SlideShare uma empresa Scribd logo
1 de 29
WINTERTemplate
OUTLINE:
OVERVIEW:
• Spam is a term used to describe unsolicited bulk
messages.
• A person who creates spam is called a spammer.
OVERVIEW:
The first spammer was Dave Rhodes.
on April 1994, the first title was given to Laurence
Canter and Martha Siegel in Scottsdale.
Junk faxing.
Telegraphic.
1. Advertising for approximately 36% of all spam
messages
2. Adult in subject for 31.7% of all spam.
3. Unwanted financial emails at 26.5%.
EXPLANATION OF THE ISSUE:
The spammers gather important and personal
information about the user.
• Questionable practices
• Posting
• Malware
• Any recipient of email can see the email
addresses of other recipients
• Tracking.
Privacy Violation Using Spam Case Study
• Australian Communications and Media
Authority (ACMA)
• Unsolicited commercial text (SMS) messages
from car trading company.
• Penalties of $6,600 for breaching the Spam
Act.
EXPLANATION OF THE ISSUE:
Identity theft issues.
Slowness of internet performance.
Spam imposes significant costs on organization.
Spam imposes significant costs on internet
service providers (ISP) and network operators.
EXPLANATION OF THE ISSUE:
EXPLANATION OF THE ISSUE:
EXPLANATION OF THE ISSUE:
EXPLANATION OF THE ISSUE:
EXPLANATION OF THE ISSUE:
WINTERTemplate
WINTERTemplate
WINTERTemplate
WINTERTemplate
WINTERTemplate
WINTERTemplate
OUR OPINION AND CONCLUSION:
SUMMARY:
This report shows information about spam and it focuses on the
following points:
•Spam is unsolicited bulk messages.
•Type of spam messages.
• Ethical issues caused by spam
• Solution of spam messages.
• Displaying opinion of people about spam messages.
• Supporting opinions with facts.
•Analyzing and evaluating spamming using workable ethical theories.
• Showing our opinion on spam.
• [1]Fight Spam on the Internet. [Online].
http://spam.abuse.net/overview/whatisspam.shtml
• [2]Gloria Craney Steve Davis. Spam help. [Online].
http://www.spamhelp.org/articles/HowDoIStopSpam.pdf
• [3]Paul Mah. (2010, September) All Spammed up. [Online].
http://www.allspammedup.com/2010/09/6-different-types-of-
spam-and-how-to-avoid-them
• [4]DAVEN HISKEY. To day I found out. [Online].
http://www.todayifoundout.com/index.php/2012/06/telegraphic-
spam-was-extremely-common-in-the-19th-century/
• [5]Spam Laws. [Online].
http://www.spamlaws.com/spam-stats.html
• [6](2013, February) ACMA. [Online].
http://engage.acma.gov.au/acmai/spam-statistics-january-2013/
• [7]mailchimp. [Online].
• http://mailchimp.com/resources/guides/html/how-to-avoid-
spam-filters/
• [8] R.A. Spinello. (1999) springer link. [Online].
http://link.springer.com/article/10.1023%2FA%3A1010064007816
• [9]Australian Communications and Media Authority. [Online].
http://www.acma.gov.au/scripts/nc.dll?
WEB/STANDARD/1001/pc=PC_310315
• [10](2011, Decamber) EmailMarketingSoftware.org. [Online].
http://emailmarketingsoftware.org/ethical-and-legal-problems-of-spam/
• [11]The Internet Governance Forum (IGF). [Online].
https://docs.google.com/viewer?a=v&q=cache:l-
_8rjM8oL0J:www.wgig.org/docs/WP-
Spam.pdf+&hl=en&gl=sa&pid=bl&srcid=ADGEESirEv0bCO2YljeSPs6nnEK
w7kK3x0-
85oAnoIV3wcfHQs2fqajCTxUp2k6fHmjPXoOGnWTEjwDEDi4OXjwvx1fqtLX
3zkU9X-NkgnR--vYI_V0vkm0_-QRtn41U51Vb9JoGVEFS&si
• [12]University of Northren lowa. [Online].
http://www.uni.edu/its/support/article/573
• [13]Federal Communications Commission. [Online].
http://www.fcc.gov/guides/spam-unwanted-text-messages-and-email
• [14]Direction freedom. [Online].
http://www.directionfreedom.com/anti-spam_policy/
• [15]Patrick Flanagan. (1999, June) Bosten collage. [Online].
http://www.bc.edu/bc_org/avp/law/st_org/iptf/commentary/content/
1999060511.html
• [16]Nick Farrell. (2007, Septamber) The inquirer. [Online].
http://www.theinquirer.net/inquirer/news/1023310/spam-is-free-
speech-claims-spammer
• [17]Grant Gross. (2008) PC world. [Online].
http://www.pcworld.com/article/151014/spam_law_overturned.html
• [18]Lionel Perez. Evan Carmichael helps entrepreneurs. [Online].
http://www.evancarmichael.com/Legal/6122/Working-with-
CANSPAM-and-the-Canadian-Privacy-Act.html
• [19]CEO & Founder of Comm100 Kevin Gao. comm100. [Online].
http://emailmarketing.comm100.com/email-marketing-ebook/can-
spam-law.aspx
• [20] (2013) Industry Canada. [Online].
http://www.ic.gc.ca/eic/site/ecic-ceac.nsf/eng/h_gv00045.html
• [21]Spam Rejection. [Online].
http://www.spamrejection.com/whatisspam.htm
The End:

