Usage of Unsupported Technologies in Websites Worldwide

Pascal Alfadian Nugroho

Abstract


Websites using unsupported technologies are generally not recommended, especially due to security issues that are left unfixed. However, upgrading to supported technologies is also challenging, hence not all web maintainers upgrade their technology dependencies. Measuring the existence of unsupported technologies in the wild may contribute to the sense of urgency on keeping technologies updated. Our research proposed a method to measure the existence of unsupported technologies in international websites, using HTTP Archive as the data source. The contribution from our research is the method as well as the snapshot result from January 2023 data. The method is composed of four steps, namely: identify list of websites, identify technologies used, group by technology names and retrieve currently supported versions, and compare version between usage and supported versions. From the January 2023 data, we found several interesting results. One is that the higher the website rank is, the higher the number of supported technologies used. Worldwide websites also generally use more supported versions of technologies, compared to Indonesia websites. Further research may be performed for longitudinal analysis of technology support evolution.

Keywords


Google BigQuery; HTTP Archive; Measurement; Security; Website;

References


H. Hassani, X. Huang, and E. Silva, "The Human Digitalisation Journey: Technology First at the Expense of Humans?," Information, vol. 12, no. 7, Art. no. 7, Jul. 2021, doi: 10.3390/info12070267.

Y. Lou and Q. Sun, "Over-reliance on database: A case study of using web of science," Hum. Behav. Emerg. Technol., vol. 3, May 2021, doi: 10.1002/hbe2.266.

T. N. Hai, Q. N. Van, and M. N. Thi Tuyet, "Digital Transformation: Opportunities and Challenges for Leaders in the Emerging Countries in Response to Covid-19 Pandemic," Emerg. Sci. J., vol. 5, pp. 21–36, May 2021, doi: 10.28991/esj-2021-SPER-03.

B. Bogdandy, J. Tamas, and Z. Toth, "Digital Transformation in Education during COVID-19: a Case Study," in 2020 11th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Mariehamn, Finland: IEEE, Sep. 2020, pp. 000173–000178. doi: 10.1109/CogInfoCom50765.2020.9237840.

J. Iida, "Digital Transformation vs COVID-19: the Case of Japan," Digit. Law J., vol. 1, no. 2, Art. no. 2, Aug. 2020, doi: 10.38044/2686-9136-2020-1-2-8-16.

D. Schilirò, "Digital transformation, COVID-19, and the future of work." Accessed: Mar. 22, 2024. [Online]. Available: https://mpra.ub.uni-muenchen.de/108817/

Y. K. Dwivedi et al., "Impact of COVID-19 pandemic on information management research and practice: Transforming education, work and life," Int. J. Inf. Manag., vol. 55, p. 102211, Dec. 2020, doi: 10.1016/j.ijinfomgt.2020.102211.

F. J. García-Peñalvo, "Digital Transformation in the Universities: Implications of the COVID-19 Pandemic," Transformación digital en las universidades: Implicaciones de la pandemia de la COVID-19, Feb. 2021, Accessed: Mar. 22, 2024. [Online]. Available: https://repositorio.grial.eu/handle/grial/2230

A. Taivalsaari, T. Mikkonen, C. Pautasso, and K. Systä, "Full Stack Is Not What It Used to Be," in Web Engineering, vol. 12706, M. Brambilla, R. Chbeir, F. Frasincar, and I. Manolescu, Eds., in Lecture Notes in Computer Science, vol. 12706. , Cham: Springer International Publishing, 2021, pp. 363–371. doi: 10.1007/978-3-030-74296-6_28.

J. Shropshire, J. Landry, and S. Presley, "Towards a Consensus Definition of Full-Stack Development," SAIS 2018 Proc., Mar. 2018, [Online]. Available: https://aisel.aisnet.org/sais2018/17

A. Nowogrodzki, "How to support open-source software and stay sane," Nature, vol. 571, no. 7763, pp. 133–134, Jul. 2019, doi: 10.1038/d41586-019-02046-0.

