Information theft prevention: theory and practice
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York ; London
Routledge, Taylor and Francis Group
2016
|
Schriftenreihe: | Routledge studies in innovation, organization and technology
41 |
Schlagworte: | |
Beschreibung: | Online resource; title from PDF title page (EBSCO, viewed February 18, 2016) |
Beschreibung: | 1 online resource (xiii, 161 pages) |
ISBN: | 9781317553700 1317553705 1317553713 9781317553717 9781315732015 1315732017 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV044360459 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170620s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781317553700 |9 978-1-317-55370-0 | ||
020 | |a 1317553705 |9 1-317-55370-5 | ||
020 | |a 1317553713 |9 1-317-55371-3 | ||
020 | |a 9781317553717 |9 978-1-317-55371-7 | ||
020 | |a 9781315732015 |9 978-1-315-73201-5 | ||
020 | |a 1315732017 |9 1-315-73201-7 | ||
035 | |a (ZDB-4-NLEBK)ocn937719310 | ||
035 | |a (OCoLC)937719310 | ||
035 | |a (DE-599)BVBBV044360459 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4/78 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Information theft prevention |b theory and practice |c by Romanus Izuchukwu Okeke and Mahmood Hussain Shah |
264 | 1 | |a New York ; London |b Routledge, Taylor and Francis Group |c 2016 | |
300 | |a 1 online resource (xiii, 161 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Routledge studies in innovation, organization and technology |v 41 | |
500 | |a Online resource; title from PDF title page (EBSCO, viewed February 18, 2016) | ||
505 | 8 | |a 1. Understanding internal information theft : a case of retail business -- 2. Know the nature of internal information theft -- 3. Understand retail operation : towards internal information theft prevention -- 4. Internal information theft prevention frameworks and their implications -- 5. Challenges in preventing internal information theft -- 6. Collaborative internal information theft prevention : towards innovative security -- 7. Application of collaborative management in information theft prevention -- 8. Application of criminological theories to internal information theft prevention -- 9. Recommended practices for internal information theft prevention -- 10. Summary of the guide | |
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Data protection |a Computer security |a Management information systems |x Security measures |a Computer networks |x Security measures | |
700 | 1 | |a Okeke, Romanus Izuchukwu |4 edt | |
700 | 1 | |a Shah, Mahmood |d 1971- |4 edt | |
776 | 0 | 8 | |i Printed edition |z 9781138841673 |
912 | |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029763090 |
Datensatz im Suchindex
_version_ | 1804177607892140032 |
---|---|
any_adam_object | |
author2 | Okeke, Romanus Izuchukwu Shah, Mahmood 1971- |
author2_role | edt edt |
author2_variant | r i o ri rio m s ms |
author_facet | Okeke, Romanus Izuchukwu Shah, Mahmood 1971- |
building | Verbundindex |
bvnumber | BV044360459 |
classification_rvk | ST 277 |
collection | ZDB-4-NLEBK |
contents | 1. Understanding internal information theft : a case of retail business -- 2. Know the nature of internal information theft -- 3. Understand retail operation : towards internal information theft prevention -- 4. Internal information theft prevention frameworks and their implications -- 5. Challenges in preventing internal information theft -- 6. Collaborative internal information theft prevention : towards innovative security -- 7. Application of collaborative management in information theft prevention -- 8. Application of criminological theories to internal information theft prevention -- 9. Recommended practices for internal information theft prevention -- 10. Summary of the guide |
ctrlnum | (ZDB-4-NLEBK)ocn937719310 (OCoLC)937719310 (DE-599)BVBBV044360459 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02564nmm a2200481zcb4500</leader><controlfield tag="001">BV044360459</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170620s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781317553700</subfield><subfield code="9">978-1-317-55370-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1317553705</subfield><subfield code="9">1-317-55370-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1317553713</subfield><subfield code="9">1-317-55371-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781317553717</subfield><subfield code="9">978-1-317-55371-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315732015</subfield><subfield code="9">978-1-315-73201-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1315732017</subfield><subfield code="9">1-315-73201-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-NLEBK)ocn937719310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)937719310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044360459</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information theft prevention</subfield><subfield code="b">theory and practice</subfield><subfield code="c">by Romanus Izuchukwu Okeke and Mahmood Hussain Shah</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York ; London</subfield><subfield code="b">Routledge, Taylor and Francis Group</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 161 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Routledge studies in innovation, organization and technology</subfield><subfield