메뉴 건너뛰기




Volumn 28, Issue 2, 2010, Pages 210-230

Incremental risks in Web 2.0 applications

Author keywords

Computer applications; Internet; Libraries; Online operations; Workplace security

Indexed keywords


EID: 77951168987     PISSN: 02640473     EISSN: None     Source Type: Journal    
DOI: 10.1108/02640471011033585     Document Type: Article
Times cited : (19)

References (60)
  • 1
    • 77951149377 scopus 로고    scopus 로고
    • AICPA/CICA 2003, Trust Services Principles and Criteria, American Institute of Certified Public Accountants, Inc. and Canadian Institute of Chartered Accountants, April, available at accessed 20 June 2008
    • AICPA/CICA (2003), Trust Services Principles and Criteria, American Institute of Certified Public Accountants, Inc. and Canadian Institute of Chartered Accountants, April, available at: www.aicpa.org (accessed 20 June 2008).
  • 2
    • 55249103402 scopus 로고    scopus 로고
    • Combating cyber crime in Nigeria
    • Adomi, E. and Igun, S. (2008), "Combating cyber crime in Nigeria", The Electronic Library, Vol. 26 No. 5, pp. 716-25.
    • (2008) The Electronic Library , vol.26 , Issue.5 , pp. 716-725
    • Adomi, E.1    Igun, S.2
  • 3
    • 59949099242 scopus 로고    scopus 로고
    • Library managers and information in world 2.0
    • Allard, S. (2009), "Library managers and information in world 2.0", Library Management, Vol. 30 Nos 1/2, pp. 57-68.
    • (2009) Library Management , vol.30 , Issue.1-2 , pp. 57-68
    • Allard, S.1
  • 5
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the Web
    • Bonatti, P. and Samarati, P. (2002), "A uniform framework for regulating access and information release on the web", Journal of Computer Security, Vol. 10 No. 3, pp. 241-71. (Pubitemid 34814466)
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-271
    • Bonatti, P.A.1    Samarati, P.2
  • 6
    • 77951182541 scopus 로고    scopus 로고
    • available at Feb08 accessed 1 June Kaspersky Lab. Inc., February
    • Bowers, T. (2008, Security Trends 2008, white paper, Kaspersky Lab Inc., February, available at: http://usa.kaspersky.com/threats/whitepapers.php?art= SecurityTrends2008 Feb08 (accessed 1 June).
    • (2008) Security Trends 2008, White Paper
    • Bowers, T.1
  • 8
    • 77951196212 scopus 로고    scopus 로고
    • available at accessed 20 June Research Report, Gartner, 13 February
    • Bradley, A. (2008, Five Major Challenges Organizations Face Regarding Social Software, Research Report, Gartner, 13 February, available at: www.gartner.com/DisplayDocument?ref=g-search&id=602207&subref= implesearch (accessed 20 June).
    • (2008) Five Major Challenges Organizations Face Regarding Social Software
    • Bradley, A.1
  • 9
    • 44949224628 scopus 로고    scopus 로고
    • UK public libraries and social networking services
    • Burton, J. (2008), "UK public libraries and social networking services", Library Hi Tech News, Vol. 25 No. 4, pp. 5-7.
    • (2008) Library Hi Tech News , vol.25 , Issue.4 , pp. 5-7
    • Burton, J.1
  • 11
    • 77951169546 scopus 로고    scopus 로고
    • white paper, Fortify Software Inc., available at accessed 20 June
    • Chess, B. (2008), "Assessing Application Vulnerabilities: A 360 degree Approach, white paper, Fortify Software Inc., available at: www.fortify.com/servlet/download/public/Fortify-360 Whitepaper.pdf (accessed 20 June).
    • (2008) Assessing Application Vulnerabilities: A 360 degree Approach
    • Chess, B.1
  • 12
    • 77951200223 scopus 로고    scopus 로고
    • special report, available at accessed 20 June 2008
    • Cisco and Ironport (2007), 2008 Internet Malware Trends, special report, available at: www.ironport.com/pdf/Malware-Trends-Report-IronPort-2008.pdf (accessed 20 June 2008).
    • (2007) 2008 Internet Malware Trends
    • CiscoIronport1
  • 13
    • 77951170557 scopus 로고    scopus 로고
    • Clearswift Limited, 11 May, available at accessed 20 June 2008
    • Clearswift (2007a), Content Security 2.0: The Impact of Web 2.0 on Corporate Security, white paper, Clearswift Limited, 11 May, available at: http://resources.clearswift.com/ExternalContent/Features/Clearswift/9586/ 200704SurveyReport-US-1063233.pdf (accessed 20 June 2008).
