Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations


View Sample PDF
Author(s): Mathias Klang (University of Lund, Sweden & University of Göteborg, Sweden)
Copyright: 2009
Pages: 16
Source title: Handbook of Research on Technoethics
Source Author(s)/Editor(s): Rocci Luppicini (University of Ottawa, Canada) and Rebecca Adell (University of Ottawa, Canada)
DOI: 10.4018/978-1-60566-022-6.ch038


View Spyware on the publisher's website for pricing and purchasing information.


It is well known that technology can be use as to effectively monitor the behavior of crows and individuals and in many cases this knowledge may b the motivation for people to behave differently than if they were not under surveillance. This internalization of surveillance has been widely discussed in privacy literature. Recent software developments have created new threats to the integrity of the individual. Today a form of software, commonly known as spyware, poses an increased threat of covert surveillance. Computer users subjected to spyware are often unaware of the surveillance and therefore continue to behave in a natural manner. This chapter argues that the integrity of the computer user is not protected under law and any rights the user may believe she has are easily circumvented.

Related Content

Ben van Lier. © 2018. 21 pages.
Jose-Luis Perez-Trivino. © 2018. 18 pages.
Gabriel R. Ricci. © 2018. 20 pages.
Tommaso Bertolotti, Selene Arfini, Lorenzo Magnani. © 2018. 14 pages.
Francesco Albert Bosco Cortese. © 2018. 31 pages.
Lambèr Royakkers, Peter Olsthoorn. © 2018. 18 pages.
John Forge. © 2018. 11 pages.
Body Bottom