The Ethics of Social Media and Network Security: Issues in the Workplace

The Ethics of Social Media and Network Security: Issues in the Workplace

Copyright: © 2015 |Pages: 12
DOI: 10.4018/978-1-4666-7254-3.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

A definition of modern social media leads to the characterization of advantages and disadvantages of social media in the workplace. The characteristics of social media are: reach, accessibility, immediacy, and permanence paradox. The extent of media invasion of privacy is discussed in this chapter, and ethical dilemmas are raised. Social networks are regarded as the main reasons for the decrease of productivity and other unanticipated confidential problems, which a company may face. Furthermore, the implications of security alerts lead to a dilemma between individual privacy and common interest. Different types of attacks might interfere with an existing functional network. Relevant current issues in Network Security include: authentication, integrity, confidentiality, non-repudiation, and authorization.
Chapter Preview
Top

State Of The Art

The security software market has witnessed a boom during the past few years. The number of individuals buying Network Security tools is increasing rapidly. In fact, this particular market has grown from 6.4 billion dollars in 2004, to 16.5 billion dollars in 2010 (Gartner, 2011). According to Dey et al., there are two main categories of Network Security software. These categories are:

  • 1.

    Off-the-Shelf Third-Party Standalone Tools: Includes antivirus, antispyware, anti-spam-ware software among other products; and

  • 2.

    System Components: Such as encryption software and firewalls that are engraved within the operating systems of computers.

There are currently 81 vendors of antivirus software in North America, and 87 vendors worldwide (Dey et al., 2012). The most prominent companies specializing in Network Security software are Symantec, McAfee, Kaspersky and others.

Complete Chapter List

Search this Book:
Reset