Summary of Preventing Identity Theft in Your Business

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Preventing Identity Theft in Your Business book summary
Start getting smarter:
or see our plans

Rating

7 Overall

9 Applicability

7 Innovation

5 Style


Recommendation

Based on research conducted at Michigan State University, this step-by-step, practitioner’s guide shows you how to implement an identity-theft protection program. Author Judith M. Collins includes useful background information about the types and frequency of identity thefts and identity crimes. She emphasizes the steps your company can take to prevent and remediate identity theft. She also provides a chapter on "best practices" for customers and advises companies to include these best practices in their marketing materials. If your company is serious about dealing with identity theft, getAbstract recommends this book as an extremely useful guide.

In this summary, you will learn

  • How to define identify theft and its causes;
  • What impact identity theft and identify crime have;
  • What eight steps you can take to prevent identity theft in your business;
  • How to avoid becoming a victim of identity theft; and
  • How to help identity-theft victims.
 

About the Author

Judith M. Collins is associate professor of industrial and organizational psychology in the School of Criminal Justice at Michigan State University. She teaches information security management and directs the University Identity Theft Partnership in Prevention.

 

Summary

Identity Theft and Identity Crime
Most identity thefts occur in the workplace. Relatively few involve dumpster diving or burglary. Although personal identity theft has made headlines, businesses can be victims of identity theft - they can also be unwitting accomplices. However, identity...

More on this topic

Customers who read this summary also read

The Laws of Disruption
The Laws of Disruption
8
Where Is Cybercrime Really Coming From?
Where Is Cybercrime Really Coming From?
8
The Wretched, Endless Cycle of Bitcoin Hacks
The Wretched, Endless Cycle of Bitcoin Hacks
7
Inside the Hunt for Russia’s Most Notorious Hacker
Inside the Hunt for Russia’s Most Notorious Hacker
8
Walmart's Out-of-Control Crime Problem Is Driving Police Crazy
Walmart's Out-of-Control Crime Problem Is Driving Police Crazy
7
Virtual Billions
Virtual Billions
8

Related Channels

Comment on this summary