Security Threats from Social Computing

Ghandi, Ajay
March 2008
Security: Solutions for Enterprise Security Leaders;Mar2008, Vol. 45 Issue 3, p20
Trade Publication
The article discusses the potential threats of social computing tools in business enterprises. According to the author, the benefits of social software applications have been coupled with serious issues regarding corporate governance and security. He emphasizes that chief security officers need to monitor new employees who are accustomed to social technologies such as Web 2.0 to protect the possible actions of phishing and malware.


Related Articles

  • Enterprise 2.0. Marks, Oliver // Infonomics;2009 AIIM Guide to ECM, p94 

    The article discusses the concept of enterprise 2.0, also known as Web 2.0. Enterprise 2.0 is significant to modern technologies and techniques to create powerful business process-specific Web applications to match with other platforms including enterprise content management (ECM), customer...

  • The triumph of IP.  // Telecom Asia;Jun2007, Vol. 18 Issue 6, p53 

    The article highlights Web 2.0, touted as the Best New Technology. According to the author, Web 2.0's victory underlines the dominance of IP and the wide expectation. He added that it is an online platform enabled by IP and leverages multiple applications and data and at the same time, it is...

  • Social Media Mindset and Knowledge Management. Säntti, Risto // Proceedings of the European Conference on Knowledge Management;2011, Vol. 2, p872 

    The term Web 2.0 is associated with web applications that facilitate interactive information sharing, interoperability, user-centered design and collaboration on the internet. There is an ongoing broad Web 2.0 or social media focused discussion within society and within organizations. The focus...

  • Collaboration drives innovation. Bicknell, David // Computer Weekly;4/28/2009, p14 

    The article focuses on the significance of workforce collaboration and the adoption of Web 2.0 software. The significance of workforce collaboration got firmer with the need to respond quickly to market changes and the proliferation of a geographically dispersed workforce. Organisations are...

  • Microsoft prepping Web 2.0 tools. FONTANA, JOHN // Network World;10/6/2008, Vol. 25 Issue 39, p20 

    The article reports on the development made by Microsoft Corp. on its Windows-based Web 2.0 and composite applications in the U.S. Such a move was viewed that the company is beginning to align its software and development tools as it defines its future as a services company. The announcement...

  • The Collaboration 3.0 approach. Spira, Jonathan // KM World;Sep2007, Vol. 16 Issue 8, p1 

    The article discusses the Collaboration 3.0 processes and technologies which are used by few chief companies. It states that Web 2.0, a term which was used for a 2003 conference is considered as a child's play in comparison with the Collaboration 3.0. It is a very high level of collaboration and...

  • Mining THE Blogosphere. Halligan, Brian // Home Business Magazine: The Home-Based Entrepreneur's Magazine;Jul/Aug2008, Vol. 15 Issue 4, p46 

    The article discusses the significance of business blogging. It is noted that a blog allows businesspeople to engage in a two-way dialogue with customers and prospects through readers posting comments. Blogging supports search engine optimization, where each blog post becomes its own Web page...

  • LinkedIn: Are You Missing a Golden Opportunity to Network? Free, Miles // Production Machining;Dec2011, Vol. 11 Issue 12, p19 

    The article focuses on features of the LinkedIn online social networking site which are said to be important for business enterprises and individuals. It mentions the Profile page where a company can make a good impression. It cites a feature in which one can create a list of contacts linked in...

  • IT keys Web 2.0 deployments.  // Communications News;Jan2009, Vol. 46 Issue 1, p6 

    The article reports that information technology ( IT) departments are taking a more active role in the acquisition and deployment of Web 2.0 technologies, according to Forrester Research. Budgetary controls, the need for integration and technical skills, and the growing importance of Web 2.0...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics