
Security Risks in Social Media Technologies
Safe Practices in Public Service Applications
- 1st Edition - July 31, 2013
- Imprint: Chandos Publishing
- Author: Alan Oxley
- Language: English
- Paperback ISBN:9 7 8 - 1 - 8 4 3 3 4 - 7 1 4 - 9
- eBook ISBN:9 7 8 - 1 - 7 8 0 6 3 - 3 8 0 - 0
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quote- Focuses on the security issues of social media, specifically in the public sector
- Written by a leading researcher and practitioner
- Shows best practices for mitigating risk in the use of social media
List of figures and tables
List of abbreviations
Acknowledgements
Preface
About the author
Introduction
Chapter 1: Web 2.0 and social media
Abstract:
Background
Web 2.0
The future of the web
The future of social media
Chapter 2: Non-frivolous uses of social media in the public sector
Abstract:
The potential of Web 2.0
The potential of social media
The potential of wikis
Example Web 2.0 applications
Teaching and learning
The use of social media in emergencies
Sentiment analysis: finding out opinions
Uses of Twitter in public service departments
Discovering applications
Chapter 3: Security threats to social media technologies
Abstract:
Security
Threats to information systems in the public sector
The impacts of social media malpractice
Specific threats: examples and applications
Chapter 4: Security controls applied to the participation-collaboration pattern
Abstract:
Types of security control
Management security controls
Technical controls
Operational security controls
Governance
Deciding what security controls are appropriate
Who is involved in security?
Chapter 5: Acceptable use practices
Abstract:
Reasons for acceptable use policies
The content of acceptable use policies
Acceptable use policies for citizens
Acceptable use policies for public service employees
Advice for K-12 schools
Chapter 6: Participation and collaboration in K-12 schools
Abstract:
Introduction
Threats to participation–collaboration in K-12 schools
Security controls for online media in schools
Parental participation–collaboration in K-12 schools
Past research and possible research
Chapter 7: Mitigating the risks of identity theft and malware
Abstract:
Introduction
Social media sites
Unsolicited messages, files, and hyperlinks sent by email
Other threats: thumb drives
Chapter 8: Conclusion
Abstract:
References
Further reading
Appendix 1: SharePoint
Appendix 2: Twitter application programming interfaces
Appendix 3: Examples of general threats and a control
Appendix 4: Examples of rogue unsolicited email messages
Appendix 5: Key terms in secure computing
Appendix 6: Acceptable use policies for citizens
Appendix 7: Acceptable use policies for public service employees
Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools
Index
- Edition: 1
- Published: July 31, 2013
- No. of pages (eBook): 292
- Imprint: Chandos Publishing
- Language: English
- Paperback ISBN: 9781843347149
- eBook ISBN: 9781780633800
AO