X. Tan and M. Zhou, "Scaling Open Source Software Communities: Challenges and Practices of Decentralization," IEEE Softw., vol. 39, no. 1, pp. 70–75, Jan. 2022, doi: 10.1109/MS.2020.3025959.

S. Butler et al., "Considerations and challenges for the adoption of open source components in software-intensive businesses," J. Syst. Softw., vol. 186, p. 111152, Apr. 2022, doi: 10.1016/j.jss.2021.111152.

A. Kritikos and I. Stamelos, "A resilience-based framework for assessing the evolution of open source software projects," J. Softw. Evol. Process, vol. n/a, no. n/a, p. e2597, doi: 10.1002/smr.2597.

T. Tervoort, M. T. De Oliveira, W. Pieters, P. Van Gelder, S. D. Olabarriaga, and H. Marquering, "Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review," IEEE Access, vol. 8, pp. 84352–84361, 2020, doi: 10.1109/ACCESS.2020.2984376.

D. Upadhyay, N. Ware, and B. Mahesh, "Evolving Trends in Web Application Vulnerabilities: A Comparative Study of OWASP Top 10 2017 and OWASP Top 10 2021," Int. J. Eng. Technol. Manag. Sci., vol. 7, Nov. 2023, doi: 10.46647/ijetms.2023.v07i06.038.

K. E. Vaniea, E. Rader, and R. Wash, "Betrayed by updates: how negative experiences affect future security," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto Ontario Canada: ACM, Apr. 2014, pp. 2671–2674. doi: 10.1145/2556288.2557275.

J. M. Haney and S. M. Furman, "User Perceptions and Experiences with Smart Home Updates," in 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA: IEEE, May 2023, pp. 2867–2884. doi: 10.1109/SP46215.2023.10179459.

J. Stringer, A. Tahir, K. Blincoe, and J. Dietrich, "Technical Lag of Dependencies in Major Package Managers," in 2020 27th Asia-Pacific Software Engineering Conference (APSEC), Singapore, Singapore: IEEE, Dec. 2020, pp. 228–237. doi: 10.1109/APSEC51365.2020.00031.

P. Lam, J. Dietrich, and D. J. Pearce, "Putting the Semantics into Semantic Versioning," in Proceedings of the 2020 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, Nov. 2020, pp. 157–179. doi: 10.1145/3426428.3426922.

F. Li, L. Rogers, A. Mathur, N. Malkin, and M. Chetty, "Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines," presented at the Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 2019, pp. 273–288. Accessed: Mar. 19, 2024. [Online]. Available: https://www.usenix.org/conference/soups2019/presentation/li

K. Vaniea and Y. Rashidi, Tales of Software Updates: The process of updating software. 2016, p. 3226. doi: 10.1145/2858036.2858303.

T. Duebendorfer and S. Frei, "Why Silent Updates Boost Security".

P. A. Nugroho and H. Steven, "Measurement of Unsupported Applications used in Indonesia Popular Websites," J. Ilm. Tek. Elektro Komput. Dan Inform., vol. 7, no. 1, Art. no. 1, Apr. 2021.

N. Demir, T. Urban, K. Wittek, and N. Pohlmann, "Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on Security," 2021, pp. 76–92. doi: 10.1007/978-3-030-72582-2_5.

K. Lim, Y. Kwon, and D. Kim, "A Longitudinal Study of Vulnerable Client-side Resources and Web Developers’ Updating Behaviors," in Proceedings of the 2023 ACM on Internet Measurement Conference, Montreal QC Canada: ACM, Oct. 2023, pp. 162–180. doi: 10.1145/3618257.3624804.

A. Kashaf, V. Sekar, and Y. Agarwal, "Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?," in Proceedings of the ACM Internet Measurement Conference, in IMC ’20. New York, NY, USA: Association for Computing Machinery, Oct. 2020, pp. 634–647. doi: 10.1145/3419394.3423664.

T. Urban, M. Degeling, T. Holz, and N. Pohlmann, "Beyond the Front Page:Measuring Third Party Dynamics in the Field," in Proceedings of The Web Conference 2020, in WWW ’20. New York, NY, USA: Association for Computing Machinery, Apr. 2020, pp. 1275–1286. doi: 10.1145/3366423.3380203.