    • (2007) Content Security 2.0: The Impact of Web 2.0 on Corporate Security, White Paper
    • Clearswift1
  • 14
    • 77951168169 scopus 로고    scopus 로고
    • Clearswift Limited, July, available at accessed 20 June 2008
    • Clearswift (2007b), Demystifying Web 2.0, white paper, Clearswift Limited, July, available at: http://resources.clearswift.com/ExternalContent/ C12CUST/Clearswift/9514/200707 DemystifyingWeb21].0-US-1062190.pdf (accessed 20 June 2008).
    • (2007) Demystifying Web 2.0, White Paper
    • Clearswift1
  • 15
    • 77951153408 scopus 로고    scopus 로고
    • accessed 20 June 2008., Clearswift Limited, available at
    • Clearswift (2007c), Fifteen Common Mistakes in Web Security, white paper, Clearswift Limited, available at: http://resources.clearswift.com/main/pages/ Clearswift/RSRCCTR/Show Collateral.aspx?oid=24638 (accessed 20 June 2008).
    • (2007) Fifteen Common Mistakes in Web Security, White Paper
    • Clearswift1
  • 16
    • 77951156549 scopus 로고    scopus 로고
    • accessed 20 June 2008., 2007d, Clearswift Limited, October 2008, available at
    • Clearswift (2007d), Ten Essential Steps to Web Security, white paper, Clearswift Limited, October 2008, available at: http://resources.clearswift.com/ ExternalContent/C12CUST/Clearswift/9538/200810-10StepsWebSecurity-US.pdf (accessed 20 June 2008).
    • Ten Essential Steps to Web Security, White Paper
    • Clearswift1
  • 17
    • 77951162708 scopus 로고    scopus 로고
    • accessed 20 June 2008, Clearswift Limited, July, available at
    • Clearswift (2007e), Web 2.0 Security: Is the Web Broken?, white paper, Clearswift Limited, July, available at: http://resources.clearswift.com/ ExternalContent/WhitePapers/Clearswift/9537/200707Web%20security-isthewebbroken- US-1066371.pdf (accessed 20 June 2008).
    • (2007) Web 2.0 Security: Is the Web Broken?, White Paper
    • Clearswift1
  • 18
    • 34250692565 scopus 로고    scopus 로고
    • New internet brings security challenges
    • 2, March
    • Cluley, G. (2007), "New internet brings security challenges", Infosecurity, Vol. 4 2, March, p. 41.
    • (2007) Infosecurity , vol.4 , pp. 41
    • Cluley, G.1
  • 19
    • 69949090624 scopus 로고    scopus 로고
    • accessed 20 December, CobiT Steering Committee, 4.1 ed., available at
    • CobiT Steering Committee (2007), CobiT 4.1, IT Governance Institute, 4.1 ed., available at: www.isaca.org (accessed 20 December).
    • (2007) CobiT 4.1, IT Governance Institute
  • 20
    • 19444370573 scopus 로고    scopus 로고
    • An access control framework for web services
    • DOI 10.1108/09685220510582656
    • Coetzee, M. and Eloff, J. (2005), "An access control framework for web services", Information Management & Computer Security, Vol. 13 No. 1, pp. 29-38. (Pubitemid 40723490)
    • (2005) Information Management and Computer Security , vol.13 , Issue.1 , pp. 29-38
    • Coetzee, M.1    Eloff, J.H.P.2
  • 21
    • 34249776106 scopus 로고    scopus 로고
    • Web services access control framework architecture incorporating trust
    • Coetzee, M. and Eloff, J. (2007), "Web services access control framework architecture incorporating trust", Internet Research, Vol. 17 No. 3, pp. 291-305.
    • (2007) Internet Research , vol.17 , Issue.3 , pp. 291-305
    • Coetzee, M.1    Eloff, J.2
  • 22
    • 77951157142 scopus 로고    scopus 로고
    • accessed 1 October 2008, Committee of Sponsoring Organisations of the Treadway Commission 1992, "Internal control - integrated framework", Committee of Sponsoring Organisations, available at
    • Committee of Sponsoring Organisations of the Treadway Commission (1992), "Internal control - integrated framework", Committee of Sponsoring Organisations, available at: www.isaca.org (accessed 1 October 2008).
  • 23
    • 57849097481 scopus 로고    scopus 로고
    • Security in the world of Web 2.0
    • Winter, 9 September
    • D'Agostino, D. (2006), "Security in the world of Web 2.0", CIO Insight, Winter, 9 September, pp. 12-15.
