logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Security Risks in Social Media Technologies. Safe Practices in Public Service Applications by Alan Oxley (Auth.) ISBN 9781780633800, 9781843347149, 1780633807, 1843347148

  • SKU: EBN-4675880
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.4

17 reviews
Instant download (eBook) Security Risks in Social Media Technologies. Safe Practices in Public Service Applications after payment.
Authors:Alan Oxley (Auth.)
Pages:292 pages.
Year:2013
Editon:1
Publisher:Chandos Publishing
Language:english
File Size:12.34 MB
Format:pdf
ISBNS:9781780633800, 9781843347149, 1780633807, 1843347148
Categories: Ebooks

Product desciption

(Ebook) Security Risks in Social Media Technologies. Safe Practices in Public Service Applications by Alan Oxley (Auth.) ISBN 9781780633800, 9781843347149, 1780633807, 1843347148

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.Focuses on the security issues of social media, specifically in the public sectorWritten by a leading researcher and practitionerShows best practices for mitigating risk in the use of social media
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products