IS SPAM ETHICAL? ETHICAL REFECTIONS ON THE PROBLEM OF SPAM... Sudharsan Chandrashekaran.

Slides:



Advertisements
Similar presentations
Microsoft ® Office Outlook ® 2003 Training Outlook can help protect you from junk Upstate Technology Services presents:
Advertisements

Dealing with Spam A CyberAngels Tutorial. Contents Introduction - What is spam? Conclusion Quick Quiz.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Woodland Hills School District Computer Network Acceptable Use Policy.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Microsoft ® Office Outlook ® 2003 Virtually Working for You presents:
Computer Technology Day 18
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
Introduction to Computer Ethics
Summary of Reading Assignments: A Taxonomy of The Internet Dr. Deepak Khazanchi.
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
Business Plug-In B7 Ethics.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
AND SPAM BY OLUWATOBI BAKARE
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Issues Raised by ICT.
Computers and the Individual lesson 29. This lesson includes the following sections: Ergonomics and Health Issues Privacy Issues.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Computer Ethics.
Jeopardy Chatting with strangers Spam and other viruses Security and Privacy Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Kill Spam Volume IV The integrated scenario Evangelos Moustakas (BA, MSc, MPhil)
“10 Big Myths about copyright” Presented By: Brenton Barnes Summer 06.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
GroupWise 6.5 Junk Mail Handling July 28, Configuring Junk Mail Handling Junk Mail Handling enables you to have actions taken automatically on any.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
The Future of Anti-Spam: A Blueprint for New Internet Abuse Tools Garth Bruen CEO, KnujOn.com LLC MIT Spam Conference.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Spam s By Jessica Romero CS-301. Spam s Spam s? Spam s? Is unsolicited and promotional sent to in bulk to multiple users.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Welcome to Using How to use Gmail, it’s free!
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
Any criminal action perpetrated primarily through the use of a computer.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Groupee - The Vision A messaging app for groups with an opposite concept Minimum info - Relevant only! Are vision is to enable people to focus on what.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
By: Jack P Mchugh Presented by: Kiel Brown. Spam Unsolicited , often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals,
Computers and the Individual
Learn how to protect yourself against common attacks
Freedom Independence Transition
BCT 2.00 Analyze Technology Issues
What is it? Why do I keep getting from Barracuda? SPAM.
Computers and the Individual
Computers and the Individual
Presentation transcript:

IS SPAM ETHICAL? ETHICAL REFECTIONS ON THE PROBLEM OF SPAM... Sudharsan Chandrashekaran

Introduction Difficulties caused by spam Arguments of its defenders Defending spam Ethical issues and implications Legal status of spam

Whats wrong with spam? Ride for Free Receiver pays more than the sender Oceans of spam problem Its all garbage Theyre all felons Most of them are illegal

Products advertised Source:AT&T Researcher Lorrie Faith and Microsoft Corporations Brian A. LaMacchia (1998) analyzed 400 pieces of classified as spam sent to an AT&T domain during the months of March, April, and May 1997

Defenders Arguments Inexpensive way to compete big business on the