Academic literature on the topic 'Spyware (Computer software)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spyware (Computer software).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Spyware (Computer software)"

1

Suki, Norazah Mohd, T. Ramayah, Au Soo Nee, and Norbayah Mohd Suki. "Consumer Intention to Use Anti-Spyware Software." International Journal of Technology and Human Interaction 10, no. 3 (July 2014): 19–31. http://dx.doi.org/10.4018/ijthi.2014070102.

Full text
Abstract:
Awareness of the importance to install anti-spyware software in one's computer has increased in this digital world. This research aims to investigate the relationship between relative advantage, moral compatibility, ease of use, subjective norms, image, computing capacity, perceived cost, and trialability, and the consumer intention to use the anti-spyware software. Data was coded and analyzed in the Statistical Package for Social Science (SPSS) computerized software version 21 and analyzed by means of Exploratory Factor Analysis (EFA). Next, Structural Equation Modeling (SEM) technique via Analysis of Moment Structure (AMOS) computer program version 21 was used for data analysis in order to achieve the research objective. Results validated the hypotheses and revealed that five vital factors: Ease of use, relative advantage, image, perceived cost, and moral compatibility influenced consumer intention to use the anti-spyware software. The ease of use dimension has the greatest impact on consumer intention to use the anti-spyware software. The developers of the anti-virus software or the software development companies should specifically target the right target groups, in terms of its market segmentation, targeting, and positioning, to boost up consumer awareness and deployment of the anti-spyware software. This research brings implication in terms of it does help the researchers and IT professionals to understand factors that influence consumer intention to use anti-spyware software.
APA, Harvard, Vancouver, ISO, and other styles
2

Klang, Mathias. "Spyware ? the ethics of covert software." Ethics and Information Technology 6, no. 3 (2004): 193–202. http://dx.doi.org/10.1007/s10676-004-3392-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kucera, Kyle, Michel Plaisent, Prosper Bernard, and Lassana Maguiraga. "An empirical investigation of the prevalence of spyware in internet shareware and freeware distributions." Journal of Enterprise Information Management 18, no. 6 (December 1, 2005): 697–708. http://dx.doi.org/10.1108/17410390510628391.

Full text
Abstract:
PurposeSpyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the personal information collected.Design/methodology/approachThe methodology was a two‐phase, multi‐case study. The first phase determined that five of the 50 most popular pieces of Windows®‐based freeware and shareware available to internet users from CNETDownload.com were suspected of containing spyware: these were included as data sources for phase two. The purpose of phase two was to confirm the existence of spyware and to identify the types and frequencies of any personal data transmissions. For this phase, data were collected and analyzed utilizing a passive network monitor program to examine packets of data transmitted from a personal computer to external destinations on the internet.FindingsThe findings confirmed the existence and use of spyware in three of five suspected cases. However, the data indicated that there was a low occurrence of spyware and that these programs have the capability to collect numerous types of personal data. The main limitation is that these results are based on a snapshot of data obtained during five days.Practical implicationsThe study has practical implications for internet users, who should be aware that spyware exists and understand its potential threat. Spyware developers should provide the user with an effective removal tool. Finally, marketers are cautioned that spyware might alienate customers.Originality/valueThis paper confirms the potential for misuse of these programs.
APA, Harvard, Vancouver, ISO, and other styles
4

Klang, Mathias. "Spyware: paying for software with our privacy." International Review of Law, Computers & Technology 17, no. 3 (November 2003): 313–22. http://dx.doi.org/10.1080/1360086032000174405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Damanik, Annisa Rizky, Henki Bayu Seta, and Theresiawati Theresiawati. "ANALISIS TROJAN DAN SPYWARE MENGGUNAKAN METODE HYBRID ANALYSIS." Jurnal Ilmiah Matrik 25, no. 1 (May 23, 2023): 89–97. http://dx.doi.org/10.33557/jurnalmatrik.v25i1.2327.

