SlideShare uma empresa Scribd logo
1 de 6
Joseph SantaBarbara
Professor Cook
COM- 201
June 10, 2012

                                                Spam- A Menace to Society

        Throughout our nation's history there have been eras of change. Most recently, our society has seen a huge

increase in technology and its influence in all facets of life. Technology has created a modern world of efficiency and

spectacular sights. However, the influence in technology in cultures around the world has not been all positive. With

wide-spread use of anything, there is always the threat of misconduct. The use of technology has not affected an

industry more than the financial and business world. Companies use technology as a means to increase profitability

and also to increase their 'attractiveness' to new customers. Spam by definition is "simply unsolicited e-mail, sent in

bulk. Intrinsically it presents a free rider problem: e-mail sent in large quantities has a significant cost (both on

recipients and on network administrators), which cannot be charged to a spammer who has sufficient technical skill to

conceal their identity" (Hedley, 2006) (pg. 227).

        Spam is an intrusive concept, birthed by the technology boom, and has been highly disputed and regarded as

an invasion of privacy by most. However, businesses are taking the side that using spam is a way to get their company

names out there. However, there is no room for spam in the business world. Spam is highly regarded as unprofessional

and not a means to get a solid client base. Spam can use information from the web, which is a public forum, to tailor

their e-mails to display personal information of the people from which are receiving their e-mails. "Spam producers

use databases of e-mail addresses collected from public websites, create e-mail lists, or purchase subscriber lists"

(Swartz, 2003)This is viewed as an invasion of privacy by most. There are several laws that have been put in place for

the current time period and also steps in process that are for the future control of spam.

        Spam is considered under different genres across cultures and the keys to success in international business are

the understanding the cultural impact of spam and whether or not it is accepted or not. Spam is not only affecting the

business world, but it is also increasing the chances for users to be susceptible to unwanted and inappropriate material.

Overall, spam is a concept which is not good for society. It costs users and businesses material amounts of money

each year to fix the problem from which is a direct cause from the use of spam. However, there are many regulations

and discussions in place to help mitigate this issue for the future.

        Spam is a concept that can be judged under different lights. For some, spam is a key tactic to the profitability

of their company's business plan through the bulk communication of their advertisement through means of e-mail or
pop-up's. For others, it is an intrusive and expensive concept that infringes on individual's rights. "As spam grew in

bulk and began to become commonplace, it was perceived as a distinct problem, at least by ISP's. Most of the expense

was falling on them: an ISP whose customers were being heavily spammed might find that their servers were

overwhelmed by the need to process the spam; and when the recipients of the spam complained, they looked to their

ISP for a solution to the problem" (Hedley, 2006) (pg 229).Individuals computers run through Internet Service

Providers or 'ISP's ' and ISP's have certain bandwidth that they offer to clients, the more bandwidth the faster the

computer, however the more expensive it is. When individuals receive spam it takes up the bandwidth that the ISP's

provide, which the users pay for, due to the traffic. Spam costs individuals money and the opportunity cost associated

with the work they could have gotten done if their internet service was working properly. Not only does this affect the

user's bank accounts, it also affects the ISP's, who are trying to make money as well. As stated above in the reference

from the scholarly journal, users seek their ISP's for help when spam is slowing down their service. This increases the

amount of man-power it takes to support the volume of calls and it costs money to hire someone to identify the issue

and then come up with a solution. The magnitude of the problem is described as, "spamming causes manifold

problems. It wastes time for users opening spam with misleading subject lines, wastes Internet resources trying to

block it, consumes storage and bandwidth, and costs money fighting it" (Mir, 2010) (pg. 33).

        Again, spam is a systemic problem. There are immense effects from the implementation of spam in

technology. Spam affects business in a major way. As stated above, it cost a material amount of money to combat the

issues of spam and studies have been completed and show that at its peak spam was increasing at an alarming rate.

