The Resource Security Risks In Social Media Technologies : Safe Practices In Public Service Applications

Security Risks In Social Media Technologies : Safe Practices In Public Service Applications

Label
Security Risks In Social Media Technologies : Safe Practices In Public Service Applications
Title
Security Risks In Social Media Technologies
Title remainder
Safe Practices In Public Service Applications
Creator
Subject
Language
eng
Summary
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first c
Member of
Cataloging source
AU@
Dewey number
006
Index
no index present
LC call number
QA76.76.H94
Literary form
non fiction
Nature of contents
dictionaries
Series statement
Chandos Publishing Social Media series
Label
Security Risks In Social Media Technologies : Safe Practices In Public Service Applications
Publication
http://library.link/vocab/branchCode
  • net
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Security Risks in Social Media Technologies : Safe practices in public serviceapplications; Copyright; Contents; List of figures and tables; List of abbreviations; Acknowledgments; Preface; About the author; Introduction; 1. Web 2.0 and social media; Background; Web 2.0; The future of the web; The future of social media; References; Useful websites; 2. Non-frivolous uses of social media in the public sector; The potential of Web 2.0; The potential of social media; The potential of wikis; Example Web 2.0 applications; Teaching and learning; The use of social media in emergencies
  • 7. Mitigating the risks of identity theft and malwareIntroduction; Social media sites; Unsolicited messages, files, and hyperlinks sent by email; Other threats: thumb drives; Useful website; 8. Conclusion; Reference; References; Further reading; Professional and scholarly journals; Conference proceedings; Social network; Appendix 1 SharePoint; Appendix 2 Twitter application programming interfaces; Appendix 3 Examples of general threats and a control; Appendix 4 Examples of rogue unsolicited email messages; Appendix 5 Key terms in secure computing
  • Appendix 6 Acceptable use policies for citizensAppendix 7 Acceptable use policies for public service employees; Appendix 8 Products to facilitate parental involvement and engagement in K-12 schools; Index
  • Sentiment analysis: finding out opinionsUses of Twitter in public service departments; Discovering applications; References; Useful websites; 3. Security threats to social media technologies; Security; Threats to information systems in the public sector; The impacts of social media malpractice; Specific threats: examples and applications; References; 4. Security controls applied to the participation- collaboration pattern; Types of security control; Management security controls; Technical controls; Operational security controls; Governance; Deciding what security controls are appropriate
  • Who is involved in security?References; Useful websites; 5. Acceptable use practices; Reasons for acceptable use policies; The content of acceptable use policies; Acceptable use policies for citizens; Acceptable use policies for public service employees; Advice for K-12 schools; References; Useful websites; 6. Participation and collaboration in K-12 schools; Introduction; Threats to participation-collaboration in K-12 schools; Security controls for online media in schools; Parental participation-collaboration in K-12 schools; Past research and possible research; References; Useful website
Control code
ocn954340399
Dimensions
unknown
Extent
1 online resource (293 pages)
Form of item
online
Isbn
9781780633800
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/recordID
.b29562193
Sound
unknown sound
Specific material designation
remote
System control number
  • (OCoLC)954340399
  • pebco1780633807

Library Locations

    • Deakin University Library - Geelong Waurn Ponds CampusBorrow it
      75 Pigdons Road, Waurn Ponds, Victoria, 3216, AU
      -38.195656 144.304955
Processing Feedback ...