메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Privacy-invasive software and preventive mechanisms

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); DATA PRIVACY; ELECTRONIC CRIME COUNTERMEASURES;

EID: 40249106199     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSNC.2006.62     Document Type: Conference Paper
Times cited : (7)

References (35)
  • 1
    • 9144256106 scopus 로고    scopus 로고
    • Understanding Spyware: Risk and Response
    • W. Ames, "Understanding Spyware: Risk and Response", in the IEEE Computer Society, Volume 6, Issue 5, 2004.
    • (2004) IEEE Computer Society , vol.6 , Issue.5
    • Ames, W.1
  • 2
    • 40249084391 scopus 로고    scopus 로고
    • Anti-Spyware Coalition, http://www.antispywarecoalition.org, 2006-07-18.
    • Anti-Spyware Coalition, http://www.antispywarecoalition.org, 2006-07-18.
  • 3
    • 40249085977 scopus 로고    scopus 로고
    • AOL/NCSA Online Safety Study, http://www.staysafeonline.org, 2006-07-18.
    • AOL/NCSA Online Safety Study, http://www.staysafeonline.org, 2006-07-18.
  • 8
    • 40249106141 scopus 로고    scopus 로고
    • Center for Democracy &Technology, Following the Money, http://www.cdt.org, 2006-07-18.
    • Center for Democracy &Technology, "Following the Money", http://www.cdt.org, 2006-07-18.
  • 10
    • 40249088501 scopus 로고    scopus 로고
    • Clearware.org, http://www.clearware.org, 2006-07-18.
    • Clearware.org, http://www.clearware.org, 2006-07-18.
  • 11
    • 24944591361 scopus 로고    scopus 로고
    • Giving notice: Why privacy policies and security breach notifications aren't enough
    • L. F. Cranor, "Giving notice: why privacy policies and security breach notifications aren't enough", in IEEE Communications Magazine, Vol. 43, Issue 8, 2005.
    • (2005) IEEE Communications Magazine , vol.43 , Issue.8
    • Cranor, L.F.1
  • 12
    • 3042822164 scopus 로고    scopus 로고
    • P3P: Making Privacy Policies More Useful
    • L. F. Cranor, "P3P: Making Privacy Policies More Useful", in the IEEE Security & Privacy, Volume 1, Issue 6, 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6
    • Cranor, L.F.1
  • 14
    • 40249098877 scopus 로고    scopus 로고
    • Earthlink Spy Audit, http://www.earthlink.net/spyaudit/press/, 2006-07-18.
    • Earthlink Spy Audit, http://www.earthlink.net/spyaudit/press/, 2006-07-18.
  • 15
    • 40249085976 scopus 로고    scopus 로고
    • FreeBSD Ports, http://www.freebsd.org/ports/, 2006-07-18.
    • FreeBSD Ports, http://www.freebsd.org/ports/, 2006-07-18.
  • 16
    • 0005078194 scopus 로고    scopus 로고
    • Informed Consent Online: A Conceptual Model and Design Principles
    • University of Washington
    • B. Friedman, E. Felten, and L.I. Millett, "Informed Consent Online: A Conceptual Model and Design Principles", CSE Technical Report, University of Washington, 2000.
    • (2000) CSE Technical Report
    • Friedman, B.1    Felten, E.2    Millett, L.I.3
  • 17
    • 33745862646 scopus 로고    scopus 로고
    • Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware
    • Pittsburgh USA
    • N. Good, et al., "Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware", in the Proceedings of the Symposium on Usable Privacy and Security, Pittsburgh USA, 2005.
    • (2005) Proceedings of the Symposium on Usable Privacy and Security
    • Good, N.1
  • 18
    • 38849089745 scopus 로고    scopus 로고
    • An Introduction to the Parasite Economy
    • Luxemburg
    • S. Görling, "An Introduction to the Parasite Economy", in EICAR 2004, Luxemburg, 2004.
    • (2004) EICAR
    • Görling, S.1
  • 20
    • 40249093205 scopus 로고    scopus 로고
    • Lavasoft, http://www.lavasoftusa.com, 2006-07-18.
    • Lavasoft, http://www.lavasoftusa.com, 2006-07-18.
  • 23
    • 40249103353 scopus 로고    scopus 로고
    • Proxy Appliances Blue Coat Systems, Inc., http://www.bluecoat.com, 2006-07-18.
    • Proxy Appliances Blue Coat Systems, Inc., http://www.bluecoat.com, 2006-07-18.
  • 24
    • 33646043992 scopus 로고    scopus 로고
    • Inside risks: Semantic network attacks
    • B. Schneier, "Inside risks: semantic network attacks", in Communications of the ACM, Volume 43, Issue 12, 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.12
    • Schneier, B.1
  • 26
    • 23344444659 scopus 로고    scopus 로고
    • Web Browsing and Spyware Intrusion
    • S. Shukla and F. F. Nah, "Web Browsing and Spyware Intrusion", in Communications of the ACM, Volume 48, Issue 8, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8
    • Shukla, S.1    Nah, F.F.2
  • 29
    • 40249107807 scopus 로고    scopus 로고
    • Spyware Developers Net Huge Profits, Outrage - With Annual Revenues of S2 Billion, Pop-up Ads are a High-Stakes Game, http://www.msnbc.msn.com/id/ 13757388/, 2006-07-18.
    • Spyware Developers Net Huge Profits, Outrage - With Annual Revenues of S2 Billion, Pop-up Ads are a High-Stakes Game, http://www.msnbc.msn.com/id/ 13757388/, 2006-07-18.
  • 30
    • 40249090122 scopus 로고    scopus 로고
    • Spyware: Research, Testing, Legislation, and Suits, http://www.benedelman.org/spyware/, 2006-07-18.
    • "Spyware": Research, Testing, Legislation, and Suits, http://www.benedelman.org/spyware/, 2006-07-18.
  • 31
    • 33845539701 scopus 로고    scopus 로고
    • Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities
    • Karlstad Sweden
    • S. Steinbrecher, "Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities", in Proceedings of the 21st IFIP SEC 2006, Karlstad Sweden, 2006.
    • (2006) Proceedings of the 21st IFIP SEC 2006
    • Steinbrecher, S.1
  • 32
    • 40249088502 scopus 로고    scopus 로고
    • StopBadware.org, http://www.stopbadware.org, 2006-07-18.
    • StopBadware.org, http://www.stopbadware.org, 2006-07-18.
  • 33
    • 40249098878 scopus 로고    scopus 로고
    • TRUSTe - The Trusted Download Program (Beta), http://www.truste.org/ trusteddownload.php, 2006-07-18.
    • TRUSTe - The Trusted Download Program (Beta), http://www.truste.org/ trusteddownload.php, 2006-07-18.
  • 34
    • 23344441842 scopus 로고    scopus 로고
    • A Framework For Spyware Assessment
    • M. Warkentin, et. al, "A Framework For Spyware Assessment", in Communications of the ACM, Volume 48, Issue 8, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8
    • Warkentin, M.1    et., al.2
  • 35
    • 40249119925 scopus 로고    scopus 로고
    • Webroot Software, State of Spyware - Q3 2005, http://www.webroot.com/resources/, 2006-07-18.
    • Webroot Software, "State of Spyware - Q3 2005", http://www.webroot.com/resources/, 2006-07-18.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.