2006
DOI: 10.1201/1079.07366981/45977.33.11.20060501/93007.1
|View full text |Cite
|
Sign up to set email alerts
|

A Holistic Approach for Managing Spyware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Even though spyware's aftermath varies from severe to mild (Warkentin et al, 2005), not many consumers appear to have practically taken remedial actions to fight against the ghost in the machine. This abnormality can be explained by the fact that most of the time consumers are unaware that their machines have been infected by spyware (Luo, 2006) or they may consider their standard anti-virus software sufficient for spyware protection (Lee and Kozar, 2005). In addition to the inadequate skills and resources to take defensive actions for Taking action against spyware the threat of spyware, Hu and Dinev (2005) found that lack of awareness is an important reason of not taking any action against spyware.…”
Section: Introductionmentioning
confidence: 98%
See 2 more Smart Citations
“…Even though spyware's aftermath varies from severe to mild (Warkentin et al, 2005), not many consumers appear to have practically taken remedial actions to fight against the ghost in the machine. This abnormality can be explained by the fact that most of the time consumers are unaware that their machines have been infected by spyware (Luo, 2006) or they may consider their standard anti-virus software sufficient for spyware protection (Lee and Kozar, 2005). In addition to the inadequate skills and resources to take defensive actions for Taking action against spyware the threat of spyware, Hu and Dinev (2005) found that lack of awareness is an important reason of not taking any action against spyware.…”
Section: Introductionmentioning
confidence: 98%
“…Spyware tracks a user's online activities, triggers pop-up windows designed to lure online business, steals and records passwords, or even takes control of a user's computer. Additionally, spyware is able to trigger system resource misuse and bandwidth waste, thereby posing grave security, confidentiality, and compliance risks (Luo, 2006). As such, spyware exacerbates the privacy concerns of consumers due to its stealthy characteristics.…”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation