Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Invasive software, who's inside your computer

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

Technology frequently turns out to be a double-edged sword. For example, as technology has increased connectivity and network accessibility, concerns about privacy and security have grown. As this concern has increased, invasive technologies-such as those that let third parties plant software on a PC and monitor users' activities from across a LAN or the Internet-are becoming more sophisticated. The paper discusses new invasive software such as Spyware, pop-over ads, e-mail tracking and Magic Lantern software

Published in:

Computer  (Volume:35 ,  Issue: 7 )