Acceptable Use Policies, 25

activists. See hacktivists

advertising campaigns

legal compliance issues for, 225–226

rapport with customers in, 212–213

alerts. See also Google Alerts

creating, 289–291

linking log files to, 272

Social Mention, 43, 232–233, 291–293

using for content, 271

American Medical Response of Connecticut (AMRC), 289

analysis. See auditing

Ann Taylor blogging gifts, 143

Anti-Cyber Squatting Protection Act, 247

Apple security leaks, 61–62

applications. See also externally hosted applications

cloud-based, 29, 30

developing and testing internal, 197–198

list of tools, 322–325

managing in-house social media, 110–112

monitoring online mentions, 274–276

next generation of Internet, 312–314

security for externally hosted, ...

Get Securing the Clicks Network Security in the Age of Social Media now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.