|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1022875841 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180212s2016 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d UMI
|d NLE
|d STF
|d TOH
|d COO
|d OCLCA
|d OCLCF
|d UOK
|d CEF
|d KSU
|d OCLCQ
|d DEBBG
|d WYU
|d G3B
|d S9I
|d C6I
|d UAB
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 945766876
|
020 |
|
|
|a 9781317553700
|
020 |
|
|
|a 1317553705
|
020 |
|
|
|a 9781317553717
|
020 |
|
|
|a 1317553713
|
020 |
|
|
|a 9781317553694
|
020 |
|
|
|a 1317553691
|
020 |
|
|
|a 1138841676
|
020 |
|
|
|a 9781138841673
|
020 |
|
|
|z 9781138841673
|
029 |
1 |
|
|a GBVCP
|b 1014935164
|
035 |
|
|
|a (OCoLC)1022875841
|z (OCoLC)945766876
|
037 |
|
|
|a CL0500000938
|b Safari Books Online
|
050 |
|
4 |
|a HF5548.37
|
082 |
0 |
4 |
|a 658.478
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Okeke, Romanus Izuchukwu,
|e author.
|
245 |
1 |
0 |
|a Information theft prevention :
|b theory and practice /
|c Romanus Izuchukwu Okeke and Mahmood Hussain Shah.
|
264 |
|
1 |
|a New York :
|b Routledge,
|c 2016.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Routledge studies in innovation, organization and technology ;
|v 41
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Understanding internal information theft : a case of retail business -- Know the nature of internal information theft -- Understand retail operation : towards internal information theft prevention -- Internal information theft prevention frameworks and their implications -- Challenges in preventing internal information theft -- Collaborative internal information theft prevention : towards innovative security -- Application of collaborative management in information theft prevention -- Application of criminological theories to internal information theft prevention -- Recommended practices for internal information theft prevention.
|
520 |
8 |
|
|a As retail businesses migrate to the digital realm, internal information theft incidents continue to threaten on-line and off-line retail operations. The evolving propagation of internal information theft has surpassed the traditional techniques of crime prevention practices. Many business organizations search for internal information theft prevention guides that fit into their retail business operation, only to be inundated with generic and theoretical models. This book examines applicable methods for retail businesses to effectively prevent internal information theft. Information Theft Preventionoffers readers a comprehensive understanding of the current status of the retail sector information theft prevention models in relation to the internationally recognized benchmark of information security. It presents simple and effective management processes for ensuring better information system security, fostering a proactive approach to internal information theft prevention. Furthermore, it builds on well-defined retail business cases to identify applicable solutions for businesses today. Integrating the retail business operations and information system security practices, the book identifies ways to coordinate efforts across a business in order to achieve the best results. IT security managers and professionals, financial frauds consultants, cyber security professionals and crime prevention professionals will find this book a valuable resource for identifying and creating tools to prevent internal information theft.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Management information systems
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Systèmes d'information de gestion
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
700 |
1 |
|
|a Shah, Mahmood,
|d 1971-
|e author.
|
776 |
0 |
8 |
|i Print version:
|t Information theft prevention.
|d New York : Routledge, Taylor & Francis Group, 2016
|z 9781138841673
|w (DLC) 2015039741
|w (OCoLC)933765313
|
830 |
|
0 |
|a Routledge studies in innovation, organization and technology ;
|v 41.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781317553700/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|