Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
Original responses should not be a word for word rehashing of what is stated in the readings, but rather an integration of the concepts and additional insights, either from real world experience or additional sources. It should be a 350 word response to the question . Your primary posting may end with a tag-line or a related question of your own. See APA criteria for citing resources. You must provide a minimum of a two references, in APA format, in your original response. note: 1.References (this does not count toward the required paper length)
FINALLY, you must cite your sources after every sentence which contains information from one of your sources. Just putting a citation at the end of a paragraph or section is not sufficient.