{"title":"社交媒体互动中的信息安全挑战:跨物理和虚拟世界规范实践的策略","authors":"Santosh Putchala, K. Bhat, R. Anitha","doi":"10.1109/BPM.2013.6615012","DOIUrl":null,"url":null,"abstract":"With the onset of new communication models, social communication took a new shape and these interactions embraced the World Wide Web. These social media interactions are quite analogous to the real world communications, and have numerous derived benefits. Humongous amount of information is generated and exchanged through social media interactions. In most instances, this information exchange does not pass through authorizations, approvals and is thus uncontrolled. This poses major concerns regarding information security & privacy. For the organization, even though there are perceived business benefits from engaging in social media, un-controlled information exchange stands as a major concern. This paper details the strategies that can be employed so as to mitigate risks of social media to the organization. It discusses the information security & privacy risks and issues underlying the social media interactions. Further, the paper suggests strategies that can minimize the risks from these interactions. The paper concludes with a discussion on the nuances and suggests future work in this arena.","PeriodicalId":186910,"journal":{"name":"DSCI - Best Practices Meet 2013","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds\",\"authors\":\"Santosh Putchala, K. Bhat, R. Anitha\",\"doi\":\"10.1109/BPM.2013.6615012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the onset of new communication models, social communication took a new shape and these interactions embraced the World Wide Web. These social media interactions are quite analogous to the real world communications, and have numerous derived benefits. Humongous amount of information is generated and exchanged through social media interactions. In most instances, this information exchange does not pass through authorizations, approvals and is thus uncontrolled. This poses major concerns regarding information security & privacy. For the organization, even though there are perceived business benefits from engaging in social media, un-controlled information exchange stands as a major concern. This paper details the strategies that can be employed so as to mitigate risks of social media to the organization. It discusses the information security & privacy risks and issues underlying the social media interactions. Further, the paper suggests strategies that can minimize the risks from these interactions. The paper concludes with a discussion on the nuances and suggests future work in this arena.\",\"PeriodicalId\":186910,\"journal\":{\"name\":\"DSCI - Best Practices Meet 2013\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"DSCI - Best Practices Meet 2013\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BPM.2013.6615012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"DSCI - Best Practices Meet 2013","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BPM.2013.6615012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds
With the onset of new communication models, social communication took a new shape and these interactions embraced the World Wide Web. These social media interactions are quite analogous to the real world communications, and have numerous derived benefits. Humongous amount of information is generated and exchanged through social media interactions. In most instances, this information exchange does not pass through authorizations, approvals and is thus uncontrolled. This poses major concerns regarding information security & privacy. For the organization, even though there are perceived business benefits from engaging in social media, un-controlled information exchange stands as a major concern. This paper details the strategies that can be employed so as to mitigate risks of social media to the organization. It discusses the information security & privacy risks and issues underlying the social media interactions. Further, the paper suggests strategies that can minimize the risks from these interactions. The paper concludes with a discussion on the nuances and suggests future work in this arena.