-
1
-
-
77951149377
-
-
AICPA/CICA 2003, Trust Services Principles and Criteria, American Institute of Certified Public Accountants, Inc. and Canadian Institute of Chartered Accountants, April, available at accessed 20 June 2008
-
AICPA/CICA (2003), Trust Services Principles and Criteria, American Institute of Certified Public Accountants, Inc. and Canadian Institute of Chartered Accountants, April, available at: www.aicpa.org (accessed 20 June 2008).
-
-
-
-
2
-
-
55249103402
-
Combating cyber crime in Nigeria
-
Adomi, E. and Igun, S. (2008), "Combating cyber crime in Nigeria", The Electronic Library, Vol. 26 No. 5, pp. 716-25.
-
(2008)
The Electronic Library
, vol.26
, Issue.5
, pp. 716-725
-
-
Adomi, E.1
Igun, S.2
-
3
-
-
59949099242
-
Library managers and information in world 2.0
-
Allard, S. (2009), "Library managers and information in world 2.0", Library Management, Vol. 30 Nos 1/2, pp. 57-68.
-
(2009)
Library Management
, vol.30
, Issue.1-2
, pp. 57-68
-
-
Allard, S.1
-
5
-
-
0036311802
-
A uniform framework for regulating service access and information release on the Web
-
Bonatti, P. and Samarati, P. (2002), "A uniform framework for regulating access and information release on the web", Journal of Computer Security, Vol. 10 No. 3, pp. 241-71. (Pubitemid 34814466)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-271
-
-
Bonatti, P.A.1
Samarati, P.2
-
6
-
-
77951182541
-
-
available at Feb08 accessed 1 June Kaspersky Lab. Inc., February
-
Bowers, T. (2008, Security Trends 2008, white paper, Kaspersky Lab Inc., February, available at: http://usa.kaspersky.com/threats/whitepapers.php?art= SecurityTrends2008 Feb08 (accessed 1 June).
-
(2008)
Security Trends 2008, White Paper
-
-
Bowers, T.1
-
7
-
-
77951199218
-
-
available at accessed 20 June 2008 Research Report, Gartner, 14 June
-
Bradley, A. (2007, Key Issues in the Enterprise Application of Web 2.0, Practices, Technologies, Products and Services, Research Report, Gartner, 14 June, available at: www.gartner.com/DisplayDocument?ref=g-search&id= 507237&subref=simplesearch (accessed 20 June 2008).
-
(2007)
Key Issues in the Enterprise Application of Web 2.0, Practices, Technologies, Products and Services
-
-
Bradley, A.1
-
8
-
-
77951196212
-
-
available at accessed 20 June Research Report, Gartner, 13 February
-
Bradley, A. (2008, Five Major Challenges Organizations Face Regarding Social Software, Research Report, Gartner, 13 February, available at: www.gartner.com/DisplayDocument?ref=g-search&id=602207&subref= implesearch (accessed 20 June).
-
(2008)
Five Major Challenges Organizations Face Regarding Social Software
-
-
Bradley, A.1
-
9
-
-
44949224628
-
UK public libraries and social networking services
-
Burton, J. (2008), "UK public libraries and social networking services", Library Hi Tech News, Vol. 25 No. 4, pp. 5-7.
-
(2008)
Library Hi Tech News
, vol.25
, Issue.4
, pp. 5-7
-
-
Burton, J.1
-
10
-
-
77951158952
-
-
available at accessed 20 June 2008.
-
Cavoukian, A. and Tapscott, D. (2006, Privacy and the Enterprise 2.0, white paper, New Paradigm Learning Corporation, 17 October, available at: http://newparadigm.com/media/Privacy-and-the-Enterprise-2.0.pdf (accessed 20 June 2008).
-
(2006)
Privacy and the Enterprise 2.0, White Paper, New Paradigm Learning Corporation, 17 October
-
-
Cavoukian, A.1
Tapscott, D.2
-
11
-
-
77951169546
-
-
white paper, Fortify Software Inc., available at accessed 20 June
-
Chess, B. (2008), "Assessing Application Vulnerabilities: A 360 degree Approach, white paper, Fortify Software Inc., available at: www.fortify.com/servlet/download/public/Fortify-360 Whitepaper.pdf (accessed 20 June).
