The communication by email has become one of the most important means of communication in cooperate and private. An internet user is constantly confronted by mass emails containing undesired information. Spam, defined as bulk unsolicited emailing, generally commercial in nature, and predominately fraudulent.
Spam causes high charges and damages.
Nucleus Research announced that the spam epidemic is costing US businesses $712 per employee each year in lost worker productivity. As a result, users are spending 16 seconds identifying and deleting each spam e-mail, which translates into an annual cost of $70 bln to all US businesses. Looking at the total e-mail traffic, Nucleus estimates that at least 90% of e-mail reaching corporate servers is spam. The average user receives 21 spam messages to their inbox each day. (Moskalyuk 2007)
Regardless of the inefficient time spent, there are further costs caused by spam, such as (cf Filterpoint 2008):
· Deleted emails remain stored in the trash folder.
· Higher storage costs through higher server expenses.
· Higher bandwith essential to store the spam mails.
· Time spent by IT staff for anti-spam measures.
· Recovery costs after a virus attack.
Various experts provide a spam calculator that enables to determine the approximate annual costs for an enterprise created by spam. (Gibbs 2003, Commtouch 2007)
The calculator introduced by Gibbs differentiates productivity, connectivity, storage and support costs. This Spam Cost Analysis Model can be found in appendix 1 of this work.
In this work different types of spam in general and in specific will be pointed out and characterized. Measures against unsolicited emails will be reviewed.
First I start with the definition of spam and where it comes from, followed with the spam history. Then I briefly list the most common categories and variants of spam used. The next step will be the revision of a present situation captured by Commtouch and Symantec, as well as statistics on the information learned through spam monitoring during the last few months, with the examples of its usage. I conclude with an overview of spam solutions offered and point out further research topics in the area.
Table of Contents
- Introduction
- Email Spam
- Definition
- History of Spam
- The MUDders
- The first internet e-mail spam, sent by Digital Equipment Corporation
- Make Money Fast
- ARMM -- first to be called spam
- First Giant Spam
- Green Card
- Categories of Spam
- Spam broad trends
- Commtouch Email Threats Trend Report 2007
- Symantec Spam Report December 2007
- Recent trends
- The Spam solutions
- Non-governmental
- Quasi-governmental
- Governmental
Objectives and Key Themes
This work aims to define and characterize different types of spam, examine its history, and review measures against unsolicited emails. The study will analyze current trends in spam, using data from Commtouch and Symantec reports. Finally, it will provide an overview of existing spam solutions and suggest areas for further research.- Definition and categorization of spam email.
- Historical evolution of spam and its origins.
- Analysis of current spam trends and statistics.
- Examination of various spam solutions.
- Identification of areas for future research in spam mitigation.
Chapter Summaries
1. Introduction: This introductory chapter establishes the context of the study by highlighting the pervasive nature of spam in both personal and corporate email communication. It emphasizes the significant economic costs associated with spam, including lost productivity and increased IT expenses. The chapter introduces the scope of the work, outlining the key areas to be examined: the definition and history of spam, current trends, and existing solutions. The chapter concludes by providing a roadmap for the subsequent chapters, detailing the progression of the analysis from the definition of spam to the examination of mitigation strategies.
2. Email Spam: This chapter delves into the multifaceted nature of spam email. It begins with a comparative analysis of spam definitions from various dictionaries, highlighting the common understanding of spam as unsolicited bulk email, often commercial and fraudulent in nature. The chapter then traces the historical development of spam, exploring its origins in the MUD (multi-user-dungeon) community and its subsequent evolution in the early days of the internet. The historical account encompasses key milestones, including the first instances of internet spam and the emergence of widespread unsolicited email campaigns. This section provides a comprehensive background to understand the current context of spam.
Keywords
Spam, unsolicited email, junk mail, email communication, internet communication, history of spam, spam trends, spam solutions, anti-spam measures, economic costs of spam, MUD, Commtouch, Symantec.
Frequently Asked Questions: A Comprehensive Language Preview
What is the purpose of this document?
This document provides a comprehensive preview of a work analyzing email spam. It includes a table of contents, objectives and key themes, chapter summaries, and keywords. The preview is intended for academic use, facilitating the analysis of themes in a structured and professional manner.
What topics are covered in this document?
The document covers the definition and categorization of spam email, its historical evolution, current trends and statistics, various spam solutions, and areas for future research in spam mitigation. Specific historical examples, such as the first instances of internet spam and the role of MUDs (multi-user dungeons), are also discussed.
What are the key themes explored?
The key themes revolve around understanding the nature of spam, tracing its historical development, analyzing current trends (using data from Commtouch and Symantec reports), examining existing solutions to combat spam, and identifying areas requiring further research.
What is the historical context of spam discussed in the document?
The historical context traces spam's origins from its early days within the MUD community to the first instances of internet spam sent by companies like Digital Equipment Corporation. Key milestones and the evolution of spam campaigns are highlighted, providing a comprehensive background to understand current spam trends.
What data sources are used to analyze current spam trends?
The analysis of current spam trends utilizes data and reports from Commtouch and Symantec, two prominent sources in the field of cybersecurity and anti-spam technologies. This allows for a data-driven examination of current trends.
What types of spam solutions are explored?
The document provides an overview of existing spam solutions, categorizing them into non-governmental, quasi-governmental, and governmental approaches. It doesn't delve into the specifics of each solution but provides a general framework for understanding the diverse range of responses to the problem of spam.
What are the main conclusions or suggestions for future research?
While not explicitly stated as conclusions, the document identifies the need for further research in spam mitigation as a key area for future study. This suggests that the analysis aims to lay the groundwork for more in-depth research on combating spam effectively.
What are the keywords associated with this document?
The keywords include: Spam, unsolicited email, junk mail, email communication, internet communication, history of spam, spam trends, spam solutions, anti-spam measures, economic costs of spam, MUD, Commtouch, Symantec.
What is the structure of the main body of the work?
The main body is structured into chapters: an introduction setting the context and scope; a chapter dedicated to email spam, including its definition, history, and categories; a chapter on broad trends in spam, referencing Commtouch and Symantec reports; and a final chapter examining spam solutions from different sectors (non-governmental, quasi-governmental, and governmental).
- Citation du texte
- Alena Rudnitskaya (Auteur), 2006, The Concept Of Spam In Email Communication, Munich, GRIN Verlag, https://www.grin.com/document/133354