• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 2
  • 2
  • 1
  • Tagged with
  • 24
  • 19
  • 13
  • 13
  • 12
  • 8
  • 7
  • 7
  • 5
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

VICTIMIZATION IN CYBERSPACE: AN APPLICATION OF ROUTINE ACTIVITY AND LIFESTYLE EXPOSURE THEORIES

YUCEDAL, BEHZAT 16 July 2010 (has links)
No description available.
2

Spyware Rechtliche Würdigung ausgewählter Fragen sowie Empfehlungen an die Praxis unter besonderer Berücksichtigung des Eidgenössischen Datenschutzgesetzes /

Bucher, Manuel. January 2009 (has links) (PDF)
Master-Arbeit Univ. St. Gallen, 2009.
3

Spyware Rechtliche Würdigung ausgewählter Fragen sowie Empfehlungen an die Praxis unter besonderer Berücksichtigung des Eidgenössischen Datenschutzgesetzes /

Bucher, Manuel. January 2009 (has links) (PDF)
Master-Arbeit Univ. St. Gallen, 2009.
4

Demographics of adware and spyware

Arumugam, Kavita. Umphress, David A. January 2007 (has links) (PDF)
Thesis(M.S.)--Auburn University, 2007. / Abstract. Includes bibliographic references (p.45-49).
5

Prevention of Spyware by Runtime Classification of End User License Agreements / Förebyggande Spionprogram med Körtid klassifikation av slutanvändarkonton Licensavtal

Rashid, Muhammad Usman, Garapati, Balakrishna January 2009 (has links)
Spyware is a threat to Internet users because it may obtain valuable information from the users’ machines without their consent. The existing anti- spyware techniques are not found to be accurate enough in the prevention or detection of spyware. According to the law in many countries, vendors are bound to mention any inclusion of spyware in the End User License Agreement (EULA) of the associated software. Moreover, this agreement must be accepted by the user to have the software installed on the user machine. Thus, if the user accepts the agreement without reading it, he or she will unknowingly accept all the regulations mentioned in the EULA. Consequently, this study emphasizes that the EULA can be used to classify the software as spyware or legitimate by using data mining algorithms. We validate our approach by implementing an application and compare it with existing EULA analysis tools. / Spionprogram är ett hot mot Internet-användare, eftersom det kan få värdefull information från användarens maskiner utan deras samtycke. Den befintliga anti - spionprogram tekniker inte visat sig vara korrekta tillräckligt för att förebygga eller upptäcka spionprogram. Enligt lag i många länder, säljare är skyldiga att nämna något införande av spyware i slutanvändarens licensavtal (EULA) för tillhörande programvara. Dessutom är detta avtal måste godkännas av användaren att ha program installeras på användarens dator. Således, om användaren godkänner avtalet utan att läsa den, han eller hon kommer ovetande acceptera alla regler nämns i EULA. Följaktligen har denna studie betonar att licensavtalet kan användas för att klassificera den programvara som spionprogram eller legitima genom att använda data mining algoritmer. Vi validera vår inställning genom genomföra ett program och sedan jämföra det med befintliga EULA analysverktyg. / <p>Muhammad Usman Rashid - 0046738958867 Balakrishna Garapati - 0046762327735</p>
6

The interrelationships among online consumers level of awareness of spy software, personal values, innovativeness characteristics and concerns /

Youn, Hyunsook. McClung, Steven. January 1900 (has links)
Thesis (M.A.)--Florida State University, 2005. / Advisor: Dr. Steven McClung, Florida State University, College of Communication, Dept. of Communication. Title and description from dissertation home page (viewed Sept. 29, 2005). Document formatted into pages; contains ix, 66 pages. Includes bibliographical references.
7

Blocking Privacy-Invasive Software Using a Specialized Reputation System

Larsson, Tobias, Lindén, Niklas January 2007 (has links)
Privacy-invasive software is an increasingly common problem for today&apos;s computer users, one to which there is no absolute cure. Most of the privacy-invasive software are positioned in a legal gray zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This thesis proposes the use of a specialized reputation system to gather and share information regarding software behaviour between community users. A client application helps guide the user at the point of executing software on the local computer, displaying other users&apos; feedback about the expected behaviour of the software. We discuss important aspects to consider when constructing such a system, and propose possible solutions. Based on the observations made, we implemented a client/server based proof-of-concept tool, which helped us discover other issues such as the effect on system stability. We also compare this solution to other, more conventional, protection methods such as anti-virus and anti-spyware software.
8

Localization of Spyware in Windows Environments

Bergstrand, Fredrik, Bergstrand, Johan, Gunnarsson, Håkan January 2004 (has links)
This is a thesis about different methods that can be used to detect spyware. Methods included are Layered Service Provider, Internet Protocol Helper API, TDI filtering and API hooking. Some firewall testing applications, leak tests, that use methods that can be used by real spyware program to penetrate firewalls have also been examined. The goal was to develop a Windows 2000/XP program that is able to detect as many of our examined leak tests as possible. Our program uses the methods TDI filtering and API hooking for detection of spyware because our study showed that these methods were the best. To evaluate the program it was tested against our examined leak test programs. Our program managed to detect all leak tests except one. / Fredrik Bergstrand cfb@home.se Johan Bergstrand jb78@home.se Håkan Gunnarsson hakan.gunnarsson@klostersfalad.se
9

Analys av pop-ups genererade från adware / Analysis of pop-ups generated from adware

Björnsson, Jens January 2003 (has links)
This thesis is about adware, which is very popular today. The adwares are used to, among other things, down- and upload files from other users on the Internet. One thing that most users of such programs are not aware of is that many of the adwares contain spyware. These spywares install themselves simultaneously with the adwares. Two of the spyware features is to generate pop-ups in the web browser and to direct advertisment from the users web habits. In some cases the users can protect themselves against pop-ups by installing additional software. To investigate these problems, five adwares have been exposed to five tests.
10

peer2peer : hur dyrt är gratis?

Folbert, Björn, Persson, Magnus, Svensson, Henrik January 2002 (has links)
Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam... / bjorn@folbert.com, magnus@student.nu, svensson@ny.com

Page generated in 0.035 seconds