Posted on September 21st, 2010 at 1:24 AM by Wan
Listen with webreader

Web 2.0 is a metaphorical indication for the idea that a new generation of internet application has been developed. Web 2.0 refers to the business revolution in the computer industry caused by the shift to the internet as platform and an effort to comprehend the rules for success on that new platform (O’Reilly, 2005).  Web 2.0 business applications include blogs, wikis, RSS (Really Simple Syndication) feeds and podcasts. Blogs provide social networking and bookmarking. Wikis allow collaboration of relevant contents. RSS feeds uses aggregator to make the user’s contents available with web access. Podcasts allow anyone to listen to a list of digital medias that are relevant to them.

The innovation of Web 2.0 has changed how business organisations conduct their work over the internet. It is users-driven and offers organisations a chance to freely communicate and collaborate. Besides, business applications of Web 2.0 impact the network effects and global connection through decentralisation and rich experiences through multimedia capabilities.  Web 2.0 is an opportunity for organisations to deliver information to citizens, partners and employees in an attitude that is more sensitive, convinced and efficient than ever before. Web 2.0 can impact organisation’s services by accelerating and improving decision-making and increase adoption of online services (Kendler, 2007).

Figure 1: The relationship between web 2.0 and Enterprise 2.0

(Hinchcliffe, 2006)

Web 2.0 has changed the role of users from unilateral technologies and passive receivers of information into both senders and receivers by multidirectional applications (Carr, 2008).The implications are as followings:

  • Unlimited and egalitarian – Users can create, add, edit or delete content without permission or regulation.
  • Allowing government work processes to be more efficient, cost-effective and transparent.
  • Assisting government to be more accountable by making the data easily accessible, easy to download and ease of use.
  • Harnessing the collective intelligence within the organisations.

Figure 2: The subsets of Web 2.0

(Joining Dots Ltd., 2005)

However, one of the risk in web 2.0 applications, it do not guarantee data security. The organisation’s business will be jeopardised if data cannot be accessed from the web. It is possible that confidential data can be accessed by unauthorised person. For example, Amazon’s EC2 service suffered a massive outage in 2008 that wiped out some customer application data. The outage was caused by a software deployment that erroneously terminated an unknown number of user instances (Malik, 2008). Alternatively, an organisation could go for a hybrid approach which will require employees to familiarise with the applications’ usage relating to workflows and processes. The organisation’s policies need to be reviewed to handle the replication of data.

An organisation needs to keep up-to-date on the latest policies, news, tools and commentary for everyone. Thus, a hybrid approach is an ideal choice as compared to other options because it offers many opportunities and benefits to organisation while maximising the return of investment.


Carr, N.G. (2008). The big switch: Rewiring the world, from Edison to Google. Norton, New York.

Hinchcliffe, D. (2006). Web 2.0 definition updated and Enterprise 2.0 emerges.  Retrieved September 21, 2010.

Joining Dots Ltd. (2005). What does Web 2.0 mean.  Retrieved September 21, 2010.

Kendler,P. B. (2007). Bank Systems & Technology.  Retrieved September 21, 2010.

Malik, O. (2008). Amazon S3 Storage Service Goes Down, Still Not Up.  Retrieved September 21, 2010.

O’Reilly, T. (2005). What is Web 2.0: Design patterns and business models for the next generation of software.  Retrieved September 21, 2010.

Velte, A. T., Velte, T. J., & Elsenpeter, R. (2010). Cloud computing: A practical approach. New York: The McGraw-Hill.


  • gume says:

    Cheers for this unique stuff. More often than not, the best advice come from the websites you actually wouldn’t expect. Recently, I did not give so much thought to leaving comments on weblog posts and have left feedback even less. Reading your useful report, will probably motivate me to take action more regularly.

    • Wan says:

      Thanks for reading my blog. There’s no doubt that there is unprecedented power on the web!

  • thanks for the inspiration I was stressed by work but i learnt that life is about living to the fullest and enjoying every moment.Thanks a million

  • Brooke Moody says:

    Awesome blog! I definitely agree that one of the biggest risks with web 2.0 is data security. Anything that is online is open to whoever may happen to stumble upon it. Organizations need to be very careful in this aspect and ensure that they are taking appropriate security measures to ensure integrity of their data.

    • Wan says:

      You’re right Moody, data security is a two-sided coin in the world of web 2.0. If there is an up-side, you can bet there is always a down-side for anything and everything and Web 2.0 is not the exception to that rule. The very fact that Web 2.0 is user driven is one of the potential down sides of it. Users are not professionals. Users are just people and the ability to use Web 2.0 sites for fun as well as for profit does not require a great deal of technical knowledge.

      More and more attackers are tagging one’s confidential data whether it is purely information nor multimedia items such as photos, audio, and video that belongs to the organisation. Attackers use botnets to perform distributed denial of service (DDOS) attacks. In order to get the hackers to stop attacking organisation’s network, they face blackmail. Lessons learned in the past shows in Japan, blackmail involving DDOS is on the rise. One major Tokyo firm had to pay 3 million yen (about U.S. $31,000) after the network was brought to a screeching halt by a botnet attack. Because the attack was so dispersed, police have been unable to track down the attackers.

      According to Velte et al. (2010), one of the top list of risk concerns is “Security” as shown in the below figure.

      Top lists of risk in an organisation

      • Amiel says:

        That must have been a devastating experience for Tokyo, but no surprise there. The development momentum is all about features–and protections seems to be neglected all the time. We are continuing to make the same mistakes by putting security last and taking it for granted. Just look at Facebook for example, how many time have they enhanced their privacy/security settings as opposed to their application features? The reality is that people are falling into the hype of creating and buying new ideas on improving Web applications, but they are not thinking about security. As a result, their users become more vulnerable and are more exposed to online threats.

Leave a Reply

You must be logged in to post a comment.