skip to main content
10.1145/3626641.3627017acmotherconferencesArticle/Chapter ViewAbstractPublication PagessietConference Proceedingsconference-collections
research-article

Itsy-Bitsy Risky URL: A User Behavior

Published: 27 December 2023 Publication History

Abstract

A Uniform Research Locator (URL) is a set of characters, such as numbers, symbols, and letters, based on a standard format for addressing sources such as files and documents on the Internet. The URL shortening service replaces old version one with shorter URL up to 30 characters. Utilizing this URL shortening gives numerous points of interest, in which this shortened URL is exceptionally simple and easy to use. Despite all the benefit of using shortened URL, there are risk hidden behind it. Malicious attacker may use this shortened URL to manipulate users through phishing attack in which attackers rename URL containing malware to shortened URL names that attract the victim's attention. This study aims to analyze which factors influence users in clicking shortened URL based on six variables. It explored how the Technology Acceptance Model (TAM) and web security construct model were implemented to determine the factors driving users to click shortened URL. Data were collected from 253 shortened URL users using an online-based survey. The data analysis used Structural Equation Modeling (SEM). The results showed that the factors that influence user's intention to click shortened URL are Trust, Perceived Usefulness, Perceived Risk, and Perceived Security. Based on the result, users are aware the risk that may occur and threatened their security, despite the benefit, hence they are hesitant to click arbitrary shortened URL as it may a fraudulent one. As a result, this study help raising awareness towards arbitrary shortened URL clicking that possess risk and harm the users.