    • (2006) CIO Insight , pp. 12-15
    • D'Agostino, D.1
  • 24
    • 36849088195 scopus 로고    scopus 로고
    • Enterprise security for Web 2.0
    • November
    • Davidson, M. and Yoran, E. (2007), "Enterprise security for Web 2.0", Computer, November, pp. 117-9.
    • (2007) Computer , pp. 117-119
    • Davidson, M.1    Yoran, E.2
  • 25
    • 77951153139 scopus 로고    scopus 로고
    • accessed 20 June 2008, available at
    • Dawson, R. (2007), "Web 2.0 framework", available at: www.rossdawsonblog.com/Web2-Framework.pdf (accessed 20 June 2008).
    • (2007) Web 2.0 framework
    • Dawson, R.1
  • 27
    • 77951186690 scopus 로고    scopus 로고
    • accessed 30 October 2008, IT Security, 18 October, available at
    • Devgan, M. (2007), "The wild Wed 2.0 needs a sheriff", IT Security, 18 October, available at: www.itsecurity.com/features/web2-needs- sheriff-101807/(accessed 30 October 2008).
    • (2007) The Wild Wed 2.0 Needs a Sheriff
    • Devgan, M.1
  • 28
    • 77951163309 scopus 로고    scopus 로고
    • Security for Web 2.0
    • 3 September
    • Fanning, E. (2007), "Security for Web 2.0", Computerworld, 3 September, p. 44.
    • (2007) Computerworld , pp. 44
    • Fanning, E.1
  • 29
    • 77951198011 scopus 로고    scopus 로고
    • accessed 23 June 2008, available at
    • Getting, B. (2007, Basic Definitions: Web 1.0, Web. 2.0, Web 3.0, available at: www.practicalecommerce.com/articles/464/Basic-Definitions:-Web-1. 0,-Web.-2.0,-Web-3.0/(accessed 23 June 2008).
    • (2007) Basic Definitions: Web 1.0, Web. 2.0, Web 3.0
    • Getting, B.1
  • 30
    • 77951164254 scopus 로고    scopus 로고
    • Security threats from social computing
    • March
    • Ghandi, A. (2008), "Security threats from social computing", Security, March, pp. 20-2.
    • (2008) Security , pp. 20-22
    • Ghandi, A.1
  • 31
    • 77951177544 scopus 로고    scopus 로고
    • accessed 20 June 2008, available at Gartner, 27 April
    • Heine, J. (2007, Digital Natives Create New Set of Risks, research report, Gartner, 27 April, available at: www.gartner.com/DisplayDocument?ref=g- search&id=733333&subref=simplesearch (accessed 20 June 2008).
    • (2007) Digital Natives Create New Set of Risks, Research Report
    • Heine, J.1
  • 33
    • 77951182325 scopus 로고    scopus 로고
    • accessed 20 June 2008, Hewlett-Packard, Hewlett-Packard Development Company, L. P., available at
    • Hewlett-Packard (2007b), XPath Injection: Are Your Applications Vulnerable, white paper, Hewlett-Packard Development Company, L. P., October, available at: www.hp. com/go/software (accessed 20 June 2008).
    • (2007) XPath Injection: Are Your Applications Vulnerable, White Paper
    • October1
  • 34
    • 77951158345 scopus 로고    scopus 로고
    • A typology of information and communication users
    • accessed 20 June 2008, Princeton Survey Research Association, 7 May, available at
    • Horrigan, J. (2007), "A typology of information and communication users", PEW/Internet & American life Project, research report, Princeton Survey Research Association, 7 May, available at: www.pewInternet.org/ pdfs/PIP-ICT-Typology.pdf (accessed 20 June 2008).
    • (2007) PEW/Internet & American Life Project, Research Report
    • Horrigan, J.1
  • 35
    • 70349117161 scopus 로고    scopus 로고
    • accessed 20 December 2007, IT Governance Institute 2006, available at 2nd Ed., IT Governance Institute, Rolling Meadows, IL
    • IT Governance Institute (2006, CobiT Mapping: Overview of International IT Guidance, 2nd ed., IT Governance Institute, Rolling Meadows, IL, available at: http://www.isaca.org (accessed 20 December 2007).
    • CobiT Mapping: Overview of International IT Guidance
  • 36
    • 77951177543 scopus 로고    scopus 로고
    • Control collaboration - Don't inhibit
    • 14 January
    • Johnson, K. (2008), "Control collaboration - don't inhibit", Networkworld, 14 January, p. 26.
