DOI: 10.5176/978-981-08-7240-3_I-62

Authors: Ted Lau and Hsuan-Chih Wang

Abstract:

The Web 2.0 environment provides fertile ground for Internet criminals to harvest sensitive information, online bank accounts and credit card numbers, and bot nets. Therefore, it is essential to provide security technologies to protect client devices, web servers and user information contents. This article examines the security strategy for the Web 2.0 environment based on Web 2.0 security related technical patents within the USPTO database that were approved between 2000 and 2009. This study found that similar efforts were made in protecting both client devices and web servers. In addition, more effort was put into content management. Furthermore, by examining Web 2.0 security related articles from the SCIand SSCI journals from 2005 through 2009, much research has been conducted in technologies for protecting the information contents.

Price: $4.99

Loading Updating cart...
LoadingUpdating...