Social media principles applied to critical infrastructure information sharing
MetadataShow full item record
Social media is on the forefront of leading capabilities to share information faster, more broadly, and to extremely large, targeted audiences. To many in the business of disseminating information quickly to these broad audiences, social media is a critical enabler. Areas of homeland security, and in particular, critical infrastructure protection, rely significantly on sharing information with partners across the mission yet are consistently criticized for their inability or ineffectiveness at sharing information. Social media principles, the fundamentals that make social media unique and successful, may have applicability to critical infrastructure information sharing, and in turn, may further the information-sharing goals of this mission area. This thesis explores the principles of social media, the resultant outcomes as seen in case studies with information sharing objectives similar to those in the critical infrastructure arena, and proposes applicability of those social media principles to the information sharing practices of the critical infrastructure discipline.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2011);10 Years After: the 9/11 Essays. Homeland Security Affairs (HSA) is pleased to present this special collection of essays in remembrance of the ten-year anniversary of September 11, 2001. We chose to honor those who lost ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2009-05);May 2009. This issue of Homeland Security Affairs opens on a sad note: Rich Cooper’s memoriam to Inspector Matthew Simeone, who passed away in March of this year. Co-president of cohort 0601-0602, Matt graduated from the ...
Potter, Trek C. (Monterey, California. Naval Postgraduate School, 2012-09);To operate effectively and maintain national security, the DoD relies on the ability to ensure authorized access to information, while protecting that information from unauthorized users. Non-malicious insider threats ...