Security Risks in Social Media Technologies Safe practices in public service applications
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader...
Saved in:
Main Author: | |
---|---|
Format: | Manuscript Book |
Language: | English |
Published: |
Oxford
Chandos Publishing
2013
|
Series: | CHANDOS SOCIAL MEDIA SERIES
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000ntm a2200000#i#4501 | ||
---|---|---|---|
001 | wils-558164 | ||
005 | 2018312114155 | ||
008 | 180927t2013 ENK a|| |#001 ##eng#D | ||
020 | # | # | |a 9781843347149 |q paperback |
020 | # | # | |a 1843347148 |q paperback |
040 | # | # | |a OSU |b eng |c OSU |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .O95 2013 |
100 | 1 | # | |a OXLEY, ALAN |e author |
245 | 1 | 0 | |a Security Risks in Social Media Technologies |b Safe practices in public service applications |c ALAN OXLEY |
264 | # | 1 | |a Oxford |b Chandos Publishing |c 2013 |
264 | # | 4 | |c ©2013 |
300 | # | # | |a xxx, 262 pages |b illustrations |c 24 cm |
336 | # | # | |a text |b txt |2 rdacontent |
337 | # | # | |a unmediated |b n |2 rdamedia |
338 | # | # | |a volume |b nc |2 rdacarrier |
490 | 1 | # | |a CHANDOS SOCIAL MEDIA SERIES |
504 | # | # | |a Includes bibliographical references : (pages 209-227) and index |
520 | # | # | |a Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion. |
650 | # | 0 | |a Computer networks |x Security measures |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=558164 |
998 | # | # | |a 00130##a006.2.2||00250##a002.5.2||00250##b002.5.3||00255##a007.25.3||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00502##a007.9.2||00520##a007.2||00520##b007.2||00538##a003.16.9||00546##a006.11||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2|| |