+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Security Risks in Social Media Technologies. Chandos Publishing Social Media Series

  • ID: 2719910
  • Book
  • July 2013
  • 292 Pages
  • Elsevier Science and Technology
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.

- Focuses on the security issues of social media, specifically in the public sector- Written by a leading researcher and practitioner- Shows best practices for mitigating risk in the use of social media

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Note: Product cover images may vary from those shown

List of figures and tables

List of abbreviations



About the author


Chapter 1: Web 2.0 and social media



Web 2.0

The future of the web

The future of social media

Chapter 2: Non-frivolous uses of social media in the public sector


The potential of Web 2.0

The potential of social media

The potential of wikis

Example Web 2.0 applications

Teaching and learning

The use of social media in emergencies

Sentiment analysis: finding out opinions

Uses of Twitter in public service departments

Discovering applications

Chapter 3: Security threats to social media technologies



Threats to information systems in the public sector

The impacts of social media malpractice

Specific threats: examples and applications

Chapter 4: Security controls applied to the participation-collaboration pattern


Types of security control

Management security controls

Technical controls

Operational security controls


Deciding what security controls are appropriate

Who is involved in security?

Chapter 5: Acceptable use practices


Reasons for acceptable use policies

The content of acceptable use policies

Acceptable use policies for citizens

Acceptable use policies for public service employees

Advice for K-12 schools

Chapter 6: Participation and collaboration in K-12 schools



Threats to participation-collaboration in K-12 schools

Security controls for online media in schools

Parental participation-collaboration in K-12 schools

Past research and possible research

Chapter 7: Mitigating the risks of identity theft and malware



Social media sites

Unsolicited messages, files, and hyperlinks sent by email

Other threats: thumb drives

Chapter 8: Conclusion



Further reading

Appendix 1: SharePoint

Appendix 2: Twitter application programming interfaces

Appendix 3: Examples of general threats and a control

Appendix 4: Examples of rogue unsolicited email messages

Appendix 5: Key terms in secure computing

Appendix 6: Acceptable use policies for citizens

Appendix 7: Acceptable use policies for public service employees

Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools


Note: Product cover images may vary from those shown
Oxley, Alan
Alan Oxley is Professor of Computer and Information Sciences at Universiti Teknologi PETRONAS in Malaysia. Alan is an all-rounder in Computer Science and has written numerous academic articles and chapters. Recently he was awarded a research stipend by the IBM Center for the Business of Government. The research led to the publication of the report entitled A Best Practices Guide for Mitigating Risk in the Use of Social Media. A considerably more expansive exposition of the topic is presented in this book.
Note: Product cover images may vary from those shown