Security Threats of URL Shortening: A Users Perspective

Files in This Item:
File Description SizeFormat 
insight_publication.pdf1.89 MBAdobe PDFDownload
Title: Security Threats of URL Shortening: A Users Perspective
Authors: Le-Khac, Nhien-An
Kechadi, Tahar
Permanent link:
Date: Sep-2015
Online since: 2016-06-23T09:36:22Z
Abstract: Short URLs have been used on the Internet for several years now and as time goes by new security threats are discovered in relation to their use (e.g. malware, phishing, spam). However, although current research in literature has compiled addressing the security threats when utilizing such types of URLs, no study approached the assessment of user confidence and user awareness regarding short URLs. Thus the aim of this paper is to cover the existing knowledge gap and to compile a baseline assessment on the frequency of use, user confidence and user awareness when utilizing short URLs. To do so, we have developed questionnaire connected to the previously mentioned aspects and which was applied to one hundred persons of various nationalities from within the European Union with various user experiences when it comes to the Internet and short URLs. The analysis of the replies received from the participants to the survey has revealed a general awareness that there are security risks associated with short URLs, a tendency of propagation of short URLs to other Internet services and platforms.
Type of material: Journal Article
Publisher: IACSIT Press
Journal: Journal of Advances in Computer Networks
Volume: 3
Issue: 3
Start page: 213
End page: 219
Copyright (published version): 2015 the Authors
Keywords: Machine learningStatisticsSecurityThreatsURL shorteningUser persepctive
DOI: 10.7763/JACN.2015.V3.169
Language: en
Status of Item: Peer reviewed
Appears in Collections:Computer Science Research Collection
Insight Research Collection

Show full item record

Google ScholarTM



This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.