This completed downloadable of Security Risks in Social Media Technologies Safe Practices in Public Service Applications 1st Edition Alan Oxley.
Instant downloaded Security Risks in Social Media Technologies Safe Practices in Public Service Applications 1st Edition Alan Oxley pdf docx epub after payment.
Product details:
- ISBN-10 : 1843347148
- ISBN-13 : 9781843347149
- Author : Alan Oxley
Table of contents:
Chapter 1: Web 2.0 and social media
Abstract:
Background
Web 2.0
The future of the web
The future of social media
Chapter 2: Non-frivolous uses of social media in the public sector
Abstract:
The potential of Web 2.0
The potential of social media
The potential of wikis
Example Web 2.0 applications
Teaching and learning
The use of social media in emergencies
Sentiment analysis: finding out opinions
Uses of Twitter in public service departments
Discovering applications
Chapter 3: Security threats to social media technologies
Abstract:
Security
Threats to information systems in the public sector
The impacts of social media malpractice
Specific threats: examples and applications
Chapter 4: Security controls applied to the participation-collaboration pattern
Abstract:
Types of security control
Management security controls
Technical controls
Operational security controls
Governance
Deciding what security controls are appropriate
Who is involved in security?
Chapter 5: Acceptable use practices
Abstract:
Reasons for acceptable use policies
The content of acceptable use policies
Acceptable use policies for citizens
Acceptable use policies for public service employees
Advice for K-12 schools
Chapter 6: Participation and collaboration in K-12 schools
Abstract:
Introduction
Threats to participation–collaboration in K-12 schools
Security controls for online media in schools
Parental participation–collaboration in K-12 schools
Past research and possible research
Chapter 7: Mitigating the risks of identity theft and malware
Abstract:
Introduction
Social media sites
Unsolicited messages, files, and hyperlinks sent by email
Other threats: thumb drives
Chapter 8: Conclusion
Abstract:
References
Further reading
Appendix 1: SharePoint
Appendix 2: Twitter application programming interfaces
Appendix 3: Examples of general threats and a control
Appendix 4: Examples of rogue unsolicited email messages
Appendix 5: Key terms in secure computing
Appendix 6: Acceptable use policies for citizens
Appendix 7: Acceptable use policies for public service employees
Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools
People also search:
security concerns with social media
security risks in social media marketing
social media cybersecurity risks
what are the risks and benefits of social media
security issues for businesses using social media