Social media brings business, but complicates security

Messmer, Ellen
May 2012
Network World;5/21/2012, Vol. 29 Issue 10, p1
Trade Publication
The article focuses on the impact and danger of the use of social media on business security. It states that while social media, like Facebook, Twitter, and LinkedIn, has become a part of life of employees and of the businesses for social interaction, it make employees spill sensitive data about their companies. According to Charles Renert, video lures is the biggest threats in the social media.


Related Articles

  • Social media spring clean. Powell, Fiona // NZ Business + Management;Oct2015, Vol. 29 Issue 9, pM26 

    The article discusses the importance of spring cleaning social media profiles in preventing potential privacy issues. Particular focus is given to social networking websites Facebook, LinkedIn and Twitter. Facebook users are advised to check their privacy settings and review which information...

  • Like it or not.  // ITNOW;Summer2013, Vol. 55 Issue 2, p28 

    The article offers the author's insights regarding the security risks that social media sites including LinkedIn, Twitter, and Facebook bring to business enterprises. The author says that social media threats such as malicious electronic mails (emails) and malware can affect the productivity,...

  • Social Network Privacy Settings Compared. MEDIATI, NICK // PCWorld;Sep2012, Vol. 30 Issue 9, p37 

    The article compares the privacy settings of several social network websites including Twitter, Google+, and Facebook. Topics include the difference between Public and Friends settings on Facebook, the Circles structure of Google+ that allows users to organize their followers into discrete...

  • Friends? Who needs them. Aron, Jacob // New Scientist;1/28/2012, Vol. 213 Issue 2849, p21 

    The article discusses research by scientist Adam Sadilek and team on the use of a dynamic Bayesian model to predict the location of a user of the social networking site Twitter through the analysis of time and location data from Twitter activity of people on that user's friend network. Also...

  • THE GHOSTS OF APP PERMISSIONS PAST. Thurston, Baratunde // Fast Company;May2015, Issue 195, p140 

    The article focuses on social networking sites and the online security aspects related with it. Topics include the privacy policies of networking sites like Facebook, Twitter, and Google, sharing of personal information on networking sites, and tracking of activities of users on social...

  • Legal Ethics and Social Media. SCHEEHLE, KARIN M. // Facts & Findings;Jan/Feb2013, Vol. 39 Issue 4, p40 

    The article focuses on the new ethical challenges faced by legal teams due to social media. It says that according to the legal ethics scholars, social media does not need new ethical rules, however, it needs to meet the challenges of the existing rules. It states that dealing with the...

  • FIVE OF THE THREATS. Nash, Graeme // ITNOW;Summer2013, Vol. 55 Issue 2, p26 

    The article offers information on the five threats that social networking websites including LinkedIn, Twitter, and Facebook might bring to companies which uses social networks in their business operations. It says that social networking sites may pose threats to corporate networks through...

  • Raising the Cohesion and Vitality of Online Communities by Reducing Privacy Concerns. Pan, Yu; Wan, Yan; Fan, Jing; Liu, Bailing; Archer, Norm // International Journal of Electronic Commerce;2017, Vol. 21 Issue 2, p151 

    How can the cohesion and vitality of an online community be improved through online privacy management and security policy advocacy? This has long been a goal of service providers and online group managers. However, previous studies have rarely explored the subject of group privacy concerns and...

  • Social Summer. Sutton, Susan // Ceramic Industry;Jun2012, Vol. 162 Issue 6, p6 

    The article discusses the utilization of social media such as Twitter, Facebook, and LinkedIn by Ceramic Industry (CI) as a method of communication of information to its readers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics