Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html

Saved in:
Bibliographic Details
Title: Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html
Authors: Martin Boldt, Bengt Carlsson
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf.
Publication Year: 2006
Collection: CiteSeerX
Description: User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.C72B0D47
Database: BASE
Be the first to leave a comment!
You must be logged in first