@dblp

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.

, and . Inf. Syst. Frontiers, 10 (1): 3-18 (2008)

Links and resources

Tags