skip to main content
article
Free access

Investigating factors affecting the adoption of anti-spyware systems

Published: 01 August 2005 Publication History

Abstract

Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1) creating serious problems such as copying and sending personal information, consuming CPU power, reducing available bandwidth, annoying users with endless pop-ups, and monitoring users' computer usage. As spyware makes the Internet a riskier place and undermines confidence in online activities, Internet users stop purchasing at online stores---a consequence that clearly disrupts e-business.

Supplementary Material

PDF File (p72-lee.jp.pdf)
Requires Asian Language Support in Adobe Reader And Japanese Language Support in your Browser

References

[1]
Ajzen, I. Attitudes, Personality, and Behavior. Open University Press, Milton-Keynes, England, 1988.
[2]
Kawamoto, D. Few corporations use the anti-spyware tools; news.zdnet.com/2100-1009_22-5428817.html
[3]
Moore, G.C. and Benbasat, I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2, 3 (1991), 192--222.

Cited By

View all

Index Terms

  1. Investigating factors affecting the adoption of anti-spyware systems

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Communications of the ACM
        Communications of the ACM  Volume 48, Issue 8
        Spyware
        August 2005
        124 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1076211
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 01 August 2005
        Published in CACM Volume 48, Issue 8

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)232
        • Downloads (Last 6 weeks)59
        Reflects downloads up to 04 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Magazine Site

        View this article on the magazine site (external)

        Magazine Site

        Login options

        Full Access

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media