New Page 1

LA GRAMMATICA DI ENGLISH GRATIS IN VERSIONE MOBILE   INFORMATIVA PRIVACY

  NUOVA SEZIONE ELINGUE

 

Selettore risorse   

   

 

                                         IL Metodo  |  Grammatica  |  RISPOSTE GRAMMATICALI  |  Multiblog  |  INSEGNARE AGLI ADULTI  |  INSEGNARE AI BAMBINI  |  AudioBooks  |  RISORSE SFiziosE  |  Articoli  |  Tips  | testi pAralleli  |  VIDEO SOTTOTITOLATI
                                                                                         ESERCIZI :   Serie 1 - 2 - 3  - 4 - 5  SERVIZI:   Pronunciatore di inglese - Dizionario - Convertitore IPA/UK - IPA/US - Convertitore di valute in lire ed euro                                              

 

 

WIKIBOOKS
DISPONIBILI
?????????

ART
- Great Painters
BUSINESS&LAW
- Accounting
- Fundamentals of Law
- Marketing
- Shorthand
CARS
- Concept Cars
GAMES&SPORT
- Videogames
- The World of Sports

COMPUTER TECHNOLOGY
- Blogs
- Free Software
- Google
- My Computer

- PHP Language and Applications
- Wikipedia
- Windows Vista

EDUCATION
- Education
LITERATURE
- Masterpieces of English Literature
LINGUISTICS
- American English

- English Dictionaries
- The English Language

MEDICINE
- Medical Emergencies
- The Theory of Memory
MUSIC&DANCE
- The Beatles
- Dances
- Microphones
- Musical Notation
- Music Instruments
SCIENCE
- Batteries
- Nanotechnology
LIFESTYLE
- Cosmetics
- Diets
- Vegetarianism and Veganism
TRADITIONS
- Christmas Traditions
NATURE
- Animals

- Fruits And Vegetables



ARTICLES IN THE BOOK

  1. ACNielsen
  2. Advertising
  3. Affiliate marketing
  4. Ambush marketing
  5. Barriers to entry
  6. Barter
  7. Billboard
  8. Brainstorming
  9. Brand
  10. Brand blunder
  11. Brand equity
  12. Brand management
  13. Break even analysis
  14. Break even point
  15. Business model
  16. Business plan
  17. Business-to-business
  18. Buyer leverage
  19. Buying
  20. Buying center
  21. Buy one, get one free
  22. Call centre
  23. Cannibalization
  24. Capitalism
  25. Case studies
  26. Celebrity branding
  27. Chain letter
  28. Co-marketing
  29. Commodity
  30. Consumer
  31. Convenience store
  32. Co-promotion
  33. Corporate branding
  34. Corporate identity
  35. Corporate image
  36. Corporate Visual Identity Management
  37. Customer
  38. Customer satisfaction
  39. Customer service
  40. Database marketing
  41. Data mining
  42. Data warehouse
  43. Defensive marketing warfare strategies
  44. Demographics
  45. Department store
  46. Design
  47. Designer label
  48. Diffusion of innovations
  49. Direct marketing
  50. Distribution
  51. Diversification
  52. Dominance strategies
  53. Duopoly
  54. Economics
  55. Economies of scale
  56. Efficient markets hypothesis
  57. Entrepreneur
  58. Family branding
  59. Financial market
  60. Five and dime
  61. Focus group
  62. Focus strategy
  63. Free markets
  64. Free price system
  65. Global economy
  66. Good
  67. Haggling
  68. Halo effect
  69. Imperfect competition
  70. Internet marketing
  71. Logo
  72. Mail order
  73. Management
  74. Market
  75. Market economy
  76. Market form
  77. Marketing
  78. Marketing management
  79. Marketing mix
  80. Marketing orientation
  81. Marketing plan
  82. Marketing research
  83. Marketing strategy
  84. Marketplace
  85. Market research
  86. Market segment
  87. Market share
  88. Market system
  89. Market trends
  90. Mass customization
  91. Mass production
  92. Matrix scheme
  93. Media event
  94. Mind share
  95. Monopolistic competition
  96. Monopoly
  97. Monopsony
  98. Multi-level marketing
  99. Natural monopoly
  100. News conference
  101. Nielsen Ratings
  102. Oligopoly
  103. Oligopsony
  104. Online marketing
  105. Opinion poll
  106. Participant observation
  107. Perfect competition
  108. Personalized marketing
  109. Photo opportunity
  110. Planning
  111. Positioning
  112. Press kit
  113. Price points
  114. Pricing
  115. Problem solving
  116. Product
  117. Product differentiation
  118. Product lifecycle
  119. Product Lifecycle Management
  120. Product line
  121. Product management
  122. Product marketing
  123. Product placement
  124. Profit
  125. Promotion
  126. Prototyping
  127. Psychographic
  128. Publicity
  129. Public relations
  130. Pyramid scheme
  131. Qualitative marketing research
  132. Qualitative research
  133. Quantitative marketing research
  134. Questionnaire construction
  135. Real-time pricing
  136. Relationship marketing
  137. Retail
  138. Retail chain
  139. Retail therapy
  140. Risk
  141. Sales
  142. Sales promotion
  143. Service
  144. Services marketing
  145. Slogan
  146. Spam
  147. Strategic management
  148. Street market
  149. Supply and demand
  150. Supply chain
  151. Supply Chain Management
  152. Sustainable competitive advantage
  153. Tagline
  154. Target market
  155. Team building
  156. Telemarketing
  157. Testimonials
  158. Time to market
  159. Trade advertisement
  160. Trademark
  161. Unique selling proposition
  162. Value added


