|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Alan Oxley (Universiti Teknologi PETRONAS, Malaysia)Publisher: Woodhead Publishing Ltd Imprint: Chandos Publishing (Oxford) Ltd Volume: No. 8 Dimensions: Width: 15.60cm , Height: 1.60cm , Length: 23.40cm Weight: 0.510kg ISBN: 9781843347149ISBN 10: 1843347148 Pages: 292 Publication Date: 31 July 2013 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsList of figures and tables List of abbreviations Acknowledgements Preface About the author Introduction Chapter 1: Web 2.0 and social media Abstract: Background Web 2.0 The future of the web The future of social media Chapter 2: Non-frivolous uses of social media in the public sector Abstract: The potential of Web 2.0 The potential of social media The potential of wikis Example Web 2.0 applications Teaching and learning The use of social media in emergencies Sentiment analysis: finding out opinions Uses of Twitter in public service departments Discovering applications Chapter 3: Security threats to social media technologies Abstract: Security Threats to information systems in the public sector The impacts of social media malpractice Specific threats: examples and applications Chapter 4: Security controls applied to the participation-collaboration pattern Abstract: Types of security control Management security controls Technical controls Operational security controls Governance Deciding what security controls are appropriate Who is involved in security? Chapter 5: Acceptable use practices Abstract: Reasons for acceptable use policies The content of acceptable use policies Acceptable use policies for citizens Acceptable use policies for public service employees Advice for K-12 schools Chapter 6: Participation and collaboration in K-12 schools Abstract: Introduction Threats to participation–collaboration in K-12 schools Security controls for online media in schools Parental participation–collaboration in K-12 schools Past research and possible research Chapter 7: Mitigating the risks of identity theft and malware Abstract: Introduction Social media sites Unsolicited messages, files, and hyperlinks sent by email Other threats: thumb drives Chapter 8: Conclusion Abstract: References Further reading Appendix 1: SharePoint Appendix 2: Twitter application programming interfaces Appendix 3: Examples of general threats and a control Appendix 4: Examples of rogue unsolicited email messages Appendix 5: Key terms in secure computing Appendix 6: Acceptable use policies for citizens Appendix 7: Acceptable use policies for public service employees Appendix 8: Products to facilitate parental involvement and engagement in K-12 schools IndexReviewsAuthor InformationAlan Oxley is Professor of Computer and Information Sciences at Universiti Teknologi PETRONAS in Malaysia. Alan is an all-rounder in Computer Science and has written numerous academic articles and chapters. Recently he was awarded a research stipend by the IBM Center for the Business of Government. The research led to the publication of the report entitled A Best Practices Guide for Mitigating Risk in the Use of Social Media. A considerably more expansive exposition of the topic is presented in this book. Tab Content 6Author Website:Countries AvailableAll regions |
||||