References

Abdul Waheed, S., Elis, S. February 13PM: No Parallels between Egypt and Malaysia. Malaysia: New Sunday Times, 2011.

Alam, M., Zhang, X., Nauman, M., Ali, T., Seifert, J. -P., Model-Based Behavioral Attestation. Proceedings of SACMAT08, ACM, 2008.

Ali, S. Twitter Helps in Haiti Quake Coverage, Aid. WSJ [Wall Street Journal] blog, January 14, available at http://blogs. wsj. com/digits/2010/01/14/twitter-helps-in-haiti-quake-coverage-aid/, 2010.

Anderson, J. Q., Rainie, L., Anderson, J. Q., Rainie, L. Millennials Will Make Online Sharing in Networks a Lifelong Habit. Pew Internet & American Life Project, July 9 http://www. pewinternet. org/Reports/2010/Future-of-Millennials/Overview. aspx, 2010.

Anti-Gov’t Propagandist Arrested. Viet Nam News. April 29, available at: http://vietnamnews. vn/social-issues/210853/anti-govt-propagandist-arrested. html, 2011.

Australian Public Service Commission. Circular 2009/6: Protocols for Online Media Participation, 2009. [November 18].

Bae, Y. K., Lim, J. S., Shin, S. -B., Lee, T. -W. paper given at IEEE International Conference on Advanced Learning Technologies. A Web-based Discussion Learning System Focusing on Teacher-Parent Feedback, 2004

Barber, I. Bayesian Opinion Mining. available at: http://phpir. com/bayesian-opinion-mining, 2010.

Barnes, N. G. and Mattson, E. (n. d. ) Social Media and College Admissions: The First Longitudinal Study, available at: http://sncr. org/sites/default/files/mediaandadmissions_0. pdf

BBC News. Hackers Take Down Child Pornography Sites. October 24, available at: http://www. bbc. com/news/technology-15428203, 2011.

News, B. B. C. Lulzsec Hacking Accused Ryan Ackroyd in Court. March 16, available at http://www. bbc. co. uk/news/uk-england-17399149, 2012.

Bertot, J. C., Jaeger, P. T., Munson, S., Glaisyer, T. Engaging the Public in Open Government: Social Media Technology and Policy for Government Transparency. available at: http://www. tmsp. umd. edu/TMSPreports_files/6. IEEE-Computer-TMSP-Government-Bertot-100817pdf. pdf, 2010.

Bourn, J. Supporting Innovation: Managing risk in Government Departments. London: National Audit Office, 2000.

Boyd, S. Disaster Microsyntax: Project EPIC, Tweak the Tweet, and Emergency Codes. available at: http://stoweboyd. com/post/786084841/disastermicrosyntax, 2010.

Brenner, J. Pew Internet: Social Networking (Full Detail). Pew Internet and American Life Project, February 14, available at: http://pewinternet. org/Commentary/2012/March/Pew-Internet-Social-Networking-full-detail. aspx, 2013.

Brewin, M. (n. d. ) Bristol e-Petitioner: Lessons Learned from the Day to Day Management of an E-petitions Website, Bristol City Council.

Byron, T. Safer Children in a Digital World: The Byron Review. London: Department for Education, 2008.

Cabinet Office. The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World. Cabinet Office, UK, available at: http://www. carlisle. army. mil/dime/documents/UK%20Cyber%20Security%20Strategy. pdf, 2011.

Catholic Education Office. Staff Use of Social Media in Sydney Catholic Schools. available at: http://www. ceosyd. catholic. edu. au/About/Documents/pol-socialmedia-staff. pdf, 2011.

CFP. Welcome to Computers, Freedom, and Privacy 2008. available at: http://www. cfp2008. org/wiki/index. php/Main_Page, 2008.

Chesbrough, H. W. Open Innovation: The New Imperative for Creating and Profiting from Technology. Boston, Mass: Harvard Business School Press, 2006.