-
(2008)
Assessing Application Vulnerabilities: A 360 degree Approach
-
-
Chess, B.1
-
12
-
-
77951200223
-
-
special report, available at accessed 20 June 2008
-
Cisco and Ironport (2007), 2008 Internet Malware Trends, special report, available at: www.ironport.com/pdf/Malware-Trends-Report-IronPort-2008.pdf (accessed 20 June 2008).
-
(2007)
2008 Internet Malware Trends
-
-
CiscoIronport1
-
13
-
-
77951170557
-
-
Clearswift Limited, 11 May, available at accessed 20 June 2008
-
Clearswift (2007a), Content Security 2.0: The Impact of Web 2.0 on Corporate Security, white paper, Clearswift Limited, 11 May, available at: http://resources.clearswift.com/ExternalContent/Features/Clearswift/9586/ 200704SurveyReport-US-1063233.pdf (accessed 20 June 2008).
-
(2007)
Content Security 2.0: The Impact of Web 2.0 on Corporate Security, White Paper
-
-
Clearswift1
-
14
-
-
77951168169
-
-
Clearswift Limited, July, available at accessed 20 June 2008
-
Clearswift (2007b), Demystifying Web 2.0, white paper, Clearswift Limited, July, available at: http://resources.clearswift.com/ExternalContent/ C12CUST/Clearswift/9514/200707 DemystifyingWeb21].0-US-1062190.pdf (accessed 20 June 2008).
-
(2007)
Demystifying Web 2.0, White Paper
-
-
Clearswift1
-
15
-
-
77951153408
-
-
accessed 20 June 2008., Clearswift Limited, available at
-
Clearswift (2007c), Fifteen Common Mistakes in Web Security, white paper, Clearswift Limited, available at: http://resources.clearswift.com/main/pages/ Clearswift/RSRCCTR/Show Collateral.aspx?oid=24638 (accessed 20 June 2008).
-
(2007)
Fifteen Common Mistakes in Web Security, White Paper
-
-
Clearswift1
-
16
-
-
77951156549
-
-
accessed 20 June 2008., 2007d, Clearswift Limited, October 2008, available at
-
Clearswift (2007d), Ten Essential Steps to Web Security, white paper, Clearswift Limited, October 2008, available at: http://resources.clearswift.com/ ExternalContent/C12CUST/Clearswift/9538/200810-10StepsWebSecurity-US.pdf (accessed 20 June 2008).
-
Ten Essential Steps to Web Security, White Paper
-
-
Clearswift1
-
17
-
-
77951162708
-
-
accessed 20 June 2008, Clearswift Limited, July, available at
-
Clearswift (2007e), Web 2.0 Security: Is the Web Broken?, white paper, Clearswift Limited, July, available at: http://resources.clearswift.com/ ExternalContent/WhitePapers/Clearswift/9537/200707Web%20security-isthewebbroken- US-1066371.pdf (accessed 20 June 2008).
-
(2007)
Web 2.0 Security: Is the Web Broken?, White Paper
-
-
Clearswift1
-
18
-
-
34250692565
-
New internet brings security challenges
-
2, March
-
Cluley, G. (2007), "New internet brings security challenges", Infosecurity, Vol. 4 2, March, p. 41.
-
(2007)
Infosecurity
, vol.4
, pp. 41
-
-
Cluley, G.1
-
19
-
-
69949090624
-
-
accessed 20 December, CobiT Steering Committee, 4.1 ed., available at
-
CobiT Steering Committee (2007), CobiT 4.1, IT Governance Institute, 4.1 ed., available at: www.isaca.org (accessed 20 December).
