User Perceptions of Software with Embedded Spyware: an Empirical Evaluation

نویسنده

  • Janice C. Sipior
چکیده

A research model and hypotheses explore software user perceptions of privacy, trust, and legal protection in using application software with embedded spyware. Empirical results reveal actual users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi-dimensional construct, reveals trustworthiness-ability and trustworthiness-integrity are important influences of overall trust of a vendor. The results may provide guidance to software vendors and government regulatory agencies in addressing the concerns associated with spyware.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection and Identification of new malware in Network Security

Spyware represents a serious threat to confidentiality relays the information across the Internet to a third party since it may result in loss of control over private data for location this type of software might collect the data and send it to the third party of the users without the user consent. Programs that have the potential violate the privacy and security of the system can be labeled as...

متن کامل

A generic anti-spyware solution by access control list at kernel level

Spyware refers to programs that steal the user information stored in the user s computer and transmit this information via the Internet to a designated home server without the user being aware of this transmission. Existing anti-spyware solutions are not generic and flexible. These solutions either check for the existence of known spyware or try to block the transmission of the private informat...

متن کامل

Monte Carlo Simulation of Prostate Intensity Modulated Radiotherapy Using PRIMO Software: A Feasibility Study

Introduction: Nowadays Intensity Modulated Radiotherapy (IMRT) is a common method for treating prostate cancers. Must of the Monte Carlo software cannot simulate the IMRT procedures due to inability of these soft wares to simulate the multi leaf collimator (MLC) positions or movements. A new user-friendly software based on the PENELOPE Monte Carlo code named PRIMO was published...

متن کامل

Detection and Prevention of Keylogger Spyware Attack

A Keylogger is also known as keystroke logger. It is a software or hardware device which monitors each and every key typed by user on user keyboard. User can not identify the presence of keylogger on user computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their children’s or company owner to spy on their empl...

متن کامل

A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness

Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This article presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006