Chief Information Office. Guidelines for Secure Use of Social Media by Federal Departments and Agencies. Version 1. 0, Chief Information Office, USA, available at: https://cio. gov/wp-content/uploads/downloads/2012/09/Guidelines_for_Secure_Use_Social_Media_v01-0. pdf, 2009.

CIMB Bank and CIMB Islamic. Stay Safe Online. available at: www. cimbclicks. com. my/keepsave_report10. htm, 2008.

CIMB Bank and CIMB Islamic. Reported Scams. available at: https://www. cimbclicks. com. my/keepsave_report028. htm, 2011.

City of Chandler. Administrative Regulation [on] Social Media/Social Networking. City of Chandler, Arizona, available at: http://icma. org/en/icma/knowledge_network/documents/kn/Document/300737/Social_Media_Policy__City_of_Chandler_AZ, 2009.

CMS. Basics of Risk Analysis and Risk Management. HIPAA Security Series, Centers for Medicare & Medicaid Services, Volume 2, Paper 6, page 5, available at: http://www. hhs. gov/ocr/privacy/hipaa/administrative/securityrule/riskassessment. pdf, 2007.

Coleman, C. Web 2. 0 Tools Encourage Public Debate. remarks at the CRM Evolution 2009, New York, August 25, available a http://www. gsa. gov/portal/content/103720, 2009.

Common Criteria Project Part 1: Introduction and General Model,” Version 3. 1, Revision 3, Final, CCMB-2009-07-001. Common Criteria for Information Technology Security Evaluation. 2009.

comScore, Inc. US Digital Year in Review 2010: A Recap of the Year in Digital Media, 2011.

Coppola, N. W., Hiltz, S. R., Rotter, N. G. Building Trust in Virtual Teams. IEEE Transactions on Professional Communication. 2004; 47(2):95–104.

De Jong J., Rizvi G., eds. The State of Access: Success and Failure of Democracies to Create Equal Opportunities (Innovative Governance in the 21st Century). Brookings Institution Press, 2009.

Debatin, B., Lovejoy, J. P., Horn, A. -K., Hughes, B. N. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication. 2009; 15(1):83–108.

Dept of Education and Child Development. Cyber-Safety: Keeping Children Safe in a Connected World: Guidelines for Schools and Preschools. Department of Education and Child Development, South Australia, available at: http://www. decd. sa. gov. au/docs/documents/1/CyberSafetyKeepingChildre. pdf, 2009.

Dept of Education and Child Development. Cyber Safety. Department of Education and Child Development, South Australia, available at: http://www. decd. sa. gov. au/speced2/pages/cybersafety, 2011.

Dept of Education and Early Childhood Development. Privacy and Security. Department of Education and Early Childhood Development, Victoria, available at: http://www. education. vic. gov. au/about/programs/learningdev/Pages/ultranetprivacy. aspx, 2012.

Dept of Finance and Deregulation. Social Media 101: A Beginner’s Guide for Finance Employees. Department of Finance and Deregulation, Australia, available at: http://agimo. govspace. gov. au/files/2010/04/social-media-101. pdf, 2010.

Dept of Human Services (n. d. ) “Policies on our Social Media Accounts,” Department of Human Services, Australia, available at http://www. humanservices. gov. au/corporate/site-information/policies-on-our-social-media-accounts

Dept of Trade and IndustryInformation Technology Security Evaluation Criteria, Harmonized Criteria of France, Germany, the Netherlands, the United Kingdom. London: Department of Trade and Industry, 1991.

Dotcom, K. Kim Dotcom’s Letter to Hollywood. The Hollywood Reporter, July 18, available at: http://www. hollywoodreporter. com/news/kim-dotcom-megaupload-extradition-350605, 2012.

Drapeau, M., Wells, L., II. Social Software and National Security: An Initial Net Assessment, Center for Technology and National Security Policy, National Defense University. available at: http://www. dtic. mil/cgi-bin/GetTRDoc?AD=ADA497525, 2009.