 

 
CONDIZIONI DI USO DI QUESTO SITO
L'utente può utilizzare il nostro sito solo se comprende e accetta quanto segue:

  • Le risorse linguistiche gratuite presentate in questo sito si possono utilizzare esclusivamente per uso personale e non commerciale con tassativa esclusione di ogni condivisione comunque effettuata. Tutti i diritti sono riservati. La riproduzione anche parziale è vietata senza autorizzazione scritta.
  • Il nome del sito EnglishGratis è esclusivamente un marchio e un nome di dominio internet che fa riferimento alla disponibilità sul sito di un numero molto elevato di risorse gratuite e non implica dunque alcuna promessa di gratuità relativamente a prodotti e servizi nostri o di terze parti pubblicizzati a mezzo banner e link, o contrassegnati chiaramente come prodotti a pagamento (anche ma non solo con la menzione "Annuncio pubblicitario"), o comunque menzionati nelle pagine del sito ma non disponibili sulle pagine pubbliche, non protette da password, del sito stesso.
  • La pubblicità di terze parti è in questo momento affidata al servizio Google AdSense che sceglie secondo automatismi di carattere algoritmico gli annunci di terze parti che compariranno sul nostro sito e sui quali non abbiamo alcun modo di influire. Non siamo quindi responsabili del contenuto di questi annunci e delle eventuali affermazioni o promesse che in essi vengono fatte!
  • L'utente, inoltre, accetta di tenerci indenni da qualsiasi tipo di responsabilità per l'uso - ed eventuali conseguenze di esso - degli esercizi e delle informazioni linguistiche e grammaticali contenute sul siti. Le risposte grammaticali sono infatti improntate ad un criterio di praticità e pragmaticità più che ad una completezza ed esaustività che finirebbe per frastornare, per l'eccesso di informazione fornita, il nostro utente. La segnalazione di eventuali errori è gradita e darà luogo ad una immediata rettifica.

     

    ENGLISHGRATIS.COM è un sito personale di
    Roberto Casiraghi e Crystal Jones
    email: robertocasiraghi at iol punto it

    Roberto Casiraghi           
    INFORMATIVA SULLA PRIVACY              Crystal Jones


    Siti amici:  Lonweb Daisy Stories English4Life Scuolitalia
    Sito segnalato da INGLESE.IT

 
 



MARKETING
This article is from:
http://en.wikipedia.org/wiki/Spam_%28electronic%29

All text is available under the terms of the GNU Free Documentation License: http://en.wikipedia.org/wiki/Wikipedia:Text_of_the_GNU_Free_Documentation_License 

Spam (electronic)

From Wikipedia, the free encyclopedia

 
A KMail folder of spam messages.
A KMail folder of spam messages.

Spamming is the abuse of electronic messaging systems to send unsolicited, undesired bulk messages. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, and mobile phone messaging spam.

Spamming is economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.

Spamming in different media

Email spam

Main article: E-mail spam

E-mail spam is the most common form of internet spamming. It involves sending unsolicited commercial messages to many recipients. Unlike legitimate commercial e-mail, spam is generally sent without the explicit permission of the recipients, and frequently contains various tricks to bypass e-mail filtering.