"MessageLabs, which sorts through 10 million e-mails daily and inspects more than three billion e-mails are says that

an average of one in 12 e-mails was spam in 2002. But by November 2002, one in three e-mails was spam. Because of

that trend, the firm predicts that spam will outpace real e-mail this year" (Rich, 2003) (pg 9). The increase in

technology is only making it easier for spammers to complete their tasks and harder for legislative bodies to prosecute

and define those who are the roots of the issue. "The increase is a result of technology improvements that have made

spammer's jobs easier. Industry experts estimate that about one-third of the more than 73 billion e-mails sent everyday

are unwanted commercial pitches" (Rich, 2003) (pg. 9). Businesses are consumed with spam and it's not only affecting

the profitability of the service providers. "A recent Ferris Research Study found that spam costs U.S. corporations $8.0

billion annually, $2.5 billion for European businesses." (Rich, 2003) (pg 9). That is a huge bottom line factor for
financial statement presentation purposes. This adds a huge expense financial statement line item to a company's profit

and loss statement which can determine whether or not their company is profitable in the eyes of investors.

        Also, with spam as defined as bulk e-mail many users attribute a sense of violation. E-mail addresses are

considered to be personal information to people in many situations in life and when this address is given out to the

wrong people, spam can occur. In many spam e-mails, there is personal information that gives individuals an eerie

feeling especially in a time period where identity theft and online misconduct is at an all time high. "Cyberspace has

been equated with the home of an individual which needs protection from unwanted communication" (Mir, 2010) (pg

43). Not only do individuals get a sense of violation with the implementation of spam into technology, but it also

opens the doors for children to be exposed to graphic images. This is not a good trend for society. The World Wide

Web does increase the chances for people to expose to socially unacceptable content, but the key with spam is that it is

involuntary. Due to the involuntary nature of this exposure, parents of children who spend time on computers and

other technology means, have to spend their earnings on protection such as parental controls.

         One would think that when there is a malignant problem, then there should be a solution, or one in the work

to help mitigate the risk of a material problem. "Just as the volume of spam has increased since 2000, so too had the

number of anti-spam laws around the world" (Schryen, 2007) (pg. 24). This is a must in for the future of the internet,

e-commerce and e-mail itself. Spam or bulk e-mails are desensitizing the use of e-mail to where if this problem

continues without a viable solution, then e-mail users could boycott the use. Legislation that has been put into play to

help mitigate the use of bulk e-mails from large username lists. One can be put on these lists by clicking a link to a

website automatically entering their personal information onto this company's mailing list. However, to help mitigate

this subconscious agreement, there have been parameters set for e-mail lists. Now users have to 'opt-in' or 'opt-out' to

either deny these bulk e-mails or to accept the receipt of them. Opt-in means that one physically clicks a box on a

website or in some other fashion agrees to receive e-mails from the applicable company. Opt-out is a tactic used by

companies that is makes users physically click a box or similar fashion to not receive e-mails. This is a marketing

tactic used by companies in e-commerce. Many people are in such a rush, or have so much bulk e-mail to go through

because of spam, that they do not completely read online contracts or similar sorts. Therefore, one might miss the fact

that at the end of the website, they needed to 'un-check' a box that was already pre-filled out, in order to be

disregarded from the e-mail listing. Marketers for e-commerce businesses find that this tactic is useful because many

people are negligent to completely reading all contracts and material pertinent to the task at hand.
In the early 2000's there was litigation in several instances where individuals tried to seek monetary

compensation for damages caused from spam and unsolicited e-mail. "Laws may make further requirements of e-

mails. The CANSPAM Act 2003, for example, prohibits the use of a harvested e-mail address, requires that

advertisement or solicitations are identified clearly and conspicuously, and requires that each e-mail contains a

functioning return e-mail address or other Internet-bases mechanism that allows the recipient to opt-out of the

commercial e-mail lists" (Schryen, 2007) (pg. 30). The CANSPAM Act of 2003 was the first national standards for

the sending of commercial e-mail and requires the Federal Trade Commission to enforce its provisions. CANSPAM

stands for Controlling the Assault of Non-Solicited Pornography and Marketing Act. When this legislation came out

in 2003, many people were furious because it thought of as a law to allow spam, which it did in some fashion.

