SUBSCRIBE
SUBSCRIBE
EXPLORE +
  • About infoDOCKET
  • Academic Libraries on LJ
  • Research on LJ
  • News on LJ
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Libraries
    • Academic Libraries
    • Government Libraries
    • National Libraries
    • Public Libraries
  • Companies (Publishers/Vendors)
    • EBSCO
    • Elsevier
    • Ex Libris
    • Frontiers
    • Gale
    • PLOS
    • Scholastic
  • New Resources
    • Dashboards
    • Data Files
    • Digital Collections
    • Digital Preservation
    • Interactive Tools
    • Maps
    • Other
    • Podcasts
    • Productivity
  • New Research
    • Conference Presentations
    • Journal Articles
    • Lecture
    • New Issue
    • Reports
  • Topics
    • Archives & Special Collections
    • Associations & Organizations
    • Awards
    • Funding
    • Interviews
    • Jobs
    • Management & Leadership
    • News
    • Patrons & Users
    • Preservation
    • Profiles
    • Publishing
    • Roundup
    • Scholarly Communications
      • Open Access

November 14, 2011 by fulltextreports

Mitigating Risk in the Use of Social Media

November 14, 2011 by fulltextreports

Mitigating Risk in the Use of Social Media

Most government employees and agencies protect their computers by installing and updating reliable anti-virus software. Managers, IT staff and front-line workers understand the threats posed by malicious software, and they know that they have to take steps to counter that threat. But as more agencies take advantage of social media, new risks emerge that may take people by surprise and may leave individuals, groups, and computer networks vulnerable to attack or data breach.
To help government leaders, managers, and staff understand and mitigate the risks engendered by social media, Professor Alan Oxley of Universiti Teknologi PETRONAS has written “A Best Practices Guide for Mitigating Risk in the Use of Social Media,” a report released by the IBM Center for the Business of Government. It covers a range of risks and countermeasures that people can take to guard against them.
The report details how social media can be used by hackers who rely on either social engineering or malware to steal information or compromise government computer networks. Specifically, Prof. Oxley details:

  • Mitigating The Risk of Identity Theft through:
    • Information Scraping;
    • Social Engineering;
    • Phishing;
    • Spoofing; and
  • Mitigating the Risk of Malware through:
    • E-mail Attachments
    • Social Media Websites
    • Unsecured Data Storage Devices

+ Full Report (PDF)
Source: IBM Center for the Business of Government

Filed under: Data Files, News

SHARE:

GovernmentInformation TechnologyInternetPrivacy and SecuritySocial Media

About fulltextreports

ADVERTISEMENT

Archives

Job Zone

ADVERTISEMENT

Related Infodocket Posts

ADVERTISEMENT

FOLLOW US ON X

Tweets by infoDOCKET

ADVERTISEMENT

This coverage is free for all visitors. Your support makes this possible.

This coverage is free for all visitors. Your support makes this possible.

Primary Sidebar

  • News
  • Reviews+
  • Technology
  • Programs+
  • Design
  • Leadership
  • People
  • COVID-19
  • Advocacy
  • Opinion
  • INFOdocket
  • Job Zone

Reviews+

  • Booklists
  • Prepub Alert
  • Book Pulse
  • Media
  • Readers' Advisory
  • Self-Published Books
  • Review Submissions
  • Review for LJ

Awards

  • Library of the Year
  • Librarian of the Year
  • Movers & Shakers 2022
  • Paralibrarian of the Year
  • Best Small Library
  • Marketer of the Year
  • All Awards Guidelines
  • Community Impact Prize

Resources

  • LJ Index/Star Libraries
  • Research
  • White Papers / Case Studies

Events & PD

  • Online Courses
  • In-Person Events
  • Virtual Events
  • Webcasts
  • About Us
  • Contact Us
  • Advertise
  • Subscribe
  • Media Inquiries
  • Newsletter Sign Up
  • Submit Features/News
  • Data Privacy
  • Terms of Use
  • Terms of Sale
  • FAQs
  • Careers at MSI


© 2026 Library Journal. All rights reserved.


© 2022 Library Journal. All rights reserved.