Security Risks in Social Media Technologies

Security Risks in Social Media Technologies
Author: Alan Oxley
Publsiher: Elsevier
Total Pages: 292
Release: 2013-07-31
ISBN 10: 1780633807
ISBN 13: 9781780633800
Language: EN, FR, DE, ES & NL

Security Risks in Social Media Technologies Book Review:

Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion. Focuses on the security issues of social media, specifically in the public sector Written by a leading researcher and practitioner Shows best practices for mitigating risk in the use of social media

Social Media Security

Social Media Security
Author: Michael Cross
Publsiher: Newnes
Total Pages: 346
Release: 2013-11-01
ISBN 10: 1597499870
ISBN 13: 9781597499873
Language: EN, FR, DE, ES & NL

Social Media Security Book Review:

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control. Defines an organization's goals for social networking Presents the risks present in social networking and how to mitigate them Explains how to maintain continuous social networking security

Collaboration with Cloud Computing

Collaboration with Cloud Computing
Author: Ric Messier
Publsiher: Elsevier
Total Pages: 242
Release: 2014-04-07
ISBN 10: 0124171230
ISBN 13: 9780124171237
Language: EN, FR, DE, ES & NL

Collaboration with Cloud Computing Book Review:

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies Explores the risks associated with the use of social media to the enterprise network Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements

Social Media Era Communication Insufficiency

Social Media Era Communication Insufficiency
Author: Prof. Dr. Sedat CERECI
Publsiher: Hiperlink eğit.ilet.yay.san.tic.ve ltd.sti.
Total Pages: 151
Release: 2020-04-01
ISBN 10: 6052818336
ISBN 13: 9786052818336
Language: EN, FR, DE, ES & NL

Social Media Era Communication Insufficiency Book Review:

Life is based on technological base in modern age and everybody uses technological products and the world agenda is based on technology too. People have communicated face to face for thousands years and technology provided people easy techniques to communicate and the world changed the age. Media brought many different messages and colours to the world in 19.th century and messages and colours increased in the beginning of 20.th century. People me different forms and different approaches via media and extended their lives. Any technological product eased people’s lives and provided them more facilities. Modern age created a competition and race atmosphere in the world and all people try to prove themselves in the hectic and tense atmosphere of modern age. Social media is the most available way to prove themselves and everybody can reveal all the properties via social media. By the way, social media became the most famous competition arena and turned into the most widespread show tools. Many people share their photographs and messages and watch the messages of others and watch the world. Social media is perceived as the mirror of the world and opinions and images of everybody in the world.

Securing the Clicks Network Security in the Age of Social Media

Securing the Clicks Network Security in the Age of Social Media
Author: Gary Bahadur,Jason Inasi,Alex de Carvalho
Publsiher: McGraw Hill Professional
Total Pages: 368
Release: 2011-10-22
ISBN 10: 0071769064
ISBN 13: 9780071769068
Language: EN, FR, DE, ES & NL

Securing the Clicks Network Security in the Age of Social Media Book Review:

Defend against corporate espionage launched from social networks Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume. Assess your global social media presence and identify vulnerabilities Establish solid security policies at every level of your organization Allocate resources for planning, administration, and corrective action Monitor usage by employees, clients, competitors, and the public Block cyberstalking. phishing, malware, and identity theft exploits Guard intellectual property rights, trademarks, copyrights, and logos Preserve your brand image using online reputation management tools Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc. Jason Inasi is CEO and cofounder of The Factory Interactive {www.thefactoryi.com], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm. Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.

Surveillance or Security

Surveillance or Security
Author: Susan Landau
Publsiher: MIT Press
Total Pages: 400
Release: 2011-01-28
ISBN 10: 0262294915
ISBN 13: 9780262294911
Language: EN, FR, DE, ES & NL

Surveillance or Security Book Review:

How, in the name of greater security, our current electronic surveillance policies are creating major security risks. Digital communications are the lifeblood of modern society. We “meet up” online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance on information systems leaves us highly exposed and vulnerable to cyberattack. Despite this, U.S. law enforcement and national security policy remain firmly focused on wiretapping and surveillance. But, as cybersecurity expert Susan Landau argues in Surveillance or Security?, the old surveillance paradigms do not easily fit the new technologies. By embedding eavesdropping mechanisms into communication technology itself, we are building tools that could be turned against us and opting for short-term security and creating dangerous long-term risks. How can we get communications security right? Landau offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom.

