Risky Business: How to Protect Yourself from Being Stalked, Conned, Libeled, or Blackmailed on the Web

Overview

In Risky Business, Daniel Janal, an online marketing and seasoned technology expert, takes a look at the numerous threats that can wreak havoc on corporations who promote themselves online. Posting cautionary warnings about external risks, Janal provides practical guidelines for setting standards for internal employee use, and - perhaps, most importantly - offers foolproof remedies and preventive techniques for effectively combatting cybercrime. Drawing an the advice of lawyers, law enforcement officials, ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (9) from $1.99   
  • New (2) from $45.00   
  • Used (7) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$45.00
Seller since 2014

Feedback rating:

(146)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$56.61
Seller since 2014

Feedback rating:

(259)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

In Risky Business, Daniel Janal, an online marketing and seasoned technology expert, takes a look at the numerous threats that can wreak havoc on corporations who promote themselves online. Posting cautionary warnings about external risks, Janal provides practical guidelines for setting standards for internal employee use, and - perhaps, most importantly - offers foolproof remedies and preventive techniques for effectively combatting cybercrime. Drawing an the advice of lawyers, law enforcement officials, government agencies, and investor relations professionals, it also reveals how you can protect yourself and your business. Risky Business gives you the bottom-line information you need to guard against web site risks - plagiarism, libel, copyright, and domain infringement; internal threats to company security - competitive spying, cyberindustrial espionage, employee abuse of Internet privileges; external attacks - stock manipulations from online investors, misinformation funneled through chat rooms, attach Web sites; and dangers to your financial well-being - online fraud, security violations, technical abuses that can affect individuals and organizations.
Read More Show Less

Editorial Reviews

From Barnes & Noble
Just when you were getting comfortable using your credit card for cyber-shopping, Dan Janal comes along to uncover some of the lesser-known risks with conducting business online, and offer some well-researched solutions. Learn how to protect your domain name and identity online, beef up server security, protect against copyright infringement, and more.
Booknews
Offers techniques for recognizing and combatting a wide variety of cybercrime and other threats to businesses on the Internet, including fraud, stock manipulation, impersonation and theft of identity, network sabotage, unauthorized access, proprietary theft, domain infringement of Web sites, attack sites, and employee abuse of Internet privileges. The information presented is based on interviews with lawyers, law enforcement officials, government agencies, and investor relations professionals. Annotation c. by Book News, Inc., Portland, Or.
Read More Show Less

Product Details

  • ISBN-13: 9780471197065
  • Publisher: Wiley, John & Sons, Incorporated
  • Publication date: 3/10/1998
  • Series: Upside Series , #3
  • Edition number: 1
  • Pages: 336
  • Product dimensions: 6.26 (w) x 9.29 (h) x 1.18 (d)

Read an Excerpt


Chapter One

Cyberspace can be a scary place:

    be dangerous for businesses, organizations, nonprofit groups, educational institutions, and associations:

    everywhere in the real world. These threats carry over to the Internet as well. Some con games are age-old: The only thing new is that they are online instead of on the phone or in the shopping mall. Other scams are new and stretch the envelope of the Internet's technology as well as our current laws and regulations.

[] THE COST OF INTERNET CRIME

Exact figures on the cost of Internet-related crimes are hard to come by. No one has conducted surveys of the costs of crime in cyberspace. In fact, some security experts who consult with financial institutions say their clients would rather eat their losses than have the world find out that their systems are less than 100 percent secure. So we may never know how many bad credit cards are passed online or how much money has been withdrawn from online banks fraudulently.

    in nearly 100 federal district court cases brought by the agency between October 1995 and December 1996, fraudulent sales in these actions cost consumers more than $250 million a year and more than $700 million over the life of the schemes.

    association of information security professionals, reported in March 1997 that computer crime reached $100 million in 1996. A total of 563 major U.S. corporations, government agencies, financial institutions, and universities responded to the survey. While the study was not limited to the Internet, it offers interesting statistics that show how organizations are being attacked, from inside and outside, through computer security systems or through negligence and misuse of company resources.

    breaches ranging from financial fraud, theft of proprietary information and sabotage, to computer viruses and laptop theft. Those reporting financial losses cited the following causes:

    found 31 percent of the companies found employee abuse of Internet privileges (e.g., downloading pornography or inappropriately using electronic mail) cost companies about $1 million.

    have been lured into dangerous liaisons with molesters. But you can hardly pick up a newspaper without reading about some child's terrifying experience, or about a clever police sting operation that nabs a deviate before he can do more damage.

    cyberspace is as scary a place as the real world. But the Internet allows thieves to commit crimes faster and more efficiently than in the real world. Because of the increased pace of communication, the ease of distributing information vast distances, the effortlessness of sending thousands of pieces of e-mail, the appeal of starting a conversation with a stranger in a chat room, and the anonymity of all transactions, the Internet attracts some unsavory users.

[] PROTECTING YOUR BUSINESS

Organizations and individuals need to be aware of a whole new Pandora's box of issues ranging from legal to moral on the Internet. Even swindlers are inventing new ways to take advantage of honest, hard-working people.

    criminal, there is the stronger (and smarter) arm of the law. In this book, you will learn about the many potential threats to people and organizations through exposure on the Internet. Then you will find out how to protect yourself by drawing on the advice of lawyers, law enforcement officials, government agencies, nonprofit groups, and public relations and investor relations professionals.

    motivate, or alarm, you to take action to protect yourself and your organization. Although the threats are real, there are ways to reduce your chances of being targeted by fraud as well as ways to protect yourself if someone makes the attempt.

    the problems that exist on the Internet and know how to defend yourself and your company against such attacks. But don't stop there. Family members, to protect themselves, should read this book as well. Organizations also should make this book required reading for employees to prevent silly mistakes that could harm an employee and the company, or expose the company to lawsuits.

[] THE SMALL PRINT

Every situation is different. Your individual situation may require a precise answer that cannot be provided in a generic book. You might need to talk to a lawyer or police officer to find the solution that best deals with your circumstances. All information in this book is offered at face value and as a generic approach for many situations. For that reason, contact information (phone number, e-mail address, and Web addresses) for lawyers, law enforcement officials, and government agencies are listed wherever possible and practical.

[] THE NEXT STEP

Your journey to self-empowerment on the Internet begins now. As you read the situations and advice in the book, think about how these examples fit you or your organization. Make notes on the points you need to address with your family, management committee, information services department, lawyer, or communications staff to provide the level of security--and peace of mind--you need to use the Internet to your full advantage.

Read More Show Less

Table of Contents

Foreword
Preface
Author Biography
Ch. 1 Cyberspace Is a Scary Place 3
Ch. 2 Cyberstalking 8
Ch. 3 Identity Theft 22
Ch. 4 Impersonation 31
Ch. 5 Cyberspace Shell Games: Fighting Fraud Online 45
Ch. 6 Website and Computer System Security 72
Ch. 7 Internet Access Policies: How to Fight Employee Theft of Services and Protect against Lawsuits 91
Ch. 8 Virtual Nemeses: E-Mail and Spam 144
Ch. 9 Protecting Your Business' Intellectual Property 162
Ch. 10 Competitive Intelligence 191
Ch. 11 Protecting Your Online Alter Ego: Domain Names 199
Ch. 12 Attack Sites, Rogue Sites, and Spoof Sites: The New Language of Crisis Communications 227
Ch. 13 Market Bull: On line Stock Manipulation 276
Ch. 14 Crisis Communications: The New Online Crisis Communications Plan 296
Afterword 317
Index 323
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)