Abstract :
Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It\´s also an outside-in revolution: Technologies developed and explored outside the enterprise are migrating inside it. People who\´ve gotten hooked on Web 2.0 demand the same user experience, tools, and networking in their work that they\´ve experienced at play. The good news for enterprise security practitioners is that the impact of Web 2.0 has thus far been evolutionary. However, Web 2.0 growth is accelerating, and it\´s doing so for reasons as varied as compliance, privacy, and protection of corporate assets. Organizations considering deployment of Web 2.0 capabilities must exercise caution and control, just as they do with non-Web 2.0 technologies. What\´s needed, in short, is Security 2.0.
Keywords :
Internet; data privacy; telecommunication security; IT construct; Internet phenomenon; Web 2.0; enterprise security; information dissemination; privacy; Business; Cellular phones; Collaboration; Companies; Computer networks; Computer security; Data security; Pervasive computing; Smart phones; Web services; IT systems perspectives; Security 2.0; Web 2.0; enterprise security;