The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service

碩士 === 華梵大學 === 資訊管理學系碩士班 === 102 === Many applications have been providing functions of files exchange. But in the process of exchanging files among users, if the application provider doesn’t supply proper protective solution, users tend to distribute malicious files through the application, then t...

Full description

Bibliographic Details
Main Authors: Chnu-Fu Tseng, 曾俊夫
Other Authors: Zne-Jung Lee
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/10943942770242535196
id ndltd-TW-102HCHT0396033
record_format oai_dc
spelling ndltd-TW-102HCHT03960332015-10-13T23:36:55Z http://ndltd.ncl.edu.tw/handle/10943942770242535196 The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service 資訊系統成功模式應用於代理惡意檔案掃描服務建置之研究 Chnu-Fu Tseng 曾俊夫 碩士 華梵大學 資訊管理學系碩士班 102 Many applications have been providing functions of files exchange. But in the process of exchanging files among users, if the application provider doesn’t supply proper protective solution, users tend to distribute malicious files through the application, then the server becomes spread malicious files hotbed. This may cause great security worries. Therefore, we build a Proxy Malicious File Scanning Service, which providing RESTful Web Service allows an external application to make API call. Users uploaded files are scanned by this service, and the service will return the result, the degree of risk back to the application server. Application server for subsequent necessary measures, hoping to reduce the risk of infection and spread of malicious files. This thesis made 13 factors of the system in AHP questionnaire by four aspects, including system quality, information quality, service quality and user satisfaction according to the Information System Success Model. Analyzing these questionnaires, the highest weight is “system stability” among these factors. According to these results, it shows that “system stability” is the most important factor. This factor makes a reference to developers of this field. Zne-Jung Lee 李仁鐘 2014 學位論文 ; thesis 63 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 華梵大學 === 資訊管理學系碩士班 === 102 === Many applications have been providing functions of files exchange. But in the process of exchanging files among users, if the application provider doesn’t supply proper protective solution, users tend to distribute malicious files through the application, then the server becomes spread malicious files hotbed. This may cause great security worries. Therefore, we build a Proxy Malicious File Scanning Service, which providing RESTful Web Service allows an external application to make API call. Users uploaded files are scanned by this service, and the service will return the result, the degree of risk back to the application server. Application server for subsequent necessary measures, hoping to reduce the risk of infection and spread of malicious files. This thesis made 13 factors of the system in AHP questionnaire by four aspects, including system quality, information quality, service quality and user satisfaction according to the Information System Success Model. Analyzing these questionnaires, the highest weight is “system stability” among these factors. According to these results, it shows that “system stability” is the most important factor. This factor makes a reference to developers of this field.
author2 Zne-Jung Lee
author_facet Zne-Jung Lee
Chnu-Fu Tseng
曾俊夫
author Chnu-Fu Tseng
曾俊夫
spellingShingle Chnu-Fu Tseng
曾俊夫
The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
author_sort Chnu-Fu Tseng
title The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
title_short The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
title_full The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
title_fullStr The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
title_full_unstemmed The Research of the Information System Success Model on Implementing a Proxy System for Malicious File Scanning Service
title_sort research of the information system success model on implementing a proxy system for malicious file scanning service
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/10943942770242535196
work_keys_str_mv AT chnufutseng theresearchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice
AT céngjùnfū theresearchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice
AT chnufutseng zīxùnxìtǒngchénggōngmóshìyīngyòngyúdàilǐèyìdàngànsǎomiáofúwùjiànzhìzhīyánjiū
AT céngjùnfū zīxùnxìtǒngchénggōngmóshìyīngyòngyúdàilǐèyìdàngànsǎomiáofúwùjiànzhìzhīyánjiū
AT chnufutseng researchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice
AT céngjùnfū researchoftheinformationsystemsuccessmodelonimplementingaproxysystemformaliciousfilescanningservice
_version_ 1718086443612504064