Annotated Bibliography: Security Management and the Social Media Name Institution Annotated Bibliography: Security Management and the Social Media Almeida F. (2012). Web 2.0 technologies and social networking security fears in enterprises. (IJACSA) International Journal of Advanced Computer Science and Applications Vol.3 No.2: 152-156 Almeida Fernando has wide knowledge on internet and security management. He is a professor at the Faculty of Engineering at the University of Porto. Almeida focuses his study on Web 2.0 usage in organizations associated security risks and possible solutions. According to the article the Web 2.0 plays an important role in organizations as they use social networking platforms in IT functions customer service and marketing and sales. However the interactive collaborative nature of the internet exposes organizations to great risks. Top security threats exacerbated by social networking include malware and virus introduction spam volume and spyware increase data leaks and exposed entry points. Companies can Springer. Cross M. (2013). Social media security: Leveraging social networking while mitigating risk. Boston: Newnes. Gupta R. & Brooks H. (2013). Using social media for global security. Hoboken NJ: John Wiley & Sons. Just J. (2015). Jihad 2.0: The impact of social media on the Salafist scene and the nature of terrorism. New York NY: Anchor Academic Publishing. Kumar A. Gupta S. K. Rai A. K. & Sinha S. (2013). Social networking sites and their security issues. International Journal of Scientific and Research Publications Volume 3 Issue 4: 1-5. Kumar D. V. Varma P. S. S. & Pabboju S. S. (2013). Security issues in social networking. IJCSNS International Journal of Computer Science and Network Security VOL.13 No.6: 120-124. Mao W. & Wang F. (2012). New advances in intelligence and security informatics. Cambridge MA: Academic Press. MacLennan A. (2014). Information governance and assurance: Reducing risk promoting policy. London: Facet Publishing. [...]
The discussion for each entry will consist of a single paragraph including the following: First 1-2 sentences will establish the credentials of the author(s) or creating entity Nest 3-4 sentences will discuss content The final 1-2 sentences will explain how the source is valuable to your particular topic NOTE: Remember to write in the third person formal. Submit with a standard APA title page and a References list *(the references list will include the basic citations from the annotated bibliographic entries only).