“We Can Stop Spam” Author: Jack P. McHugh Pui Ying (Ivy) Cheung.

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Basic Communication on the Internet:
Starter for 10 Unit 1: basics Transform IT SFT01_ _basics.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
“We Can Stop the Spam!” Article written by Jack McHugh Presented by Sebastian Fischer.
Anonymity and SPAM The Good, the Bad and the Ugly!
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
People in Design Damian Gordon. People in Design Why do we care about people in design? – Because we build software systems for other people, so we have.
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
SPAM Ka Yat, Kei Comp 450 Spring 2008, CSUN. Thesis Statement Thesis Statement---Spam is becoming a bigger issue in the computer world. How do we.
SPAM WeeSan Lee
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
Boost Your Marketing Without Busting Your Budget Creating an Marketing Campaign.
Spam Sonia Jahid University of Illinois Fall 2007.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
etiquette…. Sending and receiving s…  To send a you simply press new  You can receive s off anyone  You can add attachments.
“WE Can Stop the Spam!” By: Jack McHugh. Proposals to identify spam  Michigan- require commercial ers to insert “ADV” as the first three characters.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Spam and E-Security Bruce Matthews Manager, Anti-Spam Team International Training Program 11 September 2006.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
Anti-Spam Research Group (ASRG) 56 th IETF Meeting March 20, 2003 Paul Q. Judge.
Computer Legislation The need for computer laws Go to Contents.
E-commerce--is Based on the use of internet-commerce is fasting becoming an alternative.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Spam Filtering. From: "" Subject: real estate is the only way... gem oalvgkay Anyone can buy real estate with no money down Stop paying rent TODAY ! There.
Telecommunications Communication over a long distance; Distant communication.
Direct Marketing. Definiton Direct marketing is an interactive system of marketing which uses one or more advertising media to effect a measurable response.
Reabecca Eddins ED 505.  Copyright: is the rights of an owner/creator of a work to make copies, license, and otherwise use their works  Fair Use: is.
The Effects of Anti-Spam Methods on Spam Mail Eilon Solan, Tel Aviv University Eran Reshef, Blue Security Inc.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? Graeme Crombie Senior Associate Minter Ellison.
ETIQUETTE BY MICHAEL TOLLEY. INCLUDE A CLEAR, DIRECT SUBJECT LINE. Examples of a good subject line include "Meeting date changed," "Quick question.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
SOCIAL NETWORKING by Andre Vega. SOCIAL NETWORK(N.) an online community of people with a common interest who use a website or other technologies to communicate.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
Trespass in the Spam Cases. CompuServe v. Cyber Promotion User complaints  “CompuServe has received many complaints from subscribers threatening.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Who Gets Mail? Mailing lists and Spam Emily Springer Regional Leadership Conference August 2014.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Handling Spam In Government Administration – The Singapore Approach Presented to ICA Annual Conference 2004 Presented by Wu Choy Peng (Ms) 20 October 2004.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Marion County Public Schools Acceptable Use Guidelines for Network Access.
By: Jack P Mchugh Presented by: Kiel Brown. Spam Unsolicited , often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals,
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Computer Skills (1) .
ethical issues in business
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam.
Presentation transcript:

“We Can Stop Spam” Author: Jack P. McHugh Pui Ying (Ivy) Cheung

Main Points Suggested actions against spam Problems with these suggestions Solution to problems

Suggested Actions Against Spam Michigan: Require all commercial ers to insert “ADV” as the first three characters in the subject line of an unsolicited “Anti-Spam” bill to create a do not spam” list targeted against unsolicited commercial e- mails

Suggested Actions Against Spam Federal Trade Commission: National “do not spam” list which allow citizens to register for the list Penalize spammers who anyone on this list

Problems with Proposals They are unlikely to be effective Spammers can quickly develop ways to work around it Spammers can quickly develop ways to work around it Spammers are difficult to prosecute Spammers are difficult to prosecute Spammers send s through overseas Spammers send s through overseas

Problems with Proposals Maintenance of the “do not spam” list would not be cost-efficient Complications with purchasing and operating software and computer systems with government funds Complications with purchasing and operating software and computer systems with government funds Users who would like to be on the list has to pay Users who would like to be on the list has to pay

Solution to the Problems Do it ourselves Forward messages persuading people to stop patronizing an e-marketer’s product or service unless his communication contains “ADV” in the subject line Forward messages persuading people to stop patronizing an e-marketer’s product or service unless his communication contains “ADV” in the subject line

Any Questions?