-
(2007)
CobiT 4.1, IT Governance Institute
-
-
-
20
-
-
19444370573
-
An access control framework for web services
-
DOI 10.1108/09685220510582656
-
Coetzee, M. and Eloff, J. (2005), "An access control framework for web services", Information Management & Computer Security, Vol. 13 No. 1, pp. 29-38. (Pubitemid 40723490)
-
(2005)
Information Management and Computer Security
, vol.13
, Issue.1
, pp. 29-38
-
-
Coetzee, M.1
Eloff, J.H.P.2
-
21
-
-
34249776106
-
Web services access control framework architecture incorporating trust
-
Coetzee, M. and Eloff, J. (2007), "Web services access control framework architecture incorporating trust", Internet Research, Vol. 17 No. 3, pp. 291-305.
-
(2007)
Internet Research
, vol.17
, Issue.3
, pp. 291-305
-
-
Coetzee, M.1
Eloff, J.2
-
22
-
-
77951157142
-
-
accessed 1 October 2008, Committee of Sponsoring Organisations of the Treadway Commission 1992, "Internal control - integrated framework", Committee of Sponsoring Organisations, available at
-
Committee of Sponsoring Organisations of the Treadway Commission (1992), "Internal control - integrated framework", Committee of Sponsoring Organisations, available at: www.isaca.org (accessed 1 October 2008).
-
-
-
-
23
-
-
57849097481
-
Security in the world of Web 2.0
-
Winter, 9 September
-
D'Agostino, D. (2006), "Security in the world of Web 2.0", CIO Insight, Winter, 9 September, pp. 12-15.
-
(2006)
CIO Insight
, pp. 12-15
-
-
D'Agostino, D.1
-
24
-
-
36849088195
-
Enterprise security for Web 2.0
-
November
-
Davidson, M. and Yoran, E. (2007), "Enterprise security for Web 2.0", Computer, November, pp. 117-9.
-
(2007)
Computer
, pp. 117-119
-
-
Davidson, M.1
Yoran, E.2
-
25
-
-
77951153139
-
-
accessed 20 June 2008, available at
-
Dawson, R. (2007), "Web 2.0 framework", available at: www.rossdawsonblog.com/Web2-Framework.pdf (accessed 20 June 2008).
-
(2007)
Web 2.0 framework
-
-
Dawson, R.1
-
27
-
-
77951186690
-
-
accessed 30 October 2008, IT Security, 18 October, available at
-
Devgan, M. (2007), "The wild Wed 2.0 needs a sheriff", IT Security, 18 October, available at: www.itsecurity.com/features/web2-needs- sheriff-101807/(accessed 30 October 2008).
-
(2007)
The Wild Wed 2.0 Needs a Sheriff
-
-
Devgan, M.1
-
28
-
-
77951163309
-
Security for Web 2.0
-
3 September
-
Fanning, E. (2007), "Security for Web 2.0", Computerworld, 3 September, p. 44.
-
(2007)
Computerworld
, pp. 44
-
-
Fanning, E.1
-
29
-
-
77951198011
-
-
accessed 23 June 2008, available at
-
Getting, B. (2007, Basic Definitions: Web 1.0, Web. 2.0, Web 3.0, available at: www.practicalecommerce.com/articles/464/Basic-Definitions:-Web-1. 0,-Web.-2.0,-Web-3.0/(accessed 23 June 2008).
-
(2007)
Basic Definitions: Web 1.0, Web. 2.0, Web 3.0
-
-
Getting, B.1
-
30
-
-
77951164254
-
Security threats from social computing
-
March
-
Ghandi, A. (2008), "Security threats from social computing", Security, March, pp. 20-2.
-
(2008)
Security
, pp. 20-22
-
-
Ghandi, A.1
-
31
-
-
77951177544
-
-
accessed 20 June 2008, available at Gartner, 27 April
-
Heine, J. (2007, Digital Natives Create New Set of Risks, research report, Gartner, 27 April, available at: www.gartner.com/DisplayDocument?ref=g- search&id=733333&subref=simplesearch (accessed 20 June 2008).
-
(2007)
Digital Natives Create New Set of Risks, Research Report
-
-
Heine, J.1
-
32
-
-
84879758322
-
-
accessed 20 June 2008, Hewlett-Packard Development Company, L. P., available at
-
Hewlett-Packard (2007a), Securing Web 2.0: Are Your Web Applications Vulnerable?, white paper, Hewlett-Packard Development Company, L. P., October, available at: www.hp. com/go/software (accessed 20 June 2008).
