메뉴 건너뛰기




Volumn 14, Issue 2, 2012, Pages 171-180

A review of social media security risks and mitigation techniques

Author keywords

Data security; Risk management; Risk mitigation techniques; Secure online behaviour; Security policy; Security risks; Security strategy; Social media; User education and training

Indexed keywords


EID: 84861549713     PISSN: 13287265     EISSN: 17588847     Source Type: Journal    
DOI: 10.1108/13287261211232180     Document Type: Article
Times cited : (56)

References (41)
  • 1
    • 77956906456 scopus 로고    scopus 로고
    • An overview of social engineering malware: Trends, tactics, and implications
    • Abraham, S. and Chengalur-Smith, I. (2010), "An overview of social engineering malware: trends, tactics, and implications" in Technology in Society, Vol. 32, No. 3, pp. 183-96.
    • (2010) Technology in Society , vol.32 , Issue.3 , pp. 183-196
    • Abraham, S.1    Chengalur-Smith, I.2
  • 2
    • 84914123837 scopus 로고    scopus 로고
    • A research model for investigating human behavior related to computer security
    • Aytes, K. and Connolly, T. (2003), "A research model for investigating human behavior related to computer security" in AMCIS 2003 Proceedings, pp. 2027-31.
    • (2003) AMCIS 2003 Proceedings , pp. 2027-2031
    • Aytes, K.1    Connolly, T.2
  • 3
    • 84861556746 scopus 로고    scopus 로고
    • available at, (accessed 12 November), Ocean Blue
    • Blue Ocean (2011), Social Media Security Policy, available at: www.blueoceantechnologies.net/BlueOceanTechnologiesSocialMediaSecurityPolicy.pdf (accessed 12 November).
    • (2011) Social Media Security Policy
  • 4
    • 84861566517 scopus 로고    scopus 로고
    • available at, CDC, (accessed 12 October 2011)
    • CDC (2009), Social Media Security Mitigations, available at: www.cdc.gov/socialmedia/tools/guidelines/pdf/securitymitigations.pdf (accessed 12 October 2011).
    • (2009) Social Media Security Mitigations
  • 5
    • 84861550985 scopus 로고    scopus 로고
    • Security policy and social media use
    • available at, (accessed 9 November)
    • Chi, M. (2011), "Security policy and social media use", available at: www.sans.org/reading_room/whitepapers/policyissues/reducing-risks-social-media-organization_33749 (accessed 9 November).
    • (2011)
    • Chi, M.1
  • 6
    • 79952093275 scopus 로고    scopus 로고
    • Data leakage worldwide: The effectiveness of corporate security policies
    • available at, (accessed 16 November 2011), Systems Cisco
    • Cisco Systems (2008a), "Data leakage worldwide: the effectiveness of corporate security policies", available at: www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/Cisco_STL_Data_Leakage_2008_.pdf (accessed 16 November 2011).
    • (2008)
  • 7
    • 79952093275 scopus 로고    scopus 로고
    • Data leakage worldwide: The effectiveness of security policies
    • available at, (accessed 9 November 2011), Systems Cisco
    • Cisco Systems (2008b), "Data leakage worldwide: the effectiveness of security policies", available at: www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-503131.pdf (accessed 9 November 2011).
    • (2008)
  • 8
    • 84861538500 scopus 로고    scopus 로고
    • available at, (accessed 26 November 2011), United States Air Force
    • Clavette, L., Faggard, D., Bove, P. and Fordham, J. (2009), New Media and the Air Force, United States Air Force, available at: www.af.mil/shared/media/document/AFD-090406-036.pdf (accessed 26 November 2011).
    • (2009) New Media and the Air Force
    • Clavette, L.1    Faggard, D.2    Bove, P.3    Fordham, J.4
  • 9
    • 84861538502 scopus 로고    scopus 로고
    • Work life web 2011
    • available at, (accessed 12 November), Clearswift
    • Clearswift (2011), "Work life web 2011", available at: https://info.clearswift.com/express/clients/clearhq/papers/Clearswift_report_WorkLifeWeb_2011.pdf (accessed 12 November).
    • (2011)
  • 10
    • 84861538501 scopus 로고    scopus 로고
    • The weakest link is the human link
    • available at, (accessed 16 November)
    • Curry, S. (2011), "The weakest link is the human link", available at: www.securityweek.com/weakest-link-human-link (accessed 16 November).