Managing Online Risk

Managing Online Risk
Author: Deborah Gonzalez
Publsiher: Butterworth-Heinemann
Total Pages: 286
Release: 2014-09-25
ISBN 10: 0124200605
ISBN 13: 9780124200609
Language: EN, FR, DE, ES & NL

Managing Online Risk Book Review:

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book. Explores the risks associated with online and digital activity and covers the latest technologies, such as social media and mobile devices Includes interviews with risk management experts and company executives, case studies, checklists, and policy samples A website with related content and updates (including video) is also available

Security in IoT Social Networks

Security in IoT Social Networks
Author: Fadi Al-Turjman,B.D. Deebak
Publsiher: Academic Press
Total Pages: 266
Release: 2020-11-06
ISBN 10: 0128215992
ISBN 13: 9780128215999
Language: EN, FR, DE, ES & NL

Security in IoT Social Networks Book Review:

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. Provides several characteristics of social, network, and physical security associated with social information networks Presents the security mechanisms and events related to social information networks Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models

Social Network Engineering for Secure Web Data and Services

Social Network Engineering for Secure Web Data and Services
Author: Luca Caviglione,Mauro Coccoli,Alessio Merlo
Publsiher: IGI Global
Total Pages: 361
Release: 2013-01-01
ISBN 10: 146663927X
ISBN 13: 9781466639270
Language: EN, FR, DE, ES & NL

Social Network Engineering for Secure Web Data and Services Book Review:

"This book provides empirical research on the engineering of social network infrastructures, the development of novel applications, and the impact of social network- based services over the internet"--Provided by publisher.

Social Media Risk and Governance

Social Media Risk and Governance
Author: Phil Mennie
Publsiher: Kogan Page Publishers
Total Pages: 232
Release: 2015-10-03
ISBN 10: 0749474580
ISBN 13: 9780749474584
Language: EN, FR, DE, ES & NL

Social Media Risk and Governance Book Review:

Few topics are as pressing to policy makers, business leaders and the risk management community as the secure and compliant management of social media. Social Media Risk and Governance is a practical guide to the components and considerations which make up a good social media governance strategy, spanning both external communications channels such as Facebook, Twitter and LinkedIn, as well as enterprise social networks within an organization. Written by social media risk and governance expert Phil Mennie, Social Media Risk and Governance addresses the concepts which professionals in information security, marketing, compliance and risk management need to take into account in their daily practice, guiding us through policy evaluation, planning on social media, information security and fraud risks, how to respond to a crisis or to archive data and more. Featuring examples from companies such as BP, MasterCard, Netflix, PwC, Silk Road, UBS and Yelp, the book is designed to promote cross-functional working between professional users of social media, acknowledging the impact of these technologies across the business and the interaction of the various stakeholders when planning new activities to effectively harness the power of social media safely and successfully for their organization.

Cybercrime Security

Cybercrime   Security
Author: Alan E. Brill,Fletcher N. Baldwin,Robert John Munro
Publsiher: Unknown
Total Pages: 329
Release: 1998
ISBN 10:
ISBN 13: IND:30000060139692
Language: EN, FR, DE, ES & NL

Cybercrime Security Book Review:

Cyber Influence and Cognitive Threats

Cyber Influence and Cognitive Threats
Author: Vladlena Benson,John Mcalaney
Publsiher: Academic Press
Total Pages: 238
Release: 2019-09-27
ISBN 10: 0128192054
ISBN 13: 9780128192054
Language: EN, FR, DE, ES & NL

Cyber Influence and Cognitive Threats Book Review:

In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others. Explains psychological factors inherent in machine learning and artificial intelligence Explores attitudes towards data and privacy through the phenomena of digital hoarding and protection motivation theory Discusses the role of social and communal factors in cybersecurity behaviour and attitudes Investigates the factors that determine the spread and impact of information and disinformation

Managing Risk and Information Security

Managing Risk and Information Security
Author: Malcolm Harkins
Publsiher: Apress
Total Pages: 152
Release: 2013-03-21
ISBN 10: 143025114X
ISBN 13: 9781430251149
Language: EN, FR, DE, ES & NL

Managing Risk and Information Security Book Review:

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think. Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO. Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world.” Dave Cullinane, CISSP CEO Security Starfish, LLC “In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices.” Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University “Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University “Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives. It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this.” Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy “Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders. It equips organizations with the knowledge required to transform their security programs from a “culture of no” to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer.” Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA “For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book? It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today.” John Stewart, Chief Security Officer, Cisco “This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business. This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster. The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional.” Steven Proctor, VP, Audit & Risk Management, Flextronics

Securing Social Identity in Mobile Platforms

Securing Social Identity in Mobile Platforms
Author: Thirimachos Bourlai,Panagiotis Karampelas,Vishal M. Patel
Publsiher: Springer Nature
Total Pages: 262
Release: 2020-06-02
ISBN 10: 3030394891
ISBN 13: 9783030394899
Language: EN, FR, DE, ES & NL

Securing Social Identity in Mobile Platforms Book Review:

The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in the service of all citizens using mobile devices. More specifically, academic, industry-related and government (law enforcement, intelligence and defence) organizations, will benefit from the research topics of this book that cover the concept of identity management and security using mobile platforms from various perspectives, i.e. whether a user navigates to social media, accesses their own phone devices, access their bank accounts, uses online shopping service providers, accesses their personal documents or accounts with valuable information, surfs the internet, or even becomes a victim of cyberattacks. In all of the aforementioned cases, there is a need for mobile related technologies that protect the users’ social identity and well-being in the digital world, including the use of biometrics, cybersecurity software and tools, active authentication and identity anti-spoofing algorithms and more.

