Atjaunināt sīkdatņu piekrišanu

E-grāmata: Security Risks in Social Media Technologies: Safe Practices in Public Service Applications

(Universiti Teknologi PETRONAS, Malaysia)
  • Formāts - PDF+DRM
  • Cena: 58,89 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
List of figures and tables
ix
List of abbreviations
xiii
Acknowledgments xv
Preface xvii
About the author xxiii
Introduction xxvii
1 Web 2.0 and social media
1(32)
Background
1(3)
Web 2.0
4(22)
The future of the web
26(1)
The future of social media
27(1)
References
28(4)
Useful websites
32(1)
2 Non-frivolous uses of social media in the public sector
33(56)
The potential of Web 2.0
33(5)
The potential of social media
38(9)
The potential of wikis
47(1)
Example Web 2.0 applications
48(8)
Teaching and learning
56(3)
The use of social media in emergencies
59(15)
Sentiment analysis: finding out opinions
74(4)
Uses of Twitter in public service departments
78(2)
Discovering applications
80(3)
References
83(5)
Useful websites
88(1)
3 Security threats to social media technologies
89(28)
Security
90(4)
Threats to information systems in the public sector
94(14)
The impacts of social media malpractice
108(1)
Specific threats: examples and applications
109(3)
References
112(5)
4 Security controls applled to the participation-collaboration pattern
117(40)
Types of security control
120(8)
Management security controls
128(4)
Technical controls
132(6)
Operational security controls
138(2)
Governance
140(4)
Deciding what security controls are appropriate
144(4)
Who is involved in security?
148(5)
References
153(3)
Useful websites
156(1)
5 Acceptable use practices
157(18)
Reasons for acceptable use policies
157(1)
The content of acceptable use policies
158(7)
Acceptable use policies for citizens
165(1)
Acceptable use policies for public service employees
166(5)
Advice for K-12 schools
171(1)
References
171(2)
Useful websites
173(2)
6 Participation and collaboration in K-12 schools
175(14)
Introduction
176(1)
Threats to participation-collaboration in K-12 schools
176(1)
Security controls for online media in schools
177(2)
Parental participation-collaboration in K-12 schools
179(3)
Past research and possible research
182(4)
References
186(1)
Useful website
187(2)
7 Mitigating the risks of identity theft and malware
189(16)
Introduction
189(1)
Social media sites
190(4)
Unsolicited messages, files, and hyperlinks sent by email
194(8)
Other threats: thumb drives
202(1)
Useful website
203(2)
8 Conclusion
205(4)
Reference
208(1)
References
209(20)
Further reading
229(2)
Professional and scholarly Journals
229(1)
Conference proceedings
229(1)
Social network
230(1)
Appendix 1 SharePoint 231(2)
Appendix 2 Twitter application programming interfaces 233(4)
Appendix 3 Examples of general threats and a control 237(4)
Appendix 4 Examples of rogue unsolicited email messages 241(2)
Appendix 5 Key terms in secure computing 243(4)
Appendix 6 Acceptable use policies for citizens 247(4)
Appendix 7 Acceptable use policies for public service employees 251(4)
Appendix 8 Products to facilitate parental involvement and engagement in K-12 schools 255(2)
Index 257
Alan Oxley is Professor of Computer and Information Sciences at Universiti Teknologi PETRONAS in Malaysia. Alan is an all-rounder in Computer Science and has written numerous academic articles and chapters. Recently he was awarded a research stipend by the IBM Center for the Business of Government. The research led to the publication of the report entitled A Best Practices Guide for Mitigating Risk in the Use of Social Media. A considerably more expansive exposition of the topic is presented in this book.