Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Gonzalez, Deborah, author.

Title Managing online risk : apps, mobile, and social media security / Deborah Gonzalez ; designer, Alan Studholme. [O'Reilly electronic resource]

Publication Info. Kidlington, England ; Waltham, Massachusetts : Butterworth-Heinemann, 2015.
©2015
QR Code
Description 1 online resource (287 pages) : illustrations, tables
Note Includes index.
Bibliography Includes bibliographical references and index.
Contents Front Cover; Managing Online Risk; Copyright; Contents; About the Author; Online Resources; Introduction; CHAPTER 1 -- RISK MANAGEMENT DIGITAL STYLE; RISK MANAGEMENT MODELS; BEST PRACTICES FOR INCIDENT RESPONSE; BONUS: TEN IT SECURITY MYTHS; SECURITY/RISK MANAGEMENT APPS; CHAPTER 2 -- INTERNAL AND EXTERNAL RISKS; INTERNAL RISKS; INTERNAL RISK 1: SECURITY PERCEPTION, PRIORITY, AND BUDGET; INTERNAL RISK 2: TRADITIONAL AND SHADOW IT; INTERNAL RISK 3: MOBILE; INTERNAL RISK 4: PEOPLE; EXTERNAL RISKS; EXTERNAL RISK 1: TECHNOLOGY ADVANCES; EXTERNAL RISK 2: CLOUD STORAGE; EXTERNAL RISK 3: HACKING.
EXTERNAL RISK 4: REGULATIONEXTERNAL RISK 5: NATURAL DISASTERS AND SQUIRRELS; CHAPTER 3 -- REPUTATION AND IDENTITY; REPUTATION; REPUTATIONAL RISKS; DEFINING IDENTITY; DIGITAL IDENTITY; LEGAL IDENTITY; EXECUTIVE IDENTITY; CORPORATE IDENTITY: THE BRAND; VALUE AND WORTH OF IDENTITY; IDENTITY VERSUS REPUTATION; PROTECTING IDENTITY; PROTECTING REPUTATION; CHAPTER 4 -- THE NEW WORKFORCE; EMPLOYMENT CYCLE; WHO IS THE WORKFORCE?; MILLENNIALS; RECRUITMENT; HIRING; EMPLOYMENT; TERMINATION; OTHER; CHAPTER 5 -- BIG DATA; DATA CYCLE; DATA MANAGEMENT PLANS; DATA CLASSIFICATION; DATA ACCESS; DATA ANALYTICS.
PROTECTING DATA: BACKUPLOSING DATA; DATA RECOVERY; PRIVACY: TO USE OR NOT TO USE DATA DILEMMA; PROTECTING AGAINST LIABILITY FOR DATA/PRIVACY LOSS; DATA SURVEILLANCE; DICTATORSHIP OF DATA; CHAPTER 6 -- APPROACHES TO CONTENT; CONTENT MARKETING VERSUS CONTENT MANAGEMENT; DIFFERENT AUDIENCES, DIFFERENT CONTENT; MYTHS OF CONTENT MARKETING AND CONTENT MANAGEMENT; BENEFITS OF THE CONTENT APPROACH; INTELLECTUAL PROPERTY RIGHTS, RISKS, AND CONTENT; IP CYCLE; COPYRIGHTS; DIGITAL MILLENNIUM COPYRIGHT ACT; FAIR USE DOCTRINE; INTERNATIONAL IP CONCERNS; CREATIVE COMMONS LICENSE.
A COUPLE OF DIGITAL CONCERNS FOR COPYRIGHTSTRADEMARKS; TRADEMARK AND GRIPE SITES; TRADEMARK AND REPUTATIONAL RISKS; TRADE SECRETS; PATENTS; TECHNOLOGY DEVELOPMENT; IP OTHER RISKS; IP VALUATION; IP LEGISLATION; CHAPTER 7 -- COMPLIANCE; WHO NEEDS TO BE COMPLIANT?; GENERAL COMPLIANCE: DISCLOSURES; GENERAL COMPLIANCE: DISCLAIMERS; GENERAL COMPLIANCE: HUMAN RESOURCES; FINANCIAL INSTITUTIONS; HEALTH CARE AND MEDICAL INSTITUTIONS; HIGHER EDUCATION (FERPA); PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE; OTHER FEDERAL AGENCIES; FEDERAL LEGISLATION; STATE LEGISLATION; COMPLIANCE OVERSIGHT.
COMPLIANCE TRAININGCHAPTER 8 -- CURRENCY AND CAMPAIGNS; ONLINE BANKING; E-PAYMENTS CONVERT TO M-PAYMENTS; VIRTUAL CURRENCY; DIGITAL CURRENCY; BITCOIN; BEYOND BITCOINS; CROWDFUNDING; ONLINE MICROFINANCING; ONLINE CHARITABLE DONATIONS AND FUNDRAISING; FUTURE OF MONEY; DIGITAL POLITICAL CAMPAIGNS; DIGITAL ADVOCACY; DIGITAL LOBBYING; RISK AND SECURITY OF ONLINE POLITICS; CHAPTER 9 -- DIGITAL SUCCESSION; SUCCESSION PLANNING; INFORMATION TECHNOLOGY SECURITY SHORTAGE; THE NEXT GENERATION OF INFOSEC PRO; WOMEN IN INFOSEC; CYBERSECURITY SIMULATIONS; DIGITAL LEGACY; DIGITAL ASSETS; DIGITAL AFTERLIFE.
Summary In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and stora.
Subject Computer networks -- Security measures.
Internet -- Security measures.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Internet -- Sécurité -- Mesures.
Computer networks -- Security measures
Internet -- Security measures
Added Author Studholme, Alan, designer.
Other Form: Print version: Gonzalez, Deborah. Managing online risk : apps, mobile, and social media security. Kidlington, England ; Waltham, Massachusetts : Butterworth-Heinemann, ©2015 xiii, 271 pages 9780124200555
ISBN 9780124200609 (e-book)
0124200605 (e-book)
0124200559
9780124200555
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information