ppt (group 6)

25
Asian American (AA) Market Inc.

Upload: group6mc

Post on 02-Nov-2014

227 views

Category:

Education


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ppt (group 6)

Asian American (AA) Market Inc.

Page 2: Ppt (group 6)

Where did it come from?

Founder – Yuseta A. CaitonFounded in 2000Located in LA, California“Organic only” policyAsian and American productsStore Motto: “Live Fresh, eat fresh”

Page 3: Ppt (group 6)

Stealing another person's identity in which someone pretends to be someone else in order to obtain credit and other benefits in that person's name.

Page 4: Ppt (group 6)

Types of Identity theftCriminal identity theft (posing as another person when

apprehended for a crime)

Financial identity theft (using another's identity to obtain credit, goods and services)

Identity cloning (using another's information to assume his or her identity in daily life)

Medical identity theft (using another's identity to obtain medical care or drugs)

Child identity theft (using a child’s identity to commit any of the above actions)

Page 5: Ppt (group 6)

Budget Breakdown for 2005

Identity TheftCustomer TheftEmployee TheftStore Expenses

Page 6: Ppt (group 6)

Budget Breakdown for 2010

Identity TheftCustomer TheftEmployee TheftStore Expenses

Page 7: Ppt (group 6)

SkimmingThe theft of credit card information that is used in an otherwise legitimate transaction.

Page 8: Ppt (group 6)

How is it done? It is typically an "inside job" by a dishonest

employee.

Usually committed by photocopying receipts or using a small electronic device (skimmer) to steal hundreds of credit card numbers.

Page 9: Ppt (group 6)

What does a Skimmer look like?

Page 10: Ppt (group 6)

Countermeasures • The only way to control the problem with electronic skimming is to ensure the security of the terminals by manually inspecting them.

• Severe penalties (fines) can be issued if the machines are compromised.

Page 11: Ppt (group 6)

Other defenses against identity theft

Pan Truncation not displaying the full number on receipts

Page 12: Ppt (group 6)

Tokenization (Data Security)not storing the full Credit Card number in

computer systems

Page 13: Ppt (group 6)

Requesting additional information

Page 14: Ppt (group 6)

Employee Theft

Page 15: Ppt (group 6)

Theft of moneyMoney is one of the most common assets that are stolen from Employers

Page 16: Ppt (group 6)

Theft of timeEmployee is paid for time which they did not workEmployee who are not working while on the job

Page 17: Ppt (group 6)

Theft of suppliesTheft of supplies is another prevalent form of employee theft. Common examples of this form of theft are office supplies and restaurant supplies

Page 18: Ppt (group 6)

Why Careful selection is importantPerformanceCosts

Page 19: Ppt (group 6)

Customer Theft

Page 20: Ppt (group 6)

Types of Customer Theft

Customers using their children

Steaming (a technique where a large gang enters a store to steal large quantities of goods before leaving)

Customers using bags, purses, and coats

Page 21: Ppt (group 6)

First Solution

Hire a security team

Members of the security team: head of security, surveillance system monitor, two doors guards, and secret shoppers

All security members are required to have certain skills

Page 22: Ppt (group 6)

Second SolutionElectronic Article Surveillance System

An EAS system is a technology used to recognize stolen merchandise as it passes through a gated area in a store.

Page 23: Ppt (group 6)

Third Solution

Lock up expensive merchandise

Merchandise that exceeds a certain limit of value then we will keep the items locked in a clear case that only an employee can unlock.

Page 24: Ppt (group 6)

Final SolutionA Surveillance System

16 camera system

Page 25: Ppt (group 6)

ConclusionEstimated cost of new security measures:

$120,000 per store

Estimated 50% decrease in store theft within one year