Security Threats of URL Shortening: A User's Perspective
|Title:||Security Threats of URL Shortening: A User's Perspective||Authors:||Le-Khac, Nhien-An
|Permanent link:||http://hdl.handle.net/10197/7853||Date:||7-Jul-2015||Abstract:||Short URLs have been used on the Internet for several years now and as time goes by new security threats are discovered in relation to their use (e.g. malware, phishing, spam). However, although current research in literature has compiled addressing the security threats when utilizing such types of URLs, no study approached the assessment of user confidence and user awareness regarding short URLs. Thus the aim of this paper is to cover the existing knowledge gap and to compile a baseline assessment on the frequency of use, user confidence and user awareness when utilizing short URLs. To do so, we have developed questionnaire connected to the previously mentioned aspects and which was applied to one hundred persons of various nationalities from within the European Union with various user experiences when it comes to the Internet and short URLs. The analysis of the replies received from the participants to the survey has revealed a general awareness that there are security risks associated with short URLs, a tendency of propagation of short URLs to other Internet services and platforms.||Type of material:||Journal Article||Publisher:||JACN||Journal:||Journal of Advances in Computer Networks||Volume:||3||Issue:||3||Start page:||213||End page:||219||Keywords:||Security; Threats; URL; Shortening; User perspective||DOI:||10.7763/JACN.2015.V3.169||Other versions:||http://www.icket.org/||Language:||en||Status of Item:||Not peer reviewed||Conference Details:||2015 International Conference on Knowledge and Education Technology, Bangkok, Thailand, 6-7 July 2015|
|Appears in Collections:||Computer Science Research Collection|
Show full item record
This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.