Security risks in social media technologies safe practices in public service applications
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Oxford :
Chandos Publishing
2013.
|
Edición: | 1st edition |
Colección: | Chandos social media series,
Chandos social media series. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628737706719 |
Tabla de Contenidos:
- Cover; Security Risks in Social Media Technologies : Safe practices in public serviceapplications; Copyright; Contents; List of figures and tables; List of abbreviations; Acknowledgments; Preface; About the author; Introduction; 1. Web 2.0 and social media; Background; Web 2.0; The future of the web; The future of social media; References; Useful websites; 2. Non-frivolous uses of social media in the public sector; The potential of Web 2.0; The potential of social media; The potential of wikis; Example Web 2.0 applications; Teaching and learning; The use of social media in emergencies
- Sentiment analysis: finding out opinionsUses of Twitter in public service departments; Discovering applications; References; Useful websites; 3. Security threats to social media technologies; Security; Threats to information systems in the public sector; The impacts of social media malpractice; Specific threats: examples and applications; References; 4. Security controls applied to the participation- collaboration pattern; Types of security control; Management security controls; Technical controls; Operational security controls; Governance; Deciding what security controls are appropriate
- Who is involved in security?References; Useful websites; 5. Acceptable use practices; Reasons for acceptable use policies; The content of acceptable use policies; Acceptable use policies for citizens; Acceptable use policies for public service employees; Advice for K-12 schools; References; Useful websites; 6. Participation and collaboration in K-12 schools; Introduction; Threats to participation-collaboration in K-12 schools; Security controls for online media in schools; Parental participation-collaboration in K-12 schools; Past research and possible research; References; Useful website
- 7. Mitigating the risks of identity theft and malwareIntroduction; Social media sites; Unsolicited messages, files, and hyperlinks sent by email; Other threats: thumb drives; Useful website; 8. Conclusion; Reference; References; Further reading; Professional and scholarly journals; Conference proceedings; Social network; Appendix 1 SharePoint; Appendix 2 Twitter application programming interfaces; Appendix 3 Examples of general threats and a control; Appendix 4 Examples of rogue unsolicited email messages; Appendix 5 Key terms in secure computing
- Appendix 6 Acceptable use policies for citizensAppendix 7 Acceptable use policies for public service employees; Appendix 8 Products to facilitate parental involvement and engagement in K-12 schools; Index