Security Risks in Social Media Technologies - 1st Edition - ISBN: 9781843347149, 9781780633800

Security Risks in Social Media Technologies

1st Edition

Safe Practices in Public Service Applications

Authors: Alan Oxley
eBook ISBN: 9781780633800
Paperback ISBN: 9781843347149
Imprint: Chandos Publishing
Published Date: 31st July 2013
Page Count: 292
Sales tax will be calculated at check-out Price includes VAT/GST
15% off
15% off
15% off
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Table of Contents

List of figures and tables

List of abbreviations



About the author


Chapter 1: Web 2.0 and social media



Web 2.0

The future of the web

The future of social media

Chapter 2: Non-frivolous uses of social media in the public sector


The potential of Web 2.0

The potential of social media

The potential of wikis

Example Web 2.0 applications

Teaching and learning

The use of social media in emergencies

Sentiment analysis: finding out opinions

Uses of Twitter in public service departments

Discovering applications

Chapter 3: Security threats to social media technologies



Threats to information systems in the public sector

The impacts of social media malpractice

Specific threats: examples and applications

Chapter 4: Security controls applied to the participation-collaboration pattern


Types of security control

Management security controls

Technical controls

Operational security controls


Deciding what security controls are appropriate

Who is involved in security?

Chapter 5: Acceptable use practices


Reasons for acceptable use policies

The content of acceptable use policies

Acceptable use policies for citizens

Acceptable use policies for public service employees

Advice for K-12 schools

Chapter 6: Participation and collaboration in K-12 schools



Threats to participation–collaboration in K-12 schools

Security controls for online media in schools

Parental participation–collaboration in K-12 schools

Past research and possible research

Chapter 7: Mitigating the risks of identity theft and malware



Social media sites

Unsolicited messages, files, and hyperlinks sent by email

Other threats: thumb drives

Chapter 8: Conclusion



Further reading

Appendix 1: SharePoint

Appendix 2: Twitter application programming interfaces

Appendix 3: Examples of general threats and a control

Appendix 4: Examples of rogue unsolicited email messages

Appendix 5: Key terms in secure computing

Appendix 6: Acceptable use policies for citizens

Appendix 7: Acceptable use policies for public service employees

Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools



Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.

Key Features

  • Focuses on the security issues of social media, specifically in the public sector
  • Written by a leading researcher and practitioner
  • Shows best practices for mitigating risk in the use of social media


All those interested in social media technologies, especially in public service applications, including managers and IT staff


No. of pages:
© Chandos Publishing 2013
Chandos Publishing
eBook ISBN:
Paperback ISBN:

Ratings and Reviews

About the Authors

Alan Oxley Author

Alan Oxley is Professor of Computer and Information Sciences at Universiti Teknologi PETRONAS in Malaysia. Alan is an all-rounder in Computer Science and has written numerous academic articles and chapters. Recently he was awarded a research stipend by the IBM Center for the Business of Government. The research led to the publication of the report entitled A Best Practices Guide for Mitigating Risk in the Use of Social Media. A considerably more expansive exposition of the topic is presented in this book.

Affiliations and Expertise

Universiti Teknologi PETRONAS, Malaysia