However, many people did not research this legislation. There are an immense amount of provisions set in this act to

protect the public and mostly, children. However, there are several issues with this act, "Personal emails and email

updates and advertisements that have been consented to be are not covered under this law. Also not covered are

'transactional or relationship messages,' which are emails that pertain to agreed-upon transactions or emails that update

a customers in an existing business relationship. That is because these types of emails are not technically spam - they

are a result of previous consent or a business relationship." (Spam Laws: The United States CAN-SPAM Act, 2003).

This is a loop-hole in the law. Those who are most affected by spam are the public through personal e-mail.

        The future of e-mail is in question with all of the effects of spam on the community. The only ways to solve

the issues of spam is harsh and drastic measures. "Some proposals would require drastic changes to the e-mail system:

for example, by limiting acceptance to known senders or to those who satisfy challenge/response protocols." (Coffee,

2003) This is a scary thought for the future of e-mail. Responding to protocol in order to send an e-mail may reduce

the affects of bulk, un-solicited e-mail, but it increases the time it takes to send a simple message. This increase in

time to send a simple e-mail will deter individuals from using e-mail all together.

        As technology increases, so will the ability for individuals to commit crimes and negatively affect the public.

Technology is a venue of society that has no bounds and seems endless in its ability to encompass all realms of life.

Technology affects communication in a huge way and has a direct relation with e-mail communication and the misuse

of techniques which cost individuals a material amount of money. Spam affects all facets of life and can influence

those who do not expect it. Marketers and advertisers use different spam tactics to increase their profitability by
getting their name out there. However, due to the distaste in society from which spam has, it is not proper business

etiquette to use spam and is not a profitable business plan. Spam costs businesses and individual's material amounts of

money. It costs money for individuals to protect themselves against the threat of spam and for businesses; it takes

away employee's time from actual work. This delay in the productivity in employees deters profitability. The main

reason for all of the issues faced is due to the fact that laws and regulations did not keep pace with the technology

boom.
Bibliography
Coffee, P. (2003). Future of spam control. EWEEK , 38.

Hedley, S. (2006). A Brief History of Spam. Information & Communication Technology Law , 224-238.

Mir, F. A. (2010). Control of spam: a comparative approach with special reference to India. Information &
Communications Technology Law , 27-59.

Rich, M. (2003). Spam Costs Businesses $13 Billion Annually. The Information Management Journal , 9.

Schryen, G. (2007). Anti-Spam Legislation: An Analysis of Laws and Their Effectiveness. Information &
Communications Technology Law , 18-32.

Spam Laws: The United States CAN-SPAM Act. (2003). Retrieved June 11, 2012, from Spam Laws:
http://www.spamlaws.com/spam-laws.html

Swartz, N. (2003). The International War on Spam. Capital Edge: Legislative & Regulatory Update , 18-24.

Mais conteúdo relacionado

Mais procurados

Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)tylerboone
 
Access to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 StatesAccess to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 StatesUmesh Heendeniya
 
Social media-in-the-workplace
Social media-in-the-workplaceSocial media-in-the-workplace
Social media-in-the-workplaceVirginia Bautista
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Gerard Keenan
 
An empirical study of predispute mandatory arbitration clauses in social medi...
An empirical study of predispute mandatory arbitration clauses in social medi...An empirical study of predispute mandatory arbitration clauses in social medi...
An empirical study of predispute mandatory arbitration clauses in social medi...C C
 
Privately Obscure
Privately ObscurePrivately Obscure
Privately Obscurelisafilipek
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionAruell Tamaray
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerDarren Chaker
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 
Going the Extra Mile_Global Trade Magazine
Going the Extra Mile_Global Trade MagazineGoing the Extra Mile_Global Trade Magazine
Going the Extra Mile_Global Trade MagazineErik Malin
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)Felipe Prado
 
The Case for Outbound Content Management
The Case for Outbound Content ManagementThe Case for Outbound Content Management
The Case for Outbound Content ManagementOsterman Research, Inc.
 

