This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Online Security Threats and Computer User Intentions
January 2010 (vol. 43 no. 1)
pp. 58-64
Thomas F. Stafford, University of Memphis
Robin Poston, University of Memphis
Although computer users are aware of spyware, they typically do not take protective steps against it. A recent study looks into the reasons for this apathy and suggests boosting users' confidence in installing and operating antispyware solutions as an effective remedy.

1. X. Zhang, "What Do Consumers Really Know about Spyware?" Comm. ACM, Aug. 2005, pp. 44-48.
2. T.F. Stafford and A. Urbaczewski, "Spyware: The Ghost in the Machine," Comm. Assoc. for Information Systems, vol. 14, 2004, pp. 291-306.
3. R. Poston, T.F. Stafford, and A. Hennington, "Spyware: A View from the (Online) Street," Comm. ACM, Aug. 2005, pp. 96-99.
4. R.R. Urbach and G.A. Kibel, "Adware/Spyware: An Update Regarding Pending Litigation and Legislation," Intellectual Property &Technology Law J., July 2004, pp. 12-17.
5. B. Smith, "A Storm (Worm) Is Brewing," Computer, Feb. 2008, pp. 20-22.
6. S. Fox, "Spyware," 6 July 2005, Pew Internet and American Life Project; www.pewinternet.org/Reports/2005Spyware.aspx .
7. C.I. Hovland, I.L. Janis, and H.H. Kelly, Communications and Persuasion: Psychological Studies of Opinion Change, Yale Univ. Press, 1953.
8. R.W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change," J. Psychology, vol. 91, 1975, pp. 93-114.
9. J.F. TannerJr., J.B. Hunt, and D.R. Eppright, "The Protection Motivation Model: A Normative Model of Fear Appeals," J. Marketing, July 1991, pp. 36-45.
10. B.J. Fogg, Persuasive Technology: Using Computers to Change What We Think and Do, Morgan Kaufmann, 2002.
11. D.R. Compeau and C.A. Higgins, "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly, June 1995, pp. 189-211.
12. R.M. Baron and D.A. Kenny, "The Mediator-Moderator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations," J. Personality and Social Psychology, Dec. 1986, pp. 1173-1182.
13. N. Good et al., "Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware," Proc. 2005 Symp. Usable Privacy and Security (SOUPS 05), ACM Press, 2005, pp. 43-52.

Index Terms:
Spyware, Internet/Web, Security and privacy
Citation:
Thomas F. Stafford, Robin Poston, "Online Security Threats and Computer User Intentions," Computer, vol. 43, no. 1, pp. 58-64, Jan. 2010, doi:10.1109/MC.2010.18
Usage of this product signifies your acceptance of the Terms of Use.