Spammers obtain e-mail addresses by a number of means: harvesting addresses from Usenet postings, DNS listings, or Web pages; guessing common names at known domains (known as a dictionary attack); and "e-pending" or searching for e-mail addresses corresponding to specific persons, such as residents in an area. Many spammers utilize programs called web spiders to find e-mail addresses on web pages (see also address munging).

Many e-mail spammers go to great lengths to conceal the origin of their messages. They might do this by spoofing e-mail addresses (similar to Internet protocol spoofing). The spammer will modify the e-mail message so it looks like it is coming from another e-mail address. However, many spammers make it easy for recipients to identify their messages as spam by placing an ad phrase in the From field. Spammers try to circumvent the email filters by intentionally misspelling common spam filter trigger words. For example, "viagra" might become "vaigra", or other symbols may be inserted into the word as in "v/i/a/g./r/a". E-mail service providers have begun to use the misspellings themselves as a filtering test.

The most dedicated spammers—often those making a great deal of money or engaged in illegal activities, such as the pornography, casinos and Nigerian scam businesses—are often one step ahead of the providers. Retail e-mail services are updated constantly with improved spam filters, keeping track of spammers' technological progress by examining e-mails their users report as spam (many providers today have a prominent button to report spam).

So-called "spambots" are a major producer of e-mail spam. The worst spammers create e-mail viruses that render an unprotected PC a "zombie computer"; the zombie will inform a central unit of its existence, and the central unit will command the "zombie" to send a low volume of spam. This allows spammers to send high volumes of e-mail without being caught by their ISPs or being tracked down by antispammers; a low volume of spam is instead sent from many locations simultaneously.

Bill Gates, speaking at the World Economic Forum in Davos in January 2004, predicted that spam would soon be "a thing of the past", and that Microsoft was working on several temporary solutions, as well as on a permanent "magic solution", to spam. [1]

Messaging spam

Main article: Messaging spam

Messaging spam, sometimes termed spim (a portmanteau of spam and IM, short for instant messenger), makes use of instant messaging systems, such as AOL Instant Messenger or ICQ. Many IM systems offer a user directory, including demographic information that allows an advertiser to gather the information, sign on to the system, and send unsolicited messages. To send instant messages to millions of users requires scriptable software and the recipients' IM usernames. Spammers have similarly targeted Internet Relay Chat channels, using IRC bots that join channels and bombard them with advertising.

Messenger service spam has lent itself to spammer use in a particularly circular scheme. In many cases, messenger spammers send messages to vulnerable Windows machines consisting of text like "Annoyed by these messages? Visit this site." The link leads to a Web site where, for a fee, users are told how to disable the Windows messenger service. Though the messenger service is easily disabled for free, the scam works because it creates a perceived need and offers a solution. Often the only "annoying messages" the user receives through Messenger are ads to disable Messenger itself.

Chat spam

Main article: Chat spam

Chat spam can occur in any live chat environment like IRC and in-game multiplayer chat of online games. It consists of repeating the same word or sentence many times to get attention or to interfere with normal operations. It is generally considered very rude and may lead to swift exclusion of the user from the used chat service by the owners or moderators.

The application of the name "Spam" to unwanted communication originates in Chat-room spam. Specifically, it was developed in the chat-rooms of People-Link in the early 1980’s as a technique for getting rid of unwelcome newcomers. When someone would enter a chat-room full of friends who were in mid-conversation, and the newcomer tried to turn the conversation in an unwelcome direction (usually trolling for cybersex), two veteran members of the room would begin typing in the Monty Python “Spam” routine at high speed. They would fill the screen with “Spam Spam Spam eggs Spam Spam and Spam” etc, and make all other communication impossible. The other members of the room would just wait quietly until the newcomer got disgusted and moved on to a different room.

Newsgroup spam and Forum spam

Main article: Newsgroup spam
Main article: Forum spam

Newsgroup spam predates e-mail spam, and targets Usenet newsgroups and it consists of repetitious posting of a message (or substantially similar messages). The Breidbart Index was developed to provide an objective measure of the "spamminess" of a multi-posted or cross-posted message on Usenet. Spamming in an internet forum is when a user posts a message that is off-topic, has little relevance to the subject being discussed, or is a post that fails to contribute to the thread. Lastly, there is also the case where a person posts messages solely for the purpose of increasing his forum ranking.

