This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Invasive Software: Who's Inside Your Computer?
July 2002 (vol. 35 no. 7)
pp. 15-18

Technology frequently turns out to be a double-edgeds word. For example, as technology has increased connectivity and network accessibility,concerns about privacy and security have grown. And as this concern has increased, invasive technologies--such as those that let third parties plant software on a PC and monitor users? activities from across a LAN or the Internet are becoming more sophisticated.

At one end of the spectrum, new customer relationship tools track activity with user consent. At the other end, organizations have developed sophisticated spyware that third parties can place on systems without permission, log user keystrokes, and track online movements. Invasive software can even collect sensitive information that users enter into online forms, includingSocial Security numbers, credit card numbers, and passwords.

Citation:
George Lawton, "Invasive Software: Who's Inside Your Computer?," Computer, vol. 35, no. 7, pp. 15-18, July 2002, doi:10.1109/MC.2002.1016895
Usage of this product signifies your acceptance of the Terms of Use.