Cargando…

Managing online risk : apps, mobile, and social media security /

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and re...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gonzalez, Deborah (Autor)
Otros Autores: Studholme, Alan (Diseñador)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Kidlington, England ; Waltham, Massachusetts : Butterworth-Heinemann, 2015.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Front Cover; Managing Online Risk; Copyright; Contents; About the Author; Online Resources; Introduction; CHAPTER 1
  • RISK MANAGEMENT DIGITAL STYLE; RISK MANAGEMENT MODELS; BEST PRACTICES FOR INCIDENT RESPONSE; BONUS: TEN IT SECURITY MYTHS; SECURITY/RISK MANAGEMENT APPS; CHAPTER 2
  • INTERNAL AND EXTERNAL RISKS; INTERNAL RISKS; INTERNAL RISK 1: SECURITY PERCEPTION, PRIORITY, AND BUDGET; INTERNAL RISK 2: TRADITIONAL AND SHADOW IT; INTERNAL RISK 3: MOBILE; INTERNAL RISK 4: PEOPLE; EXTERNAL RISKS; EXTERNAL RISK 1: TECHNOLOGY ADVANCES; EXTERNAL RISK 2: CLOUD STORAGE; EXTERNAL RISK 3: HACKING.
  • EXTERNAL RISK 4: REGULATIONEXTERNAL RISK 5: NATURAL DISASTERS AND SQUIRRELS; CHAPTER 3
  • REPUTATION AND IDENTITY; REPUTATION; REPUTATIONAL RISKS; DEFINING IDENTITY; DIGITAL IDENTITY; LEGAL IDENTITY; EXECUTIVE IDENTITY; CORPORATE IDENTITY: THE BRAND; VALUE AND WORTH OF IDENTITY; IDENTITY VERSUS REPUTATION; PROTECTING IDENTITY; PROTECTING REPUTATION; CHAPTER 4
  • THE NEW WORKFORCE; EMPLOYMENT CYCLE; WHO IS THE WORKFORCE?; MILLENNIALS; RECRUITMENT; HIRING; EMPLOYMENT; TERMINATION; OTHER; CHAPTER 5
  • BIG DATA; DATA CYCLE; DATA MANAGEMENT PLANS; DATA CLASSIFICATION; DATA ACCESS; DATA ANALYTICS.
  • PROTECTING DATA: BACKUPLOSING DATA; DATA RECOVERY; PRIVACY: TO USE OR NOT TO USE DATA DILEMMA; PROTECTING AGAINST LIABILITY FOR DATA/PRIVACY LOSS; DATA SURVEILLANCE; DICTATORSHIP OF DATA; CHAPTER 6
  • APPROACHES TO CONTENT; CONTENT MARKETING VERSUS CONTENT MANAGEMENT; DIFFERENT AUDIENCES, DIFFERENT CONTENT; MYTHS OF CONTENT MARKETING AND CONTENT MANAGEMENT; BENEFITS OF THE CONTENT APPROACH; INTELLECTUAL PROPERTY RIGHTS, RISKS, AND CONTENT; IP CYCLE; COPYRIGHTS; DIGITAL MILLENNIUM COPYRIGHT ACT; FAIR USE DOCTRINE; INTERNATIONAL IP CONCERNS; CREATIVE COMMONS LICENSE.
  • A COUPLE OF DIGITAL CONCERNS FOR COPYRIGHTSTRADEMARKS; TRADEMARK AND GRIPE SITES; TRADEMARK AND REPUTATIONAL RISKS; TRADE SECRETS; PATENTS; TECHNOLOGY DEVELOPMENT; IP OTHER RISKS; IP VALUATION; IP LEGISLATION; CHAPTER 7
  • COMPLIANCE; WHO NEEDS TO BE COMPLIANT?; GENERAL COMPLIANCE: DISCLOSURES; GENERAL COMPLIANCE: DISCLAIMERS; GENERAL COMPLIANCE: HUMAN RESOURCES; FINANCIAL INSTITUTIONS; HEALTH CARE AND MEDICAL INSTITUTIONS; HIGHER EDUCATION (FERPA); PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE; OTHER FEDERAL AGENCIES; FEDERAL LEGISLATION; STATE LEGISLATION; COMPLIANCE OVERSIGHT.
  • COMPLIANCE TRAININGCHAPTER 8
  • CURRENCY AND CAMPAIGNS; ONLINE BANKING; E-PAYMENTS CONVERT TO M-PAYMENTS; VIRTUAL CURRENCY; DIGITAL CURRENCY; BITCOIN; BEYOND BITCOINS; CROWDFUNDING; ONLINE MICROFINANCING; ONLINE CHARITABLE DONATIONS AND FUNDRAISING; FUTURE OF MONEY; DIGITAL POLITICAL CAMPAIGNS; DIGITAL ADVOCACY; DIGITAL LOBBYING; RISK AND SECURITY OF ONLINE POLITICS; CHAPTER 9
  • DIGITAL SUCCESSION; SUCCESSION PLANNING; INFORMATION TECHNOLOGY SECURITY SHORTAGE; THE NEXT GENERATION OF INFOSEC PRO; WOMEN IN INFOSEC; CYBERSECURITY SIMULATIONS; DIGITAL LEGACY; DIGITAL ASSETS; DIGITAL AFTERLIFE.