Dwyer, C., Hiltz, R. S., Passerini, K., Trust and Privacy Concern With Social Networking Sites: a Comparison of Facebook and MySpace Keystone, Colorado. paper given at the Thirteen Americas Conference on Information System. 2007;

Edelman, B. Adverse Selection in Online ‘Trust’ Certifications and Search Results. Electronic Commerce Research and Applications. 2011; 10(1):17–25.

European Commission (n. d. ) Public Opinion, available at: http://ec. europa. eu/public_opinion/index_en. htm

European Parliament. Hacking IT Systems to Become a Criminal Offence. March 27, available at: http://www. europarl. europa. eu/news/en/pressroom/content/20120326IPR41843/html/Hacking-IT-systems-to-become-a-criminal-offence, 2012.

European Union. Ministerial Declaration on eGovernment Approved Unanimously in Malmd. Sweden, on 18 November 2009, available at: https://ec. europa. eu/digital-agenda/sites/digital-agenda/files/ministerial-declaration-on-egovernment-malmo. pdf, 2009.

Facebook. About. available at: http://www. facebook. com/pages/Best-Information-for-Best-Media-BIBM/165048396919567?sk=info, 2013.

Facebook. Key Facts. available at: http://newsroom. fb. com/Key-Facts, 2013.

Ferraiolo, D. F., Kuhn, D. R., Chandramouli, R. Role-Based Access Control. Artech House, 2003.

Firesmith, D. G. Engineering Security Requirements. Journal of Object Technology. 2003; 2(1):53–68.

Fogel, J., Nehmad, E. Internet Social Network Communities: Risk Taking, Trust, and Privacy Concerns. Computers in Human Behavior. 2009; 25(1):153–160.

Freeland, C. Column: Statecraft by Twitter, Reuters. April 5, available at: http://www. reuters. com/article/2012/04/05/column-freeland-twitter-idUSL2E8F54SJ20120405, 2012.

Fu, F., Liu, L., Wang, L. Empirical Analysis of Online Social Networks in the Age of Web 2. 0. Physica A. 2008; 387:675–684.

Ganapathy, N., Mukherjee Set to Be India’s 13th President July 20, Singapore. The Straits Time. 2012;

Garfinkel, S., Spafford, G., Schwartz, A. Practical UNIX and Internet Security. O’Reilly Media, 2003.

Gartner. Amplifying the Enterprise: Insights from the 2012 Gartner CIO Agenda Report. available at: http://imagesrv. gartner. com/cio/pdf/cio_agenda_insights. pdf, 2012.

GCHQ. UK Universities Awarded Academic Centre of Excellence status in Cyber Security Research. Government Communications Headquarters, available at: http://www. gchq. gov. uk/press/pages/cyber-security-research-centres-of-excellence. aspx, 2012.

Gill, C. The Facebook Crimewave Hits 100,000 in the Last Five Years. Daily Mail, December 14, available at: http://www. dailymail. co. uk/news/article-1338223/Facebook-crime-rises-540-cent-3-years-police-chiefs-16-forces-reveal. html, 2010.

Ginopolis, M. Digitaleading – Part II. blog, Dangerously Irrelevant, October 10, available at: http://scottmcleod. typepad. com/dangerouslyirrelevant/2006/10/digitaleader_pa. html, 2006.

Gollmann, D. Computer Security. John Wiley and Sons, 2011.

Governor, J., Hinchcliffe, D., Nickull, D. Web 2. 0 Architectures. O’Reilly, 2009.

GOV. UK (n. d. ) “Guide [to] Jury Service, part 4: Discussing the Trial,” available at: https://www. gov. uk/jury-service/discussing-the-trial

Grossman, L. You – Yes, You – Are TIME’s Person of the Year. Time, December 13, available at: http://henry. pha. jhu. edu/time. pdf, 2006.

Guy, M., Earle, P., Ostrum, C., Gruchalla, K., Horvath, S., Integration and Dissemination of Citizen Reported and Seismically Derived Earthquake Information via Social Network TechnologieCohen P. R., Adams N. M., Berthold M. R., eds. Lecture Notes in Computer Science. IDA 2010: Proceedings of the 9th International Conference on Advances in Intelligent Data Analysis. Springer, Berlin and Heidelberg, 2010.

