You are previewing Security Risks in Social Media Technologies.
O'Reilly logo
Security Risks in Social Media Technologies

Book Description

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.

  • Focuses on the security issues of social media, specifically in the public sector
  • Written by a leading researcher and practitioner
  • Shows best practices for mitigating risk in the use of social media

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of figures and tables
  6. List of abbreviations
  7. Acknowledgements
  8. Preface
  9. About the author
  10. Introduction
  11. Chapter 1: Web 2.0 and social media
    1. Abstract:
    2. Background
    3. Web 2.0
    4. The future of the web
    5. The future of social media
  12. Chapter 2: Non-frivolous uses of social media in the public sector
    1. Abstract:
    2. The potential of Web 2.0
    3. The potential of social media
    4. The potential of wikis
    5. Example Web 2.0 applications
    6. Teaching and learning
    7. The use of social media in emergencies
    8. Sentiment analysis: finding out opinions
    9. Uses of Twitter in public service departments
    10. Discovering applications
  13. Chapter 3: Security threats to social media technologies
    1. Abstract:
    2. Security
    3. Threats to information systems in the public sector
    4. The impacts of social media malpractice
    5. Specific threats: examples and applications
  14. Chapter 4: Security controls applied to the participation-collaboration pattern
    1. Abstract:
    2. Types of security control
    3. Management security controls
    4. Technical controls
    5. Operational security controls
    6. Governance
    7. Deciding what security controls are appropriate
    8. Who is involved in security?
  15. Chapter 5: Acceptable use practices
    1. Abstract:
    2. Reasons for acceptable use policies
    3. The content of acceptable use policies
    4. Acceptable use policies for citizens
    5. Acceptable use policies for public service employees
    6. Advice for K-12 schools
  16. Chapter 6: Participation and collaboration in K-12 schools
    1. Abstract:
    2. Introduction
    3. Threats to participation–collaboration in K-12 schools
    4. Security controls for online media in schools
    5. Parental participation–collaboration in K-12 schools
    6. Past research and possible research
  17. Chapter 7: Mitigating the risks of identity theft and malware
    1. Abstract:
    2. Introduction
    3. Social media sites
    4. Unsolicited messages, files, and hyperlinks sent by email
    5. Other threats: thumb drives
  18. Chapter 8: Conclusion
    1. Abstract:
  19. References
  20. Further reading
  21. Appendix 1: SharePoint
  22. Appendix 2: Twitter application programming interfaces
  23. Appendix 3: Examples of general threats and a control
  24. Appendix 4: Examples of rogue unsolicited email messages
  25. Appendix 5: Key terms in secure computing
  26. Appendix 6: Acceptable use policies for citizens
  27. Appendix 7: Acceptable use policies for public service employees
  28. Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools
  29. Index