2007
DOI: 10.1007/s10796-007-9035-6
|View full text |Cite
|
Sign up to set email alerts
|

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation

Abstract: The class of software which is "surreptitiously installed on a user's computer and monitors a user's activity and reports back to a third party on that behavior" is referred to as spyware "(Stafford and Urbaczewski in Communications of the AIS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 47 publications
0
1
0
Order By: Relevance
“…This kind of software is also embedded in seemingly innocuous and useful applications in the form of spyware (Sipior andWard, 2008, Zaitsev, 2010). In any case, the primary aim of a keylogger is to share system resources with legitimate programs remaining hidden while recording passwords, private conversations or e-mails (Sreenivas and Anitha, 2011).…”
Section: Touchloggers As Malwarementioning
confidence: 99%
“…This kind of software is also embedded in seemingly innocuous and useful applications in the form of spyware (Sipior andWard, 2008, Zaitsev, 2010). In any case, the primary aim of a keylogger is to share system resources with legitimate programs remaining hidden while recording passwords, private conversations or e-mails (Sreenivas and Anitha, 2011).…”
Section: Touchloggers As Malwarementioning
confidence: 99%