MARC details
| 000 -LEADER |
| fixed length control field |
01721cam a22002657a 4500 |
| 001 - CONTROL NUMBER |
| control field |
18196671 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
ISI Library, Kolkata |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20150204130336.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
140623s2013 enka b 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781843347149 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
ISI Library |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
Ox98 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Oxley, Alan. |
| 245 10 - TITLE STATEMENT |
| Title |
Security risks in social media technologies : |
| Remainder of title |
safe practices in public service applications / |
| Statement of responsibility, etc |
Alan Oxley. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Oxford : |
| Name of publisher, distributor, etc |
Chandos pub., |
| Date of publication, distribution, etc |
2013. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxx, 262 p. : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 490 ## - SERIES STATEMENT |
| Series statement |
Chandos social media series |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (pages 209-227) and index. |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
1. Web 2.0 and social media --<br/>2. Non-frivolous uses of social media in the public sector --<br/>3. Security threats to social media technologies --<br/>4. Security controls applied to the participation-collaboration pattern --<br/>5. Acceptable use practices --<br/>6. Participation and collaboration in K-12 schools --<br/>7. Mitigating the risks of identity theft and malware --<br/>8. Conclusion--<br/><br/>References--<br/>Appendixes--<br/>Index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS --Internet -- Security. |
| General subdivision |
|
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS -- Networking -- Security. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |