Perceptions of computer viruses: a cross-cultural assessment
Computers and Security
Cyberattacks: a lab-based introduction to computer security
Proceedings of the 7th conference on Information technology education
E-commerce security threats: awareness, trust and practice
International Journal of Information Systems and Change Management
The near real time statistical asset priority driven (nrtsapd) risk assessment methodology
SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education
Asset priority risk assessment using hidden markov models
Proceedings of the 10th ACM conference on SIG-information technology education
Hi-index | 0.00 |
With the increased dependence on networks and the near ubiquitous availability of the Internet, there is a new paradigm in place for the proliferation of spyware, viruses, and other malware. In fact, much attention has been given to spyware in popular literature with reports from multiple sources indicating that spyware has perhaps reached 90% home user PCs [2].