|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Romanus Okeke (University of Central Lancashire, UK) , Mahmood Shah (Coventry University, UK)Publisher: Taylor & Francis Ltd Imprint: Routledge Weight: 0.249kg ISBN: 9781138617193ISBN 10: 1138617199 Pages: 178 Publication Date: 08 June 2018 Audience: College/higher education , Tertiary & Higher Education , Undergraduate Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1. Understanding Internal Information Theft: A Case of Retail Business 2. Know the Nature of Internal Information Theft 3. Understand Retail Operation: Towards Internal Information Theft Prevention 4. Internal Information Theft Prevention Frameworks and their Implications 5. Challenges in Preventing Internal Information Theft 6. Collaborative Internal Information Theft Prevention: Towards Innovative Security 7. Application of Collaborative Management in Information Theft Prevention 8. Application of Criminological Theories to Internal Information Theft Prevention 9. Recommended Practices for Internal Information Theft Prevention 10. Summary of the GuideReviewsPraise for the first edition: `Okeke and Shah (both, Univ. of Central Lancashire, UK) focus on prevention and detection of theft in the retail economic sector that in some way leverages information systems; however, much of the book is relevant to any arena in which financial transactions or other valuable information is managed and exchanged. Despite the reluctance of institutions to release information about breaches of their security, the authors summarize many empirical studies to characterize the variety of ways and means by which either employees or outsiders have circumvented security measures to steal money or information from all types of commercial enterprises. Other sections review researchers' understanding of characteristics of thieves and organizational weaknesses that enable theft or hinder detection. Many short case studies are included to illustrate the general points of the text; every section is heavily documented. It is a bit dispiriting to reckon with the extent of thefts, especially by employees entrusted with responsibility, and recommended oversight and detection methods may seem to some to further an atmosphere of distrust or antagonism. Yet, if there is an overriding theme in the detailed suggestions for combating theft, it is the need for careful coordination and collaboration among the many operating components of any enterprise.'-- D. Bantz, University of Alaska Author InformationRomanus Okeke is a Research Fellow working as part of Security and Information Systems Groups (SIGS) at the School of Business, University of Central Lancashire in Preston, UK. Mahmood Shah is leading the Security and Information Systems Group (SIGS) at the School of Business, University of Central Lancashire, UK. Tab Content 6Author Website:Countries AvailableAll regions |