Index

A

Acceptable Use Policies, 25

activists. See hacktivists

advertising campaigns

legal compliance issues for, 225–226

rapport with customers in, 212–213

alerts. See also Google Alerts

creating, 289–291

linking log files to, 272

Social Mention, 43, 232–233, 291–293

using for content, 271

American Medical Response of Connecticut (AMRC), 289

analysis. See auditing

Ann Taylor blogging gifts, 143

Anti-Cyber Squatting Protection Act, 247

Apple security leaks, 61–62

applications. See also externally hosted applications

cloud-based, 29, 30

developing and testing internal, 197–198

list of tools, 322–325

managing in-house social media, 110–112

monitoring online mentions, 274–276

next generation of Internet, 312–314

security for externally hosted, ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.