16
New communication behaviours in a Web 2.0 world
as many plug-in vulnerabilities as there were in the same period a year earlier. In total, 61 per
cent of all vulnerabilities were related to specific Web applications
32
. It is expected that in the
near future attacks will move from personal computers to mobile phones and mobile devices.
A second concern is individual privacy and the security of published information. Such
information can be and is being misused for financial fraud, among other purposes.
The question of data ownership is also becoming a serious issue. At the moment it is unclear
whether the true owner of any given form of data is the service provider or the individual
user. This raises the question of who is allowed to edit such data and indeed who should take
responsibility for the data’s compliance with law and good practice.
This question also extends to ownership among users. Take images of other people, for example.
Can one user share his or her own images of another user without their consent? This has not
been clarified.
Summary of Contents for Web 2.0 services
Page 40: ...www alcatel lucent com...