Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Investigating factors affecting the adoption of anti-spyware systems

Published: 01 August 2005 Publication History

Abstract

Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1) creating serious problems such as copying and sending personal information, consuming CPU power, reducing available bandwidth, annoying users with endless pop-ups, and monitoring users' computer usage. As spyware makes the Internet a riskier place and undermines confidence in online activities, Internet users stop purchasing at online stores---a consequence that clearly disrupts e-business.

Supplementary Material

PDF File (p72-lee.jp.pdf)
Requires Asian Language Support in Adobe Reader And Japanese Language Support in your Browser

References

[1]
Ajzen, I. Attitudes, Personality, and Behavior. Open University Press, Milton-Keynes, England, 1988.
[2]
Kawamoto, D. Few corporations use the anti-spyware tools; news.zdnet.com/2100-1009_22-5428817.html
[3]
Moore, G.C. and Benbasat, I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2, 3 (1991), 192--222.

Cited By

View all
  • (2024)Examining formation and alleviation of information security fatigue by using job demands–resources theoryInformation Systems Journal10.1111/isj.1252434:6(2132-2172)Online publication date: 17-Apr-2024
  • (2024)Data mining for cyber biosecurity risk management – A comprehensive reviewComputers & Security10.1016/j.cose.2023.103627137(103627)Online publication date: Feb-2024
  • (2024)Determinants of Tax Compliance in the Informal Sector: The Intentions of TIN and Non-TIN Registered TaxpayersTowards Digitally Transforming Accounting and Business Processes10.1007/978-3-031-46177-4_32(595-616)Online publication date: 12-Jan-2024
  • Show More Cited By

Index Terms

  1. Investigating factors affecting the adoption of anti-spyware systems

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Communications of the ACM
        Communications of the ACM  Volume 48, Issue 8
        Spyware
        August 2005
        124 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1076211
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 August 2005
        Published in CACM Volume 48, Issue 8

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)246
        • Downloads (Last 6 weeks)48
        Reflects downloads up to 25 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Examining formation and alleviation of information security fatigue by using job demands–resources theoryInformation Systems Journal10.1111/isj.1252434:6(2132-2172)Online publication date: 17-Apr-2024
        • (2024)Data mining for cyber biosecurity risk management – A comprehensive reviewComputers & Security10.1016/j.cose.2023.103627137(103627)Online publication date: Feb-2024
        • (2024)Determinants of Tax Compliance in the Informal Sector: The Intentions of TIN and Non-TIN Registered TaxpayersTowards Digitally Transforming Accounting and Business Processes10.1007/978-3-031-46177-4_32(595-616)Online publication date: 12-Jan-2024
        • (2023)Motivating Accounting Information Systems Security Policy Compliance: Insight from the Protection Motivation Theory and the Theory of Reasoned ActionProceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022)10.2991/978-94-6463-150-0_23(342-359)Online publication date: 23-May-2023
        • (2022)Factors Influencing Information Security Standards and Policies Compliance by Nigeria Bank Employees2022 5th International Conference on Information and Computer Technologies (ICICT)10.1109/ICICT55905.2022.00040(191-197)Online publication date: Mar-2022
        • (2022)Bringing a background variable into focus: a multimethod investigation of IT security climate’s influence on elicited IT security beliefsJournal of Systems and Information Technology10.1108/JSIT-10-2021-022924:4(305-330)Online publication date: 12-Sep-2022
        • (2022)Pathways to Cybersecurity Awareness and Protection Behaviors in South KoreaJournal of Computer Information Systems10.1080/08874417.2022.203134763:1(94-106)Online publication date: 3-Feb-2022
        • (2022)Beyond adaptive security coping behaviors: Theory and empirical evidenceInformation & Management10.1016/j.im.2021.10357559:2(103575)Online publication date: Mar-2022
        • (2021)The Cultural Foundation of Information Security BehaviorResearch Anthology on Privatizing and Securing Data10.4018/978-1-7998-8954-0.ch024(522-545)Online publication date: 2021
        • (2021)How protection motivation and social bond factors influence information security behaviorSystèmes d'information & management10.3917/sim.212.0077Volume 26:2(77-115)Online publication date: 13-Jul-2021
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Magazine Site

        View this article on the magazine site (external)

        Magazine Site

        Login options

        Full Access

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media