Security Risks in Social Media Technologies
eBook - ePub

Security Risks in Social Media Technologies

Safe Practices in Public Service Applications

Alan Oxley

  1. 292 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Security Risks in Social Media Technologies

Safe Practices in Public Service Applications

Alan Oxley

Book details
Table of contents
Citations

About This Book

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.

  • Focuses on the security issues of social media, specifically in the public sector
  • Written by a leading researcher and practitioner
  • Shows best practices for mitigating risk in the use of social media

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Security Risks in Social Media Technologies an online PDF/ePUB?
Yes, you can access Security Risks in Social Media Technologies by Alan Oxley in PDF and/or ePUB format, as well as other popular books in Medicine & First Aid & Safety. We have over one million books available in our catalogue for you to explore.

Information

Year
2013
ISBN
9781780633800

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of figures and tables
  6. List of abbreviations
  7. Acknowledgements
  8. Preface
  9. About the author
  10. Introduction
  11. Chapter 1: Web 2.0 and social media
  12. Chapter 2: Non-frivolous uses of social media in the public sector
  13. Chapter 3: Security threats to social media technologies
  14. Chapter 4: Security controls applied to the participation-collaboration pattern
  15. Chapter 5: Acceptable use practices
  16. Chapter 6: Participation and collaboration in K-12 schools
  17. Chapter 7: Mitigating the risks of identity theft and malware
  18. Chapter 8: Conclusion
  19. References
  20. Further reading
  21. Appendix 1: SharePoint
  22. Appendix 2: Twitter application programming interfaces
  23. Appendix 3: Examples of general threats and a control
  24. Appendix 4: Examples of rogue unsolicited email messages
  25. Appendix 5: Key terms in secure computing
  26. Appendix 6: Acceptable use policies for citizens
  27. Appendix 7: Acceptable use policies for public service employees
  28. Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools
  29. Index