Potential influence of Web 2.0 usage and security practices of online users on information management

被引:0
|
作者
Rudman, R. J. [1 ]
Steenkamp, L. P. [1 ]
机构
[1] Univ Stellenbosch, Dept Accounting, Stellenbosch, South Africa
来源
关键词
Internet risks; online usage patterns; security practices; Web; 2.0; user behaviour;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The proliferation of Web 2.0 applications was the impetus for this survey- based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine the extent of the potential threat to corporate security, arising from Web 2.0 use and access. The results of this study indicate that the use of Web 2.0 sites is very popular among students, as a proxy for the potential future business users, and that users are not necessarily aware of the risks associated with these sites. The respondents indicated that they regularly visit Web 2.0 sites, and that they post personal information on these sites. This is of concern in protecting arguably the most valuable asset of a business.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Web users' behavioural patterns of tourism information search: From online to offline
    Ho, Chaang-Iuan
    Lin, Meng-Hui
    Chen, Hui-Mei
    [J]. TOURISM MANAGEMENT, 2012, 33 (06) : 1468 - 1482
  • [32] Scientific communication in the context of the Web 2.0: considerations on the usage of blogs as channels for the dissemination of scientific information
    Pando, Daniel Abraao
    [J]. IBERSID-REVISTA DE SISTEMAS DE INFORMACION Y DOCUMENTACION, 2014, 8 : 131 - 136
  • [33] Investigating the Influence of Information Management Practices on IS Governance
    Constantiou, Ioanna
    Madsen, Sabine
    Papazafeiropoulou, Anastasia
    [J]. GOVERNANCE AND SUSTAINABILITY IN INFORMATION SYSTEMS: MANAGING THE TRANSFER AND DIFFUSION OF IT, 2011, 366 : 295 - +
  • [34] Influence of Knowledge Management Practices on Municipalities' Image Among Their Users
    Monico, Lisete
    Pais, Leonor
    Brito, Elisabeth
    Harris, Ornela
    [J]. PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON KNOWLEDGE MANAGEMENT (ECKM 2014), VOLS 1-3, 2014, : 692 - 699
  • [35] USAGE OF WEB MAPPING SYSTEMS AND SERVICES FOR INFORMATION SUPPORT OF REGIONAL MANAGEMENT
    Shaparev, Nicolay
    Yakubailik, Oleg
    [J]. VII SCIENTIFIC CONFERENCE WITH INTERNATIONAL PARTICIPATION INFORMATION-MEASURING EQUIPMENT AND TECHNOLOGIES (IME&T 2016), 2016, 79
  • [36] Information Security Management Practices: Case Studies from India
    Singh, Abhishek Narain
    Gupta, M. P.
    [J]. GLOBAL BUSINESS REVIEW, 2019, 20 (01) : 253 - 271
  • [37] Selecting Science Information in Web 2.0: How Source Cues, Message Sidedness, and Need for Cognition Influence Users' Exposure to Blog Posts
    Winter, Stephan
    Kraemer, Nicole C.
    [J]. JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2012, 18 (01): : 80 - 96
  • [38] Application of Web Data Mining Technology in the Information Security Management
    Wang, Kun
    [J]. PROCEEDINGS OF 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 25, 2014, 25 : 260 - 263
  • [39] Security Policy on Logistics Management Information System Based on Web
    Huang, Linna
    Liu, Fenghua
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1211 - 1214
  • [40] Women in health: Social practices in online health information management
    Ikhwan, Rizghina
    [J]. MASYARAKAT KEBUDAYAAN DAN POLITIK, 2020, 33 (04) : 371 - 380