Online message boards can sometimes be spammed with tens of thousands of meaningless messages in a few hours. The spam need not be restricted to the creation of new meaningless threads, it can involve the 'revival' of obsolete threads dating many weeks or months.

A recent form of forum spam is where a member registers, he/she never posts, but puts spam in his/her profile. (The members website is of porn or any other spam-related site.)

Mobile phone spam

Main article: Mobile phone spam

Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience but also because of the fee that they are charged per text message. The term "SpaSMS" was coined at the adnews website Adland in 2000 to describe spam SMS.

Online game messaging spam

Many online games allow players to contact each other via player-to-player messaging, chatrooms, or public discussion areas. What qualifies as spam varies from game to game, but usually this term applies to all forms of message flooding, violating the terms of service contract for the website.

Spam targeting search engines (Spamdexing)

Main article: Spamdexing

Spamdexing (a portmanteau of spamming and indexing) refers to the practice on the World Wide Web of modifying HTML pages to increase the chances of them being placed high on search engine relevancy lists. It uses unethical means, "black hat SEO techniques." to unfairly increase the rank of sites in search engines. Many modern search engines modified their search algorithms to try to exclude web pages utilizing spamdexing tactics.

Blog, wiki, and guestbook spam

Spam on Wikipedia
Spam on Wikipedia
Main article: Spam in blogs

Blog spam, or "blam" for short is spamming on weblogs. In 2003, this type of spam took advantage of the open nature of comments in the blogging software Movable Type by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer's commercial web site. [2] Similar attacks are often performed against wikis and guestbooks, both of which accept user contributions.

Commercial uses

The most common purpose for spamming is advertising. Goods commonly advertised in spam include pornography, unlicensed computer software, pills such as Viagra, credit card accounts, and fad products. Many of the products advertised are fraudulent in nature, such as quack medications and get-rich-quick schemes. Spam is frequently used to advertise scams, such as diploma mills, advance fee fraud, pyramid schemes, stock pump-and-dump schemes, and phishing.

Comparison with postal "junk" mail

There are a number of differences between spam and postal junk mail:

  • The costs of spam paid by the recipient's mail site, unlike junk postal mail, commonly approach or exceed the sender's costs, in terms of bandwidth, CPU processing time, and storage space. Spammers frequently use free dial-up accounts, so their costs may be minimal. Because of this offloading of costs, many consider spamming to be criminal conversion or theft.
  • Bulk mail is used by businesses that can be held responsible for what they send. Spammers frequently operate on a fly-by-night basis, using the anonymity of the Internet as their cover.
  • Postal junk mailers do not mask unsolicited pornographic material with a legitimate appearance so that it can be delivered to your mailbox. There are rules about the way sexually explicit materials are packaged, whereas spam has no limitations on what is viewable as soon as it is opened.

Noncommercial spam

E-mail and other forms of spamming have been used for purposes other than advertisements. Many early Usenet spams were religious or political. Serdar Argic, for instance, spammed Usenet with historical revisionist screeds. A number of evangelists have spammed Usenet and e-mail media with preaching messages. A growing number of criminals are also using spam to perpetrate various sorts of fraud,[3] and in some cases have used it to lure people to locations where they have been kidnapped, held for ransom, and even murdered. [4]

Hobbit Spam

In early July 2006 there has been an enormous increase in unsolicited messages from a spoofed address with approximately half a dozen random letter subjects, containing nothing but three lines from JRR Tolkien's The Hobbit. This follows fairly closely another similar form dubbed "discordian poetry" that appeared to used a random word generator of the same. The messages had no attempt to sell anything; it was theorised that this was a script kiddie ineptly running a spam suite. This was confirmed when shortly afterward the same format messages began appearing with image files overlaying the text (a common spam technique). It is suspected to be a variation from the same source and image overlays will begin appearing. [5]

Spam as denial of service

Spamming has also been used as a denial of service ("DoS") tactic, particularly on Usenet. By overwhelming the readers of a newsgroup with an inordinate number of nonsense messages, legitimate messages and computing resources can be lost in the deluge. Since these messages are usually forged (that is, sent falsely under regular posters' names) this tactic has come to be known as sporgery (from spam + forgery). This tactic has for instance been used by members of the Church of Scientology against the alt.religion.scientology newsgroup (see Scientology vs. the Internet) and by spammers against news.admin.net-abuse.email, a forum for mail administrators to discuss spam problems. Applied to e-mail, this is termed mailbombing. The Usenet Meow Wars (around 1996) were DoS attacks on various newsgroups aimed at specific posters that disrupted the newsgroups where they were active. The DoS attacks launched by Hipcrime, which continue today, are more crafted as DoS attacks on entire newsgroups. The alt.sex newsgroups were rendered uninhabitable by commercial porn site spammers, partially for advertising purposes and partially to destroy a perceived free competitor. (This spawned the creation of the moderated, unspammable soc.sexuality newsgroups.)