Mais procurados (18)

Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)
 
Access to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 StatesAccess to Electronic Communications of Government Officials in the 50 States
Access to Electronic Communications of Government Officials in the 50 States
 
Social media-in-the-workplace
Social media-in-the-workplaceSocial media-in-the-workplace
Social media-in-the-workplace
 
Internet
InternetInternet
Internet
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
Hci 1 (1)
Hci 1 (1)Hci 1 (1)
Hci 1 (1)
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)
 
An empirical study of predispute mandatory arbitration clauses in social medi...
An empirical study of predispute mandatory arbitration clauses in social medi...An empirical study of predispute mandatory arbitration clauses in social medi...
An empirical study of predispute mandatory arbitration clauses in social medi...
 
Privately Obscure
Privately ObscurePrivately Obscure
Privately Obscure
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-Chaker
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 
Going the Extra Mile_Global Trade Magazine
Going the Extra Mile_Global Trade MagazineGoing the Extra Mile_Global Trade Magazine
Going the Extra Mile_Global Trade Magazine
 
riseandrise
riseandriseriseandrise
riseandrise
 
2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)2600 v01 n07 (july 1984)
2600 v01 n07 (july 1984)
 
The Case for Outbound Content Management
The Case for Outbound Content ManagementThe Case for Outbound Content Management
The Case for Outbound Content Management
 
Orbanosky_Portfolio
Orbanosky_PortfolioOrbanosky_Portfolio
Orbanosky_Portfolio
 

Destaque

Shopzilla On Concurrency
Shopzilla On ConcurrencyShopzilla On Concurrency
Shopzilla On ConcurrencyWill Gage
 
Menea tu chapa v
Menea tu chapa  vMenea tu chapa  v
Menea tu chapa vSamyFaz
 
ShopStyle Insights 2013
ShopStyle Insights 2013ShopStyle Insights 2013
ShopStyle Insights 2013Lee Grant
 
Coke and mentos grade 4 esl2
Coke and mentos grade 4 esl2Coke and mentos grade 4 esl2
Coke and mentos grade 4 esl2MsBenesova
 
Mint mentos and diet coke geyser
Mint mentos and diet coke geyser Mint mentos and diet coke geyser
Mint mentos and diet coke geyser Weldy Relloso
 

Destaque (6)

Why Men Lie
Why Men LieWhy Men Lie
Why Men Lie
 
Shopzilla On Concurrency
Shopzilla On ConcurrencyShopzilla On Concurrency
Shopzilla On Concurrency
 
Menea tu chapa v
Menea tu chapa  vMenea tu chapa  v
Menea tu chapa v
 
ShopStyle Insights 2013
ShopStyle Insights 2013ShopStyle Insights 2013
ShopStyle Insights 2013
 
Coke and mentos grade 4 esl2
Coke and mentos grade 4 esl2Coke and mentos grade 4 esl2
Coke and mentos grade 4 esl2
 
Mint mentos and diet coke geyser
Mint mentos and diet coke geyser Mint mentos and diet coke geyser
Mint mentos and diet coke geyser
 

Semelhante a Spam- A Menace to Society

A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamAlexander Decker
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketinghey4ndr3w
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanElliott Lowe
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET Journal
 
CNS ANTI SPAM TECHNIQUES.pptx
CNS ANTI SPAM TECHNIQUES.pptxCNS ANTI SPAM TECHNIQUES.pptx
CNS ANTI SPAM TECHNIQUES.pptxSanjuSanjay40
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing SolutionIRJET Journal
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 

Semelhante a Spam- A Menace to Society (20)

A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
 
ODMOB Ransomware newsletter final
ODMOB Ransomware newsletter finalODMOB Ransomware newsletter final
ODMOB Ransomware newsletter final
 
spam
spamspam
spam
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketing
 
Anti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from FinjanAnti-Spam Topical White Paper from Finjan
Anti-Spam Topical White Paper from Finjan
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
 
Spam!
Spam!Spam!
Spam!
 
