Computers are increasingly more integrated into peoples daily lives. In this development, user privacy is affected by the occurrence of privacy-invasive software (PIS), sometimes loosely labeled as spyware. The border between legitimate software and PIS is vague and context dependent, at best specified through End User License Agreements (EULA). This lack of spyware definition result in that current countermeasures are bound to noticeable misclassification rates. In this paper, the
User privacy is widely affected by the occurrence of Privacy-Invasive Software (PIS) on the Internet. They present a computer forensic investigation method for detecting and analyzing PIS. In an experiment they have used this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of
Technology has revolutionized the way one collect, store and process information. With the help of information technology it is possible to accumulate huge data quantities for instant or later use. The fact that information (such as user interests) creates value to advertisers has given rise to a parasitic market, focusing on information theft. Software vendors take advantage of these achievements based on questionable commercial incentives when creating and distributing questionable software.