Forged e-mail spam has been used as a tool of harassment. The spammer collects a list of addresses, then sends a spam to them signed with the name of the person he or she wishes to harass. Some recipients, angry they received spam and seeing an obvious "source", will respond angrily or pursue revenge against the apparent spammer, the forgery victim. A widely known victim of this sort of harassment was Joe's CyberPost,[6] which has lent its name to the offense: it is known as a joe job. "Joe jobs" have been used against antispammers: in recent examples, Steve Linford of Spamhaus Project and Timothy Walton, a California attorney, have been targeted. Sometimes victims (such as ROKSO-listed spammers) are subscribed to lists that don't practice verified opt-in, such as magazine subscriptions and e-mail newsletters, a practise known as subscriptionbombing.

Spammers have abused resources set up for the purposes of anonymous speech online, such as anonymous remailers. Many of these resources have been shut down, denying their services to legitimate users.

E-mail worms or viruses may be spammed to set up an initial pool of infected machines, which resend the virus to other machines in a spam-like manner. The infected machines can often be used as remote-controlled zombie computers, for more spamming or DDoS attacks. trojans are spammed to phish for bank account details, or to set up a pool of zombies without using a virus.

In Gaming

Main article: Spam (computer game)

The term "spamming" is used to mean something repetitious and disruptive by players ("spammers") of various video games, most often first-person shooters or fighting games. For shooters, it refers to "area denial" tactics—repeatedly firing rockets, grenades, explosive shells into an area—or to any tactic where a large volume of ammunition is expended in the hope of either scoring chance hits, covering teammates's advance with suppressive fire, clearing, or defending an area from an enemy. In fighting games, spamming refers to overuse of particularly powerful moves, especially if they are easy to use.

Whether such tactics are viewed as cheating or abuse varies from game to game, community to community. Analogous to camping, the tactical advantage gained by those engaged is the crux of the issue. If every player defensively "spams", and no one makes the offensive push, there will be no opportunities for players to come into conflict, and there will be no game. Games like Capture the Flag help to break this deadlock by providing incentive to invade enemy territory.

The same term may be used to describe those who flood the in-game chat with frequent messaging, similar to messaging spam mentioned above. Excessive messaging is unwelcome among most games. However, in the role-playing games MUD, MUSH, and MUCK, players happily continue using the word spam in its original sense, with no implication of abuse. When a player returns to the terminal after a brief break to find his or her screen wonderfully filled with pages of random chat, it's still called "spam".

Players of MMORPGs such as World of Warcraft who use a single move repeatedly to gain benefits are often referred to as "spamming" that move. This is seen as a "cheap" maneuver in PvP combat, but it is sometimes used as a viable tactic against powerful boss monsters. In World of Warcraft, specific moves are more likely to be spammed than others, and one of the most common is the Moonfire spell used by Druids. Blizzard referenced this in an April Fool's Day prank; one of the items on the menu of their fictional upcoming chain of restaurants, "Burgercraft" was "Moonfire Spam". [7]

History

Main article: History of spamming

The term spam is derived from the Monty Python SPAM sketch (see video in External Links), set in a cafe where nearly every item on the menu includes SPAM luncheon meat. As the server recites the SPAM-filled menu, a chorus of Viking patrons drowns out all conversations with a song repeating "SPAM, SPAM, SPAM, SPAM... lovely SPAM, wonderful SPAM," hence "SPAMming" the dialogue. The excessive amount of SPAM mentioned in the sketch is a reference to British rationing during World War II. SPAM was one of the few foods that was widely available.

