1st Edition

Social Media Warfare Equal Weapons for All

By Michael Erbschloe Copyright 2017
    327 Pages
    by Auerbach Publications

    327 Pages
    by Auerbach Publications

    Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

    A Framework to Analyze Emerging Social Media Warfare Strategies. Civilian Government Use of Social Media to Attack, Defend, or Control. Military Applications of Social Media Warfare. Corporate Efforts to Deploy or Respond to Social Media Warfare Strategies. Special Interest Groups use of Social Media Warfare. Social Media Warfare in the Political Electoral Process. Social Media Warfare for Support of Social Causes. The Mercenaries and Activists of Social Media Warfare. Social Media as a Weapon to Recruit and Inspire Violent Extremists. Social Media Warfare for Celebrity and People of Notoriety. Child Victims in Social Media Warfare. Adult Victims in Social Media Warfare. Law Enforcement Response to Social Media Warfare. Educational Institutions Response to Social Media Warfare. Monitoring Social Media Warfare Threats.

    Biography

    Michael Erbschloe has worked for over 30 years performing analysis of the economics of information technology, public policy relating to technology, and utilizing technology in reengineering organization processes. He has authored several books on social and management issues of information technology most of which covered some aspects of information or corporate security. I have also taught at several universities and developed technology-related curriculum. His career has focused on several interrelated areas: technology strategy, analysis, and forecasting; teaching and curriculum development; writing books and articles; speaking at conferences and industry events; publishing and editing; and public policy analysis and program evaluation.