This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks
January 2011 (vol. 44 no. 1)
pp. 66-73
Anna Squicciarini, Pennsylvania State University
Sathya Dev Rajasekaran, Pennsylvania State University
An analytic methodology involving modeling and simulation could help decision makers determine how their employees' use of social networks impacts their organization, identify how to mitigate potential risks, and evaluate the financial and organizational implications of doing so.

1. C. Saran, "Policies Needed to Limit Social Networking Risks, Says KPMG," Computer Weekly,10 Jan. 2008; www.computerweekly.com/Articles/2008/01/ 10/228852policies-needed-to-limit-social-networking-risk-says.htm .
2. O. Ross, "CIOs Getting Serious about Social Networking," ZdNet,25 Feb. 2009; www.zdnet.com/news/cios-getting-serious-about-social-networking 272809.
3. D. Raywood, "Companies Encouraged to Restrict SocialNetworking Access," SC Magazine,4 Mar. 2009; www.scmagazineuk.com/companies-encouraged-to-restrict-social-networking-access/ article 128244.
4. "IT Managers Lack Knowledge of Web 2.0 Use on Their Networks," SC Magazine,2 Mar. 2010; www.scmagazineuk.com/it-managers-lack-knowledge-of-web-20-use-on-their-networks/ article 164872.
5. Int'l Organization for Standardization, ISO 27001, Information Security Management, 2005; www.iso.org/isocatalogue_detail?csnumber=42103 .
6. B. Monahan, "Gnosis: HP Labs Modeling and Simulation Framework," Systems Security Lab, 2009; www.hpl.hp.com/research/systems_security gnosis.html.
7. E. Zhelevam and L. Getoor, "To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles," Proc. World Wide Web Conf., ACM Press, 2009, pp. 531-540.
8. HP Labs, "Identity Analytics Project," 2009; www.hpl.hp.com/personal/Marco_Casassa_Mont/ Projects/IdentityAnalyticsIdentityAnalytics.htm .
9. B. Carminati and E. Ferrari, "Privacy-Aware Collaborative Access Control in Web-Based Social Networks," Proc. IFIP Data and Application Security Workshop, ACM Press, 2008, pp. 81-96.
10. A. Acquisti and R. Gross, "Imagined Communities: Awareness, Information Sharing and Privacy on Facebook," Proc. Privacy-Enhancing Technologies (PET) Workshop, LNCS 4258, Springer, 2006, pp. 36-58.

Index Terms:
Social networks, Risk assessment, Identity analytics
Citation:
Anna Squicciarini, Sathya Dev Rajasekaran, Marco Casassa Mont, "Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks," Computer, vol. 44, no. 1, pp. 66-73, Jan. 2011, doi:10.1109/MC.2011.29
Usage of this product signifies your acceptance of the Terms of Use.