References

[1]
Acquisti, A., Gross, R., 2006. Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Golle, P., Danezis, G. (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies. Robinson College, Cambridge, UK, pp. 36–58.
[2]
Albakry, S., Vaniea, K. and Wolters, M.K.: What is this URL's Destination? Empirical Evaluation of Users’ URL Reading, CHI ’20: CHI Conference on Human Factors in Computing Systems, Bernhaupt, R., Mueller, F.F., Verweij, D., Andres, J., McGrenere, J., Cockburn, A., Avellino, I., Goguey, A., Bjøn, P., Zhao, S., Samson, B.P. and Kocielnik, R. (Eds.), pp.1–12, ACM (2020).
[3]
Al Khattab,Adel, Al-Shalabi,Hasan, Al-Rawad,Mahmaoud, Al-Khattab,Khamis dan Hamad,Faten, 2015. The Effect of Trust and Risk Perception on Citizen's Intention to Adopt and Use E-Government Services in Jordan. Journal of Strategic Information Systems.
[4]
Barriere, J. M., 2016. The Influence of Trust on Attitude of Employees towards HR Analytics in Organisations. University of Twente.
[5]
Budd, C. 2016. Are shortened URL safe?. Global Threat Communication.
[6]
Cheng, T.C Edwin., Lam, David Y.C., & Yeung, Andy C.L. “Adoption of Internet Banking: An Empirical Study in Hongkong,” Department of Logistics, The Hong Kong Polytechnic University. 2006
[7]
Davis, F.D., Bagozzi, R.P. nd Warshaw, P.R.1989.User acceptance of comouter technology: A comparison of two theoretica models. Management Science, 35(8), p.982-1003.U.S.A:The institute of Management Science (https://www.researchgate.net/profile/Fred_Davis2/publication/35465050_A_Technology_Acceptance_Model_for_Empirically_Testing_New_End-User_Information_Systems/links/0c960519fbaddf3ba7000000.pdf )
[8]
Hair Joseph F. Jr., Black William C., Babin Barry J., Anderson Rolph E. & Tatham Ronald L., 2010. Multivariate Data Analysis, Seventh Edition. Pearson Prentice Hall, Pearson Education, Inc: New Jersey
[9]
Fereshteh, F., Pishdar, M., Shakib, M., D., and Toloun, M., R., S., H. 2014. Consumers’ Perceived Risk and Its Effect on Adoption of Online Banking Services. American Journal of Applied Sciences 11 (1): 47-56, 2014 ISSN: 1546-9239.
[10]
Field, A., 2009. Discovering statistics using spss. 3rd ed. [e-book]. Sage Publications. Web Page: http://fac.ksu.edu.sa/sites/default/files/ktb_lktrwny_shml_fy_lhs.pdf
[11]
Fukushi, N., Koide, T., Chiba, D., Nakano, H., Akiyama, M. (2021). Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users’ Behaviors. In: Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M. (eds) Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 399. Springer, Cham. https://doi.org/10.1007/978-3-030-90022-9_1
[12]
Fukushi, N., Koide, T., Chiba, D., Nakano, H., Akiyama, M. (2022). Understanding Security Risks of Ad-based URL Shortening Services Caused by Users’ Behaviors. Journal of Information Processing Vol.30 865–877 (Dec. 2022)
[13]
Georgiev, M and Shmatikov, V. 2016. Gone in Six Characters: Short URL Considered Harmful for Cloud Services
[14]
Hair Joseph F. Jr., Black William C., Babin Barry J., Anderson Rolph E. & Tatham Ronald L. 2006. Multivariate Data Analysis, 6th edn, Pearson Prentice Hall, Pearson Education, Inc., Upper Saddle River, New Jersey 07458.
[15]
Jangir, Kshitiz, Vikas Sharma, Sanjay Taneja, and Ramona Rupeika-Apoga. 2023. The Moderating Effect of Perceived Risk on Users’ Continuance Intention for FinTech Services. Journal of Risk and Financial Management 16: 21.
[16]
Kenesei, S, Katalin Ásványi, László Kökény, Melinda Jászberényi, Márk Miskolczi, Tamás Gyulavári, Jhanghiz Syahrivar, Trust and perceived risk: How different manifestations affect the adoption of autonomous vehicles, Transportation Research Part A: Policy and Practice, Volume 164, 2022, Pages 379-393, ISSN 0965-8564, https://doi.org/10.1016/j.tra.2022.08.022. (https://www.sciencedirect.com/science/article/pii/S0965856422002269)
[17]
Kuo, K.-M. & Talley, P. C., 2014. An Empirical Investigation of the Privacy Concerns of Social Network Site Users in Taiwan. International Journal of Scientific Knowledge, 5(2), pp. 2305-1493.
[18]
L. Meyer-Waarden, J. Cloarec.2021. Baby, you can drive my car”: Psychological antecedents that drive consumers’ adoption of AI-powered autonomous vehicles Technovation, 102348 (2021), 10.1016/j.technovation.2021.102348
[19]
Lui, Hung Kit and Jamieson, Rodger, 2003. TRiTAM: A Model for Integrating Trust and Risk Perceptions in Business-to-Consumer Electronic Commerce. 16th Bled eCommerce Conference eTransformation.
[20]
Martins, Carolina., Oliveira, Tiago., &Popovic, Ales. “Understanding the Internet Banking Adoption: A Unified Theory of Acceptance and Use of Technology and Perceived Risk Application,”Faculty of Economics, University of Ljubljana. 2013
[21]
Neumann, A., Barnickel, J., Meyer, U. 2010. Security and Privacy Implications of URL Shortening Services. IT Security Group. RWTH Aachen University.
[22]
Nikiforakis, N., Maggi, F., Stringhini, G., Rafique, M.Z., Joosen, W., Kruegel, C., Piessens, F., Vigna, G. and Zanero, S.: Stranger danger: Exploring the ecosystem of ad-based URL shortening services, 23rd International World Wide Web Conference, WWW ’14, Chung, C., Broder, A.Z., Shim, K. and Suel, T. (Eds.), pp.51–62, ACM (2014)
[23]
Nguyen Vinh Khuong; Nguyen Thi Thanh Phuong; Nguyen Thanh Liem; Cao Thi Mien Thuy; Tran Hung Son (2022) : Factors affecting the intention to use financial technology among Vietnamese youth: Research in the time of COVID-19 and beyond, Economies, ISSN 2227-7099, MDPI, Basel, Vol. 10, Iss. 3, pp. 1-17,
[24]
Shin, D.H. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. 2010. Vol. 22 No. 5, pp 428-438.
[25]
Siegrist M. Trust and Risk Perception: A Critical Review of the Literature. Risk Anal. 2021 Mar;41(3):480-490. Epub 2019 May 2. 31046144.
[26]
Sun, S., Pospisil, E., Muslukhov, I., & Dindar, N.,2012. Investigating User's Perspective of Web Single Sign-On: Conceptual Gaps, Alternative Design and Acceptance Model. London: ACM Transactions on Internet Technology
[27]
Q. Yang, C. Pang, L. Liu, D.C. Yen, J.M. Tarn. Exploring Consumer Perceived Risk and Trust for Online Payments: An Empirical Study in China's Younger Generation Computers in Human Behavior, 50 (2015), pp. 9-24, 10.1016/j.chb.2015.03.058
[28]
Y. Wang, J. Gu, S. Wang, J. Wang. Understanding consumers’ willingness to use ridesharing services: The roles of perceived value and perceived riskTransportation Research Part C: Emerging Technologies, 105 (2019), pp. 504-519, 10.1016/j.trc.2019.05.044
[29]
Weidmann, K. P., Hennigs, N., Varelmann, D., and Reeh, M. O. 2010. Determinants of Consumers' Perceived Trust in IT-Ecosystems. Journal of Theoretical and Applied Electronic Commerce Research.

Index Terms

  1. Itsy-Bitsy Risky URL: A User Behavior
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        SIET '23: Proceedings of the 8th International Conference on Sustainable Information Engineering and Technology
        October 2023
        722 pages
        ISBN:9798400708503
        DOI:10.1145/3626641
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 27 December 2023

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        SIET 2023

        Acceptance Rates

        Overall Acceptance Rate 45 of 57 submissions, 79%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 25
          Total Downloads
        • Downloads (Last 12 months)22
        • Downloads (Last 6 weeks)3
        Reflects downloads up to 05 Mar 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media