CNS ANTI SPAM TECHNIQUES.pptx
CNS ANTI SPAM TECHNIQUES.pptxCNS ANTI SPAM TECHNIQUES.pptx
CNS ANTI SPAM TECHNIQUES.pptx
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing Solution
 
402 406
402 406402 406
402 406
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
3
33
3
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 

Último

Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...Riya Pathan
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...ritikasharma
 
👙 Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...noor ahmed
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448ont65320
 
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...noor ahmed
 
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...rahim quresi
 
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...ritikasharma
 
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goa
Call Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls GoaCall Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls Goa
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goasexy call girls service in goa
 
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...rahim quresi
 
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl GoaRussian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goasexy call girls service in goa
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...aamir
 
Top Rated Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...Call Girls in Nagpur High Profile
 

Último (20)

Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
 
👙 Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Park Circus 💫💫7001035870 Model escorts Service
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
 
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
 
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
 
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
Book Paid Sonagachi Call Girls Kolkata 𖠋 8250192130 𖠋Low Budget Full Independ...
 
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
 
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Kolkata Call Girls Khardah ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goa
Call Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls GoaCall Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls Goa
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goa
 
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
Science City Kolkata ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sex...
 
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
 
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl GoaRussian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
 
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
 
Top Rated Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Pimpri Chinchwad ⟟ 6297143586 ⟟ Call Me For Genuin...
 