Full text
Abstract:
Malicious Software or malware is software created to damage a computer system. The increase in internet users is also in line with the increase in the use of software. However, there are still many users who still use pirated software because it is relatively free and easy to obtain. Pirated software is usually embedded with dangerous malware such as Trojans and spyware. All crimes of spreading this malware are always related to stealing credit card information, internet banking and other cybercrimes. To prove that the software installed and used on a computer is malicious software, digital forensics is required by analyzing the software. Hybrid analysis technique is a combination of static and dynamic analysis which is suitable for analyzing malware activity. Based on the results of the analysis that has been carried out, the ryuk.bin trojan has evolved and the malware forms new malware files when it is run and also changes and destroys the original files on the system.
APA, Harvard, Vancouver, ISO, and other styles
6

Ames, W. "Understanding spyware: risk and response." IT Professional 6, no. 5 (September 2004): 25–29. http://dx.doi.org/10.1109/mitp.2004.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goud, Ediga Komal, and Gadekari Rohith Reddy. "Keylogger Surveillance Software." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 1406–9. http://dx.doi.org/10.22214/ijraset.2023.49683.

Full text
Abstract:
Abstract: A Keylogger is a spyware tool used to record targets movements. Keystroke are forensic technology used to monitor and record every keystroke written on a computer .Keylogging often used as a hacking tool by black hat hackers to steal login details of an employee and confidential company information. Keylogging presents a special challenge to security managers In contrast to customary worms and infections, particular sorts of keyloggers are everything except difficult to identify. Programming keyloggers are exceptionally well known instrument which are in many cases used to reap secret data. One of the fundamental purposes behind this fast development of keyloggers is the opportunities for unprivileged programs running in client space to snoop and screen every one of the keystrokes composed by the clients of a framework. Execution and Dissemination of these sort of keyloggers are exceptionally simple due to the capacity to run in unprivileged mode. However, simultaneously, permits one to comprehend and demonstrate their conduct exhaustively.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul Wahed, Ali Abdul Hussien. "Local and Public Traffic Concrete Barrier (TCB)." Journal of Kufa for Mathematics and Computer 1, no. 2 (October 30, 2010): 1–11. http://dx.doi.org/10.31642/jokmc/2018/010201.

Full text
Abstract:
This research presents the Local and Public Traffic Concrete Barrier software (TCB) which work as a first defensive line to the computer from any remotely orlocally attackers or intruders. The keyfeature in the TCB software that it does not depend or use the built in windows firewall which is became week against the new attacking techniques. The TCB software can blocks all TCP process based on rules that can be specified and saved by the user such as base on Process Name, Remote IP or Remote/Local Port. In order to make the user rules unchangeable the TCB is password protected software with 3 different security levels and it can also Logs and save all the activity. Dependingon the user defined rules the TCB act like a Virus/Spyware/Adware basic protector that alerts the user when it s automatically scans any Processes, IP or Port that matches with the user preset rules. All theabove mentioned TCB capabilities and features helps to keep the computer more secure. As well it restricts information that comes to the computer from other computers,providing more control over the data on the computer and providing a line of defense against people or programs (including viruses and worms) that attempts to connect to the computer without invitation (unsolicitedrequest).
APA, Harvard, Vancouver, ISO, and other styles
9

Luo, Xin. "A Holistic Approach for Managing Spyware." EDPACS 33, no. 11 (May 2006): 1–9. http://dx.doi.org/10.1201/1079.07366981/45977.33.11.20060501/93007.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gordon, Sarah. "Fighting Spyware and Adware in the Enterprise." EDPACS 32, no. 12 (June 2005): 14–18. http://dx.doi.org/10.1201/1079/45242.32.12.20050601/88294.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Spyware (Computer software)"

1

Arumugam, Kavita Umphress David A. "Demographics of adware and spyware." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Theses/SANYASI_ARUMUGAM_58.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Larsson, Tobias, and Niklas Lindén. "Blocking Privacy-Invasive Software Using a Specialized Reputation System." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4521.

