Security Threats of URL Shortening: A User’s Perspective
نویسندگان
چکیده
منابع مشابه
Security and Privacy Implications of URL Shortening Services
URL shortening services replace long URLs with shorter ones and subsequently redirect all requests for the shortened URL to the original long URL. In this paper we discuss and empirically analyze security and privacy risks caused by the use of URL shortening services. We empirically determine the most popular URL shortening services currently used on Twitter and analyze these with respect to ma...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملStudying users' computer security behavior: A health belief perspective
Available online 21 November 2008
متن کاملusers as the biggest threats to security of health information systems
there are a lot of researches in the world about attacks on information systems (is). although there have been many attempts to classify threats of is’s especially in health information systems (his), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. the main aim of this paper is to present a research agend...
متن کاملEvaluation of Users’ Perspective on Voip’s Security Vulnerabilities
Voice over Internet protocol (VoIP) represents a major newish trend in telecommunications and an alternative to traditional phone systems. VoIP uses IP networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks complicates security issues and introduces a range of vulnerabilities. A VoIP system may face either an exclusive attack or an attack to the underlying IP...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Advances in Computer Networks
سال: 2015
ISSN: 1793-8244
DOI: 10.7763/jacn.2015.v3.169