LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Save up to 30% on Elsevier print and eBooks with free shipping. No promo code needed.
Save up to 30% on print and eBooks.
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
List of figures and tables
List of abbreviations
Acknowledgements
Preface
About the author
Introduction
Chapter 1: Web 2.0 and social media
Abstract:
Background
Web 2.0
The future of the web
The future of social media
Chapter 2: Non-frivolous uses of social media in the public sector
Abstract:
The potential of Web 2.0
The potential of social media
The potential of wikis
Example Web 2.0 applications
Teaching and learning
The use of social media in emergencies
Sentiment analysis: finding out opinions
Uses of Twitter in public service departments
Discovering applications
Chapter 3: Security threats to social media technologies
Abstract:
Security
Threats to information systems in the public sector
The impacts of social media malpractice
Specific threats: examples and applications
Chapter 4: Security controls applied to the participation-collaboration pattern
Abstract:
Types of security control
Management security controls
Technical controls
Operational security controls
Governance
Deciding what security controls are appropriate
Who is involved in security?
Chapter 5: Acceptable use practices
Abstract:
Reasons for acceptable use policies
The content of acceptable use policies
Acceptable use policies for citizens
Acceptable use policies for public service employees
Advice for K-12 schools
Chapter 6: Participation and collaboration in K-12 schools
Abstract:
Introduction
Threats to participation–collaboration in K-12 schools
Security controls for online media in schools
Parental participation–collaboration in K-12 schools
Past research and possible research
Chapter 7: Mitigating the risks of identity theft and malware
Abstract:
Introduction
Social media sites
Unsolicited messages, files, and hyperlinks sent by email
Other threats: thumb drives
Chapter 8: Conclusion
Abstract:
References
Further reading
Appendix 1: SharePoint
Appendix 2: Twitter application programming interfaces
Appendix 3: Examples of general threats and a control
Appendix 4: Examples of rogue unsolicited email messages
Appendix 5: Key terms in secure computing
Appendix 6: Acceptable use policies for citizens
Appendix 7: Acceptable use policies for public service employees
Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools
Index
AO