Full text
Abstract:
Privacy-invasive software is an increasingly common problem for today's computer users, one to which there is no absolute cure. Most of the privacy-invasive software are positioned in a legal gray zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This thesis proposes the use of a specialized reputation system to gather and share information regarding software behaviour between community users. A client application helps guide the user at the point of executing software on the local computer, displaying other users' feedback about the expected behaviour of the software. We discuss important aspects to consider when constructing such a system, and propose possible solutions. Based on the observations made, we implemented a client/server based proof-of-concept tool, which helped us discover other issues such as the effect on system stability. We also compare this solution to other, more conventional, protection methods such as anti-virus and anti-spyware software.
APA, Harvard, Vancouver, ISO, and other styles
3

Majeed, Salman. "Evaluation of Collaborative Reputation System against Privacy-Invasive Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4338.

Full text
Abstract:
As computers are getting integral part of daily lives, threats to privacy and personal information of users are increasing. Privacy-Invasive Software (PIS) is common problem now days. A reputation system named the PISKeeper system has been developed as countermeasure against PIS. This thesis aims at evaluating this system in order to know how and to what extent the PISKeeper system helps users in selecting the right software for their computers. Quantitative approach was adapted to evaluate the PISKeeper system. An experiment was designed and executed on computer users from different age groups and experiences in controlled lab environment. The results have proved that the PISKeeper system helped users in selecting right software for their computer by providing essential information about the specific software and comments from previous users of that software. Apart for evaluating the PISKeeper system, this thesis also aims to suggest improvements for the system. Sometimes PIS is bundled with legitimate software and users are informed about this by stating in End User License Agreement (EULA). Usually the users do not read EULA before accepting it giving consent to whatever written in it. This thesis also aims at suggesting an alternative way to present EULA content so the user may be informed about the behavior of the software in more convenient way.
APA, Harvard, Vancouver, ISO, and other styles
4

Boldt, Martin. "Privacy-Invasive Software : Exploring Effects and Countermeasures." Licentiate thesis, Karlskrona : Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/35d8186a42fd14c1c125728800344746?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blaauw, Pieter. "Search engine poisoning and its prevalence in modern search engines." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002037.

Full text
Abstract:
The prevalence of Search Engine Poisoning in trending topics and popular search terms on the web within search engines is investigated. Search Engine Poisoning is the act of manipulating search engines in order to display search results from websites infected with malware. Research done between February and August 2012, using both manual and automated techniques, shows us how easily the criminal element manages to insert malicious content into web pages related to popular search terms within search engines. In order to provide the reader with a clear overview and understanding of the motives and the methods of the operators of Search Engine Poisoning campaigns, an in-depth review of automated and semi-automated web exploit kits is done, as well as looking into the motives for running these campaigns. Three high profile case studies are examined, and the various Search Engine Poisoning campaigns associated with these case studies are discussed in detail to the reader. From February to August 2012, data was collected from the top trending topics on Google’s search engine along with the top listed sites related to these topics, and then passed through various automated tools to discover if these results have been infiltrated by the operators of Search Engine Poisoning campaings, and the results of these automated scans are then discussed in detail. During the research period, manual searching for Search Engine Poisoning campaigns was also done, using high profile news events and popular search terms. These results are analysed in detail to determine the methods of attack, the purpose of the attack and the parties behind it
APA, Harvard, Vancouver, ISO, and other styles
6

Mjörner, Patrik, and Erik Bosrup. "Alternative methods of financing software : Replacing illegal copying with free copying." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4177.

Full text
Abstract:
The software industry’s largest and most severe problem is software piracy. Most attempts to stop illegal copying of software have failed. Alternative ways to remove software piracy must therefore be discovered and some are already being used. These ways include alternative methods of financing software products instead of trying to stop illegal copying. The alternative methods use the low cost of software duplication as an advantage to increase sales instead of seeing it as a problem. This requires a change in the business model to focus on other revenue sources than per-copy fees. Many different alternative financing methods exist. These are suitable under different conditions and there is no universal solution. The methods all have one thing in common. The user can legally copy and use the software product without purchasing a license. All have different positive and negative effects on the user and this can create the opportunity to use several business models to cater different market segments.
Mjukvaruindustrins största och allvarligaste problem är piratkopiering. De flesta försökt att få bukt med piratkopieringsproblemet har misslyckats. Alternativa metoder för att försöka lösa piratkopieringsproblemet måste därför hittas. Ett alternativt sätt att lösa piratkopieringsproblemet på är med hjälp av alternativa finansieringsmetoder för programvara. De alternativa finansieringsmetoderna använder sig av mjukvaras speciella egenarter som extremt låg reproduktionskostnad och enkelheten att enkelt göra perfekta kopior. Dessa alternativa finansieringsmetoder försöker hitta andra källor för inkomst än försäljningen av licenser. Många alternativa finansieringsmetoder finns. Dessa är tillämpbara och lämpliga i olika situationer och ingen universell lösning finns. Det dessa metoder har gemensamt är att programvarans användare fritt kan kopiera programvaran och använda den utan att behöva köpa en licens. Då de alternativa finansieringsmetoderna har olika positiva och negative påverkningar på sina användare ges tillfälle att kunna kombinera modeller.
APA, Harvard, Vancouver, ISO, and other styles
7

