Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
206 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
A United States perspective on the ethical and legal issues of spyware. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
trespass, privacy, ethics, law, spyware |
201 | Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo |
A Stateful Approach to Spyware Detection and Removal. |
PRDC |
2006 |
DBLP DOI BibTeX RDF |
|
156 | Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang |
Self-Healing Spyware: Detection, and Remediation. |
IEEE Trans. Reliab. |
2007 |
DBLP DOI BibTeX RDF |
|
156 | Ming-Wei Wu, Sy-Yen Kuo |
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
142 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
141 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
126 | Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
SpyCon: Emulating User Activities to Detect Evasive Spyware. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
125 | Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan |
Stopping spyware at the gate: a user study of privacy, notice and spyware. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
EULA, ToS, end user license agreement, notice, security and usability, terms of service, privacy, spyware |
117 | Joni Mason, Marilee Tuomanen |
TECH spyware raid: the PEA matrix. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
residential, education, spyware, adware |
112 | Hao Wang, Somesh Jha, Vinod Ganapathy |
NetSpy: Automatic Generation of Spyware Signatures for NIDS. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
94 | Janice C. Sipior, Burke T. Ward |
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. |
Inf. Syst. Frontiers |
2008 |
DBLP DOI BibTeX RDF |
Legal protection, Privacy, Trust, Spyware |
87 | Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng |
Stealthy video capturer: a new video-based spyware in 3G smartphones. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
3g smartphones, security, privacy, spyware |
87 | Karen McDowell |
Now that we are all so well-educated about spyware, can we put the bad guys out of business? |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
antispyware, greyware, malware, spyware, bots, adware |
74 | Zhuowei Li 0001, XiaoFeng Wang 0001, Jong Youl Choi |
SpyShield: Preserving Privacy from Spy Add-Ons. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Niklas Lavesson, Paul Davidsson, Martin Boldt, Andreas Jacobsson |
Spyware Prevention by Classifying End User License Agreements. |
New Challenges in Applied Intelligence Technologies |
2008 |
DBLP DOI BibTeX RDF |
EULA spyware classification prevention |
67 | Dinei A. F. Florêncio, Cormac Herley |
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Nathaniel Good, Jens Grossklags, Deirdre K. Mulligan, Joseph A. Konstan |
Noticing notice: a large-scale experiment on the timing of software license agreements. |
CHI |
2007 |
DBLP DOI BibTeX RDF |
end user license agreement, notice, security, privacy, timing, spyware |
65 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
59 | Jeheon Han, Jonghoon Kwon, Heejo Lee |
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
52 | M. N. Doja 0001, Naveen Kumar 0008 |
Image Authentication Schemes against Key-Logger Spyware. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Romain Robbes, Michele Lanza |
SpyWare: a change-aware development toolset. |
ICSE |
2008 |
DBLP DOI BibTeX RDF |
modelling, visualization, program transformation, change |
52 | Richard H. Stern |
FTC cracks down on spyware and PC hijacking, but not true lies. |
IEEE Micro |
2005 |
DBLP DOI BibTeX RDF |
|
50 | John Aycock, Heather Crawford, Rennie deGraaf |
Spamulator: the Internet on a laptop. |
ITiCSE |
2008 |
DBLP DOI BibTeX RDF |
security, simulation, internet, education, spam, spyware |
50 | Mayuresh Ektare, Yanxia Yang |
The Balancing Act Between Computer Security and Convenience. |
HCI (1) |
2007 |
DBLP DOI BibTeX RDF |
convenience, user experience, Computer security, user behavior, Spyware, Viruses |
50 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
50 | |
User Confidence-and the Software Developer. |
IEEE Softw. |
2004 |
DBLP DOI BibTeX RDF |
keylogger, trust, firewall, virus, spyware, adware |
50 | Kevin Borders, Atul Prakash 0001 |
Web tap: detecting covert web traffic. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels |
45 | Dong-Heon Kwak, Donna McAlister Kizzier, Euisung Jung |
Spyware Knowledge in Anti-Spyware Program Adoption: Effects on Risk, Trust, and Intention to Use. |
HICSS |
2011 |
DBLP DOI BibTeX RDF |
|
44 | Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung |
Disassembled code analyzer for malware (DCAM). |
IRI |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Weidong Cui, Randy H. Katz, Wai-tian Tan |
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Peter Clutterbuck |
Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
privacy, controls, risk, spyware |
43 | Raja Khurram Shahzad, Syed Imran Haider, Niklas Lavesson |
Detection of Spyware by Mining Executable Files. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Spyware Detection, Data Mining, Feature Extraction, Malicious Code |
43 | Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin |
Against Spyware Using CAPTCHA in Graphical Password Scheme. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
