skip to main content
10.1145/1181216.1181269acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
Article

Now that we are all so well-educated about spyware, can we put the bad guys out of business?

Published: 05 November 2006 Publication History

Abstract

The phenomenon known variously as spyware, adware, or malware has grown exponentially in the past few years and has been swamping our computer systems, much like email spam but significantly worse in every sense of the word.Complicating the matter, the line between viruses and spyware is rapidly blurring, largely because of the increasing sophistication of this spyware and the multiplication of "bots." While it is possible that university students are even more susceptible than the general public, it is certainly true that this is a serious national problem.Learning to identify and remove these insidious files is a critical step in securing computers and networks and in enabling faculty, staff, and students to complete their work safely and efficiently.

Cited By

View all
  • (2022)Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble ClassifierApplied Intelligence10.1007/s10489-022-03244-652:12(13941-13960)Online publication date: 1-Mar-2022
  • (2008)Trust, privacy, and legal protection in the use of software with surreptitiously installed operationsInformation Systems Frontiers10.1007/s10796-007-9035-610:1(3-18)Online publication date: 1-Mar-2008
  • (2007)Protecting Privacy Credentials from Phishing and Spyware Attacks2007 IEEE SMC Information Assurance and Security Workshop10.1109/IAW.2007.381929(167-174)Online publication date: Jun-2007

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGUCCS '06: Proceedings of the 34th annual ACM SIGUCCS fall conference: expanding the boundaries
November 2006
478 pages
ISBN:1595934383
DOI:10.1145/1181216
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 November 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adware
  2. antispyware
  3. bots
  4. greyware
  5. malware
  6. spyware

Qualifiers

  • Article

Conference

SIGUCCS Fall06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 192 of 261 submissions, 74%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble ClassifierApplied Intelligence10.1007/s10489-022-03244-652:12(13941-13960)Online publication date: 1-Mar-2022
  • (2008)Trust, privacy, and legal protection in the use of software with surreptitiously installed operationsInformation Systems Frontiers10.1007/s10796-007-9035-610:1(3-18)Online publication date: 1-Mar-2008
  • (2007)Protecting Privacy Credentials from Phishing and Spyware Attacks2007 IEEE SMC Information Assurance and Security Workshop10.1109/IAW.2007.381929(167-174)Online publication date: Jun-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media