Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
Reihe
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Gewicht
ISBN-13
978-1-84334-714-9 (9781843347149)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Alan Oxley is Professor of Computer and Information Sciences at Universiti Teknologi PETRONAS in Malaysia. Alan is an all-rounder in Computer Science and has written numerous academic articles and chapters. Recently he was awarded a research stipend by the IBM Center for the Business of Government. The research led to the publication of the report entitled A Best Practices Guide for Mitigating Risk in the Use of Social Media. A considerably more expansive exposition of the topic is presented in this book.
Autor*in
Universiti Teknologi PETRONAS, Malaysia
List of figures and tables
List of abbreviations
Acknowledgements
Preface
About the author
Introduction
Chapter 1: Web 2.0 and social media
Abstract:
Background
Web 2.0
The future of the web
The future of social media
Chapter 2: Non-frivolous uses of social media in the public sector
Abstract:
The potential of Web 2.0
The potential of social media
The potential of wikis
Example Web 2.0 applications
Teaching and learning
The use of social media in emergencies
Sentiment analysis: finding out opinions
Uses of Twitter in public service departments
Discovering applications
Chapter 3: Security threats to social media technologies
Abstract:
Security
Threats to information systems in the public sector
The impacts of social media malpractice
Specific threats: examples and applications
Chapter 4: Security controls applied to the participation-collaboration pattern
Abstract:
Types of security control
Management security controls
Technical controls
Operational security controls
Governance
Deciding what security controls are appropriate
Who is involved in security?
Chapter 5: Acceptable use practices
Abstract:
Reasons for acceptable use policies
The content of acceptable use policies
Acceptable use policies for citizens
Acceptable use policies for public service employees
Advice for K-12 schools
Chapter 6: Participation and collaboration in K-12 schools
Abstract:
Introduction
Threats to participation-collaboration in K-12 schools
Security controls for online media in schools
Parental participation-collaboration in K-12 schools
Past research and possible research
Chapter 7: Mitigating the risks of identity theft and malware
Abstract:
Introduction
Social media sites
Unsolicited messages, files, and hyperlinks sent by email
Other threats: thumb drives
Chapter 8: Conclusion
Abstract:
References
Further reading
Appendix 1: SharePoint
Appendix 2: Twitter application programming interfaces
Appendix 3: Examples of general threats and a control
Appendix 4: Examples of rogue unsolicited email messages
Appendix 5: Key terms in secure computing
Appendix 6: Acceptable use policies for citizens
Appendix 7: Acceptable use policies for public service employees
Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools
Index