Johnston, Allen C. "An empirical investigation of the influence of fear appeals on attitudes and behavioral intentions associated with recommended individual computer security actions." Diss., Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hussain, Faisal Mateen &amp Irfan. "Automated Analysis of End User License Agreements." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5138.

Full text
Abstract:
Context Spyware is “computer software that obtains information from a user's computer without the user's knowledge or consent” [25]. Spyware is often embedded in another application and is usually stated in End User License Agreement (EULA) [20]. However it is quite common to accept the EULA without even reading it. Therefore beside the traditional spyware analysis techniques, automated EULA analysis can be helpful for common users in order to identify the spyware [18]. Objectives The techniques of automated EULA analysis do exist however the process of taking a binary application, analyze it, and prepare it in order to extract the EULA has not been studied in existing research. There is a need for such a tool that can extract and analyze the EULA text from an installer binary without executing it. Objectives of this research are to investigate the techniques to unpack the binary file, extract the EULA, analyze it and present the analysis results to the end user. Methods In order to establish basic understanding of the related concepts preliminary study is done. In this study a number of article sources are used, including ACM Digital Library, Compendex, Inspec, IEEE Xplore, and Springer Link. Material has been selected after reading titles and summaries. Prototype of an open source tool is designed and developed. This tool extracts the EULA from executable binary installers, analyzes the extracted text and gives suggestions about legitimate level of the software. Results To evaluate our application we downloaded 150 executables from different web sites, which were already classified as bad or good by [23]. We used our tool to extract EULA text from executables. We were able to extract EULA from 48 percent of selected binary files. Analysis of extracted EULAs was also done to classify the software as good or bad. This analysis assists the user to make a decision to accept or reject the installation of software without reading even a single word of EULA. During the extraction and analysis process there was no significant impact on performance of the host system. Conclusion We conclude that EULA can be extracted from a binary file without executing it. However because of limited time it was not possible to extract EULA from all installer binaries. The rate of EULA extraction can be improved in future research.
APA, Harvard, Vancouver, ISO, and other styles
9

(9805517), Kenneth Howah. "Factors affecting user decisions to download and install software that may contain spyware." Thesis, 2011. https://figshare.com/articles/thesis/Factors_affecting_user_decisions_to_download_and_install_software_that_may_contain_spyware/13457063.

Full text
Abstract:
"This exploratory research project is aimed at identifying factors influencing user decisions that cause spyware to be introduced into the computer through free software downloaded and installed from the Internet ... The research will contribute to a more comprehensive understanding of what motivates user behaviour as it relates to the proliferation of spyware"--Abstract.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Spyware (Computer software)"

1

S, Yang John, ed. Spyware. New York: Nova Science Publishers, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

service), SpringerLink (Online, ed. Spyware and Adware. Boston, MA: Springer Science+Business Media, LLC, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gregory, Peter H. Blocking Spam & Spyware For Dummies. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Spyware: What you don't know can hurt you : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, April 29, 2004. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jacobson, George V. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United, States Congress Senate Committee on Commerce Science and Transportation. Impact and policy implications of spyware on consumers and businesses: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Manufacturing, and Trade. H.R. --------, a bill to renew the Federal Trade Commission's authority to combat cross-border spam, spyware, and fraud through reauthorization of the U.S. Safe Web Act of 2006: Hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, July 12, 2012. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bucher, Manuel. Spyware: Rechtliche Würdigung ausgewählter Fragen sowie Empfehlungen an die Praxis unter besonderer Berücksichtigung des eidgenössischen Datenschutzgesetzes. Zürich: Schulthess, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Spyware (Computer software)"

1

Belous, Anatoly, and Vitali Saladukha. "Computer Viruses, Malicious Logic, and Spyware." In Viruses, Hardware and Software Trojans, 101–207. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klang, Mathias. "Spyware." In Handbook of Research on Technoethics, 593–608. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-022-6.ch038.

