2010
DOI: 10.1108/02640471011033585
|View full text |Cite
|
Sign up to set email alerts
|

Incremental risks in Web 2.0 applications

Abstract: PurposeThe purpose of this paper is to identify and investigate the security issues an organisation operating in the “new” online environment is exposed to through Web 2.0 applications, with specific focus on unauthorised access (encompassing hackers). The study aims to recommend possible safeguards to mitigate these incremental risks to an acceptable level.Design/methodology/approachAn extensive literature review was performed to obtain an understanding of the technologies driving Web 2.0 applications. Therea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
14
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 18 publications
0
14
0
1
Order By: Relevance
“…In an effort to clarify the paradigm shift, Getting (2007) described it as the greater collaboration between consumers, programmers, service providers, and organisations, which enabled them to re-use and contribute information, thereby enriching the content distributed between the collaborative parties on the web. Rudman (2010) summarised the key features of Web 2.0 sites into three components:…”
Section: Web 20mentioning
confidence: 99%
See 1 more Smart Citation
“…In an effort to clarify the paradigm shift, Getting (2007) described it as the greater collaboration between consumers, programmers, service providers, and organisations, which enabled them to re-use and contribute information, thereby enriching the content distributed between the collaborative parties on the web. Rudman (2010) summarised the key features of Web 2.0 sites into three components:…”
Section: Web 20mentioning
confidence: 99%
“…Rudman (2010) explained that the negative impacts associated with the different stages of web evolution are incremental. Some of these homogeneous vulnerabilities are:…”
Section: Introductionmentioning
confidence: 98%
“… Non-compliance with regulatory governance, and the possibility of loss due to legal action.  Shortage in experienced technicians to ensure effective operation and monitoring of complicated systems and applications (Rudman, 2010).…”
Section: Pre-existing Web Risksmentioning
confidence: 99%
“…Anti-malware software, including anti-spy and -virus software, should be installed in order to eliminate the threat of malicious infections of a system of both inbound and outbound electronic transmissions (Rudman, 2010). The implementation of a structure like Taiwan Malware Analysis Net (TWMAN) will mitigate the risk of infections associated with Web 3.0.…”
mentioning
confidence: 99%
See 1 more Smart Citation