Your SlideShare is downloading. ×
Ppt (group 6)
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Ppt (group 6)


Published on

Published in: Education, Business, Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Asian American (AA) Market Inc.
  • 2. Where did it come from? Founder – Yuseta A. Caiton Founded in 2000 Located in LA, California “Organic only” policy Asian and American products Store Motto: “Live Fresh, eat fresh”
  • 3. Stealing another persons identity in whichsomeone pretends to be someone else in order toobtain credit and other benefits in that personsname.
  • 4. Types of Identity theft Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using anothers identity to obtain credit, goods and services) Identity cloning (using anothers information to assume his or her identity in daily life) Medical identity theft (using anothers identity to obtain medical care or drugs) Child identity theft (using a child’s identity to commit any of the above actions)
  • 5. Budget Breakdown for 2005 Identity Theft Customer Theft Employee Theft Store Expenses
  • 6. Budget Breakdown for 2010 Identity Theft Customer Theft Employee Theft Store Expenses
  • 7. SkimmingThe theft of creditcard information thatis used in anotherwise legitimatetransaction.
  • 8. How is it done? It is typically an "inside job" by a dishonest employee. Usually committed by photocopying receipts or using a small electronic device (skimmer) to steal hundreds of credit card numbers.
  • 9. What does a Skimmer look like?
  • 10. Countermeasures• The only way to control the problem withelectronic skimming is to ensure the securityof the terminals by manually inspectingthem.• Severe penalties (fines) can be issued if themachines are compromised.
  • 11. Other defenses against identitytheft Pan Truncation not displaying the full number on receipts
  • 12. Tokenization (Data Security)  not storing the full Credit Card number in computer systems
  • 13. Requesting additional information
  • 14. Theft of money Money is one of the most common assets that are stolen from Employers
  • 15. Theft of time Employee is paid for time which they did not work Employee who are not working while on the job
  • 16. Theft of supplies Theft of supplies is another prevalent form of employee theft. Common examples of this form of theft are office supplies and restaurant supplies
  • 17. Why Careful selection is important Performance Costs
  • 18. Types of Customer Theft Customers using their children Steaming (a technique where a large gang enters a store to steal large quantities of goods before leaving) Customers using bags, purses, and coats
  • 19. First Solution Hire a security team Members of the security team:head of security, surveillance system monitor,two doors guards, and secret shoppers All security members are required to have certain skills
  • 20. Second Solution Electronic Article Surveillance System An EAS system is a technology used to recognize stolen merchandise as it passes through a gated area in a store.
  • 21. Third Solution Lock up expensive merchandise Merchandise that exceeds a certain limit of value then we will keep the items locked in a clear case that only an employee can unlock.
  • 22. Final Solution A Surveillance System 16 camera system
  • 23. Conclusion Estimated cost of new security measures: $120,000 per store Estimated 50% decrease in store theft within one year