Sources report that bulk mail from Spam account for half of the email traffic on the Net (Webb, 2004 p.2). Spam is, according to the dictionary at gurunet.com (2003), "Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail"(Spam). Spam has very specific characteristics and today we will become more familiar with those qualities. We will examine Spam as it relates to email and, what recourses are available for Spam.
Spam the term originates from a comedy by the Monty Python's Flying Circus (spambolt.com, 2003, p. 3). The comedy is centered on a restaurant that serves excessive amounts of spam with everything. In one scene, a group of Vikings make up a song about spam and sing it until told to be quiet. Because of this song and how the Vikings annoyed the patrons, spam is thought of as annoying and redundant. How the term was actually incorporated into cyberspace is debatable. The first incident that sparked debate about spam was in 1994 two lawyers named Canter and Siegel had a programmer to write a program posting their advertisement on all the newsgroups (spambolt.com, 2003, p. 3). This advertisement flooded newsgroups and caused system problems worldwide.
To define spamming requires you to look at the two different types of spam. The first is Cancellable Usenet Spam. This spam is a message that is sent to at least 20 Usenet newsgroups. It is generally designed to catch people who view newsgroup postings but rarely post or give their personal address. In addition, this type spamming makes the system administrator of the newsgroup sites ability to control what is being posted: unstable (Mueller, p. 1).
... middle of paper ...
4. Long, L., & Long, N. (2004) Introduction to Computers Information Systems. Upper Saddle River, New Jersey: Prentice Hall, Inc.
5. Spice, B. (2004). Here?s what?s being done to eliminate spam. Retrieved May 18, 2004, from http://www.redding.com
6. Solomon, M. (2002). Spam Wars. Retrieved April 27, 2004, from http://www.computerworld.com
7. The CAN-SPAM Act. (2003) Retrieved April 26, 2004, from http://www.ftc.gov
I. Understanding Spam
A. Define Spam
1. Types of Spam
· Cancelable Usenet
· Email Spam
II. Rulers of the Spam world
· Who are they
· Who they target
· What they want
III. Spam Rage
A. Why Spam is disliked
· Costly to user
· Production time slowed
· Hides behind other internet systems
B. Additional Avenues
· Report fraud
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction Let’s start by defining spam; irrelevant or inappropriate messages sent on the Internet to a large number of recipients. Microsoft defines spam as an unwanted email trying to get information or sell you something . This could be a fake email from your bank saying you need to authorize yourself, or even just a flyer trying to sell you anything from male enhancement to clothing. Next up let’s explain how to prevent spam mail. According to Vitaly Friedman the single biggest and easiest thing is to not say your email anywhere online .... [tags: email, virus, blacklisting]
853 words (2.4 pages)
- The Ethics of Spam Prevention The user base of the Internet and World Wide Web grows by millions of users each year. In recent years this has created an explosion in the number of Internet email accounts and addresses. Companies such as Microsoft, Yahoo and Netscape have made free email accounts available for the world to use. Many people have multiple email accounts on the web, in addition to those that they may have for business purposes. This increase in the number of users around the world surfing the Internet and using email has created a new problem and a very disturbing trend.... [tags: Internet Computers Technology Essays]
2101 words (6 pages)
- Ban on Spam. Since the early days of the Internet with it’s slow connections, to today’s high tech version that plays a major function in everyday business, most advancements have been positive ones. Unfortunately one advancement that has not is Junk E-mail. These junk e-mails, (also known as “Spam”) can be described as useless messages are plaguing our Internet Service Providers (ISP) mail systems. The result of this is slower connections, a loss of time and of money. Therefore, in this work we will explore effects of Spam, (negative and positive) and will even decide if it is possible to make this practice an illegal one, even with the protection of our Constitutional First Amendment righ... [tags: essays research papers]
1021 words (2.9 pages)
- SPAM: The Unethical Email Phenomenon It's what's for breakfast. As I wake from my deep sleep of twelve hours, I step out of bed and go about my daily summer routine. I wash my face and peruse through the fridge for something to eat; its noon, meaning the mail is in. I step out of the house to check the mailbox. I’ve always looked forward to receiving the mail, as most people do until they are old enough to pay the bills. I bring back the mail to the dining table as I commence to eat the leftover SPAM my mom cooked and hope for a magazine or catalog to look at.... [tags: Internet]
2777 words (7.9 pages)
- INTRODUCTION: Spyware is a serious and actual problem, affecting every Internet user who is mostly does not know how much danger these software could impact his life and harm his machine According to the research firm IT-Harvest, spyware profits almost $2 billion a year, accounting for about 11% of the internet ad business (Elgin, 2006; 1). In the USA, spyware has infected nearly 60% of household computers, causing nearly $2.6 billion damages in 2006 (Sun, 2007; 555). The global financial cost of spyware has been estimated about 11 billion Euro in 2005 .... [tags: computer, spam, program]
582 words (1.7 pages)
- Privacy is mentioned in the Bill of Rights, but in which amendment does privacy on the Internet fall. In the website “The Right of Privacy” it says that “The U.S. Constitution contains no express right to privacy” (n. pag.). Freedom of religion is given to us in the First Amendment. The Fourth Amendment protects you from searches and seizures unless the officials possess a warrant. The Fifth Amendment gives us the right to interpret the first eight amendments in ways that can protect the people.... [tags: Internet]
1268 words (3.6 pages)
- Spam: It Isn’t Just E-Mail Anymore Introduction The digital information age has most certainly changed the face of our world. No matter where one looks, the effects of technological evolution can be seen. As recent as ten years ago, merchant companies were accustomed to using mass mailings, ad campaigns, and television commercials as their main form of advertising. Now, with e-commerce flourishing as strongly as ever over the Internet, these same merchants have a more powerful medium to utilize in advertising their products.... [tags: Internet Advertising Essays]
2354 words (6.7 pages)
- Pop-ups and Spam Email Ethical Judgement Introduction: Only two things are certain in this life, death and taxes. I beg to differ. Seems to me we can throw spam and pop-up advertisements in there as well. In recent years, spam and pop-ups have become a way of life. People spend hours of their day weeding through their emails to find which ones are spam and which are the ones they really want to see. And it seems like any webpage you go to nowadays, an animated/flashing pop-up window appears, trying to get you to buy something.... [tags: Internet Ads Advertising Essays]
2733 words (7.8 pages)
- Ban Spam It is a new day at the office, and workers are getting online to check their electronic mail, only to find that it has been over run by unsolicited junk mail. This mail, more commonly referred to as spam has been around since the beginning of the Internet, and according to a recent article, as the Internet has grown, so has spam (”Spam Spam” E.L.) A recent study by Star Internet, based on the typical number of staff spending ten minutes a day checking their mail, indicates that spam costs companies in the U.K.... [tags: essays research papers fc]
2001 words (5.7 pages)
- Viruses A person is very easy to take advantage of, because you’re on the internet and people can hack your computer if you’re not careful and take correct actions. For example, a girl was talking to a guy she was introduced to online by another friend. He sent a link to a program download for free movies and games; little did she know this was in fact a virus that enabled him to control her computer. With this advantage he sent threatening messages to her friends. Basically viruses are extremely bad, because they can delete your files and even destroy your computer.... [tags: Internet Safety, Internet, ]
507 words (1.4 pages)