Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.
By:
Michael Erbschloe
Imprint: CRC Press
Country of Publication: United Kingdom
Dimensions:
Height: 234mm,
Width: 156mm,
Weight: 612g
ISBN: 9781138036024
ISBN 10: 1138036021
Pages: 303
Publication Date: 08 May 2017
Audience:
Professional and scholarly
,
College/higher education
,
Undergraduate
,
Primary
Format: Hardback
Publisher's Status: Active
A Framework to Analyze Emerging Social Media Warfare Strategies. Civilian Government Use of Social Media to Attack, Defend, or Control. Military Applications of Social Media Warfare. Corporate Efforts to Deploy or Respond to Social Media Warfare Strategies. Special Interest Groups use of Social Media Warfare. Social Media Warfare in the Political Electoral Process. Social Media Warfare for Support of Social Causes. The Mercenaries and Activists of Social Media Warfare. Social Media as a Weapon to Recruit and Inspire Violent Extremists. Social Media Warfare for Celebrity and People of Notoriety. Child Victims in Social Media Warfare. Adult Victims in Social Media Warfare. Law Enforcement Response to Social Media Warfare. Educational Institutions Response to Social Media Warfare. Monitoring Social Media Warfare Threats.
Michael Erbschloe has worked for over 30 years performing analysis of the economics of information technology, public policy relating to technology, and utilizing technology in reengineering organization processes. He has authored several books on social and management issues of information technology most of which covered some aspects of information or corporate security. I have also taught at several universities and developed technology-related curriculum. His career has focused on several interrelated areas: technology strategy, analysis, and forecasting; teaching and curriculum development; writing books and articles; speaking at conferences and industry events; publishing and editing; and public policy analysis and program evaluation.