O'Reilly logo

Security Risks in Social Media Technologies by Alan Oxley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4

Security controls applied to the participation-collaboration pattern

Abstract:

This chapter concerns security controls (or security measures). Most security controls are generic, not country dependent. The country-specific part of the topic relates to the government bodies responsible for suggesting controls and monitoring adherence to them in individual countries. The chapter covers: types of security control – classifying them and determining how the controls to be adopted relate to different forms of sharing; the stages in deciding what security control is appropriate – identifying antecedents, and developing the motivation that prompts parties to adopt security controls; calculation of the cost-benefits of the security measures; and how ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required