13 research outputs found
Browser Extensions for Post-Secondary Students with Disabilities
Our objective, in two investigations, was: (1) to provide a listing of safe browser extensions for Google Chrome that are likely to be useful for college students with disabilities, and (2) to provide the results of an empirical study of students with and without disabilities about which browser extensions they use, what they use these for, and why they do not use more browses extensions. Our findings indicate that there are many potentially useful browser extensions that could support students with and without disabilities to do academic work. But it appears that these are not used with any great enthusiasm for school work. Indeed, our findings show that the most popular uses of extensions are for shopping, adblocking, and entertainment. We provide a listing of safe extensions that can assist students with disabilities, speculate about why these are not used more extensively, and make recommendations for accessibility service providers and for the browser industry
What Effect Does Spyware Have on Consumer Trust, and Will its Use Ever Be Acceptable?
Trust literature has been thoroughly developed in the field of Information Systems. However, recent innovations in broadband networks and the growing popularity of the Internet has brought rise to software called spyware - a program that employs a user\u27s Internet connection in the background without the user\u27s knowledge or explicit permission. This study attempts to analyze spyware and explore the nature of its effect on consumer trust. Additionally, the research examines what controls, if any may make the use of spyware acceptable to the consumer
Java Applet Awareness Impacting User Web Browsing Behavior
The purpose of this study is to investigate the web browsing behaviors of computer users and how awareness about threats impacts their behaviors. This research focused on how users behave towards web browser alerts which prompt users to install Java Applets. Applets have become common tools for enhancing user experience. However, installing these features overrides security mechanisms inherent in browsers and provides complete access to users’ computing resources. A survey was administered to two separate groups of students from the University of Massachusetts Boston to collect data. The first group took the survey after being given a few details about the study. The same survey was then given to a second set of students after they watched a video. The video educated participants on the dangers of installing Java Applets. Results showed that after watching the video participants had increased Java Applet Security Awareness and Information Security Awareness. This study can inform management on effective training procedures to improve compliance with security
The Legal Status of Spyware
This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs
The Legal Status of Spyware
This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs
Recommended from our members
Observational Studies of the Learning Behaviour of Distance Education Students using an Asynchronous, Remote, Recording and Replay Tool
This thesis gives details of a series of studies that were designed to investigate how distance education students use courseware in their learning and how time, comfort and learning styles, should be taken into account when designing distance education courses. The online behaviour of groups of distance education students, who volunteered to take part, were observed using an asynchronous, remote recording and replay tool (AESOP) as they completed online practical exercises as part of the Open University course M206 Computing: An Object Oriented Approach. Web based questionnaires were used to determine data not obtainable from the recording software, including students’ levels of comfort with computing tasks and learning styles as measured by two well known questionnaires and another developed for the study. The profile of the times at which students study suggests the times at which they study are constrained by their personal circumstances. Time of day was not found to be a factor that affected academic performance or online behaviour. Students’ self expressed levels of comfort with computing tasks were found to be significantly related to academic performance. Significant relationships were also noted between students’ levels of preferences for the Activist and Dependent learning styles and academic
performance. The Theorist, Collaborative and Visual styles were also found to be significantly related to the time students took to complete online practical work. A series of fine grained analyses looking at students' workspace arrangement, use of the notes page and sequence in which they used the course material, all raise further issues pertinent to the research and improvement in computer based instructional materials and distance education