Wikis are social networking systems that allow users to freely intermingle at different levels of communication such as collaborative learning, chatting, and group communications. Although a great idea and goal, it\u2019s particularly vulnerable due to its features of open medium and lack of clear plan of defense. Personal data can be misused for virtual insulting, resulting in misuse of personal information for financial gains or creating misuses. Wikis are an example of social computing of collaborative learning, joint editing, brain storming, and virtual socializing, which is a ripe environment for hacking, deception, abuse, and misuse. Thus, wiki needs comprehensive security measures which include privacy, trust, security, audit, and digital forensics to protect users and system resources. This paper identifies and explores the needs of secure social computing and supporting information systems as places for interaction, data collection, and manipulation for wikis. It does this by reviewing the literature and related works in proposing a safety measure framework for a secure and trustworthy medium together with privacy, audit, and digital forensic investigative functions in wiki environments. These then can aid design and usage in social computing environments with the proviso to give comfort and confidence to users without worrying about abuse and cybercrime perpetrated activities.<\/p>","DOI":"10.4018\/jisp.2012040101","type":"journal-article","created":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T16:39:14Z","timestamp":1355243954000},"page":"1-15","source":"Crossref","is-referenced-by-count":4,"title":["Safety Measures for Social Computing in Wiki Learning Environment"],"prefix":"10.4018","volume":"6","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[{"name":"Universiti Kebangsaan Malaysia, Malaysia, and Kingston University, UK"}]},{"given":"Mona","family":"Taghavi","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia, Malaysia"}]},{"given":"Joaquim Celestino","family":"J\u00fanior","sequence":"additional","affiliation":[{"name":"State University of Cear\u00e1, Brazil"}]},{"given":"Rodziah","family":"Latih","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia, Malaysia"}]},{"given":"Abdullah Mohd","family":"Zin","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia, Malaysia"}]}],"member":"2432","reference":[{"key":"jisp.2012040101-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.008"},{"key":"jisp.2012040101-1","unstructured":"Aronsson, L. (2002). Operation of a large scale, general purpose wiki website. In Proceedings of the 6th International ICCC\/IFIP Conference on Electronic Publishing, Karlovy Vary, Czech Republic."},{"issue":"5","key":"jisp.2012040101-2","first-page":"211","article-title":"Mobile agent security.","volume":"14","author":"N.Borselius","year":"2002","journal-title":"IEEE Intelligent Systems"},{"key":"jisp.2012040101-3","author":"C.Charron","year":"2006","journal-title":"Social computing: How networks erode institutional power, and what to do about it"},{"key":"jisp.2012040101-4","unstructured":"Clarke, R. (2001). Privacy as a means of engendering trust in cyberspace. Retrieved May 2, 2012, from http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/eTrust.html"},{"key":"jisp.2012040101-5","doi-asserted-by":"publisher","DOI":"10.1145\/1101779.1101804"},{"key":"jisp.2012040101-6","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0193"},{"key":"jisp.2012040101-7","article-title":"On mobile wiki systems security","author":"S.Furnell","year":"2008","journal-title":"Securing information and communication systems: principles, technologies and applications"},{"key":"jisp.2012040101-8","doi-asserted-by":"publisher","DOI":"10.1145\/1594173.1594174"},{"key":"jisp.2012040101-9","doi-asserted-by":"crossref","unstructured":"Jensen, C. D. (2009). Security in wiki-style authoring systems. In Proceedings of the Third IFIP WG 11.11 International Conference on Trust Management III (Vol. 300, pp. 81-98).","DOI":"10.1007\/978-3-642-02056-8_6"},{"key":"jisp.2012040101-10","first-page":"129","article-title":"A model for mobile agent security in e-business applications.","volume":"3","author":"A.Kannammal","year":"2007","journal-title":"International Journal of Business and Information"},{"key":"jisp.2012040101-11","unstructured":"Lazar, I. (2010). Merging the worlds of social computing and unified communications. Retrieved May 5, 2012, from http:\/\/www.networkworld.com\/community\/blog\/merging-worlds-social-computing-and-unified-c"},{"key":"jisp.2012040101-12","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Adamic, L., & Huberman, B. (2006). The dynamics of viral marketing. In Proceedings of the 7th ACM Conference on Electronic Commerce, Ann Arbor, MI.","DOI":"10.1145\/1134707.1134732"},{"key":"jisp.2012040101-13","doi-asserted-by":"crossref","unstructured":"Li, X., Mao, W., Zeng, D., & Wang, F. Y. (2008). Agent-based social simulation and modeling in social computing. In C. C. Yang, H. Chen, M. Chau, K. Chang, S.-D. Lang, P. S. Chen, et al. (Eds.), Proceedings of the International Workshop on Intelligence and Security Informatics (LNCS 5075, pp. 401-412).","DOI":"10.1007\/978-3-540-69304-8_41"},{"key":"jisp.2012040101-14","doi-asserted-by":"crossref","unstructured":"Motahari, S., Manikopoulos, C., Hiltz, R., & Jones, Q. (2007). Seven privacy worries in ubiquitous social computing. In Proceedings of the 3rd Symposium on Usable Privacy and Security, Pittsburgh, PA.","DOI":"10.1145\/1280680.1280713"},{"key":"jisp.2012040101-15","unstructured":"Musser, D., Wedman, J., & Laffey, J. (2003). Social computing and collaborative learning environments. In Proceedings of the 3rd IEEE International Conference on Advanced Learning Technologies, Athens, Greece"},{"key":"jisp.2012040101-16","unstructured":"Newsgator. (2009). Delivering ROI with enterprise social computing. Retrieved May 5, 2012, from http:\/\/www.newsgator.com\/LinkClick.aspx?fileticket=mIFywjDmIEA%3D&tabid=98"},{"key":"jisp.2012040101-17","first-page":"252","article-title":"Concept of mobile agent-based electronic marketplace \u2013 safety measures","volume":"Vol. 1","author":"A.Patel","year":"2010","journal-title":"Encyclopedia of e-business development and management in the digital economy"},{"key":"jisp.2012040101-18","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175223"},{"key":"jisp.2012040101-19","unstructured":"Thite, M. (1999). Leadership: A critical success factor in IT project management. In Proceedings of the International Conference on Management of Engineering and Technology (Vol. 2, pp. 298-303)."},{"key":"jisp.2012040101-20","first-page":"5","article-title":"Social computing: A digital and dynamical integration of science, technology, and human and social studies.","volume":"7","author":"F.Wang","year":"2005","journal-title":"China Basic Science"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=68818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:56:23Z","timestamp":1654124183000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2012040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2012040101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}