Book description
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.- Focuses on the security issues of social media, specifically in the public sector
- Written by a leading researcher and practitioner
- Shows best practices for mitigating risk in the use of social media
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- List of figures and tables
- List of abbreviations
- Acknowledgements
- Preface
- About the author
- Introduction
- Chapter 1: Web 2.0 and social media
- Chapter 2: Non-frivolous uses of social media in the public sector
- Chapter 3: Security threats to social media technologies
- Chapter 4: Security controls applied to the participation-collaboration pattern
- Chapter 5: Acceptable use practices
- Chapter 6: Participation and collaboration in K-12 schools
- Chapter 7: Mitigating the risks of identity theft and malware
- Chapter 8: Conclusion
- References
- Further reading
- Appendix 1: SharePoint
- Appendix 2: Twitter application programming interfaces
- Appendix 3: Examples of general threats and a control
- Appendix 4: Examples of rogue unsolicited email messages
- Appendix 5: Key terms in secure computing
- Appendix 6: Acceptable use policies for citizens
- Appendix 7: Acceptable use policies for public service employees
- Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools
- Index
Product information
- Title: Security Risks in Social Media Technologies
- Author(s):
- Release date: July 2013
- Publisher(s): Chandos Publishing
- ISBN: 9781780633800
You might also like
book
Social Media Security
Social networks, particularly public ones, have become part of the fabric of how we communicate and …
book
Securing Social Media in the Enterprise
Securing Social Media in the Enterprise is a concise overview of the security threats posed by …
book
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC …
book
Analyzing and Securing Social Networks
Securing social networks and ensuring the privacy of participants has become a crucial need. There are …