Security Management and the Social Media Frank B. Nguyenloc SCMT699 – Masters of Arts in Security Management Capstone Option Professor Robert Pittman American Military University Security Management and the Social Media Security management emerges as one of the integral aspects in the contemporary world. Incidentally advanced technological advancement characterizes modern world as technology and globalization enhance communication and movement of people. Nevertheless social media is one of the major technological concepts trending across the globe. Many people focus on the advantages associated with the adverse growth and development of social media. However little attention is according to its disadvantages that affect people's way of life while at the same time making national security to be vulnerable. Markedly both personal and organizational environments face the risk of advance technology as unsuspecting people face the wrath of unethical users of social media platforms. While many people and government agencies suffer from for Development 22(3) 464-486. Chen Y. Zhu S. & Xu H. (2014). Protect Children Online Safety on Social Media and Mobile Platforms. University Park Pennsylvania: Pennsylvania State University. Cole E. (2011). Physical and logical security convergence: Powered by enterprise security management. Rockland MA: Syngress. Devine A. Boluk K. & Devine F. (2017). Managing social media during a crisis: A conundrum for event managers. Event Management 21(4) 375-389. doi:10.3727/152599517X14998876105729 Land M. Ricks T. & Ricks B. (2014). Security management : A critical thinking approach. Boca Raton FL: CRC Press. Marcellino W. Smith M. L. Paul C. & Skrabala L. (2017). Monitoring Social Media: Lessons for Future Department of Defense Social Media Analysis in Support of Information Operations. Santa Monica California: RAND Corporation. Stark L. (2016). The emotional context of information privacy. Information Society 32(1) 14-27. Trim P. J. & Lee Y. (2014). Cyber security management : A governance risk and compliance framework. Farnham England: Routledge. [...]
Using the information contained in the End of Program (EOP) Manual (2014), chapter 2, and feedback from your previous draft, compose a second draft of your thesis proposal. Submit including a title page and three references related to your proposed topic. Ensure that the references are from peer-reviewed journals, government sources, other appropriate academically acceptable sources, or some combination thereof.