Disabled people encounter many barriers while attempting to access the services on the web. Nevertheless, many tools, which could help them to access the web, are available. E-commerce websites have been also intensiv...Disabled people encounter many barriers while attempting to access the services on the web. Nevertheless, many tools, which could help them to access the web, are available. E-commerce websites have been also intensively and widely used. The e-commerce market in Saudi Arabia will hit $13.3 billion by 2015. This huge investment requires e-commerce websites to be accessible by different types of users. This paper explores the tools that usually used by disabled users while using the web. It also discusses a number of available tools that help designers, developers and testers to assess web accessibility. It also evaluates the accessibility of 3 popular Arab e- commerce websites using 5 accessibility testing tools;namely Achecker, TAW, Eval Access, MAUVE and FAE. This research has found that Most accessibility guidelines are covered by Achecker tool. Navigation, readability, input assistance and timing are the common found accessibility problems while assessing the accessibility of the targeted websites. It has been also revealed that HTML can influence accessibility evaluation as HTML errors are considered as accessibility problems. It has been clearly observed that improvements are needed for better web accessibility, although some tools did report a small number of accessibility problems for some websites.展开更多
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg...The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.展开更多
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ...Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.展开更多
E-commerce systems for construction material procurement are becoming increasingly important in Hong Kong. These E-commerce systems are non-interoperable and create problems for the buyers who use these systems to pur...E-commerce systems for construction material procurement are becoming increasingly important in Hong Kong. These E-commerce systems are non-interoperable and create problems for the buyers who use these systems to purchase construction materials. This paper presents the mobile agent-based approach and Web services-based approach for enabling interoperation of these systems in the E-Union environment.展开更多
This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user...This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user database, the shopping cart), access to relevant user preference information for tourism commodity. Based on these models, the paper presents recommended strategies for the site registered users, and has had the corresponding formulas for calculating the current user of certain items recommended values and the corresponding recommendation algorithm, and the system can get a recommendation for user.展开更多
The diversity of e-commerce Business to Consumer systems and the significant increase in their use during the COVID-19 pandemic as a one of the primary channels of retail commerce, has made all the most important the ...The diversity of e-commerce Business to Consumer systems and the significant increase in their use during the COVID-19 pandemic as a one of the primary channels of retail commerce, has made all the most important the need to measuring their quality using practical methods. This paper presents a quality evaluation framework for web metrics that are B2C specific. The framework uses three dimensions based on end-user interaction categories, metrics internal specs and quality sub-characteristics as defined by ISO25010. Beginning from the existing large corpus of general-purpose web metrics, e-commerce specific metrics are chosen and categorized. Analysis results are subjected to a data mining analysis to provide association rules between the various dimensions of the framework. Finally, an ontology that corresponds to the framework is developed to answer to complicated questions related to metrics use and to facilitate the production of new, user defined meta-metrics.展开更多
this paper analyzes application status of tourism e-commerce in China and the Existing problems, points out that the construction of tourism e-commerce platform is an important part of the development of tourism elect...this paper analyzes application status of tourism e-commerce in China and the Existing problems, points out that the construction of tourism e-commerce platform is an important part of the development of tourism electronic commerce. The implementation of all business systems of various tourism enterprise data integration and information integration, the travel industry, all kinds of information resources for collaborative centralized management. By connecting the information management system of scattered all corporate travel value chain, realize the unified operation in the tourism e-commerce platform, improve the exchange of information and online transaction speed. According to our country' s tourism status and characteristics, from the feasibility analysis, function analysis, performance analysis and service oriented thought, this paper analyzes the system architecture of and data flow diagrams, system flow chart, PAD chart analysis of the system' s business processes. And it was analyzed and discussed briefly from the aspects of adaptability, functions, implementation strategy.展开更多
Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college student...Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college students on Renren.com,a popular college-oriented social networking site in China.Users’ privacy disclosure behaviors were studied and gender difference was analyzed particularly.Correlation analysis was conducted to examine the relationships among evaluation indicators involving user name,image,page visibility,message board visibility,completeness of education information and provision of personal information.Findings:A large amount of personal information was disclosed via social networking sites in China.Greater percentage of male users than female users disclosed their personal information.Furthermore,significantly positive relationships were found among page visibility,message board visibility,completeness of education information and provision of personal information.Research limitations:Subjects were collected from only one social networking website.Meanwhile,our survey involves subjective judgments of user name reliability,category of profile images and completeness of information.Practical implications:This study will be of benefit for college administrators,teachers and librarians to design courses for college students on how to use social networking sites safely.Originality /value:This empirical study is one of the first studies to reveal the current situation of privacy disclosure in the Chinese social networking sites and will help the research community gain a deeper understanding of privacy disclosure in the Chinese social networking sites.展开更多
Results of the 2007/08 survey "Energy--the present and the future" conducted on a population of 1439 students from Zagreb University have shown that after school and television, internet is the third major source of...Results of the 2007/08 survey "Energy--the present and the future" conducted on a population of 1439 students from Zagreb University have shown that after school and television, internet is the third major source of knowledge for the participants. Therefore, "NEMIS" web site (www.nemis.zpf.fer.hr) was launched at the end of the 2008. NEMIS is a Croatian acronym for "Nuclear Energy--Mysticism and Reality". The site was envisioned as a place where interested visitors could get information, prepared by experts, on all the issues relating to nuclear energy. The main objectives of the work reported in this paper are to present the structure of the NEMIS web site and to analyze the activity on the site during the last three years. Based on the performed analysis, future activities on the site are set and discussed.展开更多
You’ve built a great web site.It’s well designed,it encourages customer interaction,and it’s filledwith compelling,well-organized content.Now comes the tough reality:Creating a great site doesn’tautomatically mean...You’ve built a great web site.It’s well designed,it encourages customer interaction,and it’s filledwith compelling,well-organized content.Now comes the tough reality:Creating a great site doesn’tautomatically mean customers will visit it.With millions of web sites today,chances are slim that a customerwill randomly happen onto your site.That’s why it’s imperative that you use many strategies to get your web site noticed by the morethan 100 million people who now surf the Web.Here are seven ideas to help get you started:展开更多
随着信息时代的到来,网络安全问题越来越受到人们关注,其中Web安全问题是最常见的安全问题。文章根据风险的发生频率和危害程度,以结构化查询语言(Structured Query Language,SQL)注入、跨站脚本攻击(Cross Site Scripting,XSS)注入、...随着信息时代的到来,网络安全问题越来越受到人们关注,其中Web安全问题是最常见的安全问题。文章根据风险的发生频率和危害程度,以结构化查询语言(Structured Query Language,SQL)注入、跨站脚本攻击(Cross Site Scripting,XSS)注入、文件上传漏洞为例,研究这3种安全风险的原理、分类及安全防护。展开更多
文摘Disabled people encounter many barriers while attempting to access the services on the web. Nevertheless, many tools, which could help them to access the web, are available. E-commerce websites have been also intensively and widely used. The e-commerce market in Saudi Arabia will hit $13.3 billion by 2015. This huge investment requires e-commerce websites to be accessible by different types of users. This paper explores the tools that usually used by disabled users while using the web. It also discusses a number of available tools that help designers, developers and testers to assess web accessibility. It also evaluates the accessibility of 3 popular Arab e- commerce websites using 5 accessibility testing tools;namely Achecker, TAW, Eval Access, MAUVE and FAE. This research has found that Most accessibility guidelines are covered by Achecker tool. Navigation, readability, input assistance and timing are the common found accessibility problems while assessing the accessibility of the targeted websites. It has been also revealed that HTML can influence accessibility evaluation as HTML errors are considered as accessibility problems. It has been clearly observed that improvements are needed for better web accessibility, although some tools did report a small number of accessibility problems for some websites.
文摘The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency.
文摘Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.
文摘E-commerce systems for construction material procurement are becoming increasingly important in Hong Kong. These E-commerce systems are non-interoperable and create problems for the buyers who use these systems to purchase construction materials. This paper presents the mobile agent-based approach and Web services-based approach for enabling interoperation of these systems in the E-Union environment.
文摘This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user database, the shopping cart), access to relevant user preference information for tourism commodity. Based on these models, the paper presents recommended strategies for the site registered users, and has had the corresponding formulas for calculating the current user of certain items recommended values and the corresponding recommendation algorithm, and the system can get a recommendation for user.
