Cargando…

Security risks in social media technologies : safe practices in public service applications /

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oxley, Alan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford : Chandos Publishing, 2013.
Colección:Chandos social media series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn864851371
003 OCoLC
005 20231117044935.0
006 m o d
007 cr |n|||||||||
008 131208s2013 mnua ob 001 0 eng d
040 |a YDXCP  |b eng  |e pn  |c YDXCP  |d OCLCO  |d IDEBK  |d CDX  |d OPELS  |d N$T  |d GGVRL  |d UMI  |d DEBBG  |d DEBSZ  |d OCLCQ  |d OCLCF  |d EBLCP  |d B24X7  |d COO  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d OCLCO  |d U3W  |d D6H  |d CEF  |d NLE  |d INT  |d UKMGB  |d OCLCQ  |d WYU  |d OCLCQ  |d UAB  |d OCLCA  |d AUD  |d UKAHL  |d VT2  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
016 7 |a 017585619  |2 Uk 
019 |a 864746974  |a 865332606  |a 870330043  |a 870962459  |a 880900533  |a 1065701531  |a 1103264609  |a 1129360987  |a 1153032862  |a 1192337110  |a 1235823349  |a 1240518139  |a 1262688409 
020 |a 1780633807  |q (electronic bk.) 
020 |a 9781780633800  |q (electronic bk.) 
020 |a 1306176727  |q (electronic bk.) 
020 |a 9781306176729  |q (electronic bk.) 
020 |z 9781843347149 
020 |z 1843347148 
035 |a (OCoLC)864851371  |z (OCoLC)864746974  |z (OCoLC)865332606  |z (OCoLC)870330043  |z (OCoLC)870962459  |z (OCoLC)880900533  |z (OCoLC)1065701531  |z (OCoLC)1103264609  |z (OCoLC)1129360987  |z (OCoLC)1153032862  |z (OCoLC)1192337110  |z (OCoLC)1235823349  |z (OCoLC)1240518139  |z (OCoLC)1262688409 
050 4 |a TK5105.59  |b .O95 2013 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |b 23 
100 1 |a Oxley, Alan. 
245 1 0 |a Security risks in social media technologies :  |b safe practices in public service applications /  |c Alan Oxley. 
264 1 |a Oxford :  |b Chandos Publishing,  |c 2013. 
300 |a 1 online resource (xxx, 262 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Chandos social media series 
504 |a Includes bibliographical references (pages 209-227) and index. 
588 0 |a Print version record. 
520 |a Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion. Focuses on the security issues of social media, specifically in the public sectorWritten by a leading researcher and practitionerShows best practices for mitigating risk in the use of social media. 
505 0 |a 1. Web 2.0 and social media -- 2. Non-frivolous uses of social media in the public sector -- 3. Security threats to social media technologies -- 4. Security controls applied to the participation-collaboration pattern -- 5. Acceptable use practices -- 6. Participation and collaboration in K-12 schools -- 7. Mitigating the risks of identity theft and malware -- 8. Conclusion. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Soziale Software  |2 gnd  |0 (DE-588)7550143-0 
650 7 |a World Wide Web 2.0  |2 gnd  |0 (DE-588)7548364-6 
650 7 |a Datenschutz  |2 gnd  |0 (DE-588)4011134-9 
776 0 8 |i Print version:  |z 9781843347149  |z 1843347148 
830 0 |a Chandos social media series. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781843347149  |z Texto completo