Although the first known instance of unsolicited commercial e-mail] occurred in 1978[8] (unsolicited electronic messaging had already taken place over other media, with the first recorded instance being via telegram on September 13, 1904[citation needed]), the term "spam" for this practice had not yet been applied. In the 1980s the term was adopted to describe certain abusive users who frequented BBSs and MUDs, who would repeat "SPAM" a huge number of times to scroll other users' text off the screen. [9] In early Chat rooms services like PeopleLink and the early days of AOL, they actually flooded the screen with quotes from the Monty Python Spam sketch. This was used as a tactic by insiders of a group that wanted to drive newcomers out of the room so the usual conversation could continue. It was also used to prevent members of rival groups from chatting -- for instance, Star Wars fans often invaded Star Trek chat rooms, filling the space with blocks of text until the Star Trek fans left.[10] This act, previously called flooding or trashing, came to be known as spamming. [11] The term was soon applied to a large amount of text broadcasted by many users.

It later came to be used on Usenet to mean excessive multiple posting—the repeated posting of the same message. The first usage of this sense was by Joel Furr in the aftermath of the ARMM incident of March 31, 1993, in which a piece of experimental software released dozens of recursive messages onto the news.admin.policy newsgroup. This use had also become established—to spam Usenet was flooding newsgroups with junk messages.

Commercial spamming started in force on March 5, 1994, when a pair of lawyers, Laurence Canter and Martha Siegel, began using bulk Usenet posting to advertise immigration law services. The incident was commonly termed the "Green Card spam", after the subject line of the postings. The two went on to widely promote spamming of both Usenet and e-mail as a new means of advertisement—over the objections of Internet users they labeled "anti-commerce radicals." Within a few years, the focus of spamming (and antispam efforts) moved chiefly to e-mail, where it remains today. [12]

There are three popular false etymologies of the word "spam". The first, promulgated by Canter & Siegel themselves, is that "spamming" is what happens when one dumps a can of SPAM luncheon meat into a fan blade. The second is the backronym "shit posing as mail." The third is similar, using "stupid pointless annoying messages."

Hormel Foods Corporation, the makers of SPAM luncheon meat, do not object to the Internet use of the term "spamming." However, they do ask that the capitalized word "SPAM" be reserved to refer to their product and trademark.[13] By and large, this request is obeyed in forums which discuss spam—to the extent that to write "SPAM" for "spam" brands the writer as a n00b. In Hormel Foods v SpamArrest, Hormel attempted to assert its trademark rights against SpamArrest, a software company, from using the mark "spam," since Hormel owns the trademark. In a dilution claim, Hormel argued that Spam Arrest's use of the term "spam" has engendered and damaged "substantial goodwill and good reputation" in connection with its trademarked lunch meat and related products. Hormel also asserts that Spam Arrest's name so closely resembles its luncheon meat that the public might become confused, or might think that Hormel endorses Spam Arrest's products. Hormel did not prevail. Attorney Derek Newman responded on behalf of Spam Arrest: "Spam has become ubiquitous throughout the world to describe unsolicited commercial e-mail. No company can claim trademark rights on a generic term." While Hormel stated on its website: "Ultimately, we are trying to avoid the day when the consuming public asks, 'Why would Hormel Foods name its product after junk email?'"

More recently two failed attempts to revoke the mark "spambuster".[14]

Costs of spam

The California legislature found that spam cost United States organizations alone more than $10 billion in 2004, including lost productivity and the additional equipment, software, and manpower needed to combat the problem.

Spam's direct effects include the consumption of computer and network resources, and the cost in human time and attention of dismissing unwanted messages. In addition, spam has costs stemming from the kinds of spam messages sent, from the ways spammers send them, and from the arms race between spammers and those who try to stop or control spam. In addition, there are the opportunity cost of those who forgo the use of spam-afflicted systems. There are the direct costs, as well as the indirect costs borne by the victims - both those related to the spamming itself, and to other crimes that usually accompany it, such as financial theft, identity theft, data and intellectual property theft, virus and other malware infection, child pornography, fraud, and deceptive marketing.

The methods of spammers are likewise costly. Because spamming contravenes the vast majority of ISPs' acceptable-use policies, most spammers have for many years gone to some trouble to conceal the origins of their spam. E-mail, Usenet, and instant-message spam are often sent through insecure proxy servers belonging to unwilling third parties. Spammers frequently use false names, addresses, phone numbers, and other contact information to set up "disposable" accounts at various Internet service providers. In some cases, they have used falsified or stolen credit card numbers to pay for these accounts. This allows them to quickly move from one account to the next as each one is discovered and shut down by the host ISPs.

