Skip to main content

The Enterprise 2.0 Concept: Challenges on Data and Information Security

  • Conference paper
Knowledge Management, Information Systems, E-Learning, and Sustainability Research (WSKS 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 111))

Included in the following conference series:

Abstract

The Web 2.0 wave has “hit” businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies’ intellectual property.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Davidson, M.A., Yoran, E.: Enterprise Security for Web 2.0. Computer 11, 117–119 (2007)

    Article  Google Scholar 

  • Cunningham, P., Wilkins, J.: A Walk in the Cloud. Information Management Journal, 22–30 (2009)

    Google Scholar 

  • Taft, D.K.: IBM ‘Smashes’ Web 2.0 security risks. eweek 36(40) (2008)

    Google Scholar 

  • Brandel, M.: Keeping Secrets in a WikiBlogTubeSpace World. Computerworld, 26–30 (2007)

    Google Scholar 

  • McClure, M.: Web 2.0 Security: Getting Collaborative Peace of Mind. Econtent, 36–41 (2008)

    Google Scholar 

  • Lawton, G.: Web 2.0 Creates Security Challenges. Computer 10, 13–16 (2007)

    Article  Google Scholar 

  • Cluley, G.: New internet brings security challenges. Infosecurity 2(41) (2007)

    Google Scholar 

  • Till, J.: Using Web 2.0 safely in the enterprise. NetworkWorld 13(26) (2008)

    Google Scholar 

  • Nene, B., Swanson, T.: Information Rights Management Application Patterns. Microsoft White Paper. In: Michael, W. (ed.) Enterprise 2.0: What, Why and How. Enterprise 2.0 Conference (2009)

    Google Scholar 

  • McAfee, A.: Enterprise 2.0, version 2.0. Andrew McAfee blog (2006)

    Google Scholar 

  • Dawson, R.: Implementing Enterprise 2.0. Advanced Human Technologies, Sidney (2009)

    Google Scholar 

  • IDC, http://www.idc.com/

  • Websense: State of Internet Security, Q1 - Q2. Websense White Paper (2009)

    Google Scholar 

  • Gartner, http://www.gartner.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Silva, A., Moreira, F., Varajão, J. (2010). The Enterprise 2.0 Concept: Challenges on Data and Information Security. In: Lytras, M.D., Ordonez De Pablos, P., Ziderman, A., Roulstone, A., Maurer, H., Imber, J.B. (eds) Knowledge Management, Information Systems, E-Learning, and Sustainability Research. WSKS 2010. Communications in Computer and Information Science, vol 111. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16318-0_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16318-0_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16317-3

  • Online ISBN: 978-3-642-16318-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics