|
List of figures and tables |
|
|
ix | |
|
|
xiii | |
Acknowledgments |
|
xv | |
Preface |
|
xvii | |
About the author |
|
xxiii | |
Introduction |
|
xxvii | |
|
1 Web 2.0 and social media |
|
|
1 | (32) |
|
|
1 | (3) |
|
|
4 | (22) |
|
|
26 | (1) |
|
The future of social media |
|
|
27 | (1) |
|
|
28 | (4) |
|
|
32 | (1) |
|
2 Non-frivolous uses of social media in the public sector |
|
|
33 | (56) |
|
|
33 | (5) |
|
The potential of social media |
|
|
38 | (9) |
|
|
47 | (1) |
|
Example Web 2.0 applications |
|
|
48 | (8) |
|
|
56 | (3) |
|
The use of social media in emergencies |
|
|
59 | (15) |
|
Sentiment analysis: finding out opinions |
|
|
74 | (4) |
|
Uses of Twitter in public service departments |
|
|
78 | (2) |
|
|
80 | (3) |
|
|
83 | (5) |
|
|
88 | (1) |
|
3 Security threats to social media technologies |
|
|
89 | (28) |
|
|
90 | (4) |
|
Threats to information systems in the public sector |
|
|
94 | (14) |
|
The impacts of social media malpractice |
|
|
108 | (1) |
|
Specific threats: examples and applications |
|
|
109 | (3) |
|
|
112 | (5) |
|
4 Security controls applled to the participation-collaboration pattern |
|
|
117 | (40) |
|
Types of security control |
|
|
120 | (8) |
|
Management security controls |
|
|
128 | (4) |
|
|
132 | (6) |
|
Operational security controls |
|
|
138 | (2) |
|
|
140 | (4) |
|
Deciding what security controls are appropriate |
|
|
144 | (4) |
|
Who is involved in security? |
|
|
148 | (5) |
|
|
153 | (3) |
|
|
156 | (1) |
|
5 Acceptable use practices |
|
|
157 | (18) |
|
Reasons for acceptable use policies |
|
|
157 | (1) |
|
The content of acceptable use policies |
|
|
158 | (7) |
|
Acceptable use policies for citizens |
|
|
165 | (1) |
|
Acceptable use policies for public service employees |
|
|
166 | (5) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (2) |
|
6 Participation and collaboration in K-12 schools |
|
|
175 | (14) |
|
|
176 | (1) |
|
Threats to participation-collaboration in K-12 schools |
|
|
176 | (1) |
|
Security controls for online media in schools |
|
|
177 | (2) |
|
Parental participation-collaboration in K-12 schools |
|
|
179 | (3) |
|
Past research and possible research |
|
|
182 | (4) |
|
|
186 | (1) |
|
|
187 | (2) |
|
7 Mitigating the risks of identity theft and malware |
|
|
189 | (16) |
|
|
189 | (1) |
|
|
190 | (4) |
|
Unsolicited messages, files, and hyperlinks sent by email |
|
|
194 | (8) |
|
Other threats: thumb drives |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
205 | (4) |
|
|
208 | (1) |
|
|
209 | (20) |
|
|
229 | (2) |
|
Professional and scholarly Journals |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
Appendix 1 SharePoint |
|
231 | (2) |
Appendix 2 Twitter application programming interfaces |
|
233 | (4) |
Appendix 3 Examples of general threats and a control |
|
237 | (4) |
Appendix 4 Examples of rogue unsolicited email messages |
|
241 | (2) |
Appendix 5 Key terms in secure computing |
|
243 | (4) |
Appendix 6 Acceptable use policies for citizens |
|
247 | (4) |
Appendix 7 Acceptable use policies for public service employees |
|
251 | (4) |
Appendix 8 Products to facilitate parental involvement and engagement in K-12 schools |
|
255 | (2) |
Index |
|
257 | |