Spam- A Menace to Society

  • 1. Joseph SantaBarbara Professor Cook COM- 201 June 10, 2012 Spam- A Menace to Society Throughout our nation's history there have been eras of change. Most recently, our society has seen a huge increase in technology and its influence in all facets of life. Technology has created a modern world of efficiency and spectacular sights. However, the influence in technology in cultures around the world has not been all positive. With wide-spread use of anything, there is always the threat of misconduct. The use of technology has not affected an industry more than the financial and business world. Companies use technology as a means to increase profitability and also to increase their 'attractiveness' to new customers. Spam by definition is "simply unsolicited e-mail, sent in bulk. Intrinsically it presents a free rider problem: e-mail sent in large quantities has a significant cost (both on recipients and on network administrators), which cannot be charged to a spammer who has sufficient technical skill to conceal their identity" (Hedley, 2006) (pg. 227). Spam is an intrusive concept, birthed by the technology boom, and has been highly disputed and regarded as an invasion of privacy by most. However, businesses are taking the side that using spam is a way to get their company names out there. However, there is no room for spam in the business world. Spam is highly regarded as unprofessional and not a means to get a solid client base. Spam can use information from the web, which is a public forum, to tailor their e-mails to display personal information of the people from which are receiving their e-mails. "Spam producers use databases of e-mail addresses collected from public websites, create e-mail lists, or purchase subscriber lists" (Swartz, 2003)This is viewed as an invasion of privacy by most. There are several laws that have been put in place for the current time period and also steps in process that are for the future control of spam. Spam is considered under different genres across cultures and the keys to success in international business are the understanding the cultural impact of spam and whether or not it is accepted or not. Spam is not only affecting the business world, but it is also increasing the chances for users to be susceptible to unwanted and inappropriate material. Overall, spam is a concept which is not good for society. It costs users and businesses material amounts of money each year to fix the problem from which is a direct cause from the use of spam. However, there are many regulations and discussions in place to help mitigate this issue for the future. Spam is a concept that can be judged under different lights. For some, spam is a key tactic to the profitability of their company's business plan through the bulk communication of their advertisement through means of e-mail or
  • 2. pop-up's. For others, it is an intrusive and expensive concept that infringes on individual's rights. "As spam grew in bulk and began to become commonplace, it was perceived as a distinct problem, at least by ISP's. Most of the expense was falling on them: an ISP whose customers were being heavily spammed might find that their servers were overwhelmed by the need to process the spam; and when the recipients of the spam complained, they looked to their ISP for a solution to the problem" (Hedley, 2006) (pg 229).Individuals computers run through Internet Service Providers or 'ISP's ' and ISP's have certain bandwidth that they offer to clients, the more bandwidth the faster the computer, however the more expensive it is. When individuals receive spam it takes up the bandwidth that the ISP's provide, which the users pay for, due to the traffic. Spam costs individuals money and the opportunity cost associated with the work they could have gotten done if their internet service was working properly. Not only does this affect the user's bank accounts, it also affects the ISP's, who are trying to make money as well. As stated above in the reference from the scholarly journal, users seek their ISP's for help when spam is slowing down their service. This increases the amount of man-power it takes to support the volume of calls and it costs money to hire someone to identify the issue and then come up with a solution. The magnitude of the problem is described as, "spamming causes manifold problems. It wastes time for users opening spam with misleading subject lines, wastes Internet resources trying to block it, consumes storage and bandwidth, and costs money fighting it" (Mir, 2010) (pg. 33). Again, spam is a systemic problem. There are immense effects from the implementation of spam in technology. Spam affects business in a major way. As stated above, it cost a material amount of money to combat the issues of spam and studies have been completed and show that at its peak spam was increasing at an alarming rate. "MessageLabs, which sorts through 10 million e-mails daily and inspects more than three billion e-mails are says that an average of one in 12 e-mails was spam in 2002. But by November 2002, one in three e-mails was spam. Because of that trend, the firm predicts that spam will outpace real e-mail this year" (Rich, 2003) (pg 9). The increase in technology is only making it easier for spammers to complete their tasks and harder for legislative bodies to prosecute and define those who are the roots of the issue. "The increase is a result of technology improvements that have made spammer's jobs easier. Industry experts estimate that about one-third of the more than 73 billion e-mails sent everyday are unwanted commercial pitches" (Rich, 2003) (pg. 9). Businesses are consumed with spam and it's not only affecting the profitability of the service providers. "A recent Ferris Research Study found that spam costs U.S. corporations $8.0 billion annually, $2.5 billion for European businesses." (Rich, 2003) (pg 9). That is a huge bottom line factor for
