Rebecca Herold

According to our database1, Rebecca Herold authored at least 12 papers between 1995 and 2011.

Collaborative distances:
  • no known Dijkstra number2.
  • no known Erdős number3.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Privacy Governance: Effective Methods.
Proceedings of the Encyclopedia of Information Assurance, 2011

Privacy Breaches: Policies, Procedures, and Notification.
Proceedings of the Encyclopedia of Information Assurance, 2011

Information Protection.
Proceedings of the Encyclopedia of Information Assurance, 2011

Incident Response: Privacy Breaches.
Proceedings of the Encyclopedia of Information Assurance, 2011

Fraud: Employee Identification.
Proceedings of the Encyclopedia of Information Assurance, 2011

Awareness and Training: Effective Methods.
Proceedings of the Encyclopedia of Information Assurance, 2011

2007
Privacy Breach Incident Response.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Training Your Employees to Identify Potential Fraud and How to Encourage Them to Come Forward.
Proceedings of the Information security management handbook, Sixth Edition., 2007

Building an Effective Privacy Program.
Proceedings of the Information security management handbook, Sixth Edition., 2007

2006
Building an Effective Privacy Program.
Inf. Secur. J. A Glob. Perspect., 2006

Addressing Privacy Issues During Disaster Recovery.
Inf. Secur. J. A Glob. Perspect., 2006

1995
A Corporate Anti-Virus Strategy.
Int. J. Netw. Manag., 1995


  Loading...