• Title/Summary/Keyword: Web Information Use Behavior

Search Result 122, Processing Time 0.033 seconds

JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking

  • Kim, Hyoung-Chun;Choi, Young-Han;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.766-783
    • /
    • 2012
  • Recently, many malicious users have attacked web browsers using JavaScript code that can execute dynamic actions within the browsers. By forcing the browser to execute malicious JavaScript code, the attackers can steal personal information stored in the system, allow malware program downloads in the client's system, and so on. In order to reduce damage, malicious web pages must be located prior to general users accessing the infected pages. In this paper, a novel framework (JsSandbox) that can monitor and analyze the behavior of malicious JavaScript code using internal function hooking (IFH) is proposed. IFH is defined as the hooking of all functions in the modules using the debug information and extracting the parameter values. The use of IFH enables the monitoring of functions that API hooking cannot. JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection of URLs related to redirection, and detection of exploit codes. Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.

ISRI - Information Systems Research Constructs and Indicators: A Web Tool for Information Systems Researchers

  • Varajao, Joao;Trigo, Antonio;Silva, Tiago
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.54-67
    • /
    • 2021
  • This paper presents the ISRI (Information Systems Research Indicators) Web tool, publicly and freely available at isri.sciencesphere.org. Targeting Information Systems (IS) researchers, it compiles and organizes IS adoption and use theories/models, constructs, and indicators (measuring variables) available in the scientific literature. Aiming to support the IS theory development process, the purpose of ISRI is to gather and systematize information on research indicators to help researchers and practitioners' work. The tool currently covers eleven theories/models: DeLone and McLean's IS Success Model (D&M ISS); Diffusion of Innovations Theory (DOI); Motivational Model (MM); Social Cognitive Theory (SCT); Task-Technology Fit (TTF); Technology Acceptance Model (TAM); Technology-Organization-Environment Framework (TOE); Theory of Planned Behavior (TPB); Decomposed Theory of Planned Behavior (DTPB); Theory of Reasoned Action (TRA); and Unified Theory of Acceptance and Use of Technology (UTAUT). It also includes currently over 400 constructs, nearly 2,500 indicators, and about 60 application contexts related to the models. For the creation of the tool's database, nearly 580 references were used.

An Empirical Investigation of IT Adoption: Based on Movie Website (정보기술 수용에 관한 실증적 연구 : 영화관 웹사이트를 중심으로)

  • Kim, Jong-Weon;Jeong, Seok-Chan;Kim, Eun-Jung
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.157-176
    • /
    • 2007
  • Most of the Information Systems(IS) literature has focused on utilitarian or hedonic Information Technology(IT) to explain and predict IT adoption and use. This study investigates the relationships among individuals' beliefs and intention to use of movie website, which has both utilitarian and hedonic characteristics simultaneously. As a theoretical background, this study adopts Technology Acceptance Model(TAM) and Motivation Theory, in which the former is well-known as a theory of IT adoption and use in IS field, and the latter is famous for a theory of individual's behavior in organizational behavior field. With 153 responses, five hypotheses are tested by using structured equation model. The results show that perceived ease of use positively influences perceived usefulness and perceived enjoyment, and that all individuals' beliefs have a positive impact on intention to use of movie web-site. Based upon the study results, movie website's managers and professionals can plan and conduct their courses of action effectively for users' continuous visits on their operating website.

  • PDF

A Study on the Cosmetics Purchasing Behavior According to the 20-30 Year Old Men's Life Style (20대-30대 남성들의 라이프스타일에 따른 화장품 구매행동)

  • Lee Mun-Young;Kim Yong-Sook
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.1 s.100
    • /
    • pp.56-69
    • /
    • 2006
  • The purposes of this study were to identify cosmetics purchasing behavior according the 20-30 year old men's lifestyle. The results were as follows; 1. The factors of men's lifestyle were sense of fashion, participation of social activities, use of web-based information, sense of androgyny, economical efficiency, provision of web-base information, sport activities, and pursuit of change, and they were segmented into a passive stagnant group, a economic web-base information utilizing group, a positive social activity participation group, and a sensitive appearance change pursuit group. 2. Passive stagnant group used less information sources patronized cosmetics specialty store, did not select their cosmetics by themselves, and spent less for their cosmetics. Economic web-base information utilizing group used information sources positively, patronized cosmetics discount store or internet shopping, and spent less for cosmetics. Positive social activity participation group patronized cosmetics specialty store or discount store, but did not select cosmetics by themselves. Sensitive appearance change pursuit group patronized department store or internet shopping for cosmetics, selected cosmetics by themselves, and spent more. 3. Passive stagnant group showed a tendency of older, less educated, and lower incomes, but economic web-base information utilizing group were among the age of 20's, lower educated, and the unmarried with average incomes. Positive social activity participation group showed a tendency of older, highly educated, and the married with jobs, but sensitive appearance change pursuit group were among the age of 20's and university students with more incomes and pocket money.

