Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Canning Spam: Proposed Solutions to Unwanted Email

Published: 01 March 2005 Publication History
  • Get Citation Alerts
  • Abstract

    Unsolicited email is a major problem for anyone who transmits or receives email on a computer, telephone, or personal digital assistant. This article describes the magnitude of the problem, the reasons for proliferation, some interventions available today, and the degree to which each has been effective.

    References

    [1]
    Federal Trade Commission, "Unsolicited Commercial E-Mail," Prepared Statement to the Subcommittee on Telecommunications, Trade and Consumer Protection of the Committee on Commerce, US House of Representatives, 3 Nov. 1999; www.ftc.gov/os/1999/11/spamtestimony991103.htm.
    [2]
    B. Mitchener, "Europe Blames Weak US Laws for Surge in the Region's Spam," The Wall Street J., B1, 3 Feb. 2004.
    [3]
    L.T. Cullen, "Some More Spam, Please," Time, vol. 160, no. 20, 2002, pp. 58–59.
    [4]
    L. Welch, "Lands' End Aiming High; Best Strategy Links Catalog, Internet Sales," The Capital Times, 17 May 2001, p. E6; www.madison.com/archives/read.php?ref=tct:2001:05:17:69009:BUSINESS.
    [5]
    J. Krim, "Lawsuits by AOL Escalates Fight against Junk E-Mail," The Washington Post, 15 Apr. 2003, p. A1.
    [6]
    T. Richardson, "Telewest Email Halted under Massive Spam Attack," The Register, 30 Apr. 2003; www.theregister.co.uk/content/55/30480.html.
    [7]
    B. Goodwin, "BT Powerless to Prevent Remote Hacker Causing E-Mail Spam Havoc," ComputerWeekly.com, 2003; www.computerweekly.com/articles/article.asp?liArticleID=121335&liFlav.
    [8]
    K. Poulsen, "Rise of the Spam Zombies," SecurityFocus.com, 25 Apr. 2003; www.securityfocus.com/news/4217.
    [9]
    "Federal Court Upholds Anonymous Speech on the Internet," Am. Civil Liberties Union, 19 Apr. 2001; www.aclu-wa.org/issues/freespeech/Free.Speech.Upheld.4.23.01.html.
    [10]
    S. Hinde, "Spam: The Evolution of a Nuisance," Computers and Security, vol. 22, no. 6, 2003, pp. 474–478.
    [11]
    D.A. Vise, "AOL Joins Microsoft in a Reply to Spam," The Washington Post, 21 Feb. 2003, p. E1.
    [12]
    S. Ginsberg and R.H. Melton, "Va. Blocks Bulk E-Mailers, Warner Hails New Law to Attack 'Spam Invasion,'" The Washington Post, 30 Apr. 2003, p. B1.
    [13]
    T. Emery, "MIT Conference Takes Aim at Spam E-mails," Associated Press, 17 Jan. 2003.
    [14]
    American Library Association et al. v. United States, Finding of the Ct., US District Ct., Eastern District of Pennsylvania, no. 01-1303, 31 May 2002; www.paed.uscourts.gov/documents/opinions/3jic/02d0414p.pdf.
    [15]
    Multnomah County Public Library et al. v. United States, Opinion of the Ct., US District Ct., Eastern District of Pennsylvania, no. 01-1322, 31 May 2002.
    [16]
    L. Seltzer, "Can MS Take Over the Anti-Spam Market?" eWeek, 18 Nov. 2003; www.eweek.com/article2/0%2C4149%2C1387927%2C00.asp.
    [17]
    D.E. Sorkin, "Technical and Legal Approaches to Unsolicited Electronic Mail," Univ. of San Francisco Law Rev., vol. 35, Winter 2001, pp. 325–384.
    [18]
    Breard v. Alexandria, US Supreme Ct., vol. 341, p. 622, 1950; http://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=case&court=us&vol=341&page=622.
    [19]
    Rowan v. US Post Office, US Supreme Ct., vol. 397, p. 728, 1970; http://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=case&court=us&vol=397&page=728.
    [20]
    Bland v. Fessler, 9th Circuit Ct., Federal Reporter 3rd, vol. 88, p. 729, 1996; http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=9th&navby=case&no=955552.
    [21]
    Destination Ventures v. FCC, 9th Circuit Ct., Federal Reporter 3rd, vol. 46, p. 54, 1995; www.spamlaws.com/cases/destination.html.
    [22]
    J. Krim, "FTC Files Suit against Sender of Porn 'Spam,'" The Washington Post, 18 Apr. 2003, p. B1.
    [23]
    M. Delio, "FTC: Where Spam Goes to Die," Wired News, 5 Nov. 2002; www.wired.com/news/politics/0,1283,55972,00.html.
    [24]
    D. Richman, "The State Goes After Deceptive E-Mailers," Seattle Post-Intelligencer, 12 July 2002; http://seattlepi.nwsource.com/business/78263_spamsuit12.shtml.
    [25]
    J. Glasner, "No Easy Money Suing Spammers," Wired News, 24 Oct. 2002; www.wired.com/news/business/0,1367,55927,00.html.
    [26]
    CompuServe v. Cyber Promotions, Federal Supp., vol. 962, p. 1015, 3 Feb. 1997; http://legal.web.aol.com/decisions/dljunk/compuord.html.
    [27]
    State v. Heckel, Washington 2nd, vol. 143, p. 824, 7 June 2001; http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=wa&vol=2001_sc/69416-8&invol=3.
    [28]
    Ferguson v. Friendfinders, Calif. Appellate 4th, vol. 94, p. 1255, 2001; http://caselaw.lp.findlaw.com/ca/caapp4th/year/2002_1.html.
    [29]
    L. Lessig, Code and Other Laws of Cyberspace, Basic Books, 1999.
    [30]
    M. Bazeley, "New Weapon for Spam: Bounty," San Jose Mercury News, 26 Apr. 2003, p. C1; www.siliconvalley.com/mld/siliconvalley/5725404.htm.
    [31]
    J. Jaffe, "New Plan for Spammers: Charge 'Em," Wired News, 10 Dec. 2002, www.wired.com/news/technology/0,1282,56788,00.html.
    [32]
    S. Fahlman, "Selling Interrupt Rights: A Way to Control Unwanted E-Mail and Telephone Calls," IBM Systems J., vol. 41, no. 2, 2002, pp. 759–756; www.research.ibm.com/journal/sj/414/forum.pdf.
    [33]
    L. Seltzer, "Should Senders Pay For the Mess We Call E-Mail?" eWeek, 18 Sept. 2003; www.eweek.com/article2/0,1759,1272889,00.asp?kc=EWNKT0209KTX1K0100440.

