00938nam0-22002771i-450-99000618154040332119980601000618154FED01000618154(Aleph)000618154FED0100061815419980601d1908----km-y0itay50------ba--------00-yy<<Gli >>stati indipendenti che compongono la Societa' internazionalediritti essenziali dei medesimimodificazioni risultanti dalle unioni e dalle dipendenzebreve cenno del protettoratoe delle colonieMichele Bounvino.RomaTip. Artaro1908220 p.24 cm342.22Buonvino,Michele234519ITUNINARICAUNIMARCBK990006181540403321X I 919607FGBCFGBCStati indipendenti che compongono la Societa' internazionale646678UNINAGIU0105354nam 2200661 450 991046040250332120200520144314.00-7303-2226-2(CKB)3710000000401965(EBL)2031449(OCoLC)908075313(SSID)ssj0001515671(PQKBManifestationID)12590975(PQKBTitleCode)TC0001515671(PQKBWorkID)11481500(PQKB)11754397(MiAaPQ)EBC2031449(CaSebORM)9780730322252(Au-PeEL)EBL2031449(CaPaEBR)ebr11047016(CaONFJC)MIL776653(OCoLC)903632222(EXLCZ)99371000000040196520150511h20152015 uy 0engur|n|---|||||txtccrSocial media rules of engagement why your online narrative is the best weapon during a crisis /Nicole Matejic1st editionMilton, Queensland :Wiley,2015.©20151 online resource (235 p.)Includes index.0-7303-2227-0 0-7303-2225-4 ""Social Media Rules of Engagement""; ""Contents""; ""About the author""; ""Author note""; ""Preface""; ""PART I Rules of engagement""; ""1 Social media crisis communications: a seismic shift in the risk profile""; ""Communications born again, but the fundamentals still apply""; ""Itâ€?s all about narrative""; ""Optimus Prime: are you conditioning your audience for sales or LOLs?""; ""2 Ready, aim â€? misfire: why you must be social media data savvy""; ""The social media iceberg""; ""From marketeers to info ops: this will blow your pixels off""""The narrative in your numbers: what story is your social data telling you?""""Why social numbers donâ€?t always add up to Klout, influence, votes, dollars, sales and raving fans""; ""3 The hurt locker: getting inside is easy; escaping an art""; ""The information vacuum: why going AWOL on social media isnâ€?t an option""; ""From battlefield to boardroom â€? the threat posed by information vacuums""; ""Say something! Just not anything â€?""; ""Overexposed: why trashing your brand has never been easier""; ""Hashtag horror! Why things go terribly wrong""""4 Mission recon: why knowing your audience is critical to success""""Mission: getting to know your target audience""; ""Recon: pin it, IG it, tumble it â€?""; ""Mission: audience segmentation""; ""Psychosocial considerations""; ""Mission: audience sentiment analysis""; ""5 Classified: is your enemy an adversary or an opportunity?""; ""Social warfare: why itâ€?s not just the militaryâ€?s problem""; ""Brand you: social media jihad collateral damage""; ""Is your organisation at risk?""; ""Where to source information and support for crisis communications planning""""How to communicate during a critical incident or terrorist attack""""Full-spectrum dominance â€? oh and social media""; ""6 Socially transmitted disasters (STDs): The Clap (#PRFail) is now more contagious than ever""; ""Sex Ed 101: the birds, the bees â€? and Snapchat""; ""The Clap: are you at risk?""; ""Organisational and individual apathy""; ""Data blindness""; ""Risk-taking behaviour""; ""Coitus interruptus: not an effective method of Clap control""; ""Practise safe social media â€? itâ€?s all about using protection""; ""People""; ""Technology""; ""Corporate governance""""Click-jacking â€? not as pleasurable as it sounds""""7 Target acquired: social engineering and what it means for you and your organisation""; ""Stalkerbook â€? I mean Facebook""; ""Socialveillance: who is watching you online and why you should care""; ""Sneaking in that Trojan Horse""; ""The Trojan Horse: epic fail""; ""White collar blue: espionage and hacking is a corporate problem too""; ""8 Social media information operations: much more than military propaganda""; ""Why influence is key to mission success from battlefield to boardroom""; ""The influence equation""""Propaganda in your pocket â€? influence in everyday life""Avoid becoming a #PRFail with a solid social media strategy Social Media Rules of Engagement guides you in the development of a bullet-proof social media strategy. You can manage any crisis effectively by having a plan before you actually need one-and by understanding and influencing your audience with military precision. This original, engaging, and informative text with case studies from the coalface offers you the tools you need to avoid scandal and media crises, and to learn how to leverage social media, big data, and influence in your communications strategies. Social media has establiInternet in public relationsCrisis managementCase studiesElectronic books.Internet in public relations.Crisis management659.202854678Matejic Nicole912083MiAaPQMiAaPQMiAaPQBOOK9910460402503321Social media rules of engagement2042258UNINA03398oam 2200529 450 99641829650331620210609133030.03-030-66626-310.1007/978-3-030-66626-2(CKB)4100000011679209(DE-He213)978-3-030-66626-2(MiAaPQ)EBC6437686(PPN)252514874(EXLCZ)99410000001167920920210609d2020 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSecurity, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17-21, 2020 : proceedings /Lejla Batina, Stjepan Picek, Mainack Mondal (editors)1st ed. 2020.Cham, Switzerland :Springer,[2020]©20201 online resource (X, 259 p. 87 illus., 37 illus. in color.) Lecture notes in computer science ;125863-030-66625-5 Includes bibliographical references and index.tPAKE: Typo-Tolerant Password-Authenticated Key Exchange -- PAS-TA-U: PASsword-based Threshold Authentication with Password Update -- Re-Markable: Stealing Watermarked Neural Networks through Synthesis -- Robust Adaptive Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning -- A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics -- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation based ciphers with a case study on GIFT -- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT -- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption -- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures -- An Insecurity Study of Ethereum Smart Contracts -- Cryptographically Secure Multi-Tenant Provisioning of FPGAs -- Experimental results on higher-order differential spectra of 6 and 8-bit invertible S-boxes -- Quantum Resource Estimates of Grover’s Key Search on ARIA.This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.Lecture notes in computer science ;12586.SPACE 2020Data encryption (Computer science)CongressesComputer securityCongressesData encryption (Computer science)Computer security005.82Picek StjepanMondal MainackBatina LejlaMiAaPQMiAaPQUtOrBLWBOOK996418296503316Security, privacy, and applied cryptography engineering2065794UNISA