[go: up one dir, main page]

Ward et al., 2016 - Google Patents

Is Social Media a Threat or Can It Be a Trusted Agent?

Ward et al., 2016

View PDF
Document ID
16846770881249196862
Author
Ward W
Cole-Miller K
Fruhling A
Dempsey-Cooper K
Publication year
Publication venue
Journal of Information Warfare

External Links

Snippet

There is a prevailing belief within the United States Department of Defense (DOD) that social media is a threat to national security, leading to restrictions in workplace use of social-media applications. However, instead of dismissing social media as a threat, leaders should be …
Continue reading at digitalcommons.unomaha.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
Qureshi et al. IT‐mediated social interactions and knowledge sharing: Role of competence‐based trust and background heterogeneity
Carminati et al. Security and trust in online social networks
Bundy et al. A burden of responsibility: The role of social approval at the onset of a crisis
US8402548B1 (en) Providing user confidence information to third-party systems
Renaud et al. Cyber security responsibilization: an evaluation of the intervention approaches adopted by the Five Eyes countries and China
Braman Privacy by design: Networked computing, 1969–1979
Koepke Cybersecurity information sharing incentives and barriers
Nyblom et al. Risk perceptions on social media use in Norway
Cook Effective cyber security strategies for small businesses
Romansky et al. Business virtual system in the context of e‐governance: Investigation of secure access to information resources
Ahmadinejad et al. Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems
Tene Me, myself and I: Aggregated and disaggregated identities on social networking services
Ward et al. Is Social Media a Threat or Can It Be a Trusted Agent?
Tsekeris et al. Investigating the internet in Greece: findings from the world internet project
Chitare et al. “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations
Eugene A Delphi Study: A Model to Help IT Management within Financial Firms Reduce Regulatory Compliance Costs for Data Privacy and Cybersecurity
Badrul et al. Online disclosure of employment information: Exploring Malaysian government employees' views in different contexts
Gautam Navigating the Risks of Dark Data: An Investigation into Personal Safety
Cornelius Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge
Omotayo et al. Privacy and security information awareness and disclosure of private information by users of online social media in the Ibadan metropolis, Nigeria
Mui et al. In-Person and Remote Employees and Information Security Policy Compliance
McTurk Forensic Professionals' Views on the Lack of Standards in the Digital Forensic Field: A Generic Qualitative Inquiry
Biscop et al. Anonymity technologies in investigative journalism: a tool for inspiring trust in sources
Grace The effects of age on users’ attitudes toward security and privacy in a social media environment: a quantitative study
Collins Development of a Phishing Risk Exposure Taxonomy on Mobile Devices in the Healthcare Industry