{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:47:20Z","timestamp":1759092440115},"reference-count":41,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>The threat profile of spyware is increasing rapidly when we consider the pervasiveness of computing in everyday life. The surreptitious nature of spyware can lead to information mining, data theft and exploitation of stolen data. This article aims to explore the relationship between trust in the Internet and neglecting risks in downloading and installing free potentially spyware-infected software. This study found that trust can be viewed as an indirect function of ignorance and overconfidence through the mechanism of the calculated probability of risk. An enhanced model of trust, based on Li and Betts' trust model has been proposed with two additional vectors. The inference drawn from the study is that in most users' minds, the calculated or perceived risk is substantially less than the anticipated benefit of the software. The analysis shows that users trust the Internet when it comes to downloading and installing potentially spyware-infected software, although such nonchalant trust appears to be based on ignorance and over-confidence.<\/jats:p>","DOI":"10.4018\/jgim.2019070105","type":"journal-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T18:48:38Z","timestamp":1555354118000},"page":"87-100","source":"Crossref","is-referenced-by-count":6,"title":["Do We Trust the Internet?"],"prefix":"10.4018","volume":"27","author":[{"given":"Kenneth","family":"Howah","sequence":"first","affiliation":[{"name":"Central Queensland University, Melbourne, Australia"}]},{"given":"Ritesh","family":"Chugh","sequence":"additional","affiliation":[{"name":"Central Queensland University, Melbourne, Australia"}]}],"member":"2432","reference":[{"key":"JGIM.2019070105-0","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.19"},{"key":"JGIM.2019070105-1","first-page":"1","article-title":"More Malware \u2013 Adware, Spyware, Spam and Spim","volume":"11","year":"2006","journal-title":"Australian Institute of Criminology"},{"key":"JGIM.2019070105-2","author":"E.Babbie","year":"1990","journal-title":"Survey Research Methods"},{"key":"JGIM.2019070105-3","unstructured":"Boldt, M. (2007). Privacy-invasive Software [Dissertation thesis]. Blekinge Institute of Technology, Karlskrona, Sweden."},{"key":"JGIM.2019070105-4","author":"R. Y.Cavana","year":"2003","journal-title":"Applied Business Research: Qualitative and Quantitative Methods"},{"key":"JGIM.2019070105-5","article-title":"Online Consumer Behavior: A Review and Agenda for Future Research.","author":"C. M. K.Cheung","year":"2003","journal-title":"Proceedings of the 16th Bled eCommerce Conference"},{"key":"JGIM.2019070105-6","unstructured":"Chien, E. (2005). Techniques of Adware And Spyware. Symantec. Retrieved March 26, 2016, from http:\/\/www.symantec.com\/avcenter\/reference\/techniques.of.adware.and.spyware.pdf"},{"key":"JGIM.2019070105-7","first-page":"391","article-title":"In Defense of Ignorance: On the Significance of a Neglected Form of Incomplete Information.","volume":"27","author":"R. D.Congleton","year":"2001","journal-title":"Eastern Economic Journal"},{"key":"JGIM.2019070105-8","unstructured":"Conklin, W. A. (2006). Computer Security Behaviors of Home PC Users: A Diffusion of Innovation Approach [Doctor of Philosophy thesis]. University of Texas, San Antonio."},{"key":"JGIM.2019070105-9","unstructured":"Dick, J. (2007). What Makes a Cookie a Spyware Cookie? Ezine @rticles. Retrieved March 13, 2016 from http:\/\/ezinearticles.com\/?What-Makes-a-Cookie-a-Spyware-Cookie?&id=716437"},{"key":"JGIM.2019070105-10","article-title":"Internet Privacy, Social Awareness, and Internet Technical Literacy - an Exploratory Investigation.","author":"T.Dinev","year":"2004","journal-title":"Proceedings of the 17th Bled eCommerce Conference"},{"key":"JGIM.2019070105-11","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00038-7"},{"issue":"8","key":"JGIM.2019070105-12","first-page":"3","article-title":"Regulating Spyware: Challenges and Solutions.","volume":"13","author":"D. B.Garrie","year":"2010","journal-title":"Journal of Internet Law"},{"key":"JGIM.2019070105-13","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2014.39"},{"key":"JGIM.2019070105-14","author":"G.Hoglund","year":"2005","journal-title":"Rootkits: Subverting the Windows Kernel"},{"key":"JGIM.2019070105-15","first-page":"1","article-title":"Perceived Utility as a Motivational Factor in Affecting Users\u2019 Decisions to Download and Install Potentially Spyware-Infected Software.","author":"K.Howah","year":"2015","journal-title":"Proceedings of the Twenty-first Americas Conference on Information Systems (AMCIS)"},{"key":"JGIM.2019070105-16","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2010100102"},{"issue":"2","key":"JGIM.2019070105-17","first-page":"1","article-title":"Between Expectation and Behavioral Intent: A Model of Trust. Journal of Organizational Culture","volume":"8","author":"F.Li","year":"2004","journal-title":"Communications and Conflict"},{"issue":"3","key":"JGIM.2019070105-18","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An Integrative Model of Organizational Trust.","volume":"20","author":"R. C.Mayer","year":"1995","journal-title":"Academy of Management Review"},{"key":"JGIM.2019070105-19","unstructured":"McCardle, M. (2003). How Spyware Fits into Defense in Depth. Sans. Retrieved March 1, 2016, from https:\/\/www.sans.org\/reading-room\/whitepapers\/malicious\/spyware-fits-defense-in-depth-905"},{"key":"JGIM.2019070105-20","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.115.2.502"},{"key":"JGIM.2019070105-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.11.006"},{"key":"JGIM.2019070105-22","unstructured":"OnguardOnline. (2014). Malware. Retrieved March 1, 2016, from http:\/\/www.onguardonline.gov\/topics\/spyware.aspx"},{"key":"JGIM.2019070105-23","author":"J.Pallant","year":"2001","journal-title":"SPSS Survival Manual"},{"key":"JGIM.2019070105-24","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-1-4471-6530-9_2","article-title":"A Future for Privacy","author":"J.Phillips","year":"2014","journal-title":"Privacy vs. Security"},{"key":"JGIM.2019070105-25","first-page":"1","article-title":"Agnotology: A Missing Term to Describe the Cultural Production of Ignorance","author":"R.Proctor","year":"2008","journal-title":"Agnotology: The Making and Unmaking of Ignorance"},{"key":"JGIM.2019070105-26","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"JGIM.2019070105-27","doi-asserted-by":"publisher","DOI":"10.1080\/15332860903341307"},{"key":"JGIM.2019070105-28","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2008040106"},{"key":"JGIM.2019070105-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.beproc.2009.12.005"},{"key":"JGIM.2019070105-30","unstructured":"Sophos. (2013). Security Threat Report 2013. Retrieved March 1, 2016, from https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophossecuritythreatreport2013.pdf"},{"key":"JGIM.2019070105-31","unstructured":"Sophos. (2014). Security Threat Report 2014: Smarter, Shadier, Stealthier Malware, 1-34, Retrieved March 1, 2016, from https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/other\/sophos-security-threat-report-2014.pdf"},{"key":"JGIM.2019070105-32","doi-asserted-by":"publisher","DOI":"10.1108\/19355181200900010"},{"issue":"4","key":"JGIM.2019070105-33","first-page":"1","article-title":"Consumer Apathy and the Emerging Revenue Model of the Internet: The Economic Case for Spyware.","volume":"3","author":"T. F.Stafford","year":"2005","journal-title":"Journal of Electronic Commerce in Organizations"},{"key":"JGIM.2019070105-34","first-page":"291","article-title":"Spyware: The Ghost in the Machine.","volume":"14","author":"T. F.Stafford","year":"2004","journal-title":"Communications of the Association for Information"},{"key":"JGIM.2019070105-35","first-page":"25","article-title":"Intrinsic and Extrinsic Motivation in Internet Usage.","volume":"27","author":"T. S. H.Teo","year":"1999","journal-title":"International Journal of Management Sciences"},{"key":"JGIM.2019070105-36","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2011100104"},{"key":"JGIM.2019070105-37","unstructured":"Trochim, W. M. K. (2006). Types of Reliability. Social research methods. Retrieved February 12, 2016, from http:\/\/www.socialresearchmethods.net\/kb\/reltypes.php"},{"key":"JGIM.2019070105-38","unstructured":"Webroot. (2006). State of Spyware Q2 2006. Retrieved February 19, 2016, from http:\/\/www.webroot.com\/pdf\/2006-q2-sos-US.pdf"},{"key":"JGIM.2019070105-39","unstructured":"W\u00fcest, C. (2010). The Risks of Social Networking. Symantec. Retrieved February 19, 2016, from https:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/the_risks_of_social_networking.pdf"},{"key":"JGIM.2019070105-40","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076238"}],"container-title":["Journal of Global Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=227387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T19:32:11Z","timestamp":1694806331000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JGIM.2019070105"}},"subtitle":["Ignorance and Overconfidence in Downloading and Installing Potentially Spyware-Infected Software"],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/jgim.2019070105","relation":{},"ISSN":["1062-7375","1533-7995"],"issn-type":[{"value":"1062-7375","type":"print"},{"value":"1533-7995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}