Social media security: leveraging social networking while mitigating risk
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant drivi...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
[2014]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597499866/?ar |
Zusammenfassung: | Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control. Defines an organization's goals for social networking. Presents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xi, 328 Seiten) |
ISBN: | 9781597499873 1597499870 1597499862 9781597499866 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047648481 | ||
003 | DE-627-1 | ||
005 | 20240228115400.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781597499873 |c electronic bk. |9 978-1-59749-987-3 | ||
020 | |a 1597499870 |c electronic bk. |9 1-59749-987-0 | ||
020 | |a 1597499862 |9 1-59749-986-2 | ||
020 | |a 9781597499866 |9 978-1-59749-986-6 | ||
020 | |a 9781597499866 |9 978-1-59749-986-6 | ||
035 | |a (DE-627-1)047648481 | ||
035 | |a (DE-599)KEP047648481 | ||
035 | |a (ORHE)9781597499866 | ||
035 | |a (DE-627-1)047648481 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
082 | 0 | |a 658.472 |2 23 | |
100 | 1 | |a Cross, Michael |d 1965- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Social media security |b leveraging social networking while mitigating risk |c by Michael Cross |
264 | 1 | |a Waltham, MA |b Syngress |c [2014] | |
300 | |a 1 Online-Ressource (xi, 328 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control. Defines an organization's goals for social networking. Presents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security | ||
650 | 0 | |a Online social networks |x Security measures | |
650 | 0 | |a Online social networks |x Economic aspects | |
650 | 0 | |a Business communication |x Technological innovations | |
650 | 4 | |a Réseaux sociaux (Internet) ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux sociaux (Internet) ; Aspect économique | |
650 | 4 | |a Communication dans l'entreprise ; Innovations | |
650 | 4 | |a BUSINESS & ECONOMICS ; Industrial Management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Management Science | |
650 | 4 | |a BUSINESS & ECONOMICS ; Organizational Behavior | |
650 | 4 | |a Business communication ; Technological innovations | |
776 | 1 | |z 9781597499866 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597499866 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597499866/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047648481 |
---|---|
_version_ | 1821494867320111104 |
adam_text | |
any_adam_object | |
author | Cross, Michael 1965- |
author_facet | Cross, Michael 1965- |
author_role | aut |
author_sort | Cross, Michael 1965- |
author_variant | m c mc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047648481 (DE-599)KEP047648481 (ORHE)9781597499866 |
dewey-full | 658.472 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.472 |
dewey-search | 658.472 |
dewey-sort | 3658.472 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03674cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047648481</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115400.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499873</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-987-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499870</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-987-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499862</subfield><subfield code="9">1-59749-986-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499866</subfield><subfield code="9">978-1-59749-986-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499866</subfield><subfield code="9">978-1-59749-986-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597499866</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648481</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.472</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cross, Michael</subfield><subfield code="d">1965-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social media security</subfield><subfield code="b">leveraging social networking while mitigating risk</subfield><subfield code="c">by Michael Cross</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 328 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control. Defines an organization's goals for social networking. Presents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business communication</subfield><subfield code="x">Technological innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux sociaux (Internet) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux sociaux (Internet) ; Aspect économique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication dans l'entreprise ; Innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Industrial Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Management Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Organizational Behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business communication ; Technological innovations</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597499866</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597499866</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597499866/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047648481 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:12Z |
institution | BVB |
isbn | 9781597499873 1597499870 1597499862 9781597499866 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xi, 328 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Cross, Michael 1965- VerfasserIn aut Social media security leveraging social networking while mitigating risk by Michael Cross Waltham, MA Syngress [2014] 1 Online-Ressource (xi, 328 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control. Defines an organization's goals for social networking. Presents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security Online social networks Security measures Online social networks Economic aspects Business communication Technological innovations Réseaux sociaux (Internet) ; Sécurité ; Mesures Réseaux sociaux (Internet) ; Aspect économique Communication dans l'entreprise ; Innovations BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business communication ; Technological innovations 9781597499866 Erscheint auch als Druck-Ausgabe 9781597499866 |
spellingShingle | Cross, Michael 1965- Social media security leveraging social networking while mitigating risk Online social networks Security measures Online social networks Economic aspects Business communication Technological innovations Réseaux sociaux (Internet) ; Sécurité ; Mesures Réseaux sociaux (Internet) ; Aspect économique Communication dans l'entreprise ; Innovations BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business communication ; Technological innovations |
title | Social media security leveraging social networking while mitigating risk |
title_auth | Social media security leveraging social networking while mitigating risk |
title_exact_search | Social media security leveraging social networking while mitigating risk |
title_full | Social media security leveraging social networking while mitigating risk by Michael Cross |
title_fullStr | Social media security leveraging social networking while mitigating risk by Michael Cross |
title_full_unstemmed | Social media security leveraging social networking while mitigating risk by Michael Cross |
title_short | Social media security |
title_sort | social media security leveraging social networking while mitigating risk |
title_sub | leveraging social networking while mitigating risk |
topic | Online social networks Security measures Online social networks Economic aspects Business communication Technological innovations Réseaux sociaux (Internet) ; Sécurité ; Mesures Réseaux sociaux (Internet) ; Aspect économique Communication dans l'entreprise ; Innovations BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business communication ; Technological innovations |
topic_facet | Online social networks Security measures Online social networks Economic aspects Business communication Technological innovations Réseaux sociaux (Internet) ; Sécurité ; Mesures Réseaux sociaux (Internet) ; Aspect économique Communication dans l'entreprise ; Innovations BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Business communication ; Technological innovations |
work_keys_str_mv | AT crossmichael socialmediasecurityleveragingsocialnetworkingwhilemitigatingrisk |