Security 2020

Security 2020
Author: Doug Howard,Kevin Prince
Publsiher: John Wiley & Sons
Total Pages: 336
Release: 2010-12-07
ISBN 10: 9781118008317
ISBN 13: 1118008316
Language: EN, FR, DE, ES & NL

Security 2020 Book Review:

Securing Mega Events

Securing Mega Events
Author: Chad Whelan,Adam Molnar
Publsiher: Springer
Total Pages: 229
Release: 2018-11-11
ISBN 10: 1137596686
ISBN 13: 9781137596680
Language: EN, FR, DE, ES & NL

Securing Mega Events Book Review:

Mega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 2001, consistently involving the largest policing and security operations for event hosts outside of wartime. This book is the first to focus exclusively on the organisational dynamics underpinning the design and delivery of mega-event security. Using the G20 Summit in Brisbane, Australia in November 2014 as a case study, in conjunction with comparisons with events such as the Toronto 2010 G20, the authors engage in a comprehensive assessment of the networks, strategies and tensions involved in mega-event security. By drawing on the insightful experiences of those responsible for securing the Brisbane 2014 G20, the authors look behind-the-scenes to capture the complexity of mega-event security. The authors argue that such an approach is essential to better appreciate how different conceptions of security, ways of thinking and acting, impact a range of security ideals and outcomes.

Social Media the Fastest Growing Vulnerability to the Air Force Mission

Social Media  the Fastest Growing Vulnerability to the Air Force Mission
Author: Scott E. Solomon
Publsiher: United States Department of Defense
Total Pages: 48
Release: 2017
ISBN 10: 9781585662715
ISBN 13: 1585662712
Language: EN, FR, DE, ES & NL

Social Media the Fastest Growing Vulnerability to the Air Force Mission Book Review:

"The inherent risks and vulnerabilities of the Internet and social networking sites like Facebook, LinkedIn, and Twitter have cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. FBI guidance encourages users to reduce their online footprint in cyberspace rather to proliferate it. This paper addresses some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and current Air Force social media guidance. It recommends revising Air Force social media guidance and outlines cyberspace best practices. An informed workforce can better protect the Air Force mission and reduce the risk of becoming a target of opportunity."--Provided by publisher

Security 2020

Security 2020
Author: Doug Howard,Kevin Prince
Publsiher: Wiley
Total Pages: 336
Release: 2010-12-21
ISBN 10: 9780470639559
ISBN 13: 0470639555
Language: EN, FR, DE, ES & NL

Security 2020 Book Review:

Policing Cybercrime

Policing Cybercrime
Author: David S. Wall,Matthew Williams
Publsiher: Routledge
Total Pages: 158
Release: 2017-12-22
ISBN 10: 131768642X
ISBN 13: 9781317686422
Language: EN, FR, DE, ES & NL

Policing Cybercrime Book Review:

Cybercrime has recently experienced an ascending position in national security agendas world-wide. It has become part of the National Security Strategies of a growing number of countries, becoming a Tier One threat, above organised crime and fraud generally. Furthermore, new techno-social developments in social network media suggest that cyber-threats will continue to increase. This collection addresses the recent 'inertia' in both critical thinking and the empirical study of cybercrime and policing by adding to the literature seven interdisciplinary and critical chapters on various issues relating to the new generation of cybercrimes currently being experienced. The chapters illustrate that cybercrimes are changing in two significant ways that are asymmetrical. On the one hand cybercrime is becoming increasingly professionalised, resulting in ’specialists’ that perform complex and sophisticated attacks on computer systems and human users. On the other, the ‘hyper-connectivity’ brought about by the exponential growth in social media users has opened up opportunities to ‘non-specialist’ citizens to organise and communicate in ways that facilitate crimes on and offline. While largely distinct, these developments pose equally contrasting challenges for policing which this book addresses. This book was originally published as a special issue of Policing and Society.

The New Walford

The New Walford
Author: Ray Lester
Publsiher: Library Assn Pub Limited
Total Pages: 699
Release: 2005
ISBN 10:
ISBN 13: UOM:39015073677802
Language: EN, FR, DE, ES & NL

The New Walford Book Review:

Covers 15 broad subject groupings: social sciences (generic); psychology; sociology; social work & social welfare; politics; government; law; finance, accountancy & taxation; industries & utilities; business & management; education & learning; sport; media & communications; information & library sciences; and tools for information professionals.