Hardt, D. The OAuth 2. 0 Authorization Framework. available at: http://tools. ietf. org/html/draft-ietf-oauth-v2-31, 2012.

HM Government (n. d. ) “E-petitions – create and sign petitions online,” available at: http://epetitions. direct. gov. uk/

Honjo, M., Hasegawa, T., Hasegawa, T., Mishima, K., Suda, T., Yoshida, T., A Framework to Identify Relationships among Students in School Bullying Using Digital Communication Media. paper given at IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011.

HowTo. gov (n. d. ) “Federal-Compatible Forms of Service Agreements,” available at: http://www. howto. gov/web-content/resources/tools/terms-of-service-agreements

Hrdinova, J., Helbig, N., Peters, C. S. Designing Social Media Policy for Government: Eight Essential Elements, Center for Technology in Government. University of Albany, New York, available at: http://www. ctg. albany. edu/publications/guides/social_media_policy/social_media_policy. pdf, 2010.

Huey, W. T., Maesako, T. Development of a Dynamic Web-based Information System for Parents and Pupils to Enhance Decision-Making by School Personnel: A Case Study of Jurong Primary School. Singapore: IEEE International Conference on Computers in Education, 2002.

Ibrahim, R. The Potential for Using Mash-Ups at a Higher Education. Research Journal of Information Technology. 4(2), 2012.

ICO (n. d. ) “Taking Action: Data Protection and Privacy and Electronic Communications,” Information Commissioner’s Office, UK, available at: http://www. ico. gov. uk/what_we_cover/taking_action/dp_pecr. aspx

ICOGuidance on Data Security Breach Management. UK: Information Commissioner’s Office, 2011.

Internet 2 (n. d. ) “Middleware: Extending Shibboleth,” available at: http://www. internet2. edu/pubs/2006AR/shibboleth. cfm

Internet World Stats. Internet Users in the World: Distribution by World Regions – 2012 Q2. available at: http://www. internetworldstats. com/stats. htm, 2012.

Jarvenpaa, S. L., Leidner, D. E. Communication and Trust in Global Virtual Teams. Journal of Computer-Mediated Communication. 3(4), 1998.

Kaplan, A. M., Haenlein, M. Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons. 2010; 53(1):59–68.

Kelson, N. Social Media Audit/Assurance Program, Information Systems Audit and Control Association. available at: http://www. isaca. org/Knowledge-Center/Research/ResearchDeliverables/Pages/Social-Media-Audit-Assurance-Program. aspx, 2011.

King, M., Arthur, C. Lush Website Hack Sees Customers Defrauded. Guardian, January 21, available at: http://www. guardian. co. uk/money/2011/jan/21/lush-website-hack-customers-fraud, 2011.

Kistner, J. Social Media is the 3rd Era of the Web. available at: http://socialfresh. com/social-media-is-the-3rd-era-of-the-web/, 2010.

Klein, N. Citizen Co-Production of Government Services, summer internship paper. Department of Economics, Andrew Young School of Policy Studies, Georgia State University, 2010.

Kong, S. C., Li, K. M. Collaboration between School and Parents to Foster Information Literacy: Learning in the Information Society. Computers and Education. 2009; 52(2):275–282.

Krekel, B., Adams, P., Bakos, G. Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage. available at: http://www. uscc. gov/Research/occupying-information-high-ground-chinese-capabilities-computer-network-operations-and, 2012.

Kundra, V. The State of Federal Information Security. availableat:http://www. cio. gov/pages. cfm/page/Vivek-Kundra-Testimony-on-the-state-of-Federal-information-security, 2009.

Lavasoft, A. B. 9 Ways to Control Your Privacy on Social Network Sites. available at: http://www. lavasoft. com/company/newsletter/2010/06/article_9_ways_to_control_your_privacy_on_social_networking_sites. php, 2010.

