Original Research

Potential influence of Web 2.0 usage and security practices of online users on information management

R.J. Rudman, L.P. Steenkamp
South African Journal of Information Management | Vol 11, No 2 | a403 | DOI: https://doi.org/10.4102/sajim.v11i2.403 | © 2009 R.J. Rudman, L.P. Steenkamp | This work is licensed under CC Attribution 4.0
Submitted: 12 February 2009 | Published: 12 February 2009

About the author(s)

R.J. Rudman, Department of Accounting University of Stellenbosch Stellenbosch, South Africa
L.P. Steenkamp, Department of Accounting University of Stellenbosch Stellenbosch, South Africa

Full Text:

PDF (305KB)

Share this article

Bookmark and Share


The proliferation of Web 2.0 applications was the impetus for this survey-based research into practices that online users currently employ when using Web 2.0 sites. As part of the study, the popularity of Web 2.0 technologies and sites among online users at a university was investigated to determine the extent of the potential threat to corporate security, arising from Web 2.0 use and access. The results of this study indicate that the use of Web 2.0 sites is very popular among students, as a proxy for the potential future business users, and that users are not necessarily aware of the risks associated with these sites. The respondents indicated that they regularly visit Web 2.0 sites, and that they post personal information on these sites. This is of concern in protecting arguably the most valuable asset of a business.


No related keywords in the metadata.


Total abstract views: 2659
Total article views: 3846

Reader Comments

Before posting a comment, read our privacy policy.

Post a comment (login required)

Crossref Citations

No related citations found.