-
(2007)
Securing Web 2.0: Are Your Web Applications Vulnerable?, White Paper
-
-
Hewlett-Packard1
October2
-
33
-
-
77951182325
-
-
accessed 20 June 2008, Hewlett-Packard, Hewlett-Packard Development Company, L. P., available at
-
Hewlett-Packard (2007b), XPath Injection: Are Your Applications Vulnerable, white paper, Hewlett-Packard Development Company, L. P., October, available at: www.hp. com/go/software (accessed 20 June 2008).
-
(2007)
XPath Injection: Are Your Applications Vulnerable, White Paper
-
-
October1
-
34
-
-
77951158345
-
A typology of information and communication users
-
accessed 20 June 2008, Princeton Survey Research Association, 7 May, available at
-
Horrigan, J. (2007), "A typology of information and communication users", PEW/Internet & American life Project, research report, Princeton Survey Research Association, 7 May, available at: www.pewInternet.org/ pdfs/PIP-ICT-Typology.pdf (accessed 20 June 2008).
-
(2007)
PEW/Internet & American Life Project, Research Report
-
-
Horrigan, J.1
-
35
-
-
70349117161
-
-
accessed 20 December 2007, IT Governance Institute 2006, available at 2nd Ed., IT Governance Institute, Rolling Meadows, IL
-
IT Governance Institute (2006, CobiT Mapping: Overview of International IT Guidance, 2nd ed., IT Governance Institute, Rolling Meadows, IL, available at: http://www.isaca.org (accessed 20 December 2007).
-
CobiT Mapping: Overview of International IT Guidance
-
-
-
36
-
-
77951177543
-
Control collaboration - Don't inhibit
-
14 January
-
Johnson, K. (2008), "Control collaboration - don't inhibit", Networkworld, 14 January, p. 26.
-
(2008)
Networkworld
, pp. 26
-
-
Johnson, K.1
-
37
-
-
77951175010
-
Hacker risk in e-commerce systems with specific reference to the disclosure of confidential information
-
December
-
Lamprecht, C. (2004), "Hacker risk in e-commerce systems with specific reference to the disclosure of confidential information", South African Journal of Information Management, Vol. 8 No. 4, December.
-
(2004)
South African Journal of Information Management
, vol.8
, Issue.4
-
-
Lamprecht, C.1
-
38
-
-
36248965112
-
Web 2.0 creates security challenges
-
October
-
Lawton, G. (2007), "Web 2.0 creates security challenges", Computer, October, pp. 13-16.
-
(2007)
Computer
, pp. 13-16
-
-
Lawton, G.1
-
39
-
-
56649097264
-
From Web 2.0 to conversational knowledge management: Towards collaborative intelligence
-
2, June
-
Lee, M. and Lan, Y. (2007), "From Web 2.0 to conversational knowledge management: towards collaborative intelligence", Journal of Entrepreneurship Research, Vol. 2 2, June, pp. 47-62.
-
(2007)
Journal of Entrepreneurship Research
, vol.2
, pp. 47-62
-
-
Lee, M.1
Lan, Y.2
-
40
-
-
35348872417
-
Teens, privacy, and on-line social networks
-
accessed 20 June 2008, Princeton Survey Research Association, 18 April, available at
-
Lenhart, A. and Madden, M. (2007), "Teens, privacy, and on-line social networks", Research report, PEW/Internet & American life Project, Princeton Survey Research Association, 18 April, available at: www.pewInternet.org/pdfs/PIPTeens-Privacy-SNS-Report-Final. pdf (accessed 20 June 2008).
-
(2007)
Research Report, PEW/Internet & American Life Project
-
-
Lenhart, A.1
Madden, M.2
-
41
-
-
77951163007
-
Research highlights changing threat landscape and increased risk to the Web 2.0 enabled enterprise; latest Watchguard report identifies reasons to be fearful
-
accessed 1 November 2008, M2PressWIRE, 5 September, available at
-
M2PressWIRE (2007), "Research highlights changing threat landscape and increased risk to the Web 2.0 enabled enterprise; latest Watchguard report identifies reasons to be fearful", M2PressWIRE, 5 September, available at: www.accessmylibrary.com/coms2/summary 0286-3279 6978-ITM (accessed 1 November 2008).
