Ppt (group 6)

264 views

Published on

Published in: Education, Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
264
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ppt (group 6)

  1. 1. Asian American (AA) Market Inc.
  2. 2. Where did it come from? Founder – Yuseta A. Caiton Founded in 2000 Located in LA, California “Organic only” policy Asian and American products Store Motto: “Live Fresh, eat fresh”
  3. 3. Stealing another persons identity in whichsomeone pretends to be someone else in order toobtain credit and other benefits in that personsname.
  4. 4. Types of Identity theft Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using anothers identity to obtain credit, goods and services) Identity cloning (using anothers information to assume his or her identity in daily life) Medical identity theft (using anothers identity to obtain medical care or drugs) Child identity theft (using a child’s identity to commit any of the above actions)
  5. 5. Budget Breakdown for 2005 Identity Theft Customer Theft Employee Theft Store Expenses
  6. 6. Budget Breakdown for 2010 Identity Theft Customer Theft Employee Theft Store Expenses
  7. 7. SkimmingThe theft of creditcard information thatis used in anotherwise legitimatetransaction.
  8. 8. How is it done? It is typically an "inside job" by a dishonest employee. Usually committed by photocopying receipts or using a small electronic device (skimmer) to steal hundreds of credit card numbers.
  9. 9. What does a Skimmer look like?
  10. 10. Countermeasures• The only way to control the problem withelectronic skimming is to ensure the securityof the terminals by manually inspectingthem.• Severe penalties (fines) can be issued if themachines are compromised.
  11. 11. Other defenses against identitytheft Pan Truncation not displaying the full number on receipts
  12. 12. Tokenization (Data Security)  not storing the full Credit Card number in computer systems
  13. 13. Requesting additional information
  14. 14. Theft of money Money is one of the most common assets that are stolen from Employers
  15. 15. Theft of time Employee is paid for time which they did not work Employee who are not working while on the job
  16. 16. Theft of supplies Theft of supplies is another prevalent form of employee theft. Common examples of this form of theft are office supplies and restaurant supplies
  17. 17. Why Careful selection is important Performance Costs
  18. 18. Types of Customer Theft Customers using their children Steaming (a technique where a large gang enters a store to steal large quantities of goods before leaving) Customers using bags, purses, and coats
  19. 19. First Solution Hire a security team Members of the security team:head of security, surveillance system monitor,two doors guards, and secret shoppers All security members are required to have certain skills
  20. 20. Second Solution Electronic Article Surveillance System An EAS system is a technology used to recognize stolen merchandise as it passes through a gated area in a store.
  21. 21. Third Solution Lock up expensive merchandise Merchandise that exceeds a certain limit of value then we will keep the items locked in a clear case that only an employee can unlock.
  22. 22. Final Solution A Surveillance System 16 camera system
  23. 23. Conclusion Estimated cost of new security measures: $120,000 per store Estimated 50% decrease in store theft within one year

×