The costs of spam also include the collateral costs of the struggle between spammers and the administrators and users of the media threatened by spamming. [15]

Many users are bothered by spam because it impinges upon the amount of time they spend reading their e-mail. Many also find the content of spam frequently offensive, in that pornography is one of the most frequently advertised products. Spammers send their spam largely indiscriminately, so pornographic ads may show up in a work place e-mail inbox—or a child's, the latter of which is illegal in many jurisdictions. Recently, there has been a noticeable increase in spam advertising websites that contain child pornography.

Some spammers argue that most of these costs could potentially be alleviated by having spammers reimburse ISPs and individuals for their material. There are two problems with this logic: first, the rate of reimbursement they could credibly budget is not nearly high enough to pay the direct costs; and second, the human cost (lost mail, lost time, and lost opportunities) is basically unrecoverable.

E-mail spam exemplifies a tragedy of the commons: spammers use resources (both physical and human), without bearing the entire cost of those resources. In fact, spammers commonly do not bear the cost at all. This raises the costs for everyone. In some ways spam is even a potential threat to the entire e-mail system, as operated in the past.

Since e-mail is so cheap to send, a tiny number of spammers can saturate the Internet with junk mail. Although only a tiny percentage of their targets are motivated to purchase their products (or fall victim to their scams), the low cost may provide a sufficient conversion rate to keep the spamming alive. Furthermore, even though spam appears not to be economically viable as a way for a reputable company to do business, it suffices for professional spammers to convince a tiny proportion of gullible advertisers that it is viable for those spammers to stay in business. Finally, new spammers go into business every day, and the low costs allow a single spammer to do a lot of harm before finally realizing that the business is not profitable.

Some companies and groups "rank" spammers; spammers who make the news are sometimes referred to by these rankings.[16][17] The necessary secretiveness of the operations makes uncertainty about how they actually determine "how bad" a spammer is unavoidable. Also, spammers may target different networks to different extents, depending on how successful they are at attacking the target. Thus considerable resources are employed to actually measure the amount of spam generated by a single person or group. For example, victims that use common antispam hardware, software or services provide opportunities for such tracking. Nevertheless, such rankings should be taken with a grain of salt.

General Costs of Spam

In all cases listed above, including both commercial and non-commercial, "spam happens" due to a positive Cost-benefit analysis result.

Cost is the combination of

  • Overhead: The costs and overhead of electronic spamming include bandwidth, developing or acquiring an email/wiki/blog spam tool, taking over or acquiring a host/zombie, etc.
  • Transaction cost: The incremental cost of contacting each additional recipient once a method of spamming is constructed, multiplied by the number of recipients. (see CAPTCHA as a method of increasing transaction costs)
  • Risks: Chance and severity of legal and/or public reactions, including damages and punitive damages
  • Damage: Impact on the community and/or communication channels being spammed (see Newsgroup spam)

Benefit is the total expected profit from spam, which may include any combination of the commercial and non-commercial reasons listed above. It is normally linear, based on the incremental benefit of reaching each additional spam recipient, combined with the conversion rate.

Spam is prevalent on the Internet because the transaction cost of electronic communications is radically less than any alternate form of communication, far outweighing the current potential losses, as seen by the amount of spam currently in existence. Spam continues to spread to new forms of electronic communication as the gain (number of potential recipients) increases to levels where the cost/benefit becomes positive. Spam has most recently evolved to include wikispam and blogspam as the levels of readership increase to levels where the overhead is no longer the dominating factor. According to the above analysis, spam levels will continue to increase until the cost/benefit analysis is balanced [citation needed].

Political issues

Spamming remains a hot discussion topic. In 2004, the seized Porsche of an indicted spammer was advertised on the internet; this revealed the extent of the financial rewards available to those who are willing to commit duplicitous acts online. However, some of the possible means used to stop spamming may lead to other side effects, such as increased government control over the Internet, loss of privacy, barriers to free expression, and even the commercialization of e-mail.

One of the chief values favored by many long-time Internet users and experts, as well as by many members of the public, is the free exchange of ideas. Many have valued the relative anarchy of the Internet, and bridle at the idea of restrictions placed upon it. A common refrain from spam-fighters is that spamming itself abridges the historical freedom of the Internet, by attempting to force users to carry the costs of material which they would not choose.

An ongoing concern expressed by parties such as the Electronic Frontier Foundation and the ACLU has to do with so-called "stealth blocking", a term for ISPs employing aggressive spam blocking without their users' knowledge. These groups' concern is that ISPs or technicians seeking to reduce spam-related costs may select tools which (either through error or design) also block non-spam e-mail from sites seen as "spam-friendly". SPEWS is a common target of these criticisms. Few object to the existence of these tools; it is their use in filtering the mail of users who are not informed of their use which draws fire.

