• Title/Summary/Keyword: Website Security

Search Result 105, Processing Time 0.026 seconds

Exploring the Moderating Effect of Security Awareness on Trust and Service Value in Website (품질 관점에서 웹사이트의 신뢰와 서비스가치, 그리고 보안인식의 조절효과)

  • Park, Jun-Gi;Lee, Hyejung;Kim, Gibum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1217-1232
    • /
    • 2017
  • Because websites contain personal information such as address, contact information, etc., Attention about website security is required. This research is a study to examine that user's security awareness has a moderating effect on the relationship between website quality factors and trust, information and service value on websites holding personal information. As a result of questionnaire survey of the secondary school students and parents 635 people, website quality factors excluding usability positively affected trust of the website. Information quality on the website had a positive influence on service value and service value also affected trust. User's security awareness about the website has a moderating effect on the relationship between information and service value. The result of this research means that users are not continuously using websites with a low security level. Based on the results of this research, we presented theoretical and practical suggestions for the stakeholders of websites.

E-Smart Health Information Adoption Processes: Central versus Peripheral Route

  • Koo, Chulmo;Lim, Min Kyung;Park, Keeho
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.65-91
    • /
    • 2014
  • Our study adopted ELM (Elaboration Likelihood Model) to measure the impact of central and peripheral cues on e-healthcare website behavior and its consequence on perceived loyalty of users. While most of ELM studies did not elaborate the antecedent of both central and peripheral cues, we measured the antecedents of those information processing routes to clarify how technical and quality factors (i.e. information organization, security concern, and website attractiveness) develop the nature of either central or peripheral route. We found that information organization was the main antecedent of information quality presented on the website. Second, the results revealed that website security has a positive effect on website credibility. Third, we also found that website attractiveness was positively associated with website credibility. Fourth, consistent with elaboration likelihood model, the empirical findings suggested that information quality (central cue) and website credibility (peripheral cue) were strong predictors of behavior intention to use health website. Our findings also suggested that behavior intention to use health website significantly influenced perceived loyalty.

A Study on the Value of Web Sites: With a Modified Technology Acceptance Model (정보기술수용모형(TAM) 관점에서 본 웹사이트 가치에 관한 연구)

  • Lee, Kyoung-A;Lee, John-Hearn
    • Information Systems Review
    • /
    • v.3 no.1
    • /
    • pp.19-30
    • /
    • 2001
  • With the e-business paradigm emerging, the website became a critical resource for most corporations. However, the amount of value creation through internet is still in question. This paper shows the result of an exploratory study on website assessment, following the tradition of Technology Acceptance Model (TAM). We viewed the intended usage as the value of the website and added such factors as playfulness, commitment, system quality, and information security as external variables of the model. Website types, visiting purposes, and the user system quality were included as moderators. The website value could differ depending on website types, purposes of the use and system quality. In the case of internet shopping malls, playfulness, compatibility, website quality were identified as key influencers, while for stock trading users, however, commitment and security factors are more important. In terms of user purposes, information search requires both the compatibility and the website quality. Also the website quality was strongly affected by the user system quality. In other words, any investment of upgrading the website system quality can be meaningless unless the user system quality is improved as well. For each variable considered, empirical results are discussed and practical implications are provided.

  • PDF

A Study on Security Factors on Online Shopping - focus on internet bookshops -

  • Hua, Deng;Kim, Chang-Eun
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2005.11a
    • /
    • pp.418-422
    • /
    • 2005
  • Electronic commerce has provided another access for consumers to purchase products, but some researches have pointed out that there are difficulties for companies to do business on web. For lack of trust, many people not prefer purchasing through virtual channels. Based on the literature review, this study aims at empirically testing the impact of website design on individual trust in internet firms. From statistic analysis, we will conclude that security, interaction, and navigation functionality will affect on-line trust.

