Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Security risks in social media technologies : (Record no. 416179)

MARC details
000 -LEADER
fixed length control field 01721cam a22002657a 4500
001 - CONTROL NUMBER
control field 18196671
003 - CONTROL NUMBER IDENTIFIER
control field ISI Library, Kolkata
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150204130336.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140623s2013 enka b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781843347149
040 ## - CATALOGING SOURCE
Original cataloging agency ISI Library
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number Ox98
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Oxley, Alan.
245 10 - TITLE STATEMENT
Title Security risks in social media technologies :
Remainder of title safe practices in public service applications /
Statement of responsibility, etc Alan Oxley.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Oxford :
Name of publisher, distributor, etc Chandos pub.,
Date of publication, distribution, etc 2013.
300 ## - PHYSICAL DESCRIPTION
Extent xxx, 262 p. :
Other physical details illustrations ;
Dimensions 24 cm.
490 ## - SERIES STATEMENT
Series statement Chandos social media series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (pages 209-227) and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. Web 2.0 and social media --<br/>2. Non-frivolous uses of social media in the public sector --<br/>3. Security threats to social media technologies --<br/>4. Security controls applied to the participation-collaboration pattern --<br/>5. Acceptable use practices --<br/>6. Participation and collaboration in K-12 schools --<br/>7. Mitigating the risks of identity theft and malware --<br/>8. Conclusion--<br/><br/>References--<br/>Appendixes--<br/>Index.
520 ## - SUMMARY, ETC.
Summary, etc Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS --Internet -- Security.
General subdivision
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS -- Networking -- Security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Not for loan Home library Current library Date acquired Cost, normal purchase price Full call number Accession Number Koha item type
    ISI Library, Kolkata ISI Library, Kolkata 17/12/2014 4363.92 005.8 Ox98 135452 Books
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in