Some see spam-blocking tools as a threat to free expression—and laws against spamming as an untoward precedent for regulation or taxation of e-mail and the Internet at large. Even though it is possible in some jurisdictions to treat some spam as unlawful merely by applying existing laws against trespass and conversion, some laws specifically targeting spam have been proposed. In 2004, United States passed the Can Spam Act of 2003 which provided ISPs with tools to combat spam. This act allowed Yahoo! to successfully sue Eric Head, reportedly one of the biggest spammers in the world, who settled the lawsuit for several thousand U.S. dollars in June 2004. But the law is criticized by many for not being effective enough. Indeed, the law was supported by some spammers and organizations which support spamming, and opposed by many in the antispam community. Examples of effective anti-abuse laws that respect free speech rights include those in the U.S. against unsolicited faxes and phone calls, and those in Australia and a few U.S. states against spam.

In November 2004, Lycos Europe released a screensaver called make LOVE not SPAM which made Distributed Denial of Service attacks on the spammers themselves. It met with a large amount of controversy and the initiative ended in December 2004.

Court cases

Attorney Laurence Canter was disbarred by the Supreme Court of Tennessee in 1997 for sending prodigious amounts of spam advertising his immigration law practice.

Robert Soloway lost a case in a federal court against the operator of a small Oklahoma-based Internet service provider who accused him of spamming. U.S. Judge Ralph G. Thompson granted a motion by plaintiff Robert Braver for a default judgment and permanent injunction against him. The judgment includes a statutory damages award of $10,075,000 under Oklahoma law. [18]

In the first successful case of its kind, Mr. Nigel Roberts from the Channel Islands won £270 against Media Logistics UK who sent junk e-mails to his personal account. [19]


 

References

  1. ^ Gates reveals his 'magic solution' to spam - CNET News, 2004-01-26
  2. ^ The (Evil) Genius of Comment Spammers - Wired Magazine, March 2004
  3. ^ See: Advance fee fraud
  4. ^ SA cops, Interpol probe murder - News24.com, 2004-12-31
  5. ^ Just An Online Minute... Hobbit Spam - MediaPost Publications, 2006-07-13
  6. ^ Spam Attack! - Joe's CyberPost
  7. ^ Blizzard Entertainment Presents Burgercraft - Blizzard.com, 2006-04-01
  8. ^ Reaction to the DEC Spam of 1978
  9. ^ http://www.templetons.com/brad/spamterm.html
  10. ^ The Origins of Spam in Star Trek chatrooms
  11. ^ Spamming? (rec.games.mud) - Google Groups USENET archive, 1990-09-26
  12. ^ Origin of the term "spam" to mean net abuse
  13. ^ SPAM and the Internet - Official SPAM Website
  14. ^ Hormel Foods Corpn v Antilles Landscape Investments NV (2005) EWHC 13 (Ch)
  15. ^ Thank the Spammers - William R. James 2003-03-10
  16. ^ Spamhaus' "TOP 10 spam service ISPs"
  17. ^ The 10 Worst ROKSO Spammers
  18. ^ Braver v. Newport Internet Marketing Corporation et al - U.S. District Court - Western District of Oklahoma (Oklahoma City), 2005-02-22
  19. ^ Businessman wins e-mail spam case - BBC News, 2005-12-27

Newsgroups

  • news.admin.net-abuse.email
  • others in news.admin.net-abuse.* hierarchy
  • alt.spam

See also

  • Nigerian spam
  • Phishing
  • E-mail fraud
  • Make money fast
  • Job Scams
  • Internet Troll
  • List of e-mail spammers
  • Social networking spam
  • Identity theft
  • virus (computer)
  • Spamigation
  • Defensive computing

External links

  • Spam Cop Report Spam
  • Video of Monty Pythons Spam sketch
  • Federal Trade Comission page advising people to forward spam e-mail to them
  • E-mail Address Harvesting: How Spammers Reap What You Sow by the Federal Trade Commission
  • A list of the current top-25 IP addresses used for e-mail spamming, as identified by Project Honey Pot
  • Slamming Spamming Resource on Spam
  • http://www.cdt.org/speech/spam/030319spamreport.shtml Why am I getting all this spam?
Retrieved from "http://en.wikipedia.org/wiki/Spam_%28electronic%29"