code="v">41</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed February 18, 2016)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Understanding internal information theft : a case of retail business -- 2. Know the nature of internal information theft -- 3. Understand retail operation : towards internal information theft prevention -- 4. Internal information theft prevention frameworks and their implications -- 5. Challenges in preventing internal information theft -- 6. Collaborative internal information theft prevention : towards innovative security -- 7. Application of collaborative management in information theft prevention -- 8. Application of criminological theories to internal information theft prevention -- 9. Recommended practices for internal information theft prevention -- 10. Summary of the guide</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="a">Computer security</subfield><subfield code="a">Management information systems</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Okeke, Romanus Izuchukwu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shah, Mahmood</subfield><subfield code="d">1971-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Printed edition</subfield><subfield code="z">9781138841673</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029763090</subfield></datafield></record></collection> |
id | DE-604.BV044360459 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:50:46Z |
institution | BVB |
isbn | 9781317553700 1317553705 1317553713 9781317553717 9781315732015 1315732017 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029763090 |
oclc_num | 937719310 |
open_access_boolean | |
physical | 1 online resource (xiii, 161 pages) |
psigel | ZDB-4-NLEBK |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Routledge, Taylor and Francis Group |
record_format | marc |
series2 | Routledge studies in innovation, organization and technology |
spelling | Information theft prevention theory and practice by Romanus Izuchukwu Okeke and Mahmood Hussain Shah New York ; London Routledge, Taylor and Francis Group 2016 1 online resource (xiii, 161 pages) txt rdacontent c rdamedia cr rdacarrier Routledge studies in innovation, organization and technology 41 Online resource; title from PDF title page (EBSCO, viewed February 18, 2016) 1. Understanding internal information theft : a case of retail business -- 2. Know the nature of internal information theft -- 3. Understand retail operation : towards internal information theft prevention -- 4. Internal information theft prevention frameworks and their implications -- 5. Challenges in preventing internal information theft -- 6. Collaborative internal information theft prevention : towards innovative security -- 7. Application of collaborative management in information theft prevention -- 8. Application of criminological theories to internal information theft prevention -- 9. Recommended practices for internal information theft prevention -- 10. Summary of the guide BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Wirtschaft Data protection Computer security Management information systems Security measures Computer networks Security measures Okeke, Romanus Izuchukwu edt Shah, Mahmood 1971- edt Printed edition 9781138841673 |
spellingShingle | Information theft prevention theory and practice 1. Understanding internal information theft : a case of retail business -- 2. Know the nature of internal information theft -- 3. Understand retail operation : towards internal information theft prevention -- 4. Internal information theft prevention frameworks and their implications -- 5. Challenges in preventing internal information theft -- 6. Collaborative internal information theft prevention : towards innovative security -- 7. Application of collaborative management in information theft prevention -- 8. Application of criminological theories to internal information theft prevention -- 9. Recommended practices for internal information theft prevention -- 10. Summary of the guide BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Wirtschaft Data protection Computer security Management information systems Security measures Computer networks Security measures |
title | Information theft prevention theory and practice |
title_auth | Information theft prevention theory and practice |
title_exact_search | Information theft prevention theory and practice |
title_full | Information theft prevention theory and practice by Romanus Izuchukwu Okeke and Mahmood Hussain Shah |
title_fullStr | Information theft prevention theory and practice by Romanus Izuchukwu Okeke and Mahmood Hussain Shah |
title_full_unstemmed | Information theft prevention theory and practice by Romanus Izuchukwu Okeke and Mahmood Hussain Shah |
title_short | Information theft prevention |
title_sort | information theft prevention theory and practice |
title_sub | theory and practice |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Wirtschaft Data protection Computer security Management information systems Security measures Computer networks Security measures |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Wirtschaft Data protection Computer security Management information systems Security measures Computer networks Security measures |
work_keys_str_mv | AT okekeromanusizuchukwu informationtheftpreventiontheoryandpractice AT shahmahmood informationtheftpreventiontheoryandpractice |