Full text
Abstract:
It is well known that technology can be use as to effectively monitor the behavior of crows and individuals and in many cases this knowledge may b the motivation for people to behave differently than if they were not under surveillance. This internalization of surveillance has been widely discussed in privacy literature. Recent software developments have created new threats to the integrity of the individual. Today a form of software, commonly known as spyware, poses an increased threat of covert surveillance. Computer users subjected to spyware are often unaware of the surveillance and therefore continue to behave in a natural manner. This chapter argues that the integrity of the computer user is not protected under law and any rights the user may believe she has are easily circumvented.
APA, Harvard, Vancouver, ISO, and other styles
3

Rowe, Neil C. "The Ethics of Deception in Cyberspace." In Handbook of Research on Technoethics, 529–41. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-022-6.ch034.

Full text
Abstract:
We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on computer systems, including identity deception, Trojan horses, denial of service, eavesdropping, record manipulation, and social engineering. We then consider several types of deception for defensive purposes, less well known, including honeypots, honeytokens, defensive obstructionism, false excuses, deceptive intelligence collection, and strategic deception. In each case we assess the ethical issues pro and con for the use of deception. We argue that sometimes deception in cyberspace is unethical and sometimes it is ethical.
APA, Harvard, Vancouver, ISO, and other styles
4

Ajewole, Ayotokunbo I. "Software Requirements for Cybercafés." In Security and Software for Cybercafes, 125–46. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch009.

Full text
Abstract:
This chapter discusses basic software that should be found in a typical cybercafé setup. ‘Software requirements’ are broadly divided into requirements for the server side and client side of the network. As a commercial venture, it is of great importance that only necessary software be found installed in a cybercafé, to meet the café user’s need. Starting with an introduction, a general overview of the café user’s needs are set forth, thereby leading to the division into two broad areas: server and client side. An outline of the chapter is given. The background section gives some details on some basic terminologies (server, client, operating system, etc.) that a cybercafé user/prospective operator might want to get acquainted with. Software requirements for the server side of the café network are discussed first; general features of timing softwares, notes on Internet security, viruses, and spyware. As the café server is a very important element in café management, it is necessary that the server is not overwhelmed by unnecessary tasks thereby leading to a generally slow network. Software for the client side of the café network is discussed next with emphasis on basic software applications often used/requested by café users. Examples of such are word processing applications and graphics viewing software. Since a lot of computer literate people are familiar with the Windows operating system, all software discussed for client use derives from such a perspective. Some security issues necessary for maintaining crisp client computers are also discussed. Due to lack of in-depth knowledge about information security among internet users, the future trends section discusses the applicability of the personal Internet communicator in the Nigerian environment, because of its portability and built in security. Other possible trends in security and cyber-crime are also discussed. The chapter ends with a note that café users will continue to demand faster Internet speeds, and therefore operators must be on the search for latest software to meet their needs, latest security software to keep their café network always clean and secure. Future research directions include software development research to allow café users modify or design their desktops to their own taste while in the café. Complete café solution software is also proposed to cater for everything from operating systems to end-user applications which can be installed once, and from a single source.Literature used for this chapter is sourced mainly from the Internet, and from personal experience of the author, as there are not literatures dealing with ‘cybercafé software’ on a specific note. A whole lot of software are been used, and could be used in a café. This depends actually on general client’s requirements and/or the operator’s amount of know-how /preferences which may vary across different environments.
APA, Harvard, Vancouver, ISO, and other styles
5

Sharman, Raj, K. Pramod Krishna, H. Raghov Rao, and Shambhu Upadhyaya. "Malware and Antivirus Deployment for Enterprise Security." In Information Security and Ethics, 3067–83. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch205.