    • (2011)
    • Curry, S.1
  • 11
    • 77956187913 scopus 로고    scopus 로고
    • It won't happen to me: Promoting secure behaviour among internet users
    • Davinson, N. and Sillence, E. (2010), "It won't happen to me: promoting secure behaviour among internet users" in Computers in Human Behavior, Vol. 26, No. 6, pp. 1739-47.
    • (2010) Computers in Human Behavior , vol.26 , Issue.6 , pp. 1739-1747
    • Davinson, N.1    Sillence, E.2
  • 13
    • 84861544269 scopus 로고    scopus 로고
    • Seven social media security best practices
    • available at, (accessed 16 November)
    • Ghosh, S. (2011), "Seven social media security best practices", available at: http://searchsecurity.techtarget.in/tip/Seven-social-media-security-best-practices (accessed 16 November).
    • (2011)
    • Ghosh, S.1
  • 15
    • 84861424896 scopus 로고    scopus 로고
    • Human information security behaviors: Differences across geographies and cultures in a global user survey
    • available at, (accessed 16 November 2011), Vancouver, BC
    • Hayden, L. (2009), "Human information security behaviors: differences across geographies and cultures in a global user survey", Proceedings of the American Society for Information Science and Technology Annual Meeting, Vancouver, BC, available at: www.asis.org/Conferences/AM09/open-proceedings/papers/2.xml (accessed 16 November 2011).
    • (2009) Proceedings of the American Society for Information Science and Technology Annual Meeting
    • Hayden, L.1
  • 17
    • 84909971501 scopus 로고    scopus 로고
    • available at, (accessed 16 November 2011), Intel
    • Intel (2009), Prioritizing Information Security Risks with Threat Agent Risk, available at: ftp://download.intel.com/it/pdf/Prioritizing_Info_Security_Risks_with_TARA.pdf (accessed 16 November 2011).
    • (2009) Prioritizing Information Security Risks with Threat Agent Risk
  • 18
    • 84861556559 scopus 로고    scopus 로고
    • Top five social media risks for business: New ISACA white paper
    • available at, (accessed 16 November 2011), ISACA
    • ISACA (2010), "Top five social media risks for business: new ISACA white paper", available at: www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/Top-Five-Social-Media-Risks-for-Business-New-ISACA-White-Paper.aspx (accessed 16 November 2011).
    • (2010)
  • 22
    • 71149088987 scopus 로고    scopus 로고
    • Users of the world, unite! The challenges and opportunities of social media
    • Kaplan, M. and Haenlein, M. (2010), "Users of the world, unite! The challenges and opportunities of social media" in Business Horizons, Vol. 53, No. 1, pp. 59-68.
    • (2010) Business Horizons , vol.53 , Issue.1 , pp. 59-68
    • Kaplan, M.1    Haenlein, M.2
  • 23
    • 84861551431 scopus 로고    scopus 로고
    • available at, (accessed 16 November 2011), Labs Kaspersky
    • Kaspersky Labs (2009), Kaspersky Security Bulletin: Malware Evolution 2008, available at: www.securelist.com/en/analysis?pubid=204792051 (accessed 16 November 2011).
    • (2009) Kaspersky Security Bulletin: Malware Evolution 2008
  • 24
    • 84861551458 scopus 로고    scopus 로고
    • available at, (accessed 16 November 2011), McAfee
    • McAfee (2010), 2011 Threats Predictions, available at: http://161.69.13.40/us/resources/reports/rp-threat-predictions-2011.pdf (accessed 16 November 2011).
    • (2010) 2011 Threats Predictions
  • 25
    • 84861534411 scopus 로고    scopus 로고
    • available at, (accessed 23 November), InfoSecurity M.W.R
    • MWR InfoSecurity (2011), Is Social Media One of Your Vulnerabilities?, available at: www.mwrinfosecurity.com/files/Events/mwri_social-media-security_2011-01-28.pdf (accessed 23 November).
    • (2011) Is Social Media One of Your Vulnerabilities?
  • 26
    • 84861538043 scopus 로고    scopus 로고
    • Social engineering: Concepts and solutions
    • Peltier, T.R. (2006), "Social engineering: concepts and solutions" in Information Systems Security, Vol. 15, No. 5, pp. 13-21.
    • (2006) Information Systems Security , vol.15 , Issue.5 , pp. 13-21
