DRAFT: This module has unpublished changes.

 Abril, P., Levin, A., & Del Riego, A. (2012). Blurred boundaries: social media privacy and the twenty-first-century employee. American Business Law Journal, 49(1), 63-124.


'anonymous' warns of more cyber attacks in china. (2012, April 9). Retrieved from http://www.voanews.com/english/news/asia/east-pacific/Anonymous-Warns-of-More-Cyber-Attacks-in-China-146686215.html

 

Baker, D., Buoni, N., Fee, M., & Vitale, C. (2011). Social networking and its effects on companies and their employees. Neumann University. Retrieved from http://www.neumann.edu/academics/divisions/business/journal/Review2011/SocialNetworking.pdf

 

Brown, V. R., & Vaughn, E. D. (2011). The writing on the (facebook) wall: the use of social networking sites in hiring decisions. Journal of Business Psychology, 26, 219-225. doi: 10.1007/s10869-011-9221-x


BRIAN PIETRYLO, et al., v. HILLSTONE RESTAURANT GROUP d/b/a HOUSTON’S, court case ruling   retrieved from http://www.employerlawreport.com/uploads/file/PIETRYLO%20v%20%20HILLSIDE%20RESTAURANT.pdf

 

Chi, M. (2011). Security policy and social media use. The Sans Institute, Retrieved from http://www.sans.org/reading_room/whitepapers/policyissues/reducing-risks-social-media-organization_33749

 

Cozby, P.C. (2009).  Methods in behavioral research. (10th ed.). New York, NY:  McGraw-Hill Humanities/Social Sciences/Languages. www.mhhe.com/cozby10e    


Data leakage worldwide: common risks and mistakes employees make. In (2008). CISCO Systems.  Retrieved from http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-499060.html

 

de Carbonnel, A. (2012, May 4). Hackers plan attack on Russian government sites Reuters.com, Retrieved from http://www.reuters.com/article/2012/05/04/us-russia-hackers-anonymous-idUSBRE8430U920120504

 

DiMicco, J.M.; Millen, D.R.; Geyer, W.; Dugan, C.  Research on the use of social software in the workplace.  Retrieved  http://research.ihost.com/cscw08-socialnetworkinginorgs/papers/dimicco-millen-geyer-dugan_cscw08_workshop.pdf

 

Dr. Woody. (2012, January 16). Blurring the lines between work and personal life on facebook. FOXBusiness, Retrieved from:  http://www.foxbusiness.com/personal-finance/2012/01/16/blurring-lines-between-work-and-personal-life-on-facebook/

 

ecrimewales. (Composer). (2011). Using social media in the workplace - the employer's view. [Web Video]. Retrieved from http://youtu.be/ssJkVxzVYmM

 

ecrimewales (Composer). (2011). Using social media in the workplace - the employee's view. [Web Video]. Retrieved from http://youtu.be/f3gfBD9Gm1o

 

Evans, R. (2012, February 22). Social media blurring line between work and home life. . Retrieved from http://www.walesonline.co.uk/business-in-wales/business-news/2012/02/22/social-media-blurring-line-between-work-and-home-life-91466-30378133/

 

Fisher, L. (2011, August 5). Essential linkedin stats you need to know. Retrieved from http://www.simplyzesty.com/social-media/linkedin-2/essential-linkedin-stats-you-need-to-know/


Gaudin, S. (2009, August 10). Execs worry that facebook, twitter use could lead to data leaks. ComputerWorld.com. Retrieved from http://www.computerworld.com/s/article/9136465/Execs_worry_that_Facebook_Twitter_use_could_lead_to_data_leaks

 

Gohlar, K. (Photographer). (2009). Information leakage the human element. [PDF File]. Retrieved from www.slideshare.net/KulvinderGohlar/data-leakage


haveisharedtoomuch. (Composer). (2011). (have i shared too much?). [Web Video]. Retrieved from http://youtu.be/aoGADb_imtc

 