Lazer, D., Neblo, M., Esterling, K., Goldschmidt, K. On-line Town Hall Meeting: Exploratory Democracy in the 21st Century. (Washington, D. C. : Congressional Management Foundation), available at: http://www. cmfweb. org/storage/cmfweb/documents/CMF_Pubs/on-line-town-hall-meetings. pdf, 2009.

LeMay, R. Fake Conroy claims Telstra sacking, 2009. [ZDNet, March 25].

Libraries of SA (n. d. ) “Social Media,” Public Library Services, South Australia, available at: http://www. libraries. sa. gov. au/site/page. cfm?u=279

Lim, P. Singapore’s Top Satirist Thrives in Election Season. AFP News, April 29, available at: http://sg. news. yahoo. com/singapores-top-satirist-thrives-election-season-025109933. html, 2011.

MacEachren, A. M., Robinson, A. C., Jaiswal, A., Pezanowski, S., Savelyev, A., et al. Geo-Twitter Analytics: Applications in Crisis Management. Proceedings of the 25th International Cartographic Conference, 2011. [Paris].

Maler, E. Navigate the Future of Identity and Access Management IAM for the Extended Enterprise Must Start from Zero Trust, Forrester Research. available at: http://www. forrester. com/Navigate+The+Future+Of+Identity+And+Access+Management/fulltext/-/E-RES61625, 2012.

Mayer, R. C., Davis, J. H., Schoorman, F. D. An Integrative Model of Organizational Trust. Academy of Management Review. 1995; 20(3):712.

Mendoza, M., Poblete, B., Castillo, C., Twitter Under Crisis: Can we Trust what we RT? First Workshop on Social Media Analysis (SOMA ’10). 2010. [Washington, D. C].

Mergel, I. Working the Network: A Manager’s Guide for Using Twitter in Government, Using Technology Series. Washington, D. C: IBM Center for the Business of Government, 2012.

Microsoft. How to Recognize Phishing E-mails or Links. available at: http://www. microsoft. com/canada/protect/protect-yourself/spam-and-phishing-scams/article. aspx?article=how-to-recognize-phishing-e-mails-or-links, 2010.

Mills, A., Chen, R., Lee, J. K., Rao, H. R. Web 2. 0 Emergency Applications: How Useful can Twitter be for Emergency Response. Journal of Privacy & Security. 5(3), 2009.

Mohtasebi, A., Borazjani, P. N. Privacy Concerns in Social Networks and Online Communities. paper given at the VALA2010 Conference, 2010.

Muncaster, P. Anonymous Turns Its Fire on China. The Register, April 5, available at: http://www. theregister. co. uk/2012/04/05/anonymous_china_hacks/, 2012.

Mutter, J. (n. d. ) “Hurricane Katrina Deceased-Victims List,” available at: http://www. katrinalist. columbia. edu

Neilsen. Buzz in the Blogosphere: Millions More Bloggers and Blog Readers. available at: http://www. nielsen. com/us/en/newswire/2012/buzz-in-the-blogosphere-millions-more-bloggers-and-blog-readers. html, 2012.

Netmums (n. d. ) “Internet Safety for Children,” available at: http://www. netmums. com/your-child/tweens-teens-secondary-schools/safe-surfing-on-the-internet

NISTRecommended Security Controls for Federal Information Systems and Organizations. National Institute of Standards and Technology, US Department of Commerce, 2009.

O’Reilly, T. What is Web 2. 0 – Design Patterns and Business Models for the Next Generation of Software. available at: http://oreilly. com/web2/archive/what-is-web-20. html, 2005.

O’Reilly, T. Government as a Platform. In: Lanthrop D., Ruma L., eds. Open Government: Collaboration, Transparency, and Participation in Practice. O’Reilly Media, 2010.

Oakleaf, C. Web 2. 0 Governance Policies and Best Practices. Social Media Subcouncil, available at: http://govsocmed. pbworks. com/w/page/15060450/Web-2-0-Governance-Policies-and-Best-Practices, 2012.

Obama, B. Memo on Transparency and Open Government. available at: http://www. whitehouse. gov/the_press_office/TransparencyandOpenGovernment, 2009.

