Description

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.

Key Features

  • Focuses on the security issues of social media, specifically in the public sector
  • Written by a leading researcher and practitioner
  • Shows best practices for mitigating risk in the use of social media

Readership

All those interested in social media technologies, especially in public service applications, including managers and IT staff

Table of Contents

List of figures and tables

List of abbreviations

Acknowledgements

Preface

About the author

Introduction

Chapter 1: Web 2.0 and social media

Abstract:

Background

Web 2.0

The future of the web

The future of social media

Chapter 2: Non-frivolous uses of social media in the public sector

Abstract:

The potential of Web 2.0

The potential of social media

The potential of wikis

Example Web 2.0 applications

Teaching and learning

The use of social media in emergencies

Sentiment analysis: finding out opinions

Uses of Twitter in public service departments

Discovering applications

Chapter 3: Security threats to social media technologies

Abstract:

Security

Threats to information systems in the public sector

The impacts of social media malpractice

Specific threats: examples and applications

Chapter 4: Security controls applied to the participation-collaboration pattern

Abstract:

Types of security control

Management security controls

Technical controls

Operational security controls

Governance

Deciding what security controls are appropriate

Who is involved in security?

Chapter 5: Acceptable use practices

Abstract:

Reasons for acceptable use policies

The content of acceptable use policies

Acceptable use policies for citizens

Acceptable use policies for public service employees

Advice for K-12 schools

Chapter 6: Participation and collaboration in K-12 schools

Abstract:

Introduction

Threats to participation–collaboration in K-12 schools

Security controls for online media in schools

Parental participation–collaboration in K-12 schools

Past research and possible research

Chapt

Details

No. of pages:
292
Language:
English
Copyright:
© 2013
Published:
Imprint:
Chandos Publishing
Print ISBN:
9781843347149
Electronic ISBN:
9781780633800

About the editor

Alan Oxley

Alan Oxley is Professor of Computer and Information Sciences at Universiti Teknologi PETRONAS in Malaysia. Alan is an all-rounder in Computer Science and has written numerous academic articles and chapters. Recently he was awarded a research stipend by the IBM Center for the Business of Government. The research led to the publication of the report entitled A Best Practices Guide for Mitigating Risk in the Use of Social Media. A considerably more expansive exposition of the topic is presented in this book.