By Topic

Enterprise Security for Web 2.0

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)

Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It's also an outside-in revolution: Technologies developed and explored outside the enterprise are migrating inside it. People who've gotten hooked on Web 2.0 demand the same user experience, tools, and networking in their work that they've experienced at play. The good news for enterprise security practitioners is that the impact of Web 2.0 has thus far been evolutionary. However, Web 2.0 growth is accelerating, and it's doing so for reasons as varied as compliance, privacy, and protection of corporate assets. Organizations considering deployment of Web 2.0 capabilities must exercise caution and control, just as they do with non-Web 2.0 technologies. What's needed, in short, is Security 2.0.

Published in:

Computer  (Volume:40 ,  Issue: 11 )