13 research outputs found

    Browser Extensions for Post-Secondary Students with Disabilities

    Get PDF
    Our objective, in two investigations, was: (1) to provide a listing of safe browser extensions for Google Chrome that are likely to be useful for college students with disabilities, and (2) to provide the results of an empirical study of students with and without disabilities about which browser extensions they use, what they use these for, and why they do not use more browses extensions. Our findings indicate that there are many potentially useful browser extensions that could support students with and without disabilities to do academic work. But it appears that these are not used with any great enthusiasm for school work. Indeed, our findings show that the most popular uses of extensions are for shopping, adblocking, and entertainment. We provide a listing of safe extensions that can assist students with disabilities, speculate about why these are not used more extensively, and make recommendations for accessibility service providers and for the browser industry

    What Effect Does Spyware Have on Consumer Trust, and Will its Use Ever Be Acceptable?

    Get PDF
    Trust literature has been thoroughly developed in the field of Information Systems. However, recent innovations in broadband networks and the growing popularity of the Internet has brought rise to software called spyware - a program that employs a user\u27s Internet connection in the background without the user\u27s knowledge or explicit permission. This study attempts to analyze spyware and explore the nature of its effect on consumer trust. Additionally, the research examines what controls, if any may make the use of spyware acceptable to the consumer

    A BIOLOGICAL VIEW ON INFORMATION ECOSYSTEMS

    Full text link

    Java Applet Awareness Impacting User Web Browsing Behavior

    Get PDF
    The purpose of this study is to investigate the web browsing behaviors of computer users and how awareness about threats impacts their behaviors. This research focused on how users behave towards web browser alerts which prompt users to install Java Applets. Applets have become common tools for enhancing user experience. However, installing these features overrides security mechanisms inherent in browsers and provides complete access to users’ computing resources. A survey was administered to two separate groups of students from the University of Massachusetts Boston to collect data. The first group took the survey after being given a few details about the study. The same survey was then given to a second set of students after they watched a video. The video educated participants on the dangers of installing Java Applets. Results showed that after watching the video participants had increased Java Applet Security Awareness and Information Security Awareness. This study can inform management on effective training procedures to improve compliance with security

    The Legal Status of Spyware

    Get PDF
    This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs

    The Legal Status of Spyware

    Get PDF
    This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs
    corecore