Mais conteúdo relacionado

Semelhante a Spam

Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Padsromel
 
Policing Research Assignment
Policing Research AssignmentPolicing Research Assignment
Policing Research Assignment
JD Mac
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 

Semelhante a Spam (20)

Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Disadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptxDisadvantages-of-ICT.pptx
Disadvantages-of-ICT.pptx
 
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny RocesEmpowerment Technology By: Zyrhell Rafer and Bretny Roces
Empowerment Technology By: Zyrhell Rafer and Bretny Roces
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
Spam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a ThreatSpam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a Threat
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Anderson "Predatory Publishing -- From Natural Extreme to Unregulated Offender"
Anderson "Predatory Publishing -- From Natural Extreme to Unregulated Offender"Anderson "Predatory Publishing -- From Natural Extreme to Unregulated Offender"
Anderson "Predatory Publishing -- From Natural Extreme to Unregulated Offender"
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Class 7 fall 2016 slides
Class 7 fall 2016 slidesClass 7 fall 2016 slides
Class 7 fall 2016 slides
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Spam presentation
Spam presentationSpam presentation
Spam presentation
 
Email marketing
Email marketing Email marketing
Email marketing
 
Persuasive Essay Against School U
Persuasive Essay Against School UPersuasive Essay Against School U
Persuasive Essay Against School U
 
Policing Research Assignment
Policing Research AssignmentPolicing Research Assignment
Policing Research Assignment
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 

Mais de no0orcom (7)

The Internet Drug Bazaar
The Internet Drug BazaarThe Internet Drug Bazaar
The Internet Drug Bazaar
 
Blue nile sparkles
Blue nile sparklesBlue nile sparkles
Blue nile sparkles
 
Evaluation of mobile app paradigms
Evaluation of mobile app paradigmsEvaluation of mobile app paradigms
Evaluation of mobile app paradigms
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internet
 
AI AND EDUCATIO
AI AND EDUCATIOAI AND EDUCATIO
AI AND EDUCATIO
 
Web hosting service
Web hosting serviceWeb hosting service
Web hosting service
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Spam