  • PDF

Empirical Evaluation of Indian Tourism Websites

  • Kaur, Anupriya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.63-68
    • /
    • 2022
  • Given the competition between different tourist destinations to attract domestic and international tourists it is absolutely vital to examine their website efficacy on specific attributes. This study employs one of the recently developed multi-criteria decision-making method the Best-Worst Method to assess the state government official tourism website across four Indian states known for their tourism potential- Himachal Pradesh, Uttrakhand, Uttar Pradesh and Rajasthan on specific attributes provided by the widely acknowledged WebQual instrument. Information Fit-to-Task and Trust emerged as the most important criterion. Relative advantage and Innovation the least important. The results of the study are easily interpretable and visual. They offer both an individual and comparative analysis of the perceived website efficacy on specific attributes to facilitate tourism stakeholders and website administrators to strategize and make their digital presence effective and competitive.

Verification Methods of OWASP TOP 10 Security Vulnerability under Multi-Tenancy Web Site's Environments (멀티테넌시 기반 웹 사이트의 OWASP TOP 10 보안취약성 검증 방법)

  • Lee, Do Hyeon;Lee, Jong Wook;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.43-51
    • /
    • 2016
  • Nowadays hacked using a security vulnerability in a web application, and the number of security issues on the web site at many sites due to the exposure of personal information is increasing day by day. In this paper, considering the open-source Web Application Security Project at the time of production of the website. Proposed the OWASP TOP 10 vulnerability verification method, by applying the proposed method and then analyzed for improved method and vulnerability to verify the performance of security vulnerability.

Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response (이미지 및 코드분석을 활용한 보안관제 지향적 웹사이트 위·변조 탐지 시스템)

  • Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.871-883
    • /
    • 2014
  • New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit or national confusion are being emerged and evolved. In addition, in case of 'drive by download' attack, if a host just visits the compromised websites, then the host is infected by a malware. Website falsification detection system is one of the most powerful solutions to cope with such cyber threats that try to attack the websites. Many domestic CERTs including NCSC (National Cyber Security Center) that carry out security monitoring and response service deploy it into the target organizations. However, the existing techniques for the website falsification detection system have practical problems in that their time complexity is high and the detection accuracy is not high. In this paper, we propose website falsification detection system based on image and code analysis for improving the performance of the security monitoring and response service in CERTs. The proposed system focuses on improvement of the accuracy as well as the rapidity in detecting falsification of the target websites.

Method for Evaluating the Security Risk of Website (웹 사이트 보안 위험도 산정 기법)

  • Kim, Young-Gab;Lee, Jun-Sub;Cho, Sanghyun;Kim, Moon Jeong;Lee, Min-Soo;Kim, Sang-Rok;Kim, In Ho;Kim, Sung Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1119-1122
    • /
    • 2007
  • 최근 전자우편이나 해킹을 통한 피싱과 파밍 등 금융 사기가 많이 발생하고 있다. 이에 이러한 피해로부터 사용자의 경제적 손실 및 개인정보 보호를 위하여 웹 사이트 인증, 전자우편 인증 등의 연구가 진행되고 있다. 기존 인증 방법에서는 WBL (Website Black-List) DB를 사용하였는데, 피싱의 짧은 생명주기(life cycle)로 인해 WBL DB의 유효성은 떨어질 뿐만 아니라, 피싱 사건 발생 후 웹 사이트가 WBL DB에 등록되기 전까지는 확인 불가능하다는 단점을 가지고 있다. 이러한 문제점을 극복하기 위해 WWL (Website White-List) DB를 이용한 연구가 진행 중이지만 아직은 미비한 편이다. 이에 본 논문에서는 기존의 WBL DB와 WWL DB를 이용한 방법이 가지고 있는 한계점을 극복하기 위해 WWL DB 항목을 정의하고, 이를 이용하여 웹사이트 보안 위험도를 정량화할 수 있는 웹사이트 위험도 산정 기법을 제안한다.

Necessity of S/W Development Security (S/W 개발 보안의 필요성)

  • Shin, Seong-Yoon;Kim, Chang-Ho;Jang, Dai-Hyun;Lee, Hyun Chang;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.169-170
    • /
    • 2014
  • Most of the attacks will attempt to exploit the vulnerability of the application website(SW). Cases are also frequently at home and abroad, and to be hacked. In this paper, S/W Development Security sees the main issues dealt with. Security-related laws and regulations to look at the system.

  • PDF

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.