Publication details

Home Publications Publication details

Evaluating the Perceptions of People towards Online Security
Jayakumar NK, Phippen AD
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp199-204, 2007
Can be ordered on-line.
Download links:  Download PDF

People started using online services in day to day life from the period; when they came to know about the use and ease of the technology. Services like online banking, online product purchase or sale, instant messaging, electronic mail, online voting, medical, paying tax, etc are mostly commonly used by the people. The growth of the online commerce is the reason for the significant increase in the use of online services and also increase in the variety of fraudulent web activities. Almost all the users are the victim for the internet threats, in someway. So the project aims in evaluating the perceptions of individual users about the online security and its issues. The perception of online issues differs from each and every individual like ‘Normal User, Internet Users and Security Professional’ because the normal user just operates/uses the system without having much knowledge about the causes and threats that are caused due to online services whereas the internet users are known to some available threats like virus, spyware, malware, etc but the security professionals are known to all kinds of threats that are available and its causes. Security professionals always keep themselves updated with the change in security issues and its threats because it’s their part of the profession, they are known to latest virus, worms, malware, spyware, intrusion option, cookies, firewall, trojan horses and other security related options provided on the client/user systems etc. In this project, a survey is taken as a part of research from the people to reveal their views towards online security; which will increase the awareness about the threats that are caused due to the online transaction and services. The final survey result concluded that the users/people are known to some threats but not all, and there are some hinders for the user from utilizing the full security, which have been discussed in the final part.

Jayakumar NK, Phippen AD