Preview

asdf

Powerful Essays
Open Document
Open Document
7943 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
asdf
Spam (electronic)
From Wikipedia, the free encyclopedia
This article is about unsolicited electronic messages. For the food, see Spam. For other uses, see Spam (disambiguation).

An email box folder littered with spam messages
Spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, (phone) call spam, Internet forum spam, junk fax transmissions, social networking spam, social spam, television advertising and file sharing spam. It is named for Spam, a luncheon meat, by way of a Monty Python sketch in which Spam is included in almost every dish.
Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.[1]
A person who creates electronic spam is called a spammer.[2]
Contents [hide]
1 In different media
1.1 Email
1.2 Instant messaging
1.3 Newsgroup and forum
1.4 Mobile phone
1.5 Social networking spam
1.6 Social spam
1.7 Online game messaging
1.8 Spam targeting search engines (spamdexing)
1.9 Blog, wiki, and guestbook
1.10 Spam targeting video sharing sites
1.11 SPIT
1.12 Academic Search
2 Noncommercial forms
3



References: Jump up ^ Saul Hansell Social network launches worldwide spam campaign New York Times, September 13, 2007 Jump up ^ "Marketers need to build trust as spam hits social networks", Grace Bello, Direct Marketing News, June 1, 2012 Jump up ^ The Origins of Spam in Star Trek chat rooms Jump up ^ Spamming? (rec.games.mud) - Google Groups USENET archive, 1990-09-26 ^ Jump up to: a b At 30, Spam Going Nowhere Soon - Interviews with Gary Thuerk and Joel Furr Jump up ^ Darren Waters (31 march 2008) Jump up ^ Zeller, Tom (1 June 2003). "Ideas & Trends; Spamology". The New York Times. ^ Jump up to: a b c Tom Abate (May 3, 2008). "A very unhappy birthday to spam, age 30". San Francisco Chronicle. Jump up ^ Danchev, Dancho. "Spammers go multilingual, use automatic translation services." ZDNet. July 28, 2009. Retrieved on August 31, 2009. Jump up ^ Hormel Foods Corpn v Antilles Landscape Investments NV (2005) EWHC 13 (Ch)[dead link] Jump up ^ "Hormel Foods Corporation v Jump up ^ Shuman Ghosemajumder (18 March 2008). "Using data to help prevent fraud". Google Blog. Retrieved 12 August 2011. Jump up ^ U.S. v Jason Smathers and Sean Dunaway, amended complaint, US District Court for the Southern District of New York (2003). Retrieved 7 March 2007, from "?". thesmokinggun.com. Jump up ^ Ex-AOL employee pleads guilty in spam case. (2005, February 4). CNN. Retrieved 7 March 2007, from "Ex-AOL employee pleads guilty in spam case". CNN.com. February 5, 2005. Retrieved 27 August 2010. Jump up ^ Braver v. Newport Internet Marketing Corporation et al. -U.S. District Court - Western District of Oklahoma (Oklahoma City), 2005-02-22 Jump up ^ "Two Men Sentenced for Running International Pornographic Spamming Business" Jump up ^ Gaudin, Sharon, Two Men Convicted Of Spamming Pornography InformationWeek, June 26, 2007 Jump up ^ "Crist Announces First Case Under Florida Anti-Spam Law" Jump up ^ "Court Orders Australia-based Leader of International Spam Network to Pay $15.15 Million". Ftc.gov. 2011-06-24. Retrieved 2013-09-03. Jump up ^ "Закон За Електронната Търговия". Lex.bg. 2011-08-14. Retrieved 2013-09-03. Sources[edit] Specter, Michael (2007-08-06) Dunne, Robert "Computers and the law: an introduction to basic legal principles and their application in cyberspace" Cambridge University Press, 2009. ISBN 978-0-521886-50-5 External links[edit]

You May Also Find These Documents Helpful

  • Good Essays

    Rudolph A. Hardman, Frances N. Hardman and Hardman, Inc. Appellants, v. United States of America, Appellee, 827 F.2d 1409 (9th Cir. 1987)…

    • 720 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Brief

    • 797 Words
    • 4 Pages

    Title of Case: Stoneridge Investment Partners, LLC, Petitioner v. Scientific-Atlanta, Inc., et al. 128 S. Ct. 761 (2008)…

    • 797 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Second threat is Spam. Spam is expected to increase to 80 to 90 percent of total email. Moreover, the boundary between spam and viruses is blurring. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information.…

    • 546 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SOC 315 Week 5 DQs

    • 353 Words
    • 2 Pages

    Search the Internet to find at least one news item about this lawsuit, preferably from a news source in the state in which the incident occurred.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Buffets v. Klinke

    • 3142 Words
    • 10 Pages

    BUFFETS, INC., a Minnesota corporation; and EVERGREEN BUFFETS, INC., an Oregon corporation, Plaintiffs-Appellants, v. PAUL KLINKE; CAROL KLINKE; GREG KLINKE; GRANNY'S BUFFET, INC., a Washington corporation; and MARK MILLER, Defendants-Appellees.…

    • 3142 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Search the Internet to find at least one news item about this lawsuit, preferably from a news source in the state in which the incident occurred.…

    • 522 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Search the Internet to find at least one news item about this lawsuit, preferably from a news source in the state in which the incident occurred.…

    • 944 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Email Bomb Attacks

    • 102 Words
    • 1 Page

    One variation on the mail bomb automatically subscribes a targeted user to hundreds or thousands of high volume Internet mailing lists, which fill the user’s mailbox and / or mail server. Bombers call this attack list linking. Examples of these mail bomb programs comprises of Unabomber, Extreme Mail, Avalanche, Voodoo, and Kaboom.…

    • 102 Words
    • 1 Page
    Good Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spyware has quickly become the most prevalent threat to a computer system. Not too long ago the biggest threat to a computer system was a virus which is small computer program that copies itself from one computer to the next, with the intent of harming the computer system’s data and performance. The other major threat was spam which is seemingly not as catastrophic as a virus. Spam also known as unsolicited bulk email is when a company or person sends out the same email message to a large group of recipients indiscriminately.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Good Essays

    asdf

    • 4824 Words
    • 20 Pages

    Due to the unprecedented volatility seen in the markets over the past several months, considering hedging by purchasing put options on the market index…

    • 4824 Words
    • 20 Pages
    Good Essays
  • Powerful Essays

    Social Media Technology

    • 3427 Words
    • 14 Pages

    Mangold, W. G., & Faulds, D. J. (2009). Social Media: The New Hybrid Element of the Promotion Mix. Business Horizons, Issue 52 , 357—365.…

    • 3427 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Google Wi-Spy

    • 3366 Words
    • 14 Pages

    Joffe v. Google Inc. 11-17483 (United States Court of Appeals for Ninth Circuit , February 8, 2012).…

    • 3366 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Glossary of New Media Terms

    • 4397 Words
    • 18 Pages

    · CAN-SPAM Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003- governs what/how email can be broadcast to consumers…

    • 4397 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    We've all been here. We open up our email and to our horror we see twenty unanswered emails, all from companies we've never done business with interspersed between these useless emails might actually be a few important emails. For many of us, spam has changed our excitement of opening our emails each morning into a…

    • 214 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    14th Amendment

    • 9110 Words
    • 37 Pages

    Andrus v. Allard, 444 U.S. 51 (1979)…………………………………………………………………… 18 Armstrong v. Manzo, 380 U.S. 545,(1965)…………………………………………………. 7, 8…

    • 9110 Words
    • 37 Pages
    Powerful Essays