In the recent past, the so-called “Web 2.0” became a powerful tool for decision making processes. Politicians and managers, seeking to improve participation, embraced this technology as if it simply were a new, enhanced version of theWorldWideWeb, better suited to retrieve information, opinions and feedbacks from the general public on subjects like laws, acts and policies. This approach was often naive, neglecting the less-obvious aspects of the technology, and thus bringing on significant security problems. This paper shows how, in the end, the result could easily be the opposite of what was desired. Malicious attackers, in fact, could quite easily exploit the vulnerabilities in these systems to hijack the process and lead to wrong decisions, also causing the public to lose trust in the systems themselves.
In the recent past, the so-called “Web 2.0” became a powerful tool for decision making processes. Politicians and managers, seeking to improve participation, embraced this technology as if it simply were a new, enhanced version of world wide web, better suited to retrieve information, opinions and feedbacks from the general public on laws, acts and policies. This approach was often naive, neglecting the less-obvious aspects of the technol- ogy, and thus bringing on significant security problems. This paper shows how, in the end, the result could easily be the opposite of what was desired. Malicious attackers, in fact, could quite easily exploit the vulnerabilities in these systems to hijack the process and lead to wrong decisions, also causing the public to lose trust in the systems themselves
Prandini, M., Ramilli, M. (2012). Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes. FUTURE INTERNET, 4(4), 700-718 [10.3390/fi4030700].
Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes
PRANDINI, MARCO;RAMILLI, MARCO
2012
Abstract
In the recent past, the so-called “Web 2.0” became a powerful tool for decision making processes. Politicians and managers, seeking to improve participation, embraced this technology as if it simply were a new, enhanced version of world wide web, better suited to retrieve information, opinions and feedbacks from the general public on laws, acts and policies. This approach was often naive, neglecting the less-obvious aspects of the technol- ogy, and thus bringing on significant security problems. This paper shows how, in the end, the result could easily be the opposite of what was desired. Malicious attackers, in fact, could quite easily exploit the vulnerabilities in these systems to hijack the process and lead to wrong decisions, also causing the public to lose trust in the systems themselvesI documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.