Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.
Janice C. SipiorBurke T. WardPublished in: Inf. Syst. Frontiers (2008)
Keyphrases
- data protection
- privacy protection
- legal issues
- individual privacy
- privacy concerns
- software development
- open systems
- intellectual property
- trust model
- access control
- security risks
- personal information
- information security
- electronic transactions
- intellectual property rights
- software systems
- trust relationships
- personal data
- protection mechanisms
- privacy preserving
- privacy aware
- trust evaluation
- policy enforcement
- privacy preservation
- sensitive information
- software components
- computer systems
- social network sites
- application programs
- privacy policies
- software architecture