文摘The diversity of e-commerce Business to Consumer systems and the significant increase in their use during the COVID-19 pandemic as a one of the primary channels of retail commerce, has made all the most important the need to measuring their quality using practical methods. This paper presents a quality evaluation framework for web metrics that are B2C specific. The framework uses three dimensions based on end-user interaction categories, metrics internal specs and quality sub-characteristics as defined by ISO25010. Beginning from the existing large corpus of general-purpose web metrics, e-commerce specific metrics are chosen and categorized. Analysis results are subjected to a data mining analysis to provide association rules between the various dimensions of the framework. Finally, an ontology that corresponds to the framework is developed to answer to complicated questions related to metrics use and to facilitate the production of new, user defined meta-metrics.
文摘this paper analyzes application status of tourism e-commerce in China and the Existing problems, points out that the construction of tourism e-commerce platform is an important part of the development of tourism electronic commerce. The implementation of all business systems of various tourism enterprise data integration and information integration, the travel industry, all kinds of information resources for collaborative centralized management. By connecting the information management system of scattered all corporate travel value chain, realize the unified operation in the tourism e-commerce platform, improve the exchange of information and online transaction speed. According to our country' s tourism status and characteristics, from the feasibility analysis, function analysis, performance analysis and service oriented thought, this paper analyzes the system architecture of and data flow diagrams, system flow chart, PAD chart analysis of the system' s business processes. And it was analyzed and discussed briefly from the aspects of adaptability, functions, implementation strategy.
基金supported by the National Social Science Foundation of China(Grant No.:10ATQ004)
文摘Purpose:This study was conducted to investigate the current situation of privacy disclosure(in the Chinese social networking sites.Design/methodology/approach:Data analysis was based on profiles of 240 college students on Renren.com,a popular college-oriented social networking site in China.Users’ privacy disclosure behaviors were studied and gender difference was analyzed particularly.Correlation analysis was conducted to examine the relationships among evaluation indicators involving user name,image,page visibility,message board visibility,completeness of education information and provision of personal information.Findings:A large amount of personal information was disclosed via social networking sites in China.Greater percentage of male users than female users disclosed their personal information.Furthermore,significantly positive relationships were found among page visibility,message board visibility,completeness of education information and provision of personal information.Research limitations:Subjects were collected from only one social networking website.Meanwhile,our survey involves subjective judgments of user name reliability,category of profile images and completeness of information.Practical implications:This study will be of benefit for college administrators,teachers and librarians to design courses for college students on how to use social networking sites safely.Originality /value:This empirical study is one of the first studies to reveal the current situation of privacy disclosure in the Chinese social networking sites and will help the research community gain a deeper understanding of privacy disclosure in the Chinese social networking sites.
文摘Results of the 2007/08 survey "Energy--the present and the future" conducted on a population of 1439 students from Zagreb University have shown that after school and television, internet is the third major source of knowledge for the participants. Therefore, "NEMIS" web site (www.nemis.zpf.fer.hr) was launched at the end of the 2008. NEMIS is a Croatian acronym for "Nuclear Energy--Mysticism and Reality". The site was envisioned as a place where interested visitors could get information, prepared by experts, on all the issues relating to nuclear energy. The main objectives of the work reported in this paper are to present the structure of the NEMIS web site and to analyze the activity on the site during the last three years. Based on the performed analysis, future activities on the site are set and discussed.
文摘You’ve built a great web site.It’s well designed,it encourages customer interaction,and it’s filledwith compelling,well-organized content.Now comes the tough reality:Creating a great site doesn’tautomatically mean customers will visit it.With millions of web sites today,chances are slim that a customerwill randomly happen onto your site.That’s why it’s imperative that you use many strategies to get your web site noticed by the morethan 100 million people who now surf the Web.Here are seven ideas to help get you started:
文摘随着信息时代的到来,网络安全问题越来越受到人们关注,其中Web安全问题是最常见的安全问题。文章根据风险的发生频率和危害程度,以结构化查询语言(Structured Query Language,SQL)注入、跨站脚本攻击(Cross Site Scripting,XSS)注入、文件上传漏洞为例,研究这3种安全风险的原理、分类及安全防护。