The Concept Of Spam In Email Communication

Nonfiction, Entertainment, Drama, Anthologies
Cover of the book The Concept Of Spam In Email Communication by Alena Rudnitskaya, GRIN Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Alena Rudnitskaya ISBN: 9783640401574
Publisher: GRIN Publishing Publication: August 17, 2009
Imprint: GRIN Publishing Language: English
Author: Alena Rudnitskaya
ISBN: 9783640401574
Publisher: GRIN Publishing
Publication: August 17, 2009
Imprint: GRIN Publishing
Language: English

Seminar paper from the year 2006 in the subject English Language and Literature Studies - Linguistics, grade: keine, LMU Munich (Department für Anglistik und Amerikanistik), course: Internet Communication, language: English, abstract: The communication by email has become one of the most important means of communication in cooperate and private. An internet user is constantly confronted by mass emails containing undesired information. Spam, defined as bulk unsolicited emailing, generally commercial in nature, and predominately fraudulent. Spam causes high charges and damages. Nucleus Research announced that the spam epidemic is costing US businesses $712 per employee each year in lost worker productivity. As a result, users are spending 16 seconds identifying and deleting each spam e-mail, which translates into an annual cost of $70 bln to all US businesses. Looking at the total e-mail traffic, Nucleus estimates that at least 90% of e-mail reaching corporate servers is spam. The average user receives 21 spam messages to their inbox each day. (Moskalyuk 2007) Regardless of the inefficient time spent, there are further costs caused by spam, such as (cf Filterpoint 2008): ·Deleted emails remain stored in the trash folder. ·Higher storage costs through higher server expenses. ·Higher bandwith essential to store the spam mails. ·Time spent by IT staff for anti-spam measures. ·Recovery costs after a virus attack. Various experts provide a spam calculator that enables to determine the approximate annual costs for an enterprise created by spam. (Gibbs 2003, Commtouch 2007) The calculator introduced by Gibbs differentiates productivity, connectivity, storage and support costs. This Spam Cost Analysis Model can be found in appendix 1 of this work. In this work different types of spam in general and in specific will be pointed out and characterized. Measures against unsolicited emails will be reviewed. First I start with the definition of spam and where it comes from, followed with the spam history. Then I briefly list the most common categories and variants of spam used. The next step will be the revision of a present situation captured by Commtouch and Symantec, as well as statistics on the information learned through spam monitoring during the last few months, with the examples of its usage. I conclude with an overview of spam solutions offered and point out further research topics in the area.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Seminar paper from the year 2006 in the subject English Language and Literature Studies - Linguistics, grade: keine, LMU Munich (Department für Anglistik und Amerikanistik), course: Internet Communication, language: English, abstract: The communication by email has become one of the most important means of communication in cooperate and private. An internet user is constantly confronted by mass emails containing undesired information. Spam, defined as bulk unsolicited emailing, generally commercial in nature, and predominately fraudulent. Spam causes high charges and damages. Nucleus Research announced that the spam epidemic is costing US businesses $712 per employee each year in lost worker productivity. As a result, users are spending 16 seconds identifying and deleting each spam e-mail, which translates into an annual cost of $70 bln to all US businesses. Looking at the total e-mail traffic, Nucleus estimates that at least 90% of e-mail reaching corporate servers is spam. The average user receives 21 spam messages to their inbox each day. (Moskalyuk 2007) Regardless of the inefficient time spent, there are further costs caused by spam, such as (cf Filterpoint 2008): ·Deleted emails remain stored in the trash folder. ·Higher storage costs through higher server expenses. ·Higher bandwith essential to store the spam mails. ·Time spent by IT staff for anti-spam measures. ·Recovery costs after a virus attack. Various experts provide a spam calculator that enables to determine the approximate annual costs for an enterprise created by spam. (Gibbs 2003, Commtouch 2007) The calculator introduced by Gibbs differentiates productivity, connectivity, storage and support costs. This Spam Cost Analysis Model can be found in appendix 1 of this work. In this work different types of spam in general and in specific will be pointed out and characterized. Measures against unsolicited emails will be reviewed. First I start with the definition of spam and where it comes from, followed with the spam history. Then I briefly list the most common categories and variants of spam used. The next step will be the revision of a present situation captured by Commtouch and Symantec, as well as statistics on the information learned through spam monitoring during the last few months, with the examples of its usage. I conclude with an overview of spam solutions offered and point out further research topics in the area.

More books from GRIN Publishing

Cover of the book Book Review of 'Shi'a Islam: From Religion to Revolution' by Heinz Halm by Alena Rudnitskaya
Cover of the book The Representation of Veblen's Concepts from the 'Theory of the Leisure Class' in Dreisers 'Sister Carrie' by Alena Rudnitskaya
Cover of the book The use of emetics to obtain internally concealed drugs as evidence - a means of torture? by Alena Rudnitskaya
Cover of the book Dracula and Victorianism: A conservative or subversive novel? by Alena Rudnitskaya
Cover of the book Why Europe does not need a constitution by Alena Rudnitskaya
Cover of the book Myths in 'Harry Potter'. How Joanne K. Rowling uses real Mythology in her Novels by Alena Rudnitskaya
Cover of the book Black American Higher Education by Alena Rudnitskaya
Cover of the book Retail Marketing Theory In Fashion Retailing Context by Alena Rudnitskaya
Cover of the book 'Supporting Diversity - Strengthening Cohesion' - Multiculturalism in Germany by Alena Rudnitskaya
Cover of the book Political Parties in the USA - Realignment by Alena Rudnitskaya
Cover of the book The depiction of women in Sandra Cisneros novel 'The House On Mango Street' by Alena Rudnitskaya
Cover of the book The influence of ideology on the foreign policy behaviour of the Soviet Union and its East European satellites, 1945-61 by Alena Rudnitskaya
Cover of the book Positioning and negation of identities in a bilingual intimate communication by Alena Rudnitskaya
Cover of the book Crime, Disorder, and Justice - The Labelling Theory As A Way of Explaining Social Reactions To Deviant Behaviour by Alena Rudnitskaya
Cover of the book Robert Mugabe - Struggle, power and manipulation by Alena Rudnitskaya
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy