It Security Review Of Security Thesis

PAGES
2
WORDS
977
Cite

References

Bernoff, J., & Li, C.. (2008). Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review, 49(3), 36-42.

Cunningham, P., & Wilkins, J.. (2009). A Walk in the Cloud. Information Management Journal, 43(1), 22-24,26,28-30,54.

Mansfield-Devine, S.. (2008). Anti-social networking: exploiting the trusting environment of Web 2.0. Network Security, 2008(11), 4-7.

Orr, B.. (2008). Security 2.0: Not just a new kettle of phish. American Bankers Association. ABA Banking Journal, 100(2), 54-55.

Tim O'Reilly. (2006, July). Web 2.0: Stuck on a Name or Hooked on Value? Dr. Dobb's Journal, 31(7), 10.

Provos, N., Rajab, M., & Mavrommatis, P.. (2009). Cybercrime 2.0: When the Cloud Turns Dark. Association for Computing Machinery. Communications of the ACM, 52(4), 42.

Short, J. (2008). Risks in a Web 2.0 World. Risk Management, 55(10), 28-31,4.

Warr, W.. (2008). Social software: fun and games, or business tools? Journal of Information Science, 34(4), 591.

Appendices:

Appendix a: Web 2.0 Meme Map

Source: (O'Reilly, 2006)

Appendix B: Web 2.0 Applications

WEB 2.0 APPLICATIONS

Applications

Descriptions

Blogs

Online diary or journal entry on the Internet, which primarily supports text, photo (photoblog), video (vlog), and audio (podcast) formats

• Google, AOL, and Yahoo offer free blogging platforms

Mashup

• Web service that gathers related content from more than one source

• IBM's mashup applications enable project managers to match team resources with a map to identify the geographical locations of the resources

Peer-to-Peer Networking

• a technique for effectively sharing music, audio, and text files

• Napster and Gnutella are...

...

What is Web 2.0. Design Patterns and Business Models of the next generation of Software. Tim O'Reilly. Published September 30, 2005. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html

Sources Used in Documents:

• Consumer Wikis enable users to comment on content, in addition to editing content

• Wikipedia, a community Wiki encyclopedia, includes approximately 1.3 million English-language articles

Sources: (Bernoff, Li, 2008); O'Reilly, 2005. What is Web 2.0. Design Patterns and Business Models of the next generation of Software. Tim O'Reilly. Published September 30, 2005. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html


Cite this Document:

"It Security Review Of Security" (2010, February 12) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/it-security-review-of-security-15108

"It Security Review Of Security" 12 February 2010. Web.23 April. 2024. <
https://www.paperdue.com/essay/it-security-review-of-security-15108>

"It Security Review Of Security", 12 February 2010, Accessed.23 April. 2024,
https://www.paperdue.com/essay/it-security-review-of-security-15108

Related Documents

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is