    Cited By

    View all

    Recommendations

    Reviews

    Ned Chapin

    The amount of spam email transmitted, the effectiveness of spam, the costs and benefits of spam, and a discussion of five ways of possibly reducing spam are the main topics covered in this paper. The paper's coverage is mostly confined to literature that was published prior to March 2004. The 33 references are mostly to the trade literature, and to publications dealing with US law. I did not notice anything in this paper that was news; all of the paper's content seemed to revisit well-trodden ground, with select points collected and summarized. The paper notes that, as of early 2004, the majority of spam was in English, originated in the US, and could be classified into various types, such as marketing, phishing, and worms. Spam amounted to as much as 80 percent of email globally at that time, according to the authors. The paper also notes that spam is regarded by its senders as more effective than paper junk mail. Six aspects of spam's costs and benefits are also discussed: the cost burden of spam, the use of spam in cyberwarfare, the shortcomings of spam filters, the use of spam for harassment or fraud, the use of spam in vandalism, and the potential conflict between free speech and spam restrictions. More than half of this paper discusses ways of possibly reducing spam. This paper does not close with a summary or a set of conclusions, but with a suggestion that canning spam is a social problem. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE Security and Privacy
    IEEE Security and Privacy  Volume 3, Issue 2
    March 2005
    72 pages

    Publisher

    IEEE Educational Activities Department

    United States

    Publication History

    Published: 01 March 2005

    Author Tags

    1. CAN-SPAM Act
    2. spam
    3. unsolicited email

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Improving spam email classification accuracy using ensemble techniques: a stacking approachInternational Journal of Information Security10.1007/s10207-023-00756-123:1(505-517)Online publication date: 1-Feb-2024
    • (2009)Email licensingJournal of Network and Computer Applications10.1016/j.jnca.2008.11.00332:3(538-549)Online publication date: 1-May-2009
    • (2007)Overview of security issues of VoIPProceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications10.5555/1698307.1698355(254-259)Online publication date: 14-Mar-2007
    • (2007)Learn to Detect Phishing Scams Using Learning and Ensemble ?MethodsProceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops10.5555/1339264.1339715(311-314)Online publication date: 2-Nov-2007
    • (2007)Overview of security issues of VOIPIASTED European Conference on Proceedings of the IASTED European Conference: internet and multimedia systems and applications10.5555/1295415.1295457(254-259)Online publication date: 14-Mar-2007
    • (2006)Catching spam before it arrivesProceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 5410.5555/1151828.1151851(193-202)Online publication date: 1-Jan-2006
    • (2006)A neural model in anti-spam systemsProceedings of the 16th international conference on Artificial Neural Networks - Volume Part II10.1007/11840930_88(847-855)Online publication date: 10-Sep-2006

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media