The economics of user effort in information security [PDF]
A significant number of security breaches result from employees' failures to comply with security policies. The cause is often an honest mistake, such as when an employee enters their password in a phishing website, believing it to be a legitimate one.1 ...
Beautement, A, Sasse, A
core +1 more source
Development of Criteria and Evaluation of Search Engine Optimization Tools to Improve the Status of Library Websites [PDF]
Purpose: the current study aimed to develop criteria and evaluate engine optimization in order to improve the awareness and knowledge of librarians and information science professionals in the field of representing information resources on websites ...
Mohhamad Hassan Azimi +1 more
doaj +1 more source
PENGARUH E-SERVICE QUALITY TERHADAP KEPUASAN PENGGUNA APLIKASI GRAB DI KOTA KUPANG
This study aims to determine and analyze (1) the partial effect of e-service quality (website design, reliability, responsiveness, security/privacy, fulfillment, personalization, information, and empathy) on Grab Application users in Kupang City and (2)
Juita L D Bessie, Lea Susanti Taek
doaj +1 more source
What obstruct customer acceptance of internet banking? Security and privacy, risk, trust and website usability and the role of moderators [PDF]
Comparatively a little attention has been paid to the factors that obstruct the acceptance of Internet banking in Sri Lanka. This research assimilates constructs such as security and privacy, perceived trust, perceived risk, and website usability.
A. Ilmudeen, Yukun Bao
semanticscholar +1 more source
Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi.
Bangkit Wiguna +2 more
doaj +1 more source
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks
Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and low delay, but it also brings challenges in data security and privacy.
Tao Luo +4 more
doaj +1 more source
Rancang Bangun Sistem Informasi Manajemen Arsip Kerja Sama Pada PT. Kelola Teknologi Informasi
Currently, in the globalization era, sophisticated technology, and one of them is a website-based information system used as information management tools using the internet.
Dody Firmansyah, Siti Ernawati
doaj +1 more source
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
Imam Riadi, Rusydi Umar, Wasito Sukarno
doaj +1 more source
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts
Jean Rosemond Dora, Karol Nemoga
doaj +1 more source
Research aims : This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's ...
Santos Marianus, Syaiful Ali
semanticscholar +1 more source

