Security Threats of URL Shortening: A User's Perspective

Files in This Item:
File Description SizeFormat 
URL_shortening.pdf1.13 MBAdobe PDFDownload
Title: Security Threats of URL Shortening: A User's Perspective
Authors: Le-Khac, Nhien-An
Kechadi, Tahar
Permanent link:
Date: 7-Jul-2015
Abstract: Short URLs have been used on the Internet for several years now and as time goes by new security threats are discovered in relation to their use (e.g. malware, phishing, spam). However, although current research in literature has compiled addressing the security threats when utilizing such types of URLs, no study approached the assessment of user confidence and user awareness regarding short URLs. Thus the aim of this paper is to cover the existing knowledge gap and to compile a baseline assessment on the frequency of use, user confidence and user awareness when utilizing short URLs. To do so, we have developed questionnaire connected to the previously mentioned aspects and which was applied to one hundred persons of various nationalities from within the European Union with various user experiences when it comes to the Internet and short URLs. The analysis of the replies received from the participants to the survey has revealed a general awareness that there are security risks associated with short URLs, a tendency of propagation of short URLs to other Internet services and platforms.
Type of material: Journal Article
Publisher: JACN
Journal: Journal of Advances in Computer Networks
Volume: 3
Issue: 3
Start page: 213
End page: 219
Keywords: SecurityThreatsURLShorteningUser perspective
DOI: 10.7763/JACN.2015.V3.169
Other versions:
Language: en
Status of Item: Not peer reviewed
Conference Details: 2015 International Conference on Knowledge and Education Technology, Bangkok, Thailand, 6-7 July 2015
Appears in Collections:Computer Science Research Collection

Show full item record

Google ScholarTM



This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.