Potential influence of Web 2.0 usage and security practices of online users on information management

被引:0
|
作者
Rudman, R. J. [1 ]
Steenkamp, L. P. [1 ]
机构
[1] Univ Stellenbosch, Dept Accounting, Stellenbosch, South Africa
来源
关键词
Internet risks; online usage patterns; security practices; Web; 2.0; user behaviour;
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The proliferation of Web 2.0 applications was the impetus for this survey- based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine the extent of the potential threat to corporate security, arising from Web 2.0 use and access. The results of this study indicate that the use of Web 2.0 sites is very popular among students, as a proxy for the potential future business users, and that users are not necessarily aware of the risks associated with these sites. The respondents indicated that they regularly visit Web 2.0 sites, and that they post personal information on these sites. This is of concern in protecting arguably the most valuable asset of a business.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Knowledge, Attitudes, Practices Towards Information Privacy & Security of Online Purchase by Youth
    Pitchan, Muhammad Adnan
    Baco, Mohamad Adli
    Hassan, Fauziah
    Ghazal, Akmar Hayati Ahmad
    [J]. JURNAL KOMUNIKASI-MALAYSIAN JOURNAL OF COMMUNICATION, 2022, 38 (04) : 250 - 267
  • [42] Understanding the motivational values for the usage of specific online news media and users' perception of information credibility
    Amosun, Tunde Simeon
    Chu Jianxun
    Rufai, Olayemi Hafeez
    Sayibu, Muhideen
    Shahani, Riffat
    Nadege, Muhimpundu
    Olaiya, Tolulope B.
    [J]. GLOBAL KNOWLEDGE MEMORY AND COMMUNICATION, 2023, 72 (1/2) : 179 - 195
  • [43] Web2.0 architecture evolves innovation of enterprise information resource management
    Wang, Weijun
    Sun, Jing
    [J]. Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 3082 - 3087
  • [44] Toward A Model of Sources of Influence in Online Education: Cognitive Learning and the Effects of Web 2.0
    Carr, Caleb
    Zube, Paul
    Dickens, Eric
    Hayter, Carolyn
    Barterian, Justin
    [J]. COMMUNICATION EDUCATION, 2013, 62 (01) : 61 - 85
  • [45] Exploring the information behaviour of users of Welsh Newspapers Online through web log analysis
    Gooding, Paul
    [J]. JOURNAL OF DOCUMENTATION, 2016, 72 (02) : 232 - 246
  • [46] Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures
    Gonzalez-Granadillo, Gustavo
    Gonzalez-Zarzosa, Susana
    Diaz, Rodrigo
    [J]. SENSORS, 2021, 21 (14)
  • [47] Privacy and Security Information Awareness and Disclosure of Private Information by Users of Online Social Media in the Ibadan Metropolis, Nigeria
    Omotayo, Funmilola Olubunmi
    Olayiwola, Joy Oluwabukola
    [J]. AFRICAN JOURNAL OF INFORMATION SYSTEMS, 2023, 15 (01): : 38 - 62
  • [48] Conceptualizing the Relationships between Information Security Management Practices and Organizational Agility
    Zaini, Muhamad Khairulnizam
    Masrek, Mohamad Noorman
    [J]. 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 269 - 273
  • [49] Investigation of Information Security Management Practices in Indian Pubic Sector Banks
    Diwakar, Hemalatha
    Naik, Atul
    [J]. 8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 276 - +
  • [50] Organizational practices as antecedents of the information security management performance An empirical investigation
    Perez-Gonzalez, Daniel
    Trigueros Preciado, Sara
    Solana-Gonzalez, Pedro
    [J]. INFORMATION TECHNOLOGY & PEOPLE, 2019, 32 (05) : 1262 - 1275