Abstract
Spam is no random event, but specifically targets those with purchasing power.
- Center for Democracy and Technology. "Why Am I Getting All This Spam? Unsolicited Commercial E-mail Research Six Month Report", Washington, D.C., Mar. 2003; www.cdt.org/speech/spam/030319spamreport.shtml.Google Scholar
- Gates, B. Why I hate spam. Wall Street Journal, (June 23, 2003).Google Scholar
- Gates, B. "Preserving and enhancing the benefits of email---A progress report." Executive E-mail, June 28, 2004; www.microsoft.com/ mscorp/execmail/2004/06-28antispam.asp.Google Scholar
- Infocommunications Development Authority (IDA) of Singapore. Annual Survey on Infocomm Usage in Households and by Individuals for 2002 (Aug. 5, 2003).Google Scholar
- Jamal, K., Michael, M., and Shyam, S. Privacy in e-commerce: Development of reporting standards, disclosure and assurance services in an unregulated market. Journal of Accounting Research 41, 2 (May 2003), 285--309.Google ScholarCross Ref
- Loder, T.C., Van Alstyne, M.W., and Wash, R.L. An economic response to unsolicited communication. Advances in Economic Analysis & Policy 6, 1, Article 2.Google Scholar
- Muris, T.J. The Federal Trade Commission and the future development of U.S. consumer protection policy. Aspen Summit: Cyberspace and the American Dream, The Progress and Freedom Foundation (Aug. 19, 2003).Google Scholar
- Pew Internet & American Life Project. America's online pursuits: The changing picture of who's online and what they do. Washington, D.C. (Dec. 22, 2003).Google Scholar
- U.S. Federal Trade Commission. Email address harvesting: How spammers reap what you sow. FTC Consumer Alert (Nov. 2002).Google Scholar
Index Terms
- Who gets spammed?
Recommendations
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
ANCS '06: Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systemsThe fast spreading worm is becoming one of the most serious threats to today's networked information systems. A fast spreading worm could infect hundreds of thousands of hosts within a few minutes. In order to stop a fast spreading worm, we need the ...
E-Commerce Gets Ready for the Mainstream
During the 1998 Christmas shopping season, US consumers spent an estimated $3 billion over the Internet, exceeding all expectations. All of a sudden there was mass awareness of e-commerce. Businesses that had not caught on to the potential of online ...
A Survey on Intrusion Detection and Prevention Systems
AbstractIn the digital world, malicious activities that violate the confidentiality, integrity, or availability of data and devices are known as intrusions. An intrusion detection system (IDS) analyses the activities of a single system or a network to ...
Comments