Abstract
Before effective legislation against spyware can be drawn, lawmakers and vendors must understand what users find most deceptive and offensive about this stealth software.
Supplemental Material
Available for Download
Requires Asian Language Support in Adobe Reader And Japanese Language Support in your Browser
- Cohen, J.E. DRM and privacy. Commun. ACM 46, 4 (Apr. 2003), 46--49. Google ScholarDigital Library
- Denning, D. Information Warfare and Security. ACM Press, 1999. Google ScholarDigital Library
- Edelman, B. Methods and effects of spyware. Response to FTC Call for Comments on Spyware, Mar. 2004.Google Scholar
- Kenyon, H.S. Spyware stymies network operators. Armed Forces Communications and Electronics Association 58, 12 (Aug. 2004), 47--48Google Scholar
- Klobas, J.E. and Clyde, L.A. Adults learning to use the Internet: A longitudinal study of attitudes and other factors associated with intended Internet use. Library and Information Science Research 22, 1 (2000), 5--34.Google ScholarCross Ref
- Reed-Freeman Jr., D. Federal and state governments turn their attention to spyware and adware. E-Commerce Law and Strategy 21, 4 (Aug. 30, 2004), 1.Google Scholar
- Saroiu, S., Gribble, S.D., and Levy, H.M. Measurement and analysis of spyware in a university environment. In Proceedings of the ACM/USENIX Symposium on Networked Systems Design and Implementation (San Francisco, CA, Mar. 2004). Google ScholarDigital Library
- Schoenbachler, D.D. and Gordon, G. Trust and customer willingness to provide information in database-driven relationship marketing. J. Interactive Marketing 16, 3 (2002), 2--16.Google ScholarCross Ref
- Smith, M.D., Bailey, J.P., Brynjolfsson, E. Understanding digital markets: Review and assessment. Understanding the Digital Economy. E. Brynjolfsson and B. Kahin, Eds. MIT Press, Cambridge, MA, 2000.Google Scholar
- Stewart, K.A. and Segars, A.H. An empirical examination of the concern for information privacy instrument. Information Systems Research 13, 1 (2002), 36--49. Google ScholarDigital Library
- Tsiavos, P., Whitley, E.A., and Hosein, I. An exploration of the emergence, development and evolution of regulatory characteristics of information systems. In Proceedings of the 23rd International Conference on Information Systems (Barcelona, Spain, 2002), 813--816.Google Scholar
- Wortman, C. Some determinants of perceived control. J. Personality and Social Psychology 31 (1975), 282--294.Google ScholarCross Ref
Index Terms
- The deceptive behaviors that offend us most about spyware
Recommendations
Dynamic spyware analysis
ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical ConferenceSpyware is a class of malicious code that is surreptitiously installed on victims' machines. Once active, it silently monitors the behavior of users, records their web surfing habits, and steals their passwords. Current anti-spyware tools operate in a ...
Spyware: Spyware: more than a costly annoyance
A chronic reduction in system performance caused by spyware translates alone into harmful effects for the organisation. But for those relying on a distributed network, a spyware epidemic can also pose serious risks of information loss. Originally the ...
Interests-Based Spyware Detection
IFCSTA '09: Proceedings of the 2009 International Forum on Computer Science-Technology and Applications - Volume 02Spyware is a rapidly spreading security issue. Traditional spyware detection can mainly be classified into two categories: signature based detection and behavior based detection. The former is not able to detect unknown spyware and variants of known ...
Comments