Potential influence of Web 2.0 usage and security practices of online users on information management
The proliferation of Web 2.0 applications was the impetus for this survey-based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
AOSIS
2009-02-01
|
Series: | South African Journal of Information Management |
Online Access: | https://sajim.co.za/index.php/sajim/article/view/403 |
id |
doaj-95c6c2a8b9b74315a5f0c867d53a9bdb |
---|---|
record_format |
Article |
spelling |
doaj-95c6c2a8b9b74315a5f0c867d53a9bdb2020-11-25T00:59:40ZengAOSISSouth African Journal of Information Management2078-18651560-683X2009-02-01112387Potential influence of Web 2.0 usage and security practices of online users on information managementR.J. Rudman0L.P. Steenkamp1Department of Accounting University of Stellenbosch Stellenbosch, South AfricaDepartment of Accounting University of Stellenbosch Stellenbosch, South AfricaThe proliferation of Web 2.0 applications was the impetus for this survey-based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine the extent of the potential threat to corporate security, arising from Web 2.0 use and access. The results of this study indicate that the use of Web 2.0 sites is very popular among students, as a proxy for the potential future business users, and that users are not necessarily aware of the risks associated with these sites. The respondents indicated that they regularly visit Web 2.0 sites, and that they post personal information on these sites. This is of concern in protecting arguably the most valuable asset of a business.https://sajim.co.za/index.php/sajim/article/view/403 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
R.J. Rudman L.P. Steenkamp |
spellingShingle |
R.J. Rudman L.P. Steenkamp Potential influence of Web 2.0 usage and security practices of online users on information management South African Journal of Information Management |
author_facet |
R.J. Rudman L.P. Steenkamp |
author_sort |
R.J. Rudman |
title |
Potential influence of Web 2.0 usage and security practices of online users on information management |
title_short |
Potential influence of Web 2.0 usage and security practices of online users on information management |
title_full |
Potential influence of Web 2.0 usage and security practices of online users on information management |
title_fullStr |
Potential influence of Web 2.0 usage and security practices of online users on information management |
title_full_unstemmed |
Potential influence of Web 2.0 usage and security practices of online users on information management |
title_sort |
potential influence of web 2.0 usage and security practices of online users on information management |
publisher |
AOSIS |
series |
South African Journal of Information Management |
issn |
2078-1865 1560-683X |
publishDate |
2009-02-01 |
description |
The proliferation of Web 2.0 applications was the impetus for this survey-based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine the extent of the potential threat to corporate security, arising from Web 2.0 use and access. The results of this study indicate that the use of Web 2.0 sites is very popular among students, as a proxy for the potential future business users, and that users are not necessarily aware of the risks associated with these sites. The respondents indicated that they regularly visit Web 2.0 sites, and that they post personal information on these sites. This is of concern in protecting arguably the most valuable asset of a business. |
url |
https://sajim.co.za/index.php/sajim/article/view/403 |
work_keys_str_mv |
AT rjrudman potentialinfluenceofweb20usageandsecuritypracticesofonlineusersoninformationmanagement AT lpsteenkamp potentialinfluenceofweb20usageandsecuritypracticesofonlineusersoninformationmanagement |
_version_ |
1725216897048248320 |