Development of Active Data Mining Component for Web Database Applications (웹 데이터베이스 응용을 위한 액티브데이터마이닝 컴포넌트 개발)

  • Choi, Yong-Goo
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.2
    • /
    • pp.1-14
    • /
    • 2008
  • The distinguished prosperity of information technologies from great progress of e-business during the last decade has unavoidably made software development for active data mining to discovery hidden predictive information regarding business trends and behavior from vary large databases. Therefore this paper develops an active mining object(ADMO) component, which provides real-time predictive information from web databases. The ADMO component is to extended ADO(ActiveX Data Object) component to active data mining component based on COM(Component Object Model) for application program interface(API). ADMO component development made use of window script component(WSC) based on XML(eXtensible Markup Language). For the purpose of investigating the application environments and the practical schemes of the ADMO component, experiments for diverse practical applications were performed in this paper. As a result, ADMO component confirmed that it could effectively extract the analytic information of classification and aggregation from vary large databases for Web services.

  • PDF

Using Behavior Analysis and Improvement of Bookmark as Web nformation Management Tool (웹 정보 수집 관리 도구로서의 북마크 이용행태 분석을 통한 개선방안 연구)

  • Min, Ji-Yeon;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.4
    • /
    • pp.59-80
    • /
    • 2009
  • As the amount of web information grows, a bookmark has become an important tool to reuse web information effectively which is relevant to users' information needs. Thus, this study aimed to investigate how bookmarks are used as a management tool of web information, and what functions users require concerned with it. For this purpose, semi-structured interviews and observations were carried out from 5 respondents, and a survey was conducted to investigate the relationship between bookmark using behaviors and requirements for function improvement. The users who use bookmark less frequently think bookmark feature essential for the purpose of reusing web information.

Development of Recommendation Agents through Web Log Analysis (웹 로그 분석을 이용한 추천 에이전트의 개발)

  • 김성학;이창훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.10
    • /
    • pp.621-630
    • /
    • 2003
  • Web logs are the information recorded by a web server when users access the web sites, and due to a speedy rising of internet usage, the worth of their practical use has become increasingly important. Analyzing such logs can use to determine the patterns representing users' navigational behavior in a Web site and restructure a Web site to create a more effective organizational presence. For these applications, the generally used key methods in many studies are association rules and sequential patterns based by Apriori algorithms, which are widely used to extract correlation among patterns. But Apriori inhere inefficiency in computing cost when applied to large databases. In this paper, we develop a new algorithm for mining interesting patterns which is faster than Apriori algorithm and recommendation agents which could provide a system manager with valuable information that are accessed sequentially by many users.

  • PDF

A Study on Information Need and Use Behavior of Elementary Teachers According to Their Task (초등학교 교사의 정보 요구 및 이용 행태에 관한 연구)

  • Lee, Seung-Min;Jeong, Jiun
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.209-233
    • /
    • 2021
  • This study aims to obtain implications for educational information services for elementary school teachers by analyzing their information seeking behavior. The in-depth interview was carried out in-depth interviews with 11 elementary school teachers and it analyzed of the core roles and tasks of elementary school teachers, the required information and usage behavior of information sources. The study result showed that elementary school teachers perceived homeroom duties, teaching/learning activities, school duties, and other as their works and tasks, and the response to the importance of task performance was homeroom teacher, teaching-learning activities, school works, and other tasks. Also, elementary school teachers needed information in order of teaching-learning activities, homeroom teacher, school works and they used various information sources including web, interpersonal sources and book. Moreover, this study observed some factors that elementary school teacher mainly used web information source which other elementary school teacher developed and that they got teaching-learning materials from fellow teachers. Based on these findings, the author proposed teacher librarian share library based instruction materia in web resource, provide cooperative educational information service through learning community, and provide homeroom work material for elementary school teachers.

Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.7
    • /
    • pp.1-8
    • /
    • 2016
  • Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.

Participatory Web Users’ Information Activities and Credibility Assessment

  • Rieh, Soo-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.155-178
    • /
    • 2010
  • Assessment of information credibility is a ubiquitous human activity given that people constantly make decisions and selections based on the value of information in a variety of information seeking and use contexts. Today, people are increasingly engaging in diverse online activities beyond searching for and reading information, including activities such as creating, tagging and rating content, shopping, and listening to and watching multimedia content. The Web 2.0 environment presents new challenges for people because the burden of information evaluation is shifted from professional gatekeepers to individual information consumers. At the same time, however, it also provides unprecedented opportunities for people to use tools and features that help them to make informed credibility judgments by relying on other people's ratings and recommendations. This paper introduces fundamental notions and dimensions of credibility, and contends that credibility assessment can be best understood with respect to human information behavior because it encompasses both the level of effort people exert as well as the heuristics they employ to evaluate information. The paper reports on a survey study investigating people's credibility judgments with respect to online information, focusing on the constructs, heuristics, and interactions involved in people's credibility assessment processes within the context of their everyday life information activities. Using an online activity diary method, empirical data about people's online activities and their associated credibility assessments were collected at multiple points throughout the day for three days. The results indicate that distinct credibility assessment heuristics are emerging as people engage in diverse online activities involving more user-generated and multimedia content. A heuristic approach suggests that people apply mental shortcuts or rules of thumb in order to minimize the amount of cognitive effort and time required to make credibility judgments. The paper discusses why a heuristic approach is key to reaching a more comprehensive understanding of people's credibility assessments within the information-abundant online environment.