Office of the Chief Information Officer, British Columbia. Use of Social Media in the B. C. Public Service. Version 3, available at: http://www. cio. gov. bc. ca/local/cio/informationsecurity/policy/summaries/33_social_media. pdf, 2010.

Office of the State Chief Information Officer, California. Social Media Standard SIMM 66B. available at: http://www. cio. ca. gov/Government/IT_Policy/pdf/simm_66b. pdf, 2010.

Ormond, M. M. Web 2. 0 and Motivation to Read. available at: http://www. scribd. com/doc/52671283/Action-Research-Web-2-0-and-Motivation-to-Read, 2011.

Ostrom, E. Collective Action and the Evolution of Social Norms. Journal of Economic Perspectives. 2000; 14(3):137–158.

Oxley, A. Formulating a Policy on IT Provision: Simple Strategies Can Go a Long Way Toward Creating IT Policy that Benefits the Entire Institution. Educause 3, available at: http://www. educause. edu/ero/article/formulating-policy-it-provision, 2005.

Oxley, A. A Best Practices Guide for Mitigating Risk in the Use of Social Media, IBM Center for the Business of Government. available at: http://www. businessofgovernment. org/sites/default/files/A%20Best%20Practices%20Guide%20for%20Mitigating%20Risk%20in%20the%20Use%20of%20Social%20Media. pdf, 2011.

Palen, L., Liu, S. B. Citizen Communications in Crisis: Anticipating a Future of ICT-Supported Public Participation. CHI 2007 Proceedings, 2007:727–736.

Pang, B., Lee, L. Opinion Mining and Sentiment Analysis. Foundations and Trends in Information Retrieval. 2008; 2(1–2):1–135.

Password Hacks Show Major Sites Are Vulnerable. Computer Fraud & Security, 2012. [6:1 and 3].

Pelgrin, W. F. Security and Privacy on Social Networking Sites. Monthly Security Tips – Newsletter 5(3), Multi-State Information Sharing & Analysis Center, available at: http://msisac. cisecurity. org/newsletters/documents/2010-03. pdf, 2010.

Piccoli, G., Ives, B. Trust and the Unintended Effects of Behavior Control in Virtual Teams. MIS Quarterly. 2003; 27(3):365–395.

Poulsen, K. Firsthand Reports From California Wildfires Pour Through Twitter. available at: http://www. wired. com/threatlevel/2007/10/firsthand-repor/, 2007.

Quantcast. Demographics. updated February 2013, available at: http://www. quantcast. com/twitter. com#!demo, 2013.

Quantcast. Twitter. com. available at: http://www. quantcast. com/twitter. com, 2013.

Rashid, F. Y. Sony Data Breach Was Camouflaged by Anonymous DDoS Attack, 2011. [eWeek, May 5].

Reuben, R. The Use of Social Media in Higher Education for Marketing and Communications: A Guide for Professionals in Higher Education. available at: http://eventos. ciff. net/wp-content/uploads/2012/01/DocumentoSeminarioII_SeminarioAcademico_3. pdf, 2008.

Rico, S., Bradley, B., Kiefer, M. USA Social Media: Business Benefits and Security, Governance and Assurance Perspectives, Information Systems Audit and Control Association. available at: http://www. isaca. org/Knowledge-Center/Research/ResearchDeliverables/Pages/Social-Media-Business-Benefits-and-Security-Governance-and-Assurance-Perspectives. aspx, 2010.

Rodriguez, A., Fernandez-Medina, E., Piattini, M., Security Requirement with a UML 2. 0 Profile. Proceedings of the First International Conference on Availability, Reliability and Security. ARES ’06, 2006

Rodriguez, A., Fernandez-Medina, E., Piattini, M. Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases. In: Alonso G., Dadam P., Rosemann M., eds. Business Process Management, Lecture Notes in Computer Science. Berlin and Heidelberg: Springer, 2007.