-
(2007)
M2PressWIRE
-
-
-
42
-
-
78650870071
-
-
accessed 20 June 2008, available at KPMG LLP International, May
-
Matuszak, G. (2007, Enterprise 2.0: The Benefits and Challenges of Adoption, white paper, KPMG LLP International, May, available at: http://us.kpmg.com/microsite/attachments/2008/Enterprise 20-Adoption. pdf. (accessed 20 June 2008).
-
(2007)
Enterprise 2.0: The Benefits and Challenges of Adoption, White Paper
-
-
Matuszak, G.1
-
43
-
-
79955931031
-
Web 3.0
-
accessed 20 June 2008, 10 April, available at
-
Metz, C. (2007), "Web 3.0", PC Magazine, 10 April, available at: www.pcmag.com/article2/0, 2817, 2102852, 00.asp (accessed 20 June 2008).
-
(2007)
PC Magazine
-
-
Metz, C.1
-
44
-
-
77951172375
-
Web 2.0 users open a box of security risks
-
26 March
-
Mitchell, R. (2007), "Web 2.0 users open a box of security risks", Computerworld, 26 March, p. 32.
-
(2007)
Computerworld
, pp. 32
-
-
Mitchell, R.1
-
45
-
-
77951200222
-
-
accessed 20 June 2008, available at Gartner, 2 November
-
Pescatore, J. (2006, Web 2.0 Needs Security 101, research report, Gartner, 2 November, available at: www.gartner.com/DisplayDocument?ref=g- search&id=498199&subref= simplesearch (accessed 20 June 2008).
-
(2006)
Web 2.0 Needs Security 101, Research Report
-
-
Pescatore, J.1
-
46
-
-
77951148758
-
-
accessed 20 June, available at Gartner, 5 March
-
Pescatore, J. and Feiman, J. (2008, Security Features Should Be Built into Web 2.0 Applications, research report, Gartner, 5 March, available at: www.gartner.com/DisplayDocument?ref=g-search&id=498199&subref= simplesearch (accessed 20 June).
-
(2008)
Security Features Should Be Built Into Web 2.0 Applications, Research Report
-
-
Pescatore, J.1
Feiman, J.2
-
47
-
-
57849083058
-
Development of a library 2.0 service model for an African library
-
Pienaar, H. and Smith, I. (2008), "Development of a library 2.0 service model for an African library", Library Hi Tech News, Vol. 25 No. 5, pp. 7-10.
-
(2008)
Library Hi Tech News
, vol.25
, Issue.5
, pp. 7-10
-
-
Pienaar, H.1
Smith, I.2
-
48
-
-
77951161546
-
Firewalls, the future and Web 2.0
-
accessed 30 October 2008, 11 June, available at
-
Pruitt, S. (2007), "Firewalls, the future and Web 2.0", Network Security Journal, 11 June, available at: www.networksecurityjournal.com/ features/firewalls-the-future-web-2.061107/(accessed 30 October 2008).
-
(2007)
Network Security Journal
-
-
Pruitt, S.1
-
49
-
-
77951193426
-
Are you watching?
-
September
-
Radcliff, D. (2007), "Are you watching?", SC Magazine, September, pp. 40-3.
-
(2007)
SC Magazine
, pp. 40-43
-
-
Radcliff, D.1
-
50
-
-
34249296658
-
A risk-control framework for e-marketplace participation: The findings of seven cases
-
Ratnasigam, P. (2007), "A risk-control framework for e-marketplace participation: the findings of seven cases", Information Management & Computer Security, Vol. 15 No. 2, pp. 149-66.
-
(2007)
Information Management & Computer Security
, vol.15
, Issue.2
, pp. 149-166
-
-
Ratnasigam, P.1
-
51
-
-
34047114034
-
The security risks of AJAX/web 2.0 applications
-
DOI 10.1016/S1353-4858(07)70025-9, PII S1353485807700259
-
Ritchie, P. (2007), "The security risks of AJAX/Web 2.0 applications", Network Security, March, pp. 4-8. (Pubitemid 46518244)
-
(2007)
Network Security
, vol.2007
, Issue.3
, pp. 4-8
-
-
Ritchie, P.1
-
52
-
-
77951168611
-
Web 2.0+ Risk=Risk 2.0: Are you protected?
