Itsy-Bitsy Risky URL: A User Behavior
Abstract
References
Index Terms
- Itsy-Bitsy Risky URL: A User Behavior
Recommendations
Antecedents of information systems user behaviour – extended expectation-confirmation model
The study examines antecedents that affect information systems IS users' behaviour and influence their decision to either continue or discontinue with IS use. Two models were used: the expectation-confirmation model of IS continuance ECM-IS and the ...
Secure Short URL Generation Method that Recognizes Risk of Target URL
All the information and data on the Internet are connected based on URL. Although many people use URL to share and convey the information, it is difficult to transmit the information when URL is long and special characters are mixed. Short URL service ...
Phishing URL Detection Using URL Ranking
BIGDATACONGRESS '15: Proceedings of the 2015 IEEE International Congress on Big DataThe openness of the Web exposes opportunities for criminals to upload malicious content. In fact, despite extensive research, email based spam filtering techniques are unable to protect other web services. Therefore, a counter measure must be taken that ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 25Total Downloads
- Downloads (Last 12 months)22
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format