Romle, A. A., Singh, D. Integrated Parent Information System (SMIB) to Increase Parental Involvement in Children’s Learning Process in Malaysian Primary School. paper given at the IEEE International Conference on Electrical Engineering and Informatics, 2011.

Samsung (n. d. ) “Samsung Mobile Parent-Teacher Collaboration,” available at: http://www. samsung. com/ph/business-images/resource/brochure/2012/11/EBT_1208_EBTsource_IS_Education_Parent_Teacher_Collaboration-en-v2_BR-0-0. pdf

Scherer, M. Can They Win, One Tweet at a Time? Time Magazine, 2011. [May 30].

Social Media Governance (n. d. ) “Policy Database,” available at http://www. socialmediagovernance. com/policies. php?f=5

Socialbakers. United Kingdom Facebook Statistics. available at: http://www. socialbakers. com/facebook-statistics/united-kingdom, 2013.

Starbird, K., Palen, L. Pass It On?: Retweeting in Mass Emergency. Proceedings of the 7th International ISCRAM Conference, Seattle, 2010.

Starbird, K., Stamberger, J. Tweak the Tweet: Leveraging Microblogging Proliferation with a Prescriptive Syntax to Support Citizen Reporting. Proceedings of the 7th International ISCRAM Conference, Seattle, 2010.

Steinberg, R. M., Everson, M. E. A., Martens, F. J., Nottingham, L. E. Enterprise Risk Management: Integrated Framework, 2004. [Committee of Sponsoring Organizations of the Treadway Commission].

Stoneburner, G., Goguen, A., Feringa, A. Risk Management Guide for Information Technology Systems, 2002. [NIST special publication 800–30].

Sutton, J., Palen, L., Shklovski, I. Fiedrich F., Van der Walle B., eds. Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires. Proceedings of the 5th International ISCRAM Conference, 2008. [Washington, D. C].

Swanson, M., Guttman, B. Generally Accepted Principles and Practices for Securing Information Technology Systems. NIST National Institute of Standards and Technology, US Department of Commerce, 1996.

Texas State Library and Archives Commission (n. d. ) “Glossary,” available at: https://www. tsl. state. tx. us/ld/pubs/compsecurity/glossary. html)

The White House (n. d. ) We the People – Your Voice in Our Government, available at: https://wwws. whitehouse. gov/petitions

Thomas, K., Grier, C., Nicol, D. M., UnFriendly: Multi-party Privacy Risks in Social NetworksAtallah M. J., Hopper N. J., eds. Privacy Enhancing Technologies. Lecture Notes in Computer Science. Springer, Heidelberg and Berlin, 2010.

Tijerino, Y., Masaki, H., Igaki, N. AcadeMix Juice: A Hybrid Web 2. 0/Semantic Web Platform for Exchange of Academic Knowledge. Proceedings of the 2006 IEEE/WIC/ACM International conference on Web Intelligence and Intelligent Agent Technology (WI-IATW ’06), 2006. [IEEE Computer Society].

Toh, K. Straits Times, July 20. S’pore, US Sign Pact on Data-Sharing to Fight Crime. 2012. [Singapore].

Tracer, Z. Buffett Says Buying Facebook for a Pop Was Terrible Idea. Bloomberg Businessweek, July 14, available at: http://www. businessweek. com/news/2012-07-13/buffett-says-buying-facebook-for-a-pop-was-terrible-idea, 2012.

Trusted Computing Group. TCG Specification Architecture Overview. available at: http://www. trustedcomputinggroup. org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview. pdf, 2007.

Twitter. Euro 2012 Recap. blog, July 1, available at: http://blog. twitter. com/2012/07/euro-2012-recap. html, 2012.

Twitter. Rate Limiting. available at: https://dev. twitter. com/docs/rate-limiting#rest, 2012.

Twitter. There are now more than 200M monthly active @twitter users. tweet, December 18, available at: https://twitter. com/twitter/status/281051652235087872, 2012.

Twitter. Twitter Turns Six. blog, March 21, available at: http://blog. twitter. com/2012/03/twitter-turns-six. html, 2012.