Y. Takata, H. Kumagai, and M. Kamizono, "The Uncontrolled Web: Measuring Security Governance on the Web," IEICE Trans. Inf. Syst., vol. E104.D, no. 11, pp. 1828–1838, Nov. 2021, doi: 10.1587/transinf.2021NGP0003.

I. Pashchenko, H. Plate, S. E. Ponta, A. Sabetta, and F. Massacci, "Vulnerable Open Source Dependencies: Counting Those That Matter," 2018.

M. Zaidan, F. Noeraini, Z. Sari, and D. R. Akbi, "Website Vulnerability Analysis of AB and XY Office in East Java," J. Ilm. Tek. Elektro Komput. Dan Inform., vol. 9, no. 2, Art. no. 2, Jun. 2023.

D. Priyawati, S. Rokhmah, and I. C. Utomo, "Website Vulnerability Testing and Analysis of Website Application Using OWASP," Int. J. Comput. Inf. Syst. IJCIS, vol. 3, no. 3, Art. no. 3, Aug. 2022, doi: 10.29040/ijcis.v3i3.90.

M. A. Muin, K. Kapti, and T. Yusnanto, "Campus Website Security Vulnerability Analysis Using Nessus," Int. J. Comput. Inf. Syst. IJCIS, vol. 3, no. 2, Art. no. 2, Jun. 2022, doi: 10.29040/ijcis.v3i2.72.

R. Armando, I. G. A. K. A. Melyantara, R. Elfariani, D. F. A. Latuconsina, and M. Nasrullah, "IT Support Website Security Evaluation Using Vulnerability Assessment Tools," J. Inf. Syst. Inform., vol. 4, no. 4, Art. no. 4, Nov. 2022, doi: 10.51519/journalisi.v4i4.330.

N. A. bt Mohd and Z. F. Zaaba, "A Review of Usability and Security Evaluation Model of Ecommerce Website," Procedia Comput. Sci., vol. 161, pp. 1199–1205, Jan. 2019, doi: 10.1016/j.procs.2019.11.233.

J. Wendroth, "A Brief Overview on HTTP," 2022, doi: 10.2313/NET-2022-11-1_11.

J. Rautenstrauch and B. Stock, "Who’s Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact," 2024.

N. Demir, D. Theis, T. Urban, and N. Pohlmann, "Towards Understanding First-Party Cookie Tracking in the Field." arXiv, Feb. 10, 2022. doi: 10.48550/arXiv.2202.01498.

I. Zozas, I. Anagnostou, and S. Bibi, "Trends on Crowdsourcing JavaScript Small Tasks:," in Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering, Online Streaming, --- Select a Country ---: SCITEPRESS - Science and Technology Publications, 2022, pp. 85–94. doi: 10.5220/0011035800003176.

T. Alby, "Popular, but hardly used: Has Google Analytics been to the detriment of Web Analytics?," in Proceedings of the 15th ACM Web Science Conference 2023, in WebSci ’23. New York, NY, USA: Association for Computing Machinery, Apr. 2023, pp. 304–311. doi: 10.1145/3578503.3583601.




DOI: http://dx.doi.org/10.26555/jiteki.v10i2.28692

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Pascal Alfadian Nugroho

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


 
About the JournalJournal PoliciesAuthor Information
 


Jurnal Ilmiah Teknik Elektro Komputer dan Informatika
ISSN 2338-3070 (print) | 2338-3062 (online)
Organized by Electrical Engineering Department - Universitas Ahmad Dahlan
Published by Universitas Ahmad Dahlan
Website: http://journal.uad.ac.id/index.php/jiteki
Email 1: jiteki@ee.uad.ac.id
Email 2: alfianmaarif@ee.uad.ac.id
Office Address: Kantor Program Studi Teknik Elektro, Lantai 6 Sayap Barat, Kampus 4 UAD, Jl. Ringroad Selatan, Tamanan, Kec. Banguntapan, Bantul, Daerah Istimewa Yogyakarta 55191, Indonesia