Planned maintenance
A system upgrade is planned for 24/9-2024, at 12:00-14:00. During this time DiVA will be unavailable.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy-Invasive Software: Exploring Effects and Countermeasures
Responsible organisation
2007 (English)Licentiate thesis, comprehensive summary (Other academic)Alternative title
Illasinnad Programvara : Effekter och Motmedel (Swedish)
Abstract [en]

As computers are increasingly more integrated into our daily lives, we need aiding mechanisms for separating legitimate software from their unwanted counterparts. We use the term Privacy-Invasive Software (PIS) to refer to such illegitimate software, sometimes loosely labelled as spyware. In this thesis, we include an introduction to PIS, and how it differs from both legitimate and traditionally malicious software. We also present empirical measurements indicating the effects that PIS have on infected computers and networks. An important contribution of this work is a classification of PIS in which we target both the level of user consent, as well as the degree of user consequences associated with PIS. These consequences, affecting both users and their computers, form a global problem that deteriorates a vast number of users’ computer experiences today. As a way to hinder, or at least mitigate, this development we argue for more user-oriented countermeasures that focus on informing users about the behaviour and consequences associated with using a particular software. In addition to current reactive countermeasures, we also need preventive tools dealing with the threat of PIS before it enters users’ computers. Collaborative reputation systems present an interesting way forward towards such preventive and user-oriented countermeasures against PIS. Moving the software reputations from old channels (such as computer magazines or friends’ recommendations) into an instantly fast reputation system would be beneficial for the users when distinguishing unwanted software from legitimate. It is important that such a reputation system is designed to address antagonistic intentions from both individual users and groups thereof, so that users could depend on the reputations. This would allow users to reach more informed decisions by taking the reported consequences into account when deciding whether they want a specific software to enter their computer or not.

Place, publisher, year, edition, pages
Ronneby: Blekinge Institute of Technology , 2007. , p. 114
Series
Blekinge Institute of Technology Licentiate Dissertation Series, ISSN 1650-2140 ; 1
Keywords [en]
Information security, privacy, malware, spyware
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-00350Local ID: oai:bth.se:forskinfo35D8186A42FD14C1C125728800344746ISBN: 978-91-7295-100-6 (print)OAI: oai:DiVA.org:bth-00350DiVA, id: diva2:837092
Note
Copyright © 19xx/20xx IEEE. Reprinted from (all relevant publication info). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products or services Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending a blank email message to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.Available from: 2012-09-18 Created: 2007-02-20 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(1014 kB)1521 downloads
File information
File name FULLTEXT01.pdfFile size 1014 kBChecksum SHA-512
b70e9689c5d0fcd6de89809c737b4fbcf74aba1ebdacba5491f7fc96fcddff0d62a442de517e857ed3cbc1fe7cc7696d4875c9d0b30fe5c55a5ecf395f77c9fd
Type fulltextMimetype application/pdf

Authority records

Boldt, Martin

Search in DiVA

By author/editor
Boldt, Martin
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 1521 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 4426 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf