Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies | IEEE Journals & Magazine | IEEE Xplore