Holtz, S. (2012, January 26). Social media use in the workplace triples, report says. Retrieved from http://www.prdaily.com/Main/Articles/Social_media_use_in_the_workplace_triples_report_s_10654.aspx


hrreporter (2010, October 20). Youtube.com. [Web Video]. Retrieved from http://youtu.be/KK-vzvlbvEs

 

Jackson & Lewis LLP retrieved from  http://www.jacksonlewis.com/media/pnc/3/media.1033.pdf

 

Joyce, E. (2012, February 17). Social media in the workplace. San Francisco Chronicle. Retrieved from http://www.sfgate.com/cgi- bin/article.cgi?f=/g/a/2012/02/17/investopedia74312.DTL

 

Levin, A. (2012, March 31). Hey, get out of my face(book). . Retrieved from http://abcnews.go.com/Business/facebook-facebook/story?id=16038056


Molok, N., Chang, S., & Ahmad, A. (2010). Information leakage through online social networking: opening the doorway for advanced persistence threats. Australian Information Security Management Conference, Retrieved from http://ro.ecu.edu.au/ism/93


O'Dell, J. (n.d.). Social media use in the workplace on the rise. Retrieved from http://mashable.com/2010/07/12/social-media-at-work/

 

Ott, A. (2010, November 11). How social media has changed the workplace [study] . Retrieved from http://www.fastcompany.com/1701850/how-social-media-has-changed-the-workplace-study

 

Rashid, F. (2011, August 18). eweek.com. Retrieved from http://www.eweek.com/c/a/Security/Disgruntled

 

Schwartz, E. (2010). Living in compromise to advanced persistent threats. Retrieved from http://www.issa-dc.org/presentations/05182010_netwitness_schwartz.pdf


securecoding. (Composer). (2011). Xml injection. [Web Video]. Retrieved from http://youtu.be/SoWJowaeUrE

Skeels, M.; Grudin, J.  When social networks cross boundaries: a case study of workplace use of facebook and linkedIn Retrieved http://research.microsoft.com/en-us/um/people/jgrudin/publications/newwave/socialnetworking2009.pdf

 

Slovensky, R., & Ross, W. H. (2012). Should human resource managers use social media to screen job applicants? managerial and legal issues in the usa. info, 14(1), 55-69. doi: 10.1108/14636691211196941


Society of human resources management. (2011, November 10). Retrieved from http://www.slideshare.net/shrm/part-3-social-media-in-the-workplace-final


Sprague, R. (2011). Invasion of the social networks: blurring the line between personal life and the employment relationship. University of Louisville Law Review, 50, 1-35. Retrieved from http://ssrn.com/abstract=1773049

 

Survey Monkey: Retrieved from:  https://www.surveymonkey.com/sr.aspx?sm=GrvB0bCxRFrFYj9k0x7aGhAGFBwI5qveGUk2HCT9aS0_3d

 

RAPIDLEARNINGLIFE. (Composer). (2010). What is social media? in simple english . [Web Video]. Retrieved from http://youtu.be/jQ8J3IHhn8A

 

The ethical challenges of social media. (2011, December). Retrieved from http://www.ibe.org.uk/userfiles/social media briefing.pdf


Vance, J. (2007, Septemeber 7). Is your blog leaking trade secrets?. Internetnews.com. Retrieved from http://www.internetnews.com/xSP/article.php/3698401/Is Your Blog Leaking Trade Secrets.htm


Vicknair, J., Elkersh, D., Yancey, K., & Budden, M. (2010). The use of social networking websites as a recruiting tool for employers. American Journal of Business Education , 3(11), 7-12. Retrieved from http://cluteonline.com/journals/index.php/AJBE/article/viewFile/57/55

 

VMware vSphere  http://en.wikipedia.org/wiki/VMware_vSphere

 

Wikipedia. (2011, November 12). Anonymous (group) - wikipedia, the free encyclopedia. Retrieved from http://en.wikipedia.org/wiki/Anonymous_(group)

 

Zeiger, S. (n.d.). The disadvantages of social networking in the workplace. Chron.com, Retrieved from http://smallbusiness.chron.com/disadvantages-social-networking-workplace-21064.html

 

 

                                                                                                                      

 

DRAFT: This module has unpublished changes.