An Investigation of How Businesses Are Highly Influenced by Social Media Security.
Daniel W. K. TseDerek HL ToXin ChenZhongyi HuangZhenlin QinShaneli BharwaneyPublished in: MISNC (2014)
Keyphrases
- social media
- information security
- social networks
- security requirements
- network security
- intrusion detection
- security issues
- social media data
- computer security
- access control
- electronic commerce
- social media sites
- security systems
- e government
- social networking sites
- data mining
- security problems
- authentication protocol
- elliptic curve
- case study
- functional requirements
- database systems
- statistical databases
- risk assessment
- security policies
- decision makers
- business models