    • (2008) Networkworld , pp. 26
    • Johnson, K.1
  • 37
    • 77951175010 scopus 로고    scopus 로고
    • Hacker risk in e-commerce systems with specific reference to the disclosure of confidential information
    • December
    • Lamprecht, C. (2004), "Hacker risk in e-commerce systems with specific reference to the disclosure of confidential information", South African Journal of Information Management, Vol. 8 No. 4, December.
    • (2004) South African Journal of Information Management , vol.8 , Issue.4
    • Lamprecht, C.1
  • 38
    • 36248965112 scopus 로고    scopus 로고
    • Web 2.0 creates security challenges
    • October
    • Lawton, G. (2007), "Web 2.0 creates security challenges", Computer, October, pp. 13-16.
    • (2007) Computer , pp. 13-16
    • Lawton, G.1
  • 39
    • 56649097264 scopus 로고    scopus 로고
    • From Web 2.0 to conversational knowledge management: Towards collaborative intelligence
    • 2, June
    • Lee, M. and Lan, Y. (2007), "From Web 2.0 to conversational knowledge management: towards collaborative intelligence", Journal of Entrepreneurship Research, Vol. 2 2, June, pp. 47-62.
    • (2007) Journal of Entrepreneurship Research , vol.2 , pp. 47-62
    • Lee, M.1    Lan, Y.2
  • 40
    • 35348872417 scopus 로고    scopus 로고
    • Teens, privacy, and on-line social networks
    • accessed 20 June 2008, Princeton Survey Research Association, 18 April, available at
    • Lenhart, A. and Madden, M. (2007), "Teens, privacy, and on-line social networks", Research report, PEW/Internet & American life Project, Princeton Survey Research Association, 18 April, available at: www.pewInternet.org/pdfs/PIPTeens-Privacy-SNS-Report-Final. pdf (accessed 20 June 2008).
    • (2007) Research Report, PEW/Internet & American Life Project
    • Lenhart, A.1    Madden, M.2
  • 41
    • 77951163007 scopus 로고    scopus 로고
    • Research highlights changing threat landscape and increased risk to the Web 2.0 enabled enterprise; latest Watchguard report identifies reasons to be fearful
    • accessed 1 November 2008, M2PressWIRE, 5 September, available at
    • M2PressWIRE (2007), "Research highlights changing threat landscape and increased risk to the Web 2.0 enabled enterprise; latest Watchguard report identifies reasons to be fearful", M2PressWIRE, 5 September, available at: www.accessmylibrary.com/coms2/summary 0286-3279 6978-ITM (accessed 1 November 2008).
    • (2007) M2PressWIRE
  • 43
    • 79955931031 scopus 로고    scopus 로고
    • Web 3.0
    • accessed 20 June 2008, 10 April, available at
    • Metz, C. (2007), "Web 3.0", PC Magazine, 10 April, available at: www.pcmag.com/article2/0, 2817, 2102852, 00.asp (accessed 20 June 2008).
    • (2007) PC Magazine
    • Metz, C.1
  • 44
    • 77951172375 scopus 로고    scopus 로고
    • Web 2.0 users open a box of security risks
    • 26 March
    • Mitchell, R. (2007), "Web 2.0 users open a box of security risks", Computerworld, 26 March, p. 32.
    • (2007) Computerworld , pp. 32
    • Mitchell, R.1
  • 45
    • 77951200222 scopus 로고    scopus 로고
    • accessed 20 June 2008, available at Gartner, 2 November
    • Pescatore, J. (2006, Web 2.0 Needs Security 101, research report, Gartner, 2 November, available at: www.gartner.com/DisplayDocument?ref=g- search&id=498199&subref= simplesearch (accessed 20 June 2008).
    • (2006) Web 2.0 Needs Security 101, Research Report
    • Pescatore, J.1
  • 47
    • 57849083058 scopus 로고    scopus 로고
    • Development of a library 2.0 service model for an African library
    • Pienaar, H. and Smith, I. (2008), "Development of a library 2.0 service model for an African library", Library Hi Tech News, Vol. 25 No. 5, pp. 7-10.
    • (2008) Library Hi Tech News , vol.25 , Issue.5 , pp. 7-10
    • Pienaar, H.1    Smith, I.2
  • 48
    • 77951161546 scopus 로고    scopus 로고
    • Firewalls, the future and Web 2.0
    • accessed 30 October 2008, 11 June, available at
    • Pruitt, S. (2007), "Firewalls, the future and Web 2.0", Network Security Journal, 11 June, available at: www.networksecurityjournal.com/ features/firewalls-the-future-web-2.061107/(accessed 30 October 2008).
