Academic literature on the topic 'Spyware (Computer software)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spyware (Computer software).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Spyware (Computer software)"
Suki, Norazah Mohd, T. Ramayah, Au Soo Nee, and Norbayah Mohd Suki. "Consumer Intention to Use Anti-Spyware Software." International Journal of Technology and Human Interaction 10, no. 3 (July 2014): 19–31. http://dx.doi.org/10.4018/ijthi.2014070102.
Full textKlang, Mathias. "Spyware ? the ethics of covert software." Ethics and Information Technology 6, no. 3 (2004): 193–202. http://dx.doi.org/10.1007/s10676-004-3392-3.
Full textKucera, Kyle, Michel Plaisent, Prosper Bernard, and Lassana Maguiraga. "An empirical investigation of the prevalence of spyware in internet shareware and freeware distributions." Journal of Enterprise Information Management 18, no. 6 (December 1, 2005): 697–708. http://dx.doi.org/10.1108/17410390510628391.
Full textKlang, Mathias. "Spyware: paying for software with our privacy." International Review of Law, Computers & Technology 17, no. 3 (November 2003): 313–22. http://dx.doi.org/10.1080/1360086032000174405.
Full textDamanik, Annisa Rizky, Henki Bayu Seta, and Theresiawati Theresiawati. "ANALISIS TROJAN DAN SPYWARE MENGGUNAKAN METODE HYBRID ANALYSIS." Jurnal Ilmiah Matrik 25, no. 1 (May 23, 2023): 89–97. http://dx.doi.org/10.33557/jurnalmatrik.v25i1.2327.
Full textAmes, W. "Understanding spyware: risk and response." IT Professional 6, no. 5 (September 2004): 25–29. http://dx.doi.org/10.1109/mitp.2004.71.
Full textGoud, Ediga Komal, and Gadekari Rohith Reddy. "Keylogger Surveillance Software." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 1406–9. http://dx.doi.org/10.22214/ijraset.2023.49683.
Full textAbdul Wahed, Ali Abdul Hussien. "Local and Public Traffic Concrete Barrier (TCB)." Journal of Kufa for Mathematics and Computer 1, no. 2 (October 30, 2010): 1–11. http://dx.doi.org/10.31642/jokmc/2018/010201.
Full textLuo, Xin. "A Holistic Approach for Managing Spyware." EDPACS 33, no. 11 (May 2006): 1–9. http://dx.doi.org/10.1201/1079.07366981/45977.33.11.20060501/93007.1.
Full textGordon, Sarah. "Fighting Spyware and Adware in the Enterprise." EDPACS 32, no. 12 (June 2005): 14–18. http://dx.doi.org/10.1201/1079/45242.32.12.20050601/88294.2.
Full textDissertations / Theses on the topic "Spyware (Computer software)"
Arumugam, Kavita Umphress David A. "Demographics of adware and spyware." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Theses/SANYASI_ARUMUGAM_58.pdf.
Full textLarsson, Tobias, and Niklas Lindén. "Blocking Privacy-Invasive Software Using a Specialized Reputation System." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4521.
Full textMajeed, Salman. "Evaluation of Collaborative Reputation System against Privacy-Invasive Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4338.
Full textBoldt, Martin. "Privacy-Invasive Software : Exploring Effects and Countermeasures." Licentiate thesis, Karlskrona : Blekinge Institute of Technology, 2007. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/35d8186a42fd14c1c125728800344746?OpenDocument.
Full textBlaauw, Pieter. "Search engine poisoning and its prevalence in modern search engines." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002037.
Full textMjörner, Patrik, and Erik Bosrup. "Alternative methods of financing software : Replacing illegal copying with free copying." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4177.
Full textMjukvaruindustrins största och allvarligaste problem är piratkopiering. De flesta försökt att få bukt med piratkopieringsproblemet har misslyckats. Alternativa metoder för att försöka lösa piratkopieringsproblemet måste därför hittas. Ett alternativt sätt att lösa piratkopieringsproblemet på är med hjälp av alternativa finansieringsmetoder för programvara. De alternativa finansieringsmetoderna använder sig av mjukvaras speciella egenarter som extremt låg reproduktionskostnad och enkelheten att enkelt göra perfekta kopior. Dessa alternativa finansieringsmetoder försöker hitta andra källor för inkomst än försäljningen av licenser. Många alternativa finansieringsmetoder finns. Dessa är tillämpbara och lämpliga i olika situationer och ingen universell lösning finns. Det dessa metoder har gemensamt är att programvarans användare fritt kan kopiera programvaran och använda den utan att behöva köpa en licens. Då de alternativa finansieringsmetoderna har olika positiva och negative påverkningar på sina användare ges tillfälle att kunna kombinera modeller.
Johnston, Allen C. "An empirical investigation of the influence of fear appeals on attitudes and behavioral intentions associated with recommended individual computer security actions." Diss., Mississippi State : Mississippi State University, 2006. http://sun.library.msstate.edu/ETD-db/ETD-browse/browse.
Full textHussain, Faisal Mateen & Irfan. "Automated Analysis of End User License Agreements." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5138.
Full text(9805517), Kenneth Howah. "Factors affecting user decisions to download and install software that may contain spyware." Thesis, 2011. https://figshare.com/articles/thesis/Factors_affecting_user_decisions_to_download_and_install_software_that_may_contain_spyware/13457063.
Full textBooks on the topic "Spyware (Computer software)"
Tittel, Ed. PC magazine fighting spyware, viruses, and malware. Indianapolis, IN: Wiley Pub., 2005.
Find full textservice), SpringerLink (Online, ed. Spyware and Adware. Boston, MA: Springer Science+Business Media, LLC, 2008.
Find full textGregory, Peter H. Blocking Spam & Spyware For Dummies. New York: John Wiley & Sons, Ltd., 2005.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Spyware: What you don't know can hurt you : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, April 29, 2004. Washington: U.S. G.P.O., 2004.
Find full textJacobson, George V. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009.
Find full textUnited, States Congress Senate Committee on Commerce Science and Transportation. Impact and policy implications of spyware on consumers and businesses: Hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008. Washington: U.S. G.P.O., 2012.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Combating spyware: H.R. 29, the SPY Act : hearing before the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, January 26, 2005. Washington: U.S. G.P.O., 2005.
Find full textUnited States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Manufacturing, and Trade. H.R. --------, a bill to renew the Federal Trade Commission's authority to combat cross-border spam, spyware, and fraud through reauthorization of the U.S. Safe Web Act of 2006: Hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Twelfth Congress, second session, July 12, 2012. Washington: U.S. Government Printing Office, 2013.
Find full textBucher, Manuel. Spyware: Rechtliche Würdigung ausgewählter Fragen sowie Empfehlungen an die Praxis unter besonderer Berücksichtigung des eidgenössischen Datenschutzgesetzes. Zürich: Schulthess, 2010.
Find full textBook chapters on the topic "Spyware (Computer software)"
Belous, Anatoly, and Vitali Saladukha. "Computer Viruses, Malicious Logic, and Spyware." In Viruses, Hardware and Software Trojans, 101–207. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47218-4_2.
Full textKlang, Mathias. "Spyware." In Handbook of Research on Technoethics, 593–608. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-022-6.ch038.
Full textRowe, Neil C. "The Ethics of Deception in Cyberspace." In Handbook of Research on Technoethics, 529–41. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-022-6.ch034.
Full textAjewole, Ayotokunbo I. "Software Requirements for Cybercafés." In Security and Software for Cybercafes, 125–46. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch009.
Full textSharman, Raj, K. Pramod Krishna, H. Raghov Rao, and Shambhu Upadhyaya. "Malware and Antivirus Deployment for Enterprise Security." In Information Security and Ethics, 3067–83. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch205.
Full textBhrugubanda, Meenakshi, and Siva Rama Krishna T. "ROLE OF DEEP LEARNING IN MALWARE DETECTION." In Advances in Cyber Security and Digital Forensics, 103–10. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/nbennurch262.
Full textConference papers on the topic "Spyware (Computer software)"
Salih, Huda M., and Mustafa S. Mohammed. "Spyware Injection in Android using Fake Application." In 2020 International Conference on Computer Science and Software Engineering (CSASE). IEEE, 2020. http://dx.doi.org/10.1109/csase48920.2020.9142101.
Full textDarbanian, Elham, and Gh Dastghaiby fard. "A graphical password against spyware and shoulder-surfing attacks." In 2015 International Symposium on Computer Science and Software Engineering (CSSE). IEEE, 2015. http://dx.doi.org/10.1109/csicsse.2015.7369239.
Full textMitakidis, Evangelos, Dimitrios Taketzis, Alexandros Fakis, and Georgios Kambourakis. "SnoopyBot: An Android spyware to bridge the mixes in Tor." In 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2016. http://dx.doi.org/10.1109/softcom.2016.7772180.
Full textStanica, Olivian. "E-LEARNING FOR THE DEVELOPMENT NEW SKILLS IN SECURITY OF INFORMATION FIELD : E-CYBER SECURITY COMPETENCE." In eLSE 2014. Editura Universitatii Nationale de Aparare "Carol I", 2014. http://dx.doi.org/10.12753/2066-026x-14-129.
Full text