Twopcharts (n. d. ) “The Last 100M Twitter Accounts,” available at: twopcharts. com/twitter500million. php

Ullrich, C., Borau, K., Luo, H., Tan, X., Shen, L., Shen, R. Why Web 2. 0 is Good for Learning and for Research: Principles and Prototypes. paper given at the WWW 2008 Conference, 2008.

US Dept of Justice. Justice Department Charges Leaders of Megaupload with Widespread Online Copyright Infringement. Office of Public Affairs, US Department of Justice, January 19, available at: http://www. justice. gov/opa/pr/2012/January/12-crm-074. html, 2012.

US Dept of the Interior (n. d. ) “US Geological Survey: Twitter Earthquake Detector (TED),” available at: http://www. recovery. doi. gov/press/us-geological-survey-twitter-earthquake-detector-ted/

Securities, U. S., Exchange Commission. Form S-1 Registration Statement Under the Securities Act of 1933: Facebook, Inc. available at: http://www. sec. gov/Archives/edgar/data/1326801/000119312512034517/d287954ds1. htm, 2012.

Van Leuven, L. Optimizing Citizen Engagement During Emergencies Through Use of Web 2. 0 Technologies, 2009. [Master’s thesis, Naval Postgraduate School, Monterey, California].

Verizon. 2012 Data Breach Investigations Report. available at: http://www. verizonbusiness. com/resources/reports/rp_data-breach-investigations-report-2012_en_xg. pdf, 2012.

Vieweg, S., Hughes, A. L., Starbird, K., Palen, L. Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. Proceedings of the 28th International Conference on Human Factors in Computing Systems. 2010:1079–1088.

Visible Measures Corp. 2011 Visible Measures Social Video Advertising Report, 2012.

Wangpipatwong, T., Piamsakkamol, S. The Design of Online Learning Community Using Web 2. 0. ICT 1(3), available at: http://ejournals. swu. ac. th/index. php/ictl/article/view/379/374, 2008.

Wikipedia (n. d. ) “Coproduction (Public Services),” available at: http://www. en. wikipedia. org/wiki/Coproduction_of_public_services_by_service_users_and_communities

Wikipedia (n. d. ) “Mashup (Web Application Hybrid),” available at: http://www. en. wikipedia. org/wiki/Mashup_%28web_application_hybrid%29

Wikipedia (n. d. ) “Microblogging,” available at: http://www. en. wikipedia. org/wiki/Microblogging

Wikipedia (n. d. ) “Online Communication Between School and Home,” available at: http://www. en. wikipedia. org/wiki/Online_communication_between_school_and_home

Wikipedia (n. d. ) “Technology Acceptance Model,” available at: http://www. en. wikipedia. org/wiki/Technology_acceptance_model

Wikipedia (n. d. ) “Transport Layer Security,” available at: http://en. wikipedia. org/wiki/Transport_Layer_Security

Wikipedia (n. d. ) “Web 2. 0,” available at: http://www. en. wikipedia. org/wiki/Web_2. 0

Williams, C. Anonymous ‘Robin Hood’ Hacking Attack Hits Major Firms. Telegraph, December 28, available at: http://www. telegraph. co. uk/technology/news/8980453/Anonymous-Robin-Hood-hacking-attack-hits-major-firms. html, 2011.

Wilson, T., Wiebe, J., Hoffmann, P. Recognizing Contextual Polarity in Phrase-Level Sentiment Analysis. Proceedings of Human Language Technology Conference and Conference on Empirical Methods in Natural Language Processing (HLT/EMNLP), 2005. [Vancouver].

Wolter, C., Menzel, M., Meinel, C., Modelling Security Goals in Business ProcessesKuehne T., Reisig W., Steimann F., eds. Modellierung 2008. Lecture Notes in Informatics. Gesellschaft fuer Informatik, Bonn, 2008.

YouTube (n. d. ) “Viewership is Growing,” http://www. youtube. com/yt/advertise/whos-watching. html

Zarrella, D. The Social Media Marketing Book, 2009. [O’Reilly Media].

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.195.215