    • (2007) Network Security Journal
    • Pruitt, S.1
  • 49
    • 77951193426 scopus 로고    scopus 로고
    • Are you watching?
    • September
    • Radcliff, D. (2007), "Are you watching?", SC Magazine, September, pp. 40-3.
    • (2007) SC Magazine , pp. 40-43
    • Radcliff, D.1
  • 50
    • 34249296658 scopus 로고    scopus 로고
    • A risk-control framework for e-marketplace participation: The findings of seven cases
    • Ratnasigam, P. (2007), "A risk-control framework for e-marketplace participation: the findings of seven cases", Information Management & Computer Security, Vol. 15 No. 2, pp. 149-66.
    • (2007) Information Management & Computer Security , vol.15 , Issue.2 , pp. 149-166
    • Ratnasigam, P.1
  • 51
    • 34047114034 scopus 로고    scopus 로고
    • The security risks of AJAX/web 2.0 applications
    • DOI 10.1016/S1353-4858(07)70025-9, PII S1353485807700259
    • Ritchie, P. (2007), "The security risks of AJAX/Web 2.0 applications", Network Security, March, pp. 4-8. (Pubitemid 46518244)
    • (2007) Network Security , vol.2007 , Issue.3 , pp. 4-8
    • Ritchie, P.1
  • 52
    • 77951168611 scopus 로고    scopus 로고
    • Web 2.0+ Risk=Risk 2.0: Are you protected?
    • October
    • Rudman, R. (2007), "Web 2.0+ Risk=Risk 2.0: are you protected?", Accountancy SA, October, pp. 26-9.
    • (2007) Accountancy SA , pp. 26-29
    • Rudman, R.1
  • 53
    • 84993109351 scopus 로고    scopus 로고
    • The impact of internet crime on development
    • Salifu, A. (2008), "The impact of internet crime on development", Journal of Financial Crime, Vol. 15 No. 4, pp. 432-43.
    • (2008) Journal of Financial Crime , vol.15 , Issue.4 , pp. 432-443
    • Salifu, A.1
  • 54
    • 77951188180 scopus 로고    scopus 로고
    • accessed 14 June, Secure Computing, 2007, white paper, Secure Computing Corporation, available at
    • Secure Computing (2007), In Today's Web 2.0 Environment, Proactive Security is Paramount. Are You protected?, white paper, Secure Computing Corporation, available at: www.securitytechnet.com/resource/rsc-center2/vendor- wp/securecomputing/WW-WGS-WP.pdf (accessed 14 June).
    • In Today's Web 2.0 Environment, Proactive Security Is Paramount. Are You protected?
  • 55
    • 77951154003 scopus 로고    scopus 로고
    • Web 2.0 threats and risks for financial services
    • accessed 20 June 2008, 30 April, available at
    • Shah, S. (2007), "Web 2.0 threats and risks for financial services", Net Square, 30 April, available at: www.net-security.org/ article.php?id=1004 (accessed 20 June 2008).
    • (2007) Net Square
    • Shah, S.1
  • 56
    • 53149096568 scopus 로고    scopus 로고
    • Understanding purchasing behaviour in a virtual economy: Consumer behaviour involving currency in Web 2.0 communities
    • 11 April
    • Shin, D. (2008), "Understanding purchasing behaviour in a virtual economy: consumer behaviour involving currency in Web 2.0 communities", Interacting with Computers, Vol. 20, 11 April, pp. 433-46.
    • (2008) Interacting with Computers , vol.20 , pp. 433-446
    • Shin, D.1
  • 59
    • 77951191276 scopus 로고    scopus 로고
    • The implications of Web 2.0 on web information systems
    • Springer Berlin Heidelberg, Stanford Linear Accelerator Centre
    • White, B. (2007), "The implications of Web 2.0 on web information systems", Web Information Systems and Technologies, Vol. 1 No. 1, Springer Berlin Heidelberg, Stanford Linear Accelerator Centre, pp. 3-7.
    • (2007) Web Information Systems and Technologies , vol.1 , Issue.1 , pp. 3-7
    • White, B.1
  • 60
    • 77951171750 scopus 로고    scopus 로고
    • accessed 23 June, Wikipedia, Wikipedia, available at
    • Wikipedia (2008), "Web 2.0", Wikipedia, available at: http://en. wikipedia.org/wiki/Web-2 (accessed 23 June).
    • (2008) Web 2.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.