Making spammers pay

Clark, Robert
June 2003
Telecom Asia;Jun2003, Vol. 14 Issue 6, p4
Trade Publication
Focuses on the preventive measures in response to the problems of unsolicited electronic mail messages (spam). Adoption of a spammer-pays approach; Number of charging mechanisms for spam; Increase in the cost of sending spam.


Related Articles

  • Antispam effort smacks of cyber-McCarthyism. Kobielus, James // Network World;03/08/99, Vol. 16 Issue 10, p41 

    Focuses on the efforts of Mail Abuse Protection System to eliminate spamming on the Internet. Blacklisting of networks with management policies conducive to spam origination; Freedom of speech issue on requiring prior authorization to send e-mail.

  • A Notice from the Editor.  // Military History;Jul2014, Vol. 31 Issue 2, p4 

    The article offers the author's insights on the guidelines on how to prevent fraudulent mailings and telephone calls in renewing subscription to the periodical "Military History."

  • Spotting a scam.  // Money (Australia Edition);Sep2010, Issue 127, p29 

    This article offers tips for avoiding financial scams. It warns people that scams tend to offer a higher return than genuine investments. It advises to caution about unsolicited e-mails, letters and telephone calls. The article also informs that some scammers are trying to steal personal...

  • Dubious Distinction: U.S. Still World's Top Spammer.  // Business Communications Review;Jun2006, Vol. 36 Issue 6, p6 

    The article reports on the result of the study conducted by Sophos Inc., a company that provides anti-virus, anti-spam, and anti-phishing systems, that compares the volume and origin of spam electronic mails (emails) sent in the first quarter of 2006. For the period, Sophos cited that the U.S....

  • Tips to help keep you safe from scammers this holiday season. Brown, Johnny // Ellis County Press;12/1/2016, Vol. 23 Issue 35, p5 

    The article offers suggestions to ensure cybersecurity during Christmas by avoiding social media posts about gift card giveaways and other contests, checking credit card statement routinely and keeping personal information safe, and avoiding opening of links in e-mail.

  • New advances in securing cyberspace and curbing crowdturfing. Li, Gang; Niu, Wenjia; Batten, Lynn; Liu, Jiqiang // Concurrency & Computation: Practice & Experience;10/25/2017, Vol. 29 Issue 20, pn/a 

    No abstract available.

  • Spam Wars: The Battle of the Formbots. Breeding, Marshall // Computers in Libraries;Jan2007, Vol. 27 Issue 1, p32 

    The article discusses threats to Internet security, as well as guidelines for protecting computer systems from such threats. Spams have become a tool for phishing and identity theft, causing economic and personal damage to its victims. Advanced strategies used by spammers for fraudulent...

  • Tracking Social Spam.  // Technology Review;Jan/Feb2011, Vol. 114 Issue 1, p89 

    The article discusses research being done on social spam activity. It references the study "Detecting and Characterizing Social Spam Campaigns," by Hongyu Gao and colleagues which was discussed at the ACM Internet Measurement Conference in Melbourne, Australia on November 1-3, 2010. It states...

  • Phishing -- the Internet's obnoxious snare. Sardoni, Ken // Enterprise/Salt Lake City;9/6/2004, Vol. 34 Issue 11, p10 

    Offers advice on avoiding being deceived by phishing scams on the Internet. Validation of the legitimacy of the request; Importance of monitoring bank account and credit card statements when received for fraudulent charges; Suggestion on forwarding phishing spam electronic mail to the Federal...

  • Get-rich-quick offers make Net a money pit. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);03/26/2001, Vol. 21 Issue 40, p25 

    Focuses on the use of unsolicited e-mails by Internet scam artists. Examples of fraudulent e-mail solicitations; Difference from e-mails from bona fide businesses; Pyramid schemes promoted by scam artists on the Internet.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics