The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
碩士 === 華梵大學 === 資訊管理學系碩士班 === 102 === Many applications have been providing functions of files exchange. But in the process of exchanging files among users, if the application provider doesn’t supply proper protective solution, users tend to distribute malicious files through the application, then t...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/10943942770242535196 |
id |
ndltd-TW-102HCHT0396033 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102HCHT03960332015-10-13T23:36:55Z http://ndltd.ncl.edu.tw/handle/10943942770242535196 The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service 資訊系統成功模式應用於代理惡意檔案掃描服務建置之研究 Chnu-Fu Tseng 曾俊夫 碩士 華梵大學 資訊管理學系碩士班 102 Many applications have been providing functions of files exchange. But in the process of exchanging files among users, if the application provider doesn’t supply proper protective solution, users tend to distribute malicious files through the application, then the server becomes spread malicious files hotbed. This may cause great security worries. Therefore, we build a Proxy Malicious File Scanning Service, which providing RESTful Web Service allows an external application to make API call. Users uploaded files are scanned by this service, and the service will return the result, the degree of risk back to the application server. Application server for subsequent necessary measures, hoping to reduce the risk of infection and spread of malicious files. This thesis made 13 factors of the system in AHP questionnaire by four aspects, including system quality, information quality, service quality and user satisfaction according to the Information System Success Model. Analyzing these questionnaires, the highest weight is “system stability” among these factors. According to these results, it shows that “system stability” is the most important factor. This factor makes a reference to developers of this field. Zne-Jung Lee 李仁鐘 2014 學位論文 ; thesis 63 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 華梵大學 === 資訊管理學系碩士班 === 102 === Many applications have been providing functions of files exchange. But in the process of exchanging files among users, if the application provider doesn’t supply proper protective solution, users tend to distribute malicious files through the application, then the server becomes spread malicious files hotbed. This may cause great security worries. Therefore, we build a Proxy Malicious File Scanning Service, which providing RESTful Web Service allows an external application to make API call. Users uploaded files are scanned by this service, and the service will return the result, the degree of risk back to the application server. Application server for subsequent necessary measures, hoping to reduce the risk of infection and spread of malicious files.
This thesis made 13 factors of the system in AHP questionnaire by four aspects, including system quality, information quality, service quality and user satisfaction according to the Information System Success Model. Analyzing these questionnaires, the highest weight is “system stability” among these factors. According to these results, it shows that “system stability” is the most important factor. This factor makes a reference to developers of this field.
|
author2 |
Zne-Jung Lee |
author_facet |
Zne-Jung Lee Chnu-Fu Tseng 曾俊夫 |
author |
Chnu-Fu Tseng 曾俊夫 |
spellingShingle |
Chnu-Fu Tseng 曾俊夫 The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service |
author_sort |
Chnu-Fu Tseng |
title |
The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service |
title_short |
The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service |
title_full |
The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service |
title_fullStr |
The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service |
title_full_unstemmed |
The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service |
title_sort |
research of the information system success model on implementing a proxy system for malicious file scanning service |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/10943942770242535196 |
work_keys_str_mv |
AT chnufutseng theresearchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice AT céngjùnfū theresearchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice AT chnufutseng zīxùnxìtǒngchénggōngmóshìyīngyòngyúdàilǐèyìdàngànsǎomiáofúwùjiànzhìzhīyánjiū AT céngjùnfū zīxùnxìtǒngchénggōngmóshìyīngyòngyúdàilǐèyìdàngànsǎomiáofúwùjiànzhìzhīyánjiū AT chnufutseng researchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice AT céngjùnfū researchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice |
_version_ |
1718086443612504064 |