    • Peltier, T.R.1
  • 27
    • 84861544270 scopus 로고    scopus 로고
    • Top 8 web 2.0 security threats
    • available at, (accessed 25 November 2011)
    • Perez, S. (2009), "Top 8 web 2.0 security threats", available at: www.readwriteweb.com/enterprise/2009/02/top-8-web-20-security-threats.php (accessed 25 November 2011).
    • (2009)
    • Perez, S.1
  • 31
    • 84861547513 scopus 로고    scopus 로고
    • available at, (accessed 23 November), Institute S.A.N.S
    • SANS Institute (2011), Password Policy, available at: www.sans.org/security-resources/policies/Password_Policy.pdf (accessed 23 November).
    • (2011) Password Policy
  • 32
    • 84861560461 scopus 로고    scopus 로고
    • The US air force: Armed with social media
    • available at, (accessed 23 November 2011)
    • Scott, D.M. (2008), "The US air force: armed with social media", available at: www.webinknow.com/2008/12/the-us-air-force-armed-with-social-media.html (accessed 23 November 2011).
    • (2008)
    • Scott, D.M.1
  • 33
    • 84861543392 scopus 로고    scopus 로고
    • How to implement and enforce a social networking security policy
    • available at, (accessed 23 November 2011)
    • Sherry, D. (2008), "How to implement and enforce a social networking security policy", available at: http://searchsecurity.techtarget.com/tip/How-to-implement-and-enforce-a-social-networking-security-policy (accessed 23 November 2011).
    • (2008)
    • Sherry, D.1
  • 34
    • 80054707541 scopus 로고    scopus 로고
    • Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
    • Son, J.Y. (2011), "Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies" in Information & Management, Vol. 48, No. 7, pp. 296-302.
    • (2011) Information & Management , vol.48 , Issue.7 , pp. 296-302
    • Son, J.Y.1
  • 35
    • 84861569163 scopus 로고    scopus 로고
    • Example social media security policy
    • available at, (accessed 23 November), Sophos
    • Sophos (2011), "Example social media security policy", available at: www.sophos.com/sophos/docs/eng/smst/sophos-example-social-media-security-policy.pdf (accessed 23 November).
    • (2011)
  • 37
    • 84861544272 scopus 로고    scopus 로고
    • Social media protection flash poll global results
    • available at, (accessed 23 November), Symantec
    • Symantec (2011a), "Social media protection flash poll global results", available at: www.slideshare.net/symantec/symantec-2011-social-media-protection-flash-poll-global-results (accessed 23 November).
    • (2011)
  • 38
    • 84861552269 scopus 로고    scopus 로고
    • Symantec enterprise vault 10 reduces the risks of using social media tools for business
    • available at, (accessed 23 November), Symantec
    • Symantec (2011b), "Symantec enterprise vault 10 reduces the risks of using social media tools for business", available at: www.symantec.com/about/news/release/article.jsp?prid=20110801_02 (accessed 23 November).
    • (2011)
  • 39
    • 84861453131 scopus 로고    scopus 로고
    • Towards information security behavioral compliance
    • Vroom, C. and von Solms, R. (2004), "Towards information security behavioral compliance" in Information Management & Computer Security, Vol. 6, No. 4, pp. 167-73.
    • (2004) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Vroom, C.1    von Solms, R.2
  • 40
    • 84861569164 scopus 로고    scopus 로고
    • Monitoring social media for security references to your organization
    • available at, (accessed 23 November)
    • Zeltser, L. (2011), "Monitoring social media for security references to your organization", available at: http://isc.sans.edu/diary.html?storyid=10921 (accessed 23 November).
    • (2011)
    • Zeltser, L.1
  • 41
    • 84861540398 scopus 로고    scopus 로고
    • Social media: A hacker's secret weapon for accessing your network
    • available at, (accessed 23 November)
    • Zhang, H. (2011), "Social media: a hacker's secret weapon for accessing your network", available at: http://esj.com/Articles/2011/10/31/Social-Media-Hackers-Secret-Weapon.aspx?Page=1 (accessed 23 November).
    • (2011)
    • Zhang, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.