Full text
Abstract:
Threats to information security are pervasive, originating from both outside and within an organization. The history of computer security is dotted with the tales of newer methods of identification, detection, and prevention of malware, only to be followed by a new set of threats that circumvent those safeguards. The explosive growth of the Internet and wide availability of toolsets and documentation exacerbates this problem by making malware development easy. As blended threats continue to combine multiple types of attacks into single and more dangerous payloads, newer threats are emerging. Phishing, pharming, spamming, spoofing, spyware, and hacking incidents are increasing at an alarming rate despite the release of breakthrough security defense products. A multi-layered, integrated approach using different security products in conjunction with well-defined security policies and antivirus software will form the foundation for effective enterprise security management.
APA, Harvard, Vancouver, ISO, and other styles
6

Bhrugubanda, Meenakshi, and Siva Rama Krishna T. "ROLE OF DEEP LEARNING IN MALWARE DETECTION." In Advances in Cyber Security and Digital Forensics, 103–10. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/nbennurch262.

Full text
Abstract:
Malicious Software (Malware) is a major threat to Computers, networks in the Cyber world. Malware removal is essential to prevent identity theft and document theft by cybercriminals. Digital attacks include Malware, ransomware, spyware, Denial-ofservice attack, Trojan horse, Man-in-the middle attack, Phishing etc. Malware introduction into electronic gadgets rose along with their widespread use. The correct operation of these devices depends on the elimination of malware from them. These malware issues in cyberspace have a viable remedy in Artificial Intelligence (AI). Deep learning (DL) is a subset of Machine learning (ML), which is a branch of artificial intelligence. This Chapter provides a survey on DL techniques for Malware Detection
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Spyware (Computer software)"

1

Salih, Huda M., and Mustafa S. Mohammed. "Spyware Injection in Android using Fake Application." In 2020 International Conference on Computer Science and Software Engineering (CSASE). IEEE, 2020. http://dx.doi.org/10.1109/csase48920.2020.9142101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Darbanian, Elham, and Gh Dastghaiby fard. "A graphical password against spyware and shoulder-surfing attacks." In 2015 International Symposium on Computer Science and Software Engineering (CSSE). IEEE, 2015. http://dx.doi.org/10.1109/csicsse.2015.7369239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mitakidis, Evangelos, Dimitrios Taketzis, Alexandros Fakis, and Georgios Kambourakis. "SnoopyBot: An Android spyware to bridge the mixes in Tor." In 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2016. http://dx.doi.org/10.1109/softcom.2016.7772180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stanica, Olivian. "E-LEARNING FOR THE DEVELOPMENT NEW SKILLS IN SECURITY OF INFORMATION FIELD : E-CYBER SECURITY COMPETENCE." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-129.

Full text
Abstract:
The emergence of threats of attacks in cyberspace requires from all governmental or non-governmental security measures and protection of critical infrastructures are vulnerable to these means. Therefore to find solutions, including training and education of computer users in the XXI century is imminent. E-Learning is required to be developed and generalized to all computer users a new security culture and a new e-cyber security competence. Why is needed to develop a new e-cyber security competence because, in 2014 we are talking about e-crime, e-terrorism or e-war in cyberspace. E-cyber security culture must include training / awareness / education organizational competence users (be they experts, business people or simply beneficiaries ICT) data protection, proper use of procedures for the use of cyberspace. In other words it is about the formation of ethical and moral skills that enable citizens, according to their aspirations and belonging to a modern and civilized society. The problem to be addressed in other areas such as economic security, social, food, environmental, industrial, military, etc. Today, the cyberspace identified four major threats: spam - unsolicited e-mail messages that users upload mailboxes worldwide, bugs - undiscovered software errors that lead to data corruption and security vulnerabilities, attacks type "denial of services" - users are deprived of resources and services (personal HDD or the entire network bandwidth) and malicious software - viruses, worms, trojans and spyware programmes. Therefore e-Learning could be a good option in order to develop new cyber security skills of the users in a variety of ways and new e-Learning technologies could be integrated into the mainstream of education and training programmes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography