[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

To read this content please select one of the options below:

User perceptions of software with embedded spyware

Janice C. Sipior (School of Business, Villanova University, Villanova, Pennsylvania, USA)
Burke T. Ward (School of Business, Villanova University, Villanova, Pennsylvania, USA)

Journal of Enterprise Information Management

ISSN: 1741-0398

Article publication date: 1 January 2008

955

Abstract

Purpose

The purpose of this paper is to provide a research model and hypotheses that explores software users' perceptions of privacy, trust, and US legal protection in using application software with embedded spyware.

Design/methodology/approach

An experimental study was undertaken requiring subjects to use an online analytical processing software product. After use, the experimental group was told spyware was embedded in the software. Questionnaire responses for the experimental and control group were compared using independent samples t‐test. Multiple regression was used to determine significant predictors of overall trust in the software vendor.

Findings

Users of software with spyware, versus users of software without spyware, have lower trust perceptions of a software vendor. Further examination of trustworthiness as a multi‐dimensional construct, reveals trustworthiness‐ability and trustworthiness‐integrity are important influences of overall trust of a vendor.

Research limitations/implications

The main limitation of the findings is the use of a convenience sample, limiting the generalizability of the results.

Practical implications

The results may provide guidance to software vendors and government regulatory agencies in addressing the concerns associated with spyware.

Originality/value

Software vendors should rethink the practice of embedding spyware in software applications, unless user trust can be maintained.

Keywords

Citation

Sipior, J.C. and Ward, B.T. (2008), "User perceptions of software with embedded spyware", Journal of Enterprise Information Management, Vol. 21 No. 1, pp. 13-23. https://doi.org/10.1108/17410390810842228

Publisher

:

Emerald Group Publishing Limited

Copyright © 2008, Emerald Group Publishing Limited

Related articles