Right to Internet Use
The United Nations advocates making “Right to Internet Access” a human right, one which countries such as Estonia, France, Finland, Greece and Spain have already implemented. This got me thinking about how we would look at “Right to Internet Use”, e.g., social networking.
We all know the power of social networking, its adaption and growth. According to Facebook, more than 500 million users spend over 700 billion minutes per month on the site. However, not many of us could have imagined its impact on reshaping the political landscape of countries. Perhaps the most talked about example is that of a 26-year-old woman, worried about the state of her country, who wrote on Facebook, “People, I am going to Tahrir Square”. The message soon snowballed into a movement to oust Egyptian President Hosni Mubarak. As another example, China’s reaction to what is called the “Jasmine Revolution” was swift, with filtering and monitoring on popular social media websites and services.
The buzz is about the CSM (Cloud, Social Media, Mobile) phenomenon which is reshaping the Internet world. It’s already established that social networking has overtaken search as the primary reason for users to access the Internet. Facebook has more than 200 million active users who use mobile for access, and these users are twice as active as non-mobile users.
Consumerization of the Enterprise, combined with the CSM phenomenon and recent political events, make me feel that this is not just about adaption of new technologies but more about changes and impact on the history of mankind. It’s not just about using new technologies and models to provide better services at lower cost to a larger user base. It’s about a medium to communicate, participate and influence changes in the world.
One can think of several positive and negative uses of this phenomenon. If used well, it can bring about necessary changes and revolutions. But it can also be used to spread panic and lead to concepts like “social networking terrorism”.
The CSM phenomenon is too strong and important to be ignored. Would censoring of this medium be possible? Like the Internet, CSM could be considered as a human right, leading to positions on “Right to Internet Use”.
At an Enterprise level, blocking and not adopting CSM is a risk management control which is not sustainable. Users and business would not accept this posture. We need to find answers for the two main reasons why some Enterprises are staying away from adoption of CSM, which are “Confusion and Fear”.
February 23, 2011 - Posted by Aujas US | Cloud Security, Enterprise Security, Social networking | Cloud computing, CSM, Facebook, Hosni Mubarak, Internet access rights, Security, Social media, social networking
No comments yet.
Information Risk Consultants
Managing Information Risk
Aujas is backed by the strength and financial depth of IDG, a global company well-known in the IT media space for its thought leadership.
Our seasoned IRM professionals work with clients to develop cost effective solutions aligned with business strategy.
Contact Us
Karl S. Kispert
VP Sales & Business Development
201 633 4745 (w)
karl.kispert@aujas.com2500 Plaza 5
Harborside Financial Center
Jersey City, NJ 07311
-
Recent Ezine Articles
- Managing Risk of Privileged Access and Activity Management
- Download the Risky Business eBook for Insights into Information Security
- Aujas Opens New Office in California to Focus on Global Growth
- Secure Software Development by Design
- Aujas among the Most-Requested Information Risk / IT Security Firms at 2011 CIO & IT Security Forum
- Mitigating Security Risks in USSD-Based Mobile Payment Applications
- Windows Azure: Build Secure Applications by Design
- Phishers Target Social Media, Are You the Victim?
- Amazon EC2 Failures Are a Wakeup Call for Cloud Customers
- The Business Case for Secure Development Lifecycle
- Data-Breach Risk Is Not Only from Insider Threats
- Data Protection and Controls – Does Format Really Matter?
- Data Governance – What We Need to Think About
- Cloud Computing – Security Threats and More…
- Right to Internet Use
Archives
Search posts
Most popular categories
Access control Cloud Security Cyber Crime Data governance Data Leak Prevention Data Losss Prevention Data protection Enterprise Security File upload security identity and access management Identity Theft information risk management services IT security Mergers and Acquisitions Mobile device security Phishing Physical Security controls Risk management SDL Secure code development Secure Development Lifecycle Service oriented architecture Social Engineering Social networking Uncategorized USSD-based mobile applications Vulnerabiliy managment White Hat HackingSubscribe to the Aujas Ezine
For current Information Risk Management news, commentary and tips, subscribe to the Weekly Aujas Ezine. Email karl.kispert@aujas.com with "Ezine" in your subject line.
Leave a Reply