Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Web browsing and spyware intrusion

Published: 01 August 2005 Publication History

Abstract

Spyware poses serious privacy and security issues to users of e-commerce and m-commerce [3, 5, 8]. Microsoft claims that half of all computer crashes reported by its customers were caused by spyware and its equivalents. Spyware is also responsible for about 12% of all technical support calls and accounts for the biggest category of customer complaints, according to Dell [1].

Supplementary Material

PDF File (p85-shukla.jp.pdf)
Requires Asian Language Support in Adobe Reader And Japanese Language Support in your Browser

References

[1]
Asaravala, A. Sick of spam? Prepare for adware. Wired News. (May 07, 2004); www.wired.com/news/print/0,1294,63345,00.html.
[2]
Doxdesk. Definition of parasite related terms; www.doxdesk.com/parasite/definitions.html.
[3]
Galanxhi-Janaqi, H. and Nah, F. U-commerce: Emerging trends and research issues. Industrial Management and Data Systems 104, 9 (2004), 744--755.
[4]
Lavasoft; www.lavasoft.com
[5]
Nah, F., Siau, K., and Sheng, H. The value of mobile applications: A study on a public utility company. Commun. ACM 48, 2 (Feb. 2005), 85--90.
[6]
Saroiu, S., Gribble, S.D., and Levy, H.M. Measurement and analysis of spyware in a university environment. In Proceedings of the First Symposium on Networked Systems Design and Implementation (San Francisco, CA, Mar. 29-31, 2004), 141--153.
[7]
Siau, K., Nah, F., and Teng, J. Internet abuse and acceptable Internet use policy, Commun. ACM 45, 1 (Jan. 2002), 75-79.
[8]
Siau, K. and Shen, Z. Building customer trust in mobile commerce, Commun. ACM 46, 4 (Apr. 2003), 91--94.
[9]
Spybot; security.kolla.de.
[10]
SpywareGuide; www.spywareguide.com.
[11]
Stafford, T.F., and Urbaczewski, A. Spyware: The ghost in the machine. Commun. AIS 14, (2004), 291--306.
[12]
TrustGauge; trustgauge.com/?xcmpx=1474.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 48, Issue 8
Spyware
August 2005
124 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1076211
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2005
Published in CACM Volume 48, Issue 8

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)78
  • Downloads (Last 6 weeks)8
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Consumer Intention to Use Anti-Spyware SoftwareInternational Journal of Technology and Human Interaction10.4018/ijthi.201407010210:3(19-31)Online publication date: 1-Jul-2014
  • (2014)A Research Framework for Information Systems SecurityJournal of Information Privacy and Security10.1080/15536548.2006.108557892:2(3-24)Online publication date: 10-Sep-2014
  • (2014)Social and Q&A interfaces for app downloadInformation Processing & Management10.1016/j.ipm.2014.02.00550:4(584-598)Online publication date: Jul-2014
  • (2012)Protection of Privacy on the WebCyber Crime10.4018/978-1-61350-323-2.ch107(83-100)Online publication date: 2012
  • (2011)Learning to detect spyware using end user license agreementsKnowledge and Information Systems10.5555/3225634.322577226:2(285-307)Online publication date: 1-Feb-2011
  • (2011)Spyware Knowledge in Anti-Spyware Program AdoptionProceedings of the 2011 44th Hawaii International Conference on System Sciences10.1109/HICSS.2011.382(1-10)Online publication date: 4-Jan-2011
  • (2010)Learning to detect spyware using end user license agreementsKnowledge and Information Systems10.1007/s10115-009-0278-z26:2(285-307)Online publication date: 16-Jan-2010
  • (2009)SpywareHandbook of Research on Technoethics10.4018/978-1-60566-022-6.ch038(593-608)Online publication date: 2009
  • (2008)SesameProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1357054.1357217(1045-1054)Online publication date: 6-Apr-2008
  • (2008)UndercoverProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1357054.1357085(183-192)Online publication date: 6-Apr-2008
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media