  • 3. financial statement presentation purposes. This adds a huge expense financial statement line item to a company's profit and loss statement which can determine whether or not their company is profitable in the eyes of investors. Also, with spam as defined as bulk e-mail many users attribute a sense of violation. E-mail addresses are considered to be personal information to people in many situations in life and when this address is given out to the wrong people, spam can occur. In many spam e-mails, there is personal information that gives individuals an eerie feeling especially in a time period where identity theft and online misconduct is at an all time high. "Cyberspace has been equated with the home of an individual which needs protection from unwanted communication" (Mir, 2010) (pg 43). Not only do individuals get a sense of violation with the implementation of spam into technology, but it also opens the doors for children to be exposed to graphic images. This is not a good trend for society. The World Wide Web does increase the chances for people to expose to socially unacceptable content, but the key with spam is that it is involuntary. Due to the involuntary nature of this exposure, parents of children who spend time on computers and other technology means, have to spend their earnings on protection such as parental controls. One would think that when there is a malignant problem, then there should be a solution, or one in the work to help mitigate the risk of a material problem. "Just as the volume of spam has increased since 2000, so too had the number of anti-spam laws around the world" (Schryen, 2007) (pg. 24). This is a must in for the future of the internet, e-commerce and e-mail itself. Spam or bulk e-mails are desensitizing the use of e-mail to where if this problem continues without a viable solution, then e-mail users could boycott the use. Legislation that has been put into play to help mitigate the use of bulk e-mails from large username lists. One can be put on these lists by clicking a link to a website automatically entering their personal information onto this company's mailing list. However, to help mitigate this subconscious agreement, there have been parameters set for e-mail lists. Now users have to 'opt-in' or 'opt-out' to either deny these bulk e-mails or to accept the receipt of them. Opt-in means that one physically clicks a box on a website or in some other fashion agrees to receive e-mails from the applicable company. Opt-out is a tactic used by companies that is makes users physically click a box or similar fashion to not receive e-mails. This is a marketing tactic used by companies in e-commerce. Many people are in such a rush, or have so much bulk e-mail to go through because of spam, that they do not completely read online contracts or similar sorts. Therefore, one might miss the fact that at the end of the website, they needed to 'un-check' a box that was already pre-filled out, in order to be disregarded from the e-mail listing. Marketers for e-commerce businesses find that this tactic is useful because many people are negligent to completely reading all contracts and material pertinent to the task at hand.
  • 4. In the early 2000's there was litigation in several instances where individuals tried to seek monetary compensation for damages caused from spam and unsolicited e-mail. "Laws may make further requirements of e- mails. The CANSPAM Act 2003, for example, prohibits the use of a harvested e-mail address, requires that advertisement or solicitations are identified clearly and conspicuously, and requires that each e-mail contains a functioning return e-mail address or other Internet-bases mechanism that allows the recipient to opt-out of the commercial e-mail lists" (Schryen, 2007) (pg. 30). The CANSPAM Act of 2003 was the first national standards for the sending of commercial e-mail and requires the Federal Trade Commission to enforce its provisions. CANSPAM stands for Controlling the Assault of Non-Solicited Pornography and Marketing Act. When this legislation came out in 2003, many people were furious because it thought of as a law to allow spam, which it did in some fashion. However, many people did not research this legislation. There are an immense amount of provisions set in this act to protect the public and mostly, children. However, there are several issues with this act, "Personal emails and email updates and advertisements that have been consented to be are not covered under this law. Also not covered are 'transactional or relationship messages,' which are emails that pertain to agreed-upon transactions or emails that update a customers in an existing business relationship. That is because these types of emails are not technically spam - they are a result of previous consent or a business relationship." (Spam Laws: The United States CAN-SPAM Act, 2003). This is a loop-hole in the law. Those who are most affected by spam are the public through personal e-mail. The future of e-mail is in question with all of the effects of spam on the community. The only ways to solve the issues of spam is harsh and drastic measures. "Some proposals would require drastic changes to the e-mail system: for example, by limiting acceptance to known senders or to those who satisfy challenge/response protocols." (Coffee, 2003) This is a scary thought for the future of e-mail. Responding to protocol in order to send an e-mail may reduce the affects of bulk, un-solicited e-mail, but it increases the time it takes to send a simple message. This increase in time to send a simple e-mail will deter individuals from using e-mail all together. As technology increases, so will the ability for individuals to commit crimes and negatively affect the public. Technology is a venue of society that has no bounds and seems endless in its ability to encompass all realms of life. Technology affects communication in a huge way and has a direct relation with e-mail communication and the misuse of techniques which cost individuals a material amount of money. Spam affects all facets of life and can influence those who do not expect it. Marketers and advertisers use different spam tactics to increase their profitability by
  • 5. getting their name out there. However, due to the distaste in society from which spam has, it is not proper business etiquette to use spam and is not a profitable business plan. Spam costs businesses and individual's material amounts of money. It costs money for individuals to protect themselves against the threat of spam and for businesses; it takes away employee's time from actual work. This delay in the productivity in employees deters profitability. The main reason for all of the issues faced is due to the fact that laws and regulations did not keep pace with the technology boom.
  • 6. Bibliography Coffee, P. (2003). Future of spam control. EWEEK , 38. Hedley, S. (2006). A Brief History of Spam. Information & Communication Technology Law , 224-238. Mir, F. A. (2010). Control of spam: a comparative approach with special reference to India. Information & Communications Technology Law , 27-59. Rich, M. (2003). Spam Costs Businesses $13 Billion Annually. The Information Management Journal , 9. Schryen, G. (2007). Anti-Spam Legislation: An Analysis of Laws and Their Effectiveness. Information & Communications Technology Law , 18-32. Spam Laws: The United States CAN-SPAM Act. (2003). Retrieved June 11, 2012, from Spam Laws: http://www.spamlaws.com/spam-laws.html Swartz, N. (2003). The International War on Spam. Capital Edge: Legislative & Regulatory Update , 18-24.