-
1
-
-
9144256106
-
Understanding Spyware: Risk and Response
-
W. Ames, "Understanding Spyware: Risk and Response", in the IEEE Computer Society, Volume 6, Issue 5, 2004.
-
(2004)
IEEE Computer Society
, vol.6
, Issue.5
-
-
Ames, W.1
-
2
-
-
40249084391
-
-
Anti-Spyware Coalition, http://www.antispywarecoalition.org, 2006-07-18.
-
Anti-Spyware Coalition, http://www.antispywarecoalition.org, 2006-07-18.
-
-
-
-
3
-
-
40249085977
-
-
AOL/NCSA Online Safety Study, http://www.staysafeonline.org, 2006-07-18.
-
AOL/NCSA Online Safety Study, http://www.staysafeonline.org, 2006-07-18.
-
-
-
-
8
-
-
40249106141
-
-
Center for Democracy &Technology, Following the Money, http://www.cdt.org, 2006-07-18.
-
Center for Democracy &Technology, "Following the Money", http://www.cdt.org, 2006-07-18.
-
-
-
-
10
-
-
40249088501
-
-
Clearware.org, http://www.clearware.org, 2006-07-18.
-
Clearware.org, http://www.clearware.org, 2006-07-18.
-
-
-
-
11
-
-
24944591361
-
Giving notice: Why privacy policies and security breach notifications aren't enough
-
L. F. Cranor, "Giving notice: why privacy policies and security breach notifications aren't enough", in IEEE Communications Magazine, Vol. 43, Issue 8, 2005.
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.8
-
-
Cranor, L.F.1
-
12
-
-
3042822164
-
P3P: Making Privacy Policies More Useful
-
L. F. Cranor, "P3P: Making Privacy Policies More Useful", in the IEEE Security & Privacy, Volume 1, Issue 6, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
-
-
Cranor, L.F.1
-
14
-
-
40249098877
-
-
Earthlink Spy Audit, http://www.earthlink.net/spyaudit/press/, 2006-07-18.
-
Earthlink Spy Audit, http://www.earthlink.net/spyaudit/press/, 2006-07-18.
-
-
-
-
15
-
-
40249085976
-
-
FreeBSD Ports, http://www.freebsd.org/ports/, 2006-07-18.
-
FreeBSD Ports, http://www.freebsd.org/ports/, 2006-07-18.
-
-
-
-
16
-
-
0005078194
-
Informed Consent Online: A Conceptual Model and Design Principles
-
University of Washington
-
B. Friedman, E. Felten, and L.I. Millett, "Informed Consent Online: A Conceptual Model and Design Principles", CSE Technical Report, University of Washington, 2000.
-
(2000)
CSE Technical Report
-
-
Friedman, B.1
Felten, E.2
Millett, L.I.3
-
17
-
-
33745862646
-
Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware
-
Pittsburgh USA
-
N. Good, et al., "Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware", in the Proceedings of the Symposium on Usable Privacy and Security, Pittsburgh USA, 2005.
-
(2005)
Proceedings of the Symposium on Usable Privacy and Security
-
-
Good, N.1
-
18
-
-
38849089745
-
An Introduction to the Parasite Economy
-
Luxemburg
-
S. Görling, "An Introduction to the Parasite Economy", in EICAR 2004, Luxemburg, 2004.
-
(2004)
EICAR
-
-
Görling, S.1
-
20
-
-
40249093205
-
-
Lavasoft, http://www.lavasoftusa.com, 2006-07-18.
-
Lavasoft, http://www.lavasoftusa.com, 2006-07-18.
-
-
-
-
21
-
-
0012126983
-
The privacy practices of Web browser extensions
-
D. M. Martin Jr, R. M. Smith, M. Brittain, I. F. Fetch, and H. Wu, "The privacy practices of Web browser extensions", in Communications of the ACM, Volume 44, Issue 2, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
-
-
Martin Jr, D.M.1
Smith, R.M.2
Brittain, M.3
Fetch, I.F.4
Wu, H.5
-
22
-
-
85077681170
-
A Crawler-based Study of Spyware on the Web
-
San Diego CA
-
A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy, "A Crawler-based Study of Spyware on the Web", in the Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego CA, 2006.
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006)
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.M.4
-
23
-
-
40249103353
-
-
Proxy Appliances Blue Coat Systems, Inc., http://www.bluecoat.com, 2006-07-18.
-
Proxy Appliances Blue Coat Systems, Inc., http://www.bluecoat.com, 2006-07-18.
-
-
-
-
24
-
-
33646043992
-
Inside risks: Semantic network attacks
-
B. Schneier, "Inside risks: semantic network attacks", in Communications of the ACM, Volume 43, Issue 12, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
-
-
Schneier, B.1
-
26
-
-
23344444659
-
Web Browsing and Spyware Intrusion
-
S. Shukla and F. F. Nah, "Web Browsing and Spyware Intrusion", in Communications of the ACM, Volume 48, Issue 8, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
-
-
Shukla, S.1
Nah, F.F.2
-
29
-
-
40249107807
-
-
Spyware Developers Net Huge Profits, Outrage - With Annual Revenues of S2 Billion, Pop-up Ads are a High-Stakes Game, http://www.msnbc.msn.com/id/ 13757388/, 2006-07-18.
-
Spyware Developers Net Huge Profits, Outrage - With Annual Revenues of S2 Billion, Pop-up Ads are a High-Stakes Game, http://www.msnbc.msn.com/id/ 13757388/, 2006-07-18.
-
-
-
-
30
-
-
40249090122
-
-
Spyware: Research, Testing, Legislation, and Suits, http://www.benedelman.org/spyware/, 2006-07-18.
-
"Spyware": Research, Testing, Legislation, and Suits, http://www.benedelman.org/spyware/, 2006-07-18.
-
-
-
-
31
-
-
33845539701
-
Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities
-
Karlstad Sweden
-
S. Steinbrecher, "Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities", in Proceedings of the 21st IFIP SEC 2006, Karlstad Sweden, 2006.
-
(2006)
Proceedings of the 21st IFIP SEC 2006
-
-
Steinbrecher, S.1
-
32
-
-
40249088502
-
-
StopBadware.org, http://www.stopbadware.org, 2006-07-18.
-
StopBadware.org, http://www.stopbadware.org, 2006-07-18.
-
-
-
-
33
-
-
40249098878
-
-
TRUSTe - The Trusted Download Program (Beta), http://www.truste.org/ trusteddownload.php, 2006-07-18.
-
TRUSTe - The Trusted Download Program (Beta), http://www.truste.org/ trusteddownload.php, 2006-07-18.
-
-
-
-
34
-
-
23344441842
-
A Framework For Spyware Assessment
-
M. Warkentin, et. al, "A Framework For Spyware Assessment", in Communications of the ACM, Volume 48, Issue 8, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
-
-
Warkentin, M.1
et., al.2
-
35
-
-
40249119925
-
-
Webroot Software, State of Spyware - Q3 2005, http://www.webroot.com/resources/, 2006-07-18.
-
Webroot Software, "State of Spyware - Q3 2005", http://www.webroot.com/resources/, 2006-07-18.
-
-
-
|