TITLE

Are you Twittering, getting friends on Facebook, and YouTube?

PUB. DATE
November 2009
SOURCE
Same-Day Surgery;Nov2009, Vol. 33 Issue 11, p105
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Progressive outpatient surgery programs are using social media to market their programs, educate patients, and recruit patients and staff. • Caveats include potentially negative comments posted online, as well as exposure to malicious software. • Fully educate patients if their procedures will be broadcast. Broadcast the positive and negative aspects of the surgery. • When a procedure is being broadcast, have a response plan in place in the event something goes wrong. INSET: Examples of using social media.
ACCESSION #
44595872

 

Related Articles

  • What is really important for success of day care surgery from an anesthetic point of view: patient education?  // International Journal of Students' Research;Dec2011, Vol. 1 Issue 4, p145 

    The article reports on the challenges of day care surgery from an anesthetic view in India in 2011 and the importance of patient education in the success of any type of surgery. Since every patient is apprehensive before an operation, all surgical procedures and their outcomes and instructions...

  • The Case Against Social Media in Banking. Jaser, John // New Jersey Banker;Winter2010, p26 

    The article discusses the impact of social media in the banking industry. One of the risks of social media, like Facebook and Twitter, is the danger of infecting friends and followers with malicious scripts, which might lead to cyber crimes. Another risk is the danger posed by employees who...

  • Twitter trolls: the existing legal framework.  // Lawyer (Online Edition);1/14/2014, p6 

    The article offers information related to the misuse of social media and legislative framework to tackle them. It is noted that writer and feminist campaigner Caroline Criado-Perez received threats via Twitter to rape and kill her and offenders, Isabella Sorley and John Nimmo, recently pleaded...

  • On top of the world.  // In Search of the Perfect Investment; 

    The article offers information on various topics related to computer industry in the U.S. It offers information on Internet Security, virus and aware protector software from Norton Integrated Systems Ltd. It presents information on the improvement on social media. It presents information on the...

  • TO FRIEND or not TO FRIEND. WAXER, CINDY // Public CIO;Feb2011, Vol. 9 Issue 1, p8 

    The article discusses the security risks associated with the use of social media by U.S. government agencies. It is said that while social media is useful in disseminating information of interest to citizens, it can also pose risks such as malware attacks and disclosure of state secrets. It...

  • The ultimate guide to COMPUTER SECURITY.  // Computer Shopper;May2013, Issue 303, p134 

    The article offers a look at how cyber criminals access and exploit data on devices, what they hope to gain and how to protect devices from security breaches. It also offers a guide on data security, from protecting mobile phones to understanding what malware makers hope to gain and what users...

  • Engaging the Returns on Social Media. Ambwani, Kailash // Siliconindia;Jan2012, Vol. 15 Issue 1, p26 

    The article discusses the advantages and disadvantages of social media. It emphasizes that social media is a formidable tool from building customers loyalty to developing new business. It stresses that the disadvantages of the media have to do with data leakage, malware, and errant employees who...

  • IT Pros Lack Tools to Combat Social Media Cyber-Threats.  // Channel Insider;9/30/2011, p1 

    The article offers information on the report "Global Survey on Social Media Risks," from Ponemon Institute. It mentions that the report surveys information technology (IT) professionals and IT security practitioners on the problems they considered in using social media. It says that they lack...

  • WATCHGUARD UNVEILS TOP 10 SECURITY PREDICTIONS FOR 2011.  // Computer Security Update;Feb2011, Vol. 12 Issue 2, p4 

    The article presents the top ten security treat predictions for 2011 by WatchGuard Technologies Inc. security analysts. It cites the advanced persistent threats (APTs) as a security acronym of the year, the most advanced attack, infection, and malware propagation techniques and designed to stay...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics