Security Risks in Social Media Technologies - 1st Edition - ISBN: 9781843347149, 9781780633800

Security Risks in Social Media Technologies

1st Edition

Safe Practices in Public Service Applications

Authors: Alan Oxley
Paperback ISBN: 9781843347149
eBook ISBN: 9781780633800
Imprint: Chandos Publishing
Published Date: 31st July 2013
Page Count: 292
Tax/VAT will be calculated at check-out
80.00
61.95
49.50
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Table of Contents

List of figures and tables

List of abbreviations

Acknowledgements

Preface

About the author

Introduction

Chapter 1: Web 2.0 and social media

Abstract:

Background

Web 2.0

The future of the web

The future of social media

Chapter 2: Non-frivolous uses of social media in the public sector

Abstract:

The potential of Web 2.0

The potential of social media

The potential of wikis

Example Web 2.0 applications

Teaching and learning

The use of social media in emergencies

Sentiment analysis: finding out opinions

Uses of Twitter in public service departments

Discovering applications

Chapter 3: Security threats to social media technologies

Abstract:

Security

Threats to information systems in the public sector

The impacts of social media malpractice

Specific threats: examples and applications

Chapter 4: Security controls applied to the participation-collaboration pattern

Abstract:

Types of security control

Management security controls

Technical controls

Operational security controls

Governance

Deciding what security controls are appropriate

Who is involved in security?

Chapter 5: Acceptable use practices

Abstract:

Reasons for acceptable use policies

The content of acceptable use policies

Acceptable use policies for citizens

Acceptable use policies for public service employees

Advice for K-12 schools

Chapter 6: Participation and collaboration in K-12 schools

Abstract:

Introduction

Threats to participation–collaboration in K-12 schools

Security controls for online media in schools

Parental participation–collaboration in K-12 schools

Past research and possible research

Chapter 7: Mitigating the risks of identity theft and malware

Abstract:

Introduction

Social media sites

Unsolicited messages, files, and hyperlinks sent by email

Other threats: thumb drives

Chapter 8: Conclusion

Abstract:

References

Further reading

Appendix 1: SharePoint

Appendix 2: Twitter application programming interfaces

Appendix 3: Examples of general threats and a control

Appendix 4: Examples of rogue unsolicited email messages

Appendix 5: Key terms in secure computing

Appendix 6: Acceptable use policies for citizens

Appendix 7: Acceptable use policies for public service employees

Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools

Index


Description

List of figures and tables

List of abbreviations

Acknowledgements

Preface

About the author

Introduction

Chapter 1: Web 2.0 and social media

Abstract:

Background

Web 2.0

The future of the web

The future of social media

Chapter 2: Non-frivolous uses of social media in the public sector

Abstract:

The potential of Web 2.0

The potential of social media

The potential of wikis

Example Web 2.0 applications

Teaching and learning

The use of social media in emergencies

Sentiment analysis: finding out opinions

Uses of Twitter in public service departments

Discovering applications

Chapter 3: Security threats to social media technologies

Abstract:

Security

Threats to information systems in the public sector

The impacts of social media malpractice

Specific threats: examples and applications

Chapter 4: Security controls applied to the participation-collaboration pattern

Abstract:

Types of security control

Management security controls

Technical controls

Operational security controls

Governance

Deciding what security controls are appropriate

Who is involved in security?

Chapter 5: Acceptable use practices

Abstract:

Reasons for acceptable use policies

The content of acceptable use policies

Acceptable use policies for citizens

Acceptable use policies for public service employees

Advice for K-12 schools

Chapter 6: Participation and collaboration in K-12 schools

Abstract:

Introduction

Threats to participation–collaboration in K-12 schools

Security controls for online media in schools

Parental participation–collaboration in K-12 schools

Past research and possible research

Chapter 7: Mitigating the risks of identity theft and malware

Abstract:

Introduction

Social media sites

Unsolicited messages, files, and hyperlinks sent by email

Other threats: thumb drives

Chapter 8: Conclusion

Abstract:

References

Further reading

Appendix 1: SharePoint

Appendix 2: Twitter application programming interfaces

Appendix 3: Examples of general threats and a control

Appendix 4: Examples of rogue unsolicited email messages

Appendix 5: Key terms in secure computing

Appendix 6: Acceptable use policies for citizens

Appendix 7: Acceptable use policies for public service employees

Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools

Index

Key Features

  • Focuses on the security issues of social media, specifically in the public sector
  • Written by a leading researcher and practitioner
  • Shows best practices for mitigating risk in the use of social media

Readership

All those interested in social media technologies, especially in public service applications, including managers and IT staff


Details

No. of pages:
292
Language:
English
Copyright:
© Chandos Publishing 2013
Published:
Imprint:
Chandos Publishing
eBook ISBN:
9781780633800
Paperback ISBN:
9781843347149

About the Authors

Alan Oxley Author

Alan Oxley is Professor of Computer and Information Sciences at Universiti Teknologi PETRONAS in Malaysia. Alan is an all-rounder in Computer Science and has written numerous academic articles and chapters. Recently he was awarded a research stipend by the IBM Center for the Business of Government. The research led to the publication of the report entitled A Best Practices Guide for Mitigating Risk in the Use of Social Media. A considerably more expansive exposition of the topic is presented in this book.

Affiliations and Expertise

Universiti Teknologi PETRONAS, Malaysia