{"title":"侵犯隐私的软件和预防机制","authors":"Martin Boldt, B. Carlsson","doi":"10.1109/ICSNC.2006.62","DOIUrl":null,"url":null,"abstract":"Computers are increasingly more integrated into peoples¿ daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This lack of spyware definition result in that current countermeasures are bound to noticeable misclassification rates. In this work we present a classification of PIS from which we come to the conclusion that additional mechanisms that safeguard users¿ consent during software installation is needed, to effectively counteract PIS. We further present techniques that counteract PIS by increasing user awareness about software behaviour, which allow users to base their software installation consent on more informed decisions.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"Privacy-Invasive Software and Preventive Mechanisms\",\"authors\":\"Martin Boldt, B. Carlsson\",\"doi\":\"10.1109/ICSNC.2006.62\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computers are increasingly more integrated into peoples¿ daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This lack of spyware definition result in that current countermeasures are bound to noticeable misclassification rates. In this work we present a classification of PIS from which we come to the conclusion that additional mechanisms that safeguard users¿ consent during software installation is needed, to effectively counteract PIS. We further present techniques that counteract PIS by increasing user awareness about software behaviour, which allow users to base their software installation consent on more informed decisions.\",\"PeriodicalId\":217322,\"journal\":{\"name\":\"2006 International Conference on Systems and Networks Communications (ICSNC'06)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Conference on Systems and Networks Communications (ICSNC'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSNC.2006.62\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSNC.2006.62","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy-Invasive Software and Preventive Mechanisms
Computers are increasingly more integrated into peoples¿ daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labelled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End-User License Agreements (EULA). This lack of spyware definition result in that current countermeasures are bound to noticeable misclassification rates. In this work we present a classification of PIS from which we come to the conclusion that additional mechanisms that safeguard users¿ consent during software installation is needed, to effectively counteract PIS. We further present techniques that counteract PIS by increasing user awareness about software behaviour, which allow users to base their software installation consent on more informed decisions.