-
October
-
Rudman, R. (2007), "Web 2.0+ Risk=Risk 2.0: are you protected?", Accountancy SA, October, pp. 26-9.
-
(2007)
Accountancy SA
, pp. 26-29
-
-
Rudman, R.1
-
53
-
-
84993109351
-
The impact of internet crime on development
-
Salifu, A. (2008), "The impact of internet crime on development", Journal of Financial Crime, Vol. 15 No. 4, pp. 432-43.
-
(2008)
Journal of Financial Crime
, vol.15
, Issue.4
, pp. 432-443
-
-
Salifu, A.1
-
54
-
-
77951188180
-
-
accessed 14 June, Secure Computing, 2007, white paper, Secure Computing Corporation, available at
-
Secure Computing (2007), In Today's Web 2.0 Environment, Proactive Security is Paramount. Are You protected?, white paper, Secure Computing Corporation, available at: www.securitytechnet.com/resource/rsc-center2/vendor- wp/securecomputing/WW-WGS-WP.pdf (accessed 14 June).
-
In Today's Web 2.0 Environment, Proactive Security Is Paramount. Are You protected?
-
-
-
55
-
-
77951154003
-
Web 2.0 threats and risks for financial services
-
accessed 20 June 2008, 30 April, available at
-
Shah, S. (2007), "Web 2.0 threats and risks for financial services", Net Square, 30 April, available at: www.net-security.org/ article.php?id=1004 (accessed 20 June 2008).
-
(2007)
Net Square
-
-
Shah, S.1
-
56
-
-
53149096568
-
Understanding purchasing behaviour in a virtual economy: Consumer behaviour involving currency in Web 2.0 communities
-
11 April
-
Shin, D. (2008), "Understanding purchasing behaviour in a virtual economy: consumer behaviour involving currency in Web 2.0 communities", Interacting with Computers, Vol. 20, 11 April, pp. 433-46.
-
(2008)
Interacting with Computers
, vol.20
, pp. 433-446
-
-
Shin, D.1
-
57
-
-
77951183148
-
-
accessed 20 June, available at
-
Smith, D. (2008, Web 2.0 and Beyond: Evolving the Discussion, research report, Gartner, 24 January, available at: www.gartner.com/DisplayDocument?ref= gsearch&id= 588707&subref=simplesearch (accessed 20 June).
-
(2008)
Web 2.0 and Beyond: Evolving the Discussion, Research Report, Gartner, 24 January
-
-
Smith, D.1
-
58
-
-
77951173271
-
-
accessed 20 June, available at Gartner, 25 January
-
Valdes, R. (2008, Key Issues in Rich Internet Application Platforms and User Experience, research report, Gartner, 25 January, available at: www.gartner.com/DisplayDocument?ref=gsearch &id=589413&subref= simplesearch (accessed 20 June).
-
(2008)
Key Issues in Rich Internet Application Platforms and User Experience, Research Report
-
-
Valdes, R.1
-
59
-
-
77951191276
-
The implications of Web 2.0 on web information systems
-
Springer Berlin Heidelberg, Stanford Linear Accelerator Centre
-
White, B. (2007), "The implications of Web 2.0 on web information systems", Web Information Systems and Technologies, Vol. 1 No. 1, Springer Berlin Heidelberg, Stanford Linear Accelerator Centre, pp. 3-7.
-
(2007)
Web Information Systems and Technologies
, vol.1
, Issue.1
, pp. 3-7
-
-
White, B.1
-
60
-
-
77951171750
-
-
accessed 23 June, Wikipedia, Wikipedia, available at
-
Wikipedia (2008), "Web 2.0", Wikipedia, available at: http://en. wikipedia.org/wiki/Web-2 (accessed 23 June).
-
(2008)
Web 2.0
-
-
|