Potential influence of Web 2.0 usage and security practices of online users on information management

The proliferation of Web 2.0 applications was the impetus for this survey-based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine...

Full description

Bibliographic Details
Main Authors: R.J. Rudman, L.P. Steenkamp
Format: Article
Language:English
Published: AOSIS 2009-02-01
Series:South African Journal of Information Management
Online Access:https://sajim.co.za/index.php/sajim/article/view/403
id doaj-95c6c2a8b9b74315a5f0c867d53a9bdb
record_format Article
spelling doaj-95c6c2a8b9b74315a5f0c867d53a9bdb2020-11-25T00:59:40ZengAOSISSouth African Journal of Information Management2078-18651560-683X2009-02-01112387Potential influence of Web 2.0 usage and security practices of online users on information managementR.J. Rudman0L.P. Steenkamp1Department of Accounting University of Stellenbosch Stellenbosch, South AfricaDepartment of Accounting University of Stellenbosch Stellenbosch, South AfricaThe proliferation of Web 2.0 applications was the impetus for this survey-based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine the extent of the potential threat to corporate security, arising from Web 2.0 use and access. The results of this study indicate that the use of Web 2.0 sites is very popular among students, as a proxy for the potential future business users, and that users are not necessarily aware of the risks associated with these sites. The respondents indicated that they regularly visit Web 2.0 sites, and that they post personal information on these sites. This is of concern in protecting arguably the most valuable asset of a business.https://sajim.co.za/index.php/sajim/article/view/403
collection DOAJ
language English
format Article
sources DOAJ
author R.J. Rudman
L.P. Steenkamp
spellingShingle R.J. Rudman
L.P. Steenkamp
Potential influence of Web 2.0 usage and security practices of online users on information management
South African Journal of Information Management
author_facet R.J. Rudman
L.P. Steenkamp
author_sort R.J. Rudman
title Potential influence of Web 2.0 usage and security practices of online users on information management
title_short Potential influence of Web 2.0 usage and security practices of online users on information management
title_full Potential influence of Web 2.0 usage and security practices of online users on information management
title_fullStr Potential influence of Web 2.0 usage and security practices of online users on information management
title_full_unstemmed Potential influence of Web 2.0 usage and security practices of online users on information management
title_sort potential influence of web 2.0 usage and security practices of online users on information management
publisher AOSIS
series South African Journal of Information Management
issn 2078-1865
1560-683X
publishDate 2009-02-01
description The proliferation of Web 2.0 applications was the impetus for this survey-based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine the extent of the potential threat to corporate security, arising from Web 2.0 use and access. The results of this study indicate that the use of Web 2.0 sites is very popular among students, as a proxy for the potential future business users, and that users are not necessarily aware of the risks associated with these sites. The respondents indicated that they regularly visit Web 2.0 sites, and that they post personal information on these sites. This is of concern in protecting arguably the most valuable asset of a business.
url https://sajim.co.za/index.php/sajim/article/view/403
work_keys_str_mv AT rjrudman potentialinfluenceofweb20usageandsecuritypracticesofonlineusersoninformationmanagement
AT lpsteenkamp potentialinfluenceofweb20usageandsecuritypracticesofonlineusersoninformationmanagement
_version_ 1725216897048248320