Spyware vs. Spyware: Software Conflicts and User Autonomy