authentication, CAPTCHA, spyware, graphical password |
37 | Charles D. Curran |
Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Linda Dailey Paulson |
News Briefs. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
semiconductor technology, LED technology, herd computing, wireless technology, spyware |
35 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
35 | Johnathon A. Mohr |
The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking |
35 | Joshua Hartranft, Veronica Longenecker |
SafetyNET -- designing and implementing a technology support program for students. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
Cisco clean access, security, help desk, spyware, viruses, support tools, call tracking, student support |
35 | Richard Ford, Sarah Gordon |
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
business models, worm, virus, spyware, malicious code, adware |
30 | Ting-Fang Yen, Michael K. Reiter |
Traffic Aggregation for Malware Detection. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén |
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
malware prevention, Information security, reputation systems |
30 | Huanyu Zhao, Xiaolin Li 0001 |
S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Martin Boldt, Bengt Carlsson |
Analysing Countermeasures Against Privacy-Invasive Software. |
ICSEA |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Martin Boldt, Bengt Carlsson |
Privacy-Invasive Software and Preventive Mechanisms. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
Foreign Code Detection on the Windows/X86 Platform. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis |
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Enze Liu 0001, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy |
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. |
Proc. Priv. Enhancing Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Muawya Naser, Qasem Abu Al-Haija |
Spyware Identification for Android Systems Using Fine Trees. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Muawya Naser, Hussein Albazar, Hussein Abdel-jaber |
Mobile Spyware Identification and Categorization: A Systematic Review. |
Informatica (Slovenia) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kenneth Ward Church, Raman Chandrasekar |
Emerging trends: Risks 3.0 and proliferation of spyware to 50,000 cell phones. |
Nat. Lang. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Tamara N. AlMasri, Mu'awiya N. AlDalaien |
Detecting Spyware in Android Devices Using Random Forest. |
ACR |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Enting Zhou, Yurong Liu, Hanjia Lyu, Jiebo Luo |
"Ban the Chinese spyware!": A Fine-Grained Analysis of Public Opinion toward Chinese Technology Companies on Reddit. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
23 | Salma Elmalaki 0001, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava |
VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
23 | Majdi K. Qabalin, Muawya Naser, Mouhammd Alkasassbeh 0001 |
Android Spyware Detection Using Machine Learning: A Novel Dataset. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Nowshin Tasnim, Md. Musfique Anwar, Iqbal H. Sarker |
A Stacked Ensemble Spyware Detection Model Using Hyper-Parameter Tuned Tree Based Classifiers. |
MIET (2) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | J. D. Rudie, Zach Katz, Sam Kuhbander, Suman Bhunia |
Technical Analysis of the NSO Group's Pegasus Spyware. |
CSCI |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Thomas Sutter |
Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
23 | Fabio Pierazzi, Ghita Mezzour, Qian Han, Michele Colajanni, V. S. Subrahmanian |
A Data-driven Characterization of Modern Android Spyware. |
ACM Trans. Manag. Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Sergii Lysenko, Kira Bobrovnikova, Peter T. Popov, Viacheslav Kharchenko, Dmytro Medzatyi |
Spyware Detection Technique Based on Reinforcement Learning. |
IntelITSIS |
2020 |
DBLP BibTeX RDF |
|
23 | Haissam Badih, Benjamin Bond, Julian L. Rrushi |
On Second-Order Detection of Webcam Spyware. |
ICICT |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Haissam Badih, Yasamin Alagrash, Julian L. Rrushi |
A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection. |
DASC/PiCom/CBDCom/CyberSciTech |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Rongjunchen Zhang, Xiao Chen 0002, Sheng Wen, Xi Zheng 0001, Yong Ding 0005 |
Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Kenneth Howah, Ritesh Chugh |
Do We Trust the Internet?: Ignorance and Overconfidence in Downloading and Installing Potentially Spyware-Infected Software. |
J. Glob. Inf. Manag. |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
Spyware Detection using Temporal Logic. |
ICISSP |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Salma Elmalaki 0001, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava |
SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT. |
IEEE Symposium on Security and Privacy Workshops |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Aishwarya Afzulpurkar, Mouza Alshemaili, Khalid Samara |
Outgoing Data Filtration for Detecting Spyware on Personal Computers. |
EIDWT |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Danial Javaheri, Mehdi Hosseinzadeh 0001, Amir Masoud Rahmani |
Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Rongjunchen Zhang, Xiao Chen 0002, Jianchao Lu, Sheng Wen, Surya Nepal, Yang Xiang 0001 |
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
23 | Rahul Chatterjee 0001, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart |
The Spyware Used in Intimate Partner Violence. |
IEEE Symposium on Security and Privacy |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Evangelos Mitakidis, Dimitrios Taketzis, Alexandros Fakis, Georgios Kambourakis |
SnoopyBot: An Android spyware to bridge the mixes in Tor. |
SoftCOM |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Suryakanta Panda, Samrat Mondal |
SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack. |
IHCI |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok, Azzam Mourad |
An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability. |
ANT/SEIT |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ifeyinwa Eucharia Achumba, Kennedy Chinedu Okafor, Gloria N. Ezeh, Uchenna Hermes Diala |
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot. |
Int. J. Digit. Crime Forensics |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama |
Android spyware disease and medication. |
InfoSec |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Ritesh Chugh, Kenneth Howah |
Perceived Utility as a Motivational Factor in Affecting Users' Decisions to Download and Install Potentially Spyware-Infected Software. |
AMCIS |
2015 |
DBLP BibTeX RDF |
|
23 | Norazah Mohd Suki, Thurasamy Ramayah, Au Soo Nee, Norbayah Mohd Suki |
Consumer Intention to Use Anti-Spyware Software: An Application of Structural Equation Modeling. |
Int. J. Technol. Hum. Interact. |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Yuan-Shun Dai, Y. P. Xiang, Yi Pan 0001 |
Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing. |
ACM Trans. Auton. Adapt. Syst. |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Taejin Kim, Jeong Hyun Yi, Changho Seo |
Spyware Resistant Smartphone User Authentication Scheme. |
Int. J. Distributed Sens. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Sarang Na, Taekyoung Kwon 0002 |
RIK: A virtual keyboard resilient to spyware in smartphones. |
ICCE |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin |
Against Spyware Using CAPTCHA in Graphical Password Scheme. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
23 | Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, Mavis Rodrigues |
A Timing Channel Spyware for the CSMA/CA Protocol. |
IEEE Trans. Inf. Forensics Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
23 | David A. Werden |
Review of Spyware and Adware by John Aycock. |
SIGACT News |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Mohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi |
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. |
SSCC |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Jun Fu, Huan Yang, Yiwen Liang, Chengyu Tan |
Bait a Trap: Introducing Natural Killer Cells to Artificial Immune System for Spyware Detection. |
ICARIS |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Nary Subramanian |
Spyware. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
Spyware: Ethical and Legal Concerns. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Ken M. Shaurette, Thomas J. Schleppenbach |
Spyware. |
Encyclopedia of Information Assurance |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Niklas Lavesson, Martin Boldt, Paul Davidsson, Andreas Jacobsson |
Learning to detect spyware using end user license agreements. |
Knowl. Inf. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
23 | John Aycock |
Spyware and Adware |
|
2011 |
DOI RDF |
|
23 | Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis |
Evaluation of a Spyware Detection System Using Thin Client Computing. |
ICISC |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Fadel M. Adib, Hazem M. Hajj |
VSpyware: Spyware in VANETs. |
LCN |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Anil Gurung, Xin (Robert) Luo, Qinyu Liao |
Consumer motivations in taking action against spyware: an empirical investigation. |
Inf. Manag. Comput. Secur. |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Haichang Gao, Xiyang Liu |
A new graphical password scheme against spyware by using CAPTCHA. |
SOUPS |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Sergio Castillo-Perez, Joaquín García-Alfaro |
Spyware-Based Menaces Against Web Applications. |
INCoS |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Janice C. Sipior, Burke T. Ward |
User perceptions of software with embedded spyware. |
J. Enterp. Inf. Manag. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Younghwa Lee, Kenneth A. Kozar |
An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. |
Inf. Manag. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Saroiu, Alec Wolman |
SpySaver: using incentives to address spyware. |
NetEcon |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Thomas F. Stafford |
Spyware. |
Encyclopedia of Information Ethics and Security |
2007 |
DBLP BibTeX RDF |
|
23 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
The Ethical and Legal Concerns of Spyware. |
Information Security Management Handbook, 6th ed. |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Xin (Robert) Luo, Anil Gurung |
Understanding Consumer Motivation for Taking Action against Spyware. |
AMCIS |
2007 |
DBLP BibTeX RDF |
|