The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.07 - July (2002 vol.35)
pp: 15-18
ABSTRACT
<p>Technology frequently turns out to be a double-edgeds word. For example, as technology has increased connectivity and network accessibility,concerns about privacy and security have grown. And as this concern has increased, invasive technologies--such as those that let third parties plant software on a PC and monitor users? activities from across a LAN or the Internet are becoming more sophisticated.</p><p>At one end of the spectrum, new customer relationship tools track activity with user consent. At the other end, organizations have developed sophisticated spyware that third parties can place on systems without permission, log user keystrokes, and track online movements. Invasive software can even collect sensitive information that users enter into online forms, includingSocial Security numbers, credit card numbers, and passwords.</p>
CITATION
George Lawton, "Invasive Software: Who's Inside Your Computer?", Computer, vol.35, no. 7, pp. 15-18, July 2002, doi:10.1109/MC.2002.1016895
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool