10 research outputs found

    Evaluation of Spam Impact on Arabic Websites Popularity

    Get PDF
    The expansion of the Web and its information in all aspects of life raises the concern of how to trust information published on the Web especially in cases where publisher may not be known. Websites strive to be more popular and make themselves visible to search engines and eventually to users. Website popularity can be measured using several metrics such as the Web traffic (e.g. Website: visitors\u27 number and visited page number). A link or page popularity refers to the total number of hyperlinks referring to a certain Web page. In this study, several top ranked Arabic Websites are selected for evaluating possible Web spam behavior. Websites use spam techniques to boost their ranks within Search Engine Results Page (SERP). Results of this study showed that some of these popular Websites are using techniques that are considered spam techniques according to Search Engine Optimization guidelines

    Designing an Algorithm for Students Impact on Social Adaptive Behavior in Political Education Context

    Get PDF
    This study aimed to discuss the social adjustment behaviors of university students. The social adjustment behaviors of university students not only relate to their healthy development but also significantly affect social development., the ideological and political education model combines with the impact on social adaptation behaviors of university students. It optimizes the article algorithm design and creates a theoretical model in the field of social adaptation of university students. The articles limitation is that it was made with a sample of 966 subjects. The methodology involved statistical analysis of students social adaptation status, understanding the average and standard deviation of each dimension and the basic situation of their social adaptation. The average social adjustment index of university students was found to be m=3.68. Changes were observed in the interpersonal relationships of university students in all dimensions of adaptation to the future, learning adaptation, psychological adaptation, and environmental adaptation before and after graduation. In conclusion, this article depends on the analysis of the current state of students adaptation to society, the main personal and environmental factors in the life of university students, and based on the results of analysis and research, provides recommendations for relevant improvements

    Usable security for QR code

    No full text
    QR codes are widely used in various settings such as consumer advertising, commercial tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but there exists no standard mechanism for providing authenticity and confidentiality of the code content. Attacks such as the redirection to a malicious website or the infection of a smartphone with a malware are realistic and feasible in practice. In this paper, we present the first systematic study of usable state-of-the-art cryptographic primitives inside QR codes. We select standard, popular cryptographic schemes and we compare them based on performance, size and security. We conduct tests that show how different usability factors impact on the QR code scanning performance and we evaluate the usability/security trade-off of the considered cryptographic schemes. Interestingly, we find out that in some cases security breaks usability and we provide recommendations for the choice of secure and usable cryptographic schemes

    Security and privacy of QR code applications: A comprehensive study, general guidelines and solutions

    No full text
    The widespread use of smartphones is boosting the market take-up of dedicated applications and among them, barcode scanning applications. Several barcodes scanners are available but show security and privacy weaknesses. In this paper, we provide a comprehensive security and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some apps that provide security services including checking URLs and adopting cryptographic solutions, and other apps that guarantee user privacy by supporting least privilege permission lists. However, there are also apps that deceive the users by providing security and privacy protections that are weaker than what is claimed. We analyzed 100 barcode scanner applications and we categorized them based on the real security features they provide, or on their popularity. From the analysis, we extracted a set of recommendations that developers should follow in order to build usable, secure and privacy-friendly barcode scanning applications. Based on them, we also implemented BarSec Droid, a proof of concept Android application for barcode scanning. We then conducted a user experience test on our app and we compared it with DroidLa, the most popular/secure QR code reader app. The results show that our app has nice features, such as ease of use, provides security trust, is effective and efficient
    corecore