Article,

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.

, and .
Inf. Syst. Frontiers, 10 (1): 3-18 (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews