

  Society for Industrial and Organizational Psychology

  Specialists, industrial and organizational

  T

  Technical competency

  Test of Interpersonal Skills

  Title VII

  U

  Uniform Guidelines on Employee Selection Procedures

  V

  Victims’ Assistance Guide

  Victims: identity theft effects on

  resources for

  W

  Web site security assessment

  Wonderlic Personnel Test (WPT)

  Work Group Appraisal Instrument

  WILEY END USER LICENSE AGREEMENT

  Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.

 

 

 
ter: grayscale(100%); -moz-filter: grayscale(100%); -o-filter: grayscale(100%); -ms-filter: grayscale(100%); filter: grayscale(100%); " class="sharethis-inline-share-buttons">share



‹ Prev