Search

Boss, i think someone stole our customer data : HBR case study

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000nab a2200000 i 4500</leader>
    <controlfield tag="001">MAP20071509016</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20080418130202.0</controlfield>
    <controlfield tag="007">hzruuu---uuuu</controlfield>
    <controlfield tag="008">071126e20070901esp||||    | |00010|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">922.112.1</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20080077716</subfield>
      <subfield code="a">McNulty, Eric</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Boss, i think someone stole our customer data</subfield>
      <subfield code="b">: HBR case study</subfield>
      <subfield code="c">Eric McNulty</subfield>
    </datafield>
    <datafield tag="520" ind1="8" ind2=" ">
      <subfield code="a">Flayton Electronics learns that the security of its customer data has been compromised and faces tough decisions about what to do next</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080588434</subfield>
      <subfield code="a">Toma de decisiones</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080551513</subfield>
      <subfield code="a">Liderazgo</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080580698</subfield>
      <subfield code="a">Gestión de crisis</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080592875</subfield>
      <subfield code="a">Protección de datos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080607067</subfield>
      <subfield code="a">Management estratégico</subfield>
    </datafield>
    <datafield tag="650" ind1="1" ind2="1">
      <subfield code="0">MAPA20080571566</subfield>
      <subfield code="a">Casos prácticos</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077100345</subfield>
      <subfield code="d">Boston</subfield>
      <subfield code="g">Vol. 85, nº 10 September 2007 ; p. 37-50</subfield>
      <subfield code="t">Harvard Business Review</subfield>
    </datafield>
  </record>
</collection>