SPYWARE
- PRIVACY VIOLATION |
. | This page
used in the following courses taught by Prof. Richardson
.
|
INTRODUCTION | , | The growth of
Spyware is a direct consequence of the intensity of the global Competitive
Environment and the sophisticated offerings of the Technological
Environment.
Competition among companies means you have to hang on to your customers and this requires knowing more about what the customer does with your product, or service, and how can this knowledge help you sell them more stuff at a good price so they don't leave you for the competition. The technological environment continues to move at a fast pace and means that it is possible for companies to use certain advanced technology to allow them to do things that customers might not think possible, or might not even consider - so the spying , in a way, becomes easy cause the customers don't even understand how they could be spied on. WTGR |
INTRODUCTION | , | "Spyware has
quickly evolved from an online nuisance to one of the most dire threats
facing the Internet. As users struggle to maintain control over their computers,
many find themselves trapped in a cyclical battle against programs that
install themselves without warning, open dangerous security holes and reinstall
themselves after they've been deleted. The worst of these programs allow
online criminals to hijack users' sensitive personal information at will.
Even the most benign variants can slow computers to a crawl by wasting
their processing power to provide unwanted "services." Compounding the
problem are the sophisticated ploys spyware developers use to install their
programs on unsuspecting users' computers. Spyware distributors often rely
on security holes, clever cons, opaque "bundling" arrangements and other
unsavory practices to spread their unwanted payload."
from www.antispywarecoalition.org/documents/definitions.htm
|
Spyware | , |
"Spyware needs global cure" Guzman reported on a workshop sponsored by the Anti-Spyware Coalition meeting in Ottawa in May 2006.. |
Anti-Spyware Coalition | , | Anti-Spyware
Coalition
From their site www.antispywarecoalition.org
"The Center for Democracy
and Technology coordinates the Anti-Spyware Coalition. Anti-spyware companies
or public interest groups interested in joining the Coalition should contact
|
DRM
Digital Rights Mgmnt and Spyware |
, | DRM Digital
Rights Management and Spyware
John
explains This article examines the misuse
of Digital Rights Management (DRM) a technology owned by Sony
BMG Music Entertainment that initially
was intended to prevent listeners from making copies of the CDs they purchased.
But what actually occurred is that aside from not allowing purchasers from
copying CDs the software had a hidden purpose that was added on at the
purchaser's expense. When a Sony music CD is played in a computer,
mysterious files that resemble a rootkit is installed in the user?s computer.
The purpose of a rootkit is to hide something else, tricking an operating
system making it unable to detect worms, viruses and other file that a
|
DRM
Digital Rights Mgmnt and Spyware |
, | DRM Digital
Rights Management and Spyware
When Spyware cause "extra" problems John
adds Every computer that hade been
used to play a Sony BMG disc was open to
|
DRM
Digital Rights Mgmnt and Spyware |
Although
Sony tried to settle the matter with
US District Court for southern New York
by providing every individual who owed a disc with XCP with a replacement
disc of $7.50 cash payment, it did not settle the customers' uneasiness
with the fact Sony BMG concealed its presence. They felt Sony trespassed
on fundamental protections - the
WTGR
adds, the scandal that John discusses became
so "famous" that it has its own page on Wikipedia - you can read more here
at
|
|
CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE |
. | |
MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I | |
. |