Spyware: The Ghost in the Machine

@inproceedings{Stafford2004SpywareTG,
  title={Spyware: The Ghost in the Machine},
  author={Tom Stafford and Andrew Urbaczewski},
  booktitle={AMCIS},
  year={2004}
}
Computer users face a new and growing threat to security and privacy. This threat is not in the form of direct attacks by viruses or hackers, but rather by indirect infiltration in the form of monitoring programs surreptitiously installed on computers. These monitoring applications are called spyware, and serve to record and transmit a user’s computer uses and behaviors to third parties. Frequently used by marketers to harvest customer data for segmentation and targeting purposes, spyware can… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 32 references

What Spies Beneath,

C. Taylor
Time, (160)15, • 2002
View 5 Excerpts
Highly Influenced

How to Stymie the Snoop in Your PC,

S. H. Wildstrom
BusinessWeek, April • 2004
View 12 Excerpts
Highly Influenced

Prepared Statement of Jerry Berman, President, The Center for Democracy and Technology,

J. Berman
U.S. Senate Committee on Commerce, Science and Transportation, http://commerce.senate.gov/pdf/ berman032304.pdf (current July • 2004
View 9 Excerpts
Highly Influenced

Testimony of Mr

A. V. Naider
Avi Z. Naider,” U.S. Senate Committee on Commerce, Science and Transportation, http://commerce.senate.gov/ pdf/naider032304.pdf (current July • 2004
View 8 Excerpts
Highly Influenced

The Testimony of Mr. Robert Holleyman, President and CEO, Business Software Alliance,

R. Holleyman
U.S. Senate Committee on Commerce, Science and Transportation, http://commerce.senate.gov/ hearings/testimony.cfm?id=1125&wit_id=3166 (current July • 2004
View 5 Excerpts
Highly Influenced

Written Comments of Dr

J. R. Levine
John R. Levine,” U.S. Senate Committee on Commerce, • 2004
View 19 Excerpts
Highly Influenced

Is your Desktop being Wiretapped?

R. Farrow
Network Magazine, • 2003
View 8 Excerpts
Highly Influenced

Not All Spyware is as Harmless as Cookies: Block it or Your Business Could Pay Dearly,

E. Doyle
Computer Weekly, November • 2003
View 4 Excerpts
Highly Influenced

Spyware, Adware and Peer-to-Peer Networks: The Hidden Threat to Corporate Security,

K. Townsend
PestPatrol White Paper, http://www.pestpatrol.com/ Whitepapers/CorporateSecurity0403.asp (current July • 2003
View 8 Excerpts
Highly Influenced

Uncovering the Spy Network,

D. Ferrer, M. Mead
Computers in Libraries, • 2003
View 6 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…