Incremental risks in Web 2.0 applications

被引:12
作者
Rudman, Riaan J. [1 ]
机构
[1] Univ Stellenbosch, Thuthuka Bursary Programme, ZA-7600 Stellenbosch, South Africa
关键词
Libraries; Computer applications; Workplace security; Internet; Online operations;
D O I
10.1108/02640471011033585
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose - The purpose of this paper is to identify and investigate the security issues an organisation operating in the "new" online environment is exposed to through Web 2.0 applications, with specific focus on unauthorised access (encompassing hackers). The study aims to recommend possible safeguards to mitigate these incremental risks to an acceptable level. Design/methodology/approach - An extensive literature review was performed to obtain an understanding of the technologies driving Web 2.0 applications. Thereafter, the technologies were mapped against Control Objectives for Information and Related Technology (CobiT) and Trust Service Principles and Criteria and associated control objectives relating to security risks, specifically to hacker risks. These objectives were used to identify relevant risks and formulate appropriate internal control measures. Findings - The findings show that every organisation, technology and application is unique and the safeguards depend on the nature of the organisation, information at stake, degree of vulnerability and risks. A comprehensive security program, including a multi-layer technological, as well as an administrative component, should be implemented. User training on acceptable practices should also be conducted. Originality/value - Obtaining an understanding of Web 2.0 and Web 2.0 security is important, as Web 2.0 is a new, poorly understood technology and with the growing mobility of users, the potential surface area of attack increases and should be managed. The paper will help organisations, information repository managers, information technology (IT) professionals, librarians and internal and external auditors to understand the "new" risks relating to unauthorised access, which previously did not exist in an on-line environment, and will assist the development of a framework to limit the most significant risks.
引用
收藏
页码:210 / 230
页数:21
相关论文
共 57 条
[1]   Combating cyber crime in Nigeria [J].
Adomi, Esharenana E. ;
Igun, Stella E. .
ELECTRONIC LIBRARY, 2008, 26 (05) :716-725
[2]  
*AICPA CICA, 2003, TRUST SERV PRINC CRI
[3]   Library managers and information in World 2.0 [J].
Allard, Suzie .
LIBRARY MANAGEMENT, 2009, 30 (1-2) :57-+
[4]  
[Anonymous], 5 MAJOR CHALLENGES O
[5]  
BENSON AC, 2001, NEALSCHUMAN COMPLETE
[6]  
Bonatti P. A., 2002, Journal of Computer Security, V10, P241
[7]  
BOWERS T, 2008, SECURITY TRENDS 2008
[8]  
Bradley A., 2007, KEY ISSUES ENTERPRIS
[9]  
Burton Jim, 2008, Library Hi Tech News, V25, P5, DOI 10.1108/07419050810890602
[10]  
Cavoukian A., 2006, Privacy and the Enterprise 2.0