Managing Online Risk - 1st Edition - ISBN: 9780124200555, 9780124200609

Managing Online Risk

1st Edition

Apps, Mobile, and Social Media Security

Authors: Deborah Gonzalez
eBook ISBN: 9780124200609
Paperback ISBN: 9780124200555
Imprint: Butterworth-Heinemann
Published Date: 29th September 2014
Page Count: 286
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
31.95
22.36
22.36
22.36
22.36
22.36
25.56
25.56
24.99
17.49
17.49
17.49
17.49
17.49
19.99
19.99
39.95
27.96
27.96
27.96
27.96
27.96
31.96
31.96
Unavailable
Price includes VAT (GST)
DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses.

Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.

Key Features

  • Explores the risks associated with online and digital activity and covers the latest technologies, such as social media and mobile devices
  • Includes interviews with risk management experts and company executives, case studies, checklists, and policy samples
  • A website with related content and updates (including video) is also available

Readership

C-suite executives (CEO, CIO, COO, and CFO) in businesses of all sizes; risk managers, security managers, IT security managers, and business attorneys; faculty and students in business, IT, and risk management courses.

Table of Contents

  • About the Author
  • Online Resources
  • Introduction
  • Chapter 1. Risk Management Digital Style
    • Risk management models
    • Best practices for incident response
    • BONUS: ten IT security myths
    • Security/risk management apps
  • Chapter 2. Internal and External Risks
    • Internal risks
    • Internal risk 1: security perception, priority, and budget
    • Internal risk 2: traditional and shadow IT
    • Internal risk 3: mobile
    • Internal risk 4: people
    • External risks
    • External risk 1: technology advances
    • External risk 2: cloud storage
    • External risk 3: hacking
    • External risk 4: regulation
    • External risk 5: natural disasters and squirrels
  • Chapter 3. Reputation and Identity
    • Reputation
    • Reputational risks
    • Defining identity
    • Digital identity
    • Legal identity
    • Executive identity
    • Corporate identity: The BRAND
    • Value and worth of identity
    • Identity versus reputation
    • Protecting identity
    • Protecting reputation
  • Chapter 4. The New Workforce
    • Employment cycle
    • Who is the workforce?
    • Millennials
    • Recruitment
    • Hiring
    • Employment
    • Termination
    • Other
  • Chapter 5. Big Data
    • Data cycle
    • Data management plans
    • Data classification
    • Data access
    • Data analytics
    • Protecting data: backup
    • Losing data
    • Data recovery
    • Privacy: to use or not to use data dilemma
    • Protecting against liability for data/privacy loss
    • Data surveillance
    • Dictatorship of data
  • Chapter 6. Approaches to content
    • Content marketing versus content management
    • Different audiences, different content
    • Myths of content marketing and content management
    • Benefits of the content approach
    • Intellectual property rights, risks, and content
    • IP cycle
    • Copyrights
    • Digital Millennium Copyright Act
    • Fair use doctrine
    • International IP concerns
    • Creative Commons license
    • A couple of digital concerns for copyrights
    • Trademarks
    • Trademark and gripe sites
    • Trademark and reputational risks
    • Trade secrets
    • Patents
    • Technology development
    • IP other risks
    • IP valuation
    • IP legislation
  • Chapter 7. Compliance
    • Who needs to be compliant?
    • General compliance: disclosures
    • General compliance: disclaimers
    • General compliance: human resources
    • Financial Institutions
    • Health Care and Medical Institutions
    • Higher education (FERPA)
    • Professional Trade Oversight and Organizations: Mobile
    • Other Federal Agencies
    • Federal legislation
    • State legislation
    • Compliance oversight
    • Compliance training
  • Chapter 8. Currency and Campaigns
    • Online banking
    • E-payments convert to M-payments
    • Virtual currency
    • Digital currency
    • Bitcoin
    • Beyond bitcoins
    • Crowdfunding
    • Online microfinancing
    • Online charitable donations and fundraising
    • Future of money
    • Digital political campaigns
    • Digital advocacy
    • Digital lobbying
    • Risk and security of online politics
  • Chapter 9. Digital Succession
    • Succession planning
    • Information technology security shortage
    • The next generation of InfoSec Pro
    • Women in Infosec
    • Cybersecurity simulations
    • Digital legacy
    • Digital assets
    • Digital afterlife
    • Digital expiration
    • Digital immortality
  • Chapter 10. The Future of Online Security
    • The future: unpredictable
    • The future: four scenarios
    • Monitored Man
    • Bicentennial man revisited
    • Credential verification
    • Big Data
  • Index

Details

No. of pages:
286
Language:
English
Copyright:
© Butterworth-Heinemann 2015
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9780124200609
Paperback ISBN:
9780124200555

About the Author

Deborah Gonzalez

Deborah Gonzalez, Esq. is the founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.

Deborah graduated from New York Law School and is licensed to practice law in New York and Georgia.

Deborah began her career in the corporate arena working in various positions in the information technology area - from network administrator to manager of the IS department for a top-6 CPA firm in New York City. During her tenure she managed day-to-day IT operations; designed and implemented IT-related training for employees, managers, and IT staff; developed policies and protocols for IT-corporate use; and monitored emerging trends for IT business strategies and management. Deborah used this foundation as a starting point with her legal practice, which is now transporting her beyond the Internet to the social space where the physical and digital dimensions of her clients co-exist and where she can leverage her legal expertise to their benefit.

Deborah enjoys engaging with those around her - so social media is a natural fit. But it is her skill in being able to connect the dots to understand the next big paradigm shift in global communication and legal application that makes her a leader in social media and online law. Deborah serves as Chair of the GA Bar Association’s Annual Program on Social Media and the Law and serves as a social media legal liaison for social media marketing companies and their clients.

In addition, Deborah speaks on legal issues relating to intellectual property, social media and online legal trends and practices, and online risk management in various venues throughout the United States and abroad.

Follow her on Twitter: @DGOnlineSec and @Law2sm, or visit www.managingonlinerisk.com or www.law2sm.com.

Affiliations and Expertise

Attorney and founder of Law2sm, LLC, a legal consulting firm focusing on helping its clients navigate the legal issues relating to the new digital and social media world.

Reviews

"Those looking for a high-level introductory approach to the topic, yet with significant tactical and practical advice, will find that Managing Online Risk is a good resource." --Security Management