The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January (2011 vol.44)
pp: 66-73
Anna Squicciarini , Pennsylvania State University
Sathya Dev Rajasekaran , Pennsylvania State University
ABSTRACT
An analytic methodology involving modeling and simulation could help decision makers determine how their employees' use of social networks impacts their organization, identify how to mitigate potential risks, and evaluate the financial and organizational implications of doing so.
INDEX TERMS
Social networks, Risk assessment, Identity analytics
CITATION
Anna Squicciarini, Sathya Dev Rajasekaran, Marco Casassa Mont, "Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks", Computer, vol.44, no. 1, pp. 66-73, January 2011, doi:10.1109/MC.2011.29
REFERENCES
1. C. Saran, "Policies Needed to Limit Social Networking Risks, Says KPMG," Computer Weekly,10 Jan. 2008; www.computerweekly.com/Articles/2008/01/ 10/228852policies-needed-to-limit-social-networking-risk-says.htm .
2. O. Ross, "CIOs Getting Serious about Social Networking," ZdNet,25 Feb. 2009; www.zdnet.com/news/cios-getting-serious-about-social-networking 272809.
3. D. Raywood, "Companies Encouraged to Restrict SocialNetworking Access," SC Magazine,4 Mar. 2009; www.scmagazineuk.com/companies-encouraged-to-restrict-social-networking-access/ article 128244.
4. "IT Managers Lack Knowledge of Web 2.0 Use on Their Networks," SC Magazine,2 Mar. 2010; www.scmagazineuk.com/it-managers-lack-knowledge-of-web-20-use-on-their-networks/ article 164872.
5. Int'l Organization for Standardization, ISO 27001, Information Security Management, 2005; www.iso.org/isocatalogue_detail?csnumber=42103 .
6. B. Monahan, "Gnosis: HP Labs Modeling and Simulation Framework," Systems Security Lab, 2009; www.hpl.hp.com/research/systems_security gnosis.html.
7. E. Zhelevam and L. Getoor, "To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles," Proc. World Wide Web Conf., ACM Press, 2009, pp. 531-540.
8. HP Labs, "Identity Analytics Project," 2009; www.hpl.hp.com/personal/Marco_Casassa_Mont/ Projects/IdentityAnalyticsIdentityAnalytics.htm .
9. B. Carminati and E. Ferrari, "Privacy-Aware Collaborative Access Control in Web-Based Social Networks," Proc. IFIP Data and Application Security Workshop, ACM Press, 2008, pp. 81-96.
10. A. Acquisti and R. Gross, "Imagined Communities: Awareness, Information Sharing and Privacy on Facebook," Proc. Privacy-Enhancing Technologies (PET) Workshop, LNCS 4258, Springer, 2006, pp. 36-58.
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool