skip to main content
10.1145/3274005.3274018acmotherconferencesArticle/Chapter ViewAbstractPublication PagescompsystechConference Proceedingsconference-collections
research-article

Web Technologies Used in the Commercial Banks in Finland

Published: 13 September 2018 Publication History

Abstract

The publication presents the results of empirical research on web technologies used in the home pages of the Finland commercial banks authorized under Finland Legislation to carry on commercial banking business and supervised by the Finland Financial Supervisory Authority (FIN-FSA). The home pages of 9 commercial banks were studied. Our survey reveals details about the proportion of the web technologies used in the respective web sites. The mean home page size is around 2.5 MB (±3.7 SD, median - 1.3) and the share of the images is around 41%. The share of the other web components is as follows: JavaScript programs - around 35%, CSS files - 10%, Font files - 7%. The size of the main HTML file is only 7% of the size of whole web page. The mean total number of requests that the web browser makes in order to display the home page is around 64 separate requests - 23 requests for images, 19 for JavaScript, 7 for CSS files, 6 for Font files. Only one of the surveyed web sites is using HTTP/2. The rest are using as minimum HTTP 1.1. Near 56% of the sites are using Symantec SSL certificates and again near 56% are using 2 years long certificates.

References

[1]
L. Hasana and E. Abuelrub. 2011. Assessing the quality of web sites. In: Applied Computing and Informatics. Vol. 9, issue 1, 2011, p. 11--29.
[2]
Parusheva, S. A Study on Adoption of Internet Banking and New Direct Banking Channels with Reference to Young Bulgarian Consumers. Journal of Applied Economic Sciences, Craiova: ASERS Publishing, 8, 2018, Spring 2(56), pp.510--519.
[3]
Supervised entities. Service providers supervised by the Financial Supervisory Authority (FIN-FSA), <http://www.finanssivalvonta.fi/en/About_us/Supervised/Pages/ supervisedentities.aspx> (retrieved 15.10.2017)
[4]
Petrov, P., Trends in the Use of Web Server Software in Bulgarian Banks. In: International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE-2012), UNWE, 2012, pp.359--364.
[5]
Dickinger, A., Stangl, B., Website performance and behavioural consequences: A formative measurement approach. In: Journal of Business Research, Volume 66, Issue 6, 2013, pp.771--777.
[6]
Apache HTTP Server Project. Apache httpd 2.2 vulnerabilities, <https://httpd.apache.org/security/vulnerabilities_22.html> (retrieved 15.01.2018).
[7]
Hodges, J., Jackson, C., Barth, A., HTTP Strict Transport Security (HSTS), 2012, <https://tools.ietf.org/rfc/rfc6797.txt> (retrieved 20.01.2018)
[8]
Chang, L., Hsiao, H., Jeng, W., Kim, T., Lin, W., Security Implications of Redirection Trail in Popular Websites Worldwide. In: Proceedings of the 26th International Conference on World Wide Web, 2017, pp.1491--1500.
[9]
Ross, D., Gondrom, T., Stanley,. T., HTTP Header Field X-Frame-Options, 2013, <https://tools.ietf.org/rfc/rfc7034.txt>
[10]
Some, D., Bielova, N., Rezk, T., On the Content Security Policy Violations due to the Same-Origin Policy. In: Proceedings of the 26th International Conference on World Wide Web, 2017, pp.877--886.
[11]
Kisa, K., Tatli, E., Analysis of HTTP Security Headers in Turkey. In: International Journal of Information Security Science, 2016, 5(4), pp.96--105.
[12]
Kuyumdzhiev, I. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security. In: TEM Journal, 3, 2014, 2, pp.113--119.

Cited By

View all
  • (2024)Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart gridE3S Web of Conferences10.1051/e3sconf/202450803008508(03008)Online publication date: 5-Apr-2024
  • (2023)Analysis of Workability of One-Way Functions Based on Cellular Automata in Diffie–Hellman Algorithm for Big Data TasksDigital Transformation, Cyber Security and Resilience10.1007/978-3-031-44440-1_19(123-145)Online publication date: 1-Nov-2023
  • (2022)Improving methods for generating encryption keys using strange attractorsPROBLEMS IN PROGRAMMING10.15407/pp2022.03-04.417(417-424)Online publication date: Dec-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CompSysTech '18: Proceedings of the 19th International Conference on Computer Systems and Technologies
September 2018
206 pages
ISBN:9781450364256
DOI:10.1145/3274005
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • ERSVB: EURORISC SYSTEMS - Varna, Bulgaria
  • FOSEUB: FEDERATION OF THE SCIENTIFIC ENGINEERING UNIONS - Bulgaria
  • UORB: University of Ruse, Bulgaria
  • TECHUVB: Technical University of Varna, Bulgaria

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 September 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Finland commercial banks
  2. SSL certificate
  3. home page
  4. web site
  5. web technologies

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CompSysTech'18

Acceptance Rates

Overall Acceptance Rate 241 of 492 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Applications of attack mitigation mechanisms in energy networks, attack detection and preventive methods for security in the smart gridE3S Web of Conferences10.1051/e3sconf/202450803008508(03008)Online publication date: 5-Apr-2024
  • (2023)Analysis of Workability of One-Way Functions Based on Cellular Automata in Diffie–Hellman Algorithm for Big Data TasksDigital Transformation, Cyber Security and Resilience10.1007/978-3-031-44440-1_19(123-145)Online publication date: 1-Nov-2023
  • (2022)Improving methods for generating encryption keys using strange attractorsPROBLEMS IN PROGRAMMING10.15407/pp2022.03-04.417(417-424)Online publication date: Dec-2022
  • (2021)Big data in property managementTHERMOPHYSICAL BASIS OF ENERGY TECHNOLOGIES (TBET 2020)10.1063/5.0041902(070001)Online publication date: 2021
  • (2020)One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open SpaceInformation & Security: An International Journal10.11610/isij.471647:2(233-246)Online publication date: 2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media