  • 3. OVERVIEW: • Spam is a term used to describe unsolicited bulk messages. • A person who creates spam is called a spammer.
  • 5. The first spammer was Dave Rhodes. on April 1994, the first title was given to Laurence Canter and Martha Siegel in Scottsdale.
  • 7.
  • 8.
  • 9. 1. Advertising for approximately 36% of all spam messages 2. Adult in subject for 31.7% of all spam. 3. Unwanted financial emails at 26.5%.
  • 10.
  • 11. EXPLANATION OF THE ISSUE: The spammers gather important and personal information about the user. • Questionable practices • Posting • Malware • Any recipient of email can see the email addresses of other recipients • Tracking.
  • 12. Privacy Violation Using Spam Case Study • Australian Communications and Media Authority (ACMA) • Unsolicited commercial text (SMS) messages from car trading company. • Penalties of $6,600 for breaching the Spam Act. EXPLANATION OF THE ISSUE:
  • 13. Identity theft issues. Slowness of internet performance. Spam imposes significant costs on organization. Spam imposes significant costs on internet service providers (ISP) and network operators. EXPLANATION OF THE ISSUE:
  • 24. OUR OPINION AND CONCLUSION:
  • 25. SUMMARY: This report shows information about spam and it focuses on the following points: •Spam is unsolicited bulk messages. •Type of spam messages. • Ethical issues caused by spam • Solution of spam messages. • Displaying opinion of people about spam messages. • Supporting opinions with facts. •Analyzing and evaluating spamming using workable ethical theories. • Showing our opinion on spam.
  • 26. • [1]Fight Spam on the Internet. [Online]. http://spam.abuse.net/overview/whatisspam.shtml • [2]Gloria Craney Steve Davis. Spam help. [Online]. http://www.spamhelp.org/articles/HowDoIStopSpam.pdf • [3]Paul Mah. (2010, September) All Spammed up. [Online]. http://www.allspammedup.com/2010/09/6-different-types-of- spam-and-how-to-avoid-them • [4]DAVEN HISKEY. To day I found out. [Online]. http://www.todayifoundout.com/index.php/2012/06/telegraphic- spam-was-extremely-common-in-the-19th-century/ • [5]Spam Laws. [Online]. http://www.spamlaws.com/spam-stats.html • [6](2013, February) ACMA. [Online]. http://engage.acma.gov.au/acmai/spam-statistics-january-2013/ • [7]mailchimp. [Online]. • http://mailchimp.com/resources/guides/html/how-to-avoid- spam-filters/
  • 27. • [8] R.A. Spinello. (1999) springer link. [Online]. http://link.springer.com/article/10.1023%2FA%3A1010064007816 • [9]Australian Communications and Media Authority. [Online]. http://www.acma.gov.au/scripts/nc.dll? WEB/STANDARD/1001/pc=PC_310315 • [10](2011, Decamber) EmailMarketingSoftware.org. [Online]. http://emailmarketingsoftware.org/ethical-and-legal-problems-of-spam/ • [11]The Internet Governance Forum (IGF). [Online]. https://docs.google.com/viewer?a=v&q=cache:l- _8rjM8oL0J:www.wgig.org/docs/WP- Spam.pdf+&hl=en&gl=sa&pid=bl&srcid=ADGEESirEv0bCO2YljeSPs6nnEK w7kK3x0- 85oAnoIV3wcfHQs2fqajCTxUp2k6fHmjPXoOGnWTEjwDEDi4OXjwvx1fqtLX 3zkU9X-NkgnR--vYI_V0vkm0_-QRtn41U51Vb9JoGVEFS&si • [12]University of Northren lowa. [Online]. http://www.uni.edu/its/support/article/573 • [13]Federal Communications Commission. [Online]. http://www.fcc.gov/guides/spam-unwanted-text-messages-and-email • [14]Direction freedom. [Online]. http://www.directionfreedom.com/anti-spam_policy/
  • 28. • [15]Patrick Flanagan. (1999, June) Bosten collage. [Online]. http://www.bc.edu/bc_org/avp/law/st_org/iptf/commentary/content/ 1999060511.html • [16]Nick Farrell. (2007, Septamber) The inquirer. [Online]. http://www.theinquirer.net/inquirer/news/1023310/spam-is-free- speech-claims-spammer • [17]Grant Gross. (2008) PC world. [Online]. http://www.pcworld.com/article/151014/spam_law_overturned.html • [18]Lionel Perez. Evan Carmichael helps entrepreneurs. [Online]. http://www.evancarmichael.com/Legal/6122/Working-with- CANSPAM-and-the-Canadian-Privacy-Act.html • [19]CEO & Founder of Comm100 Kevin Gao. comm100. [Online]. http://emailmarketing.comm100.com/email-marketing-ebook/can- spam-law.aspx • [20] (2013) Industry Canada. [Online]. http://www.ic.gc.ca/eic/site/ecic-ceac.nsf/eng/h_gv00045.html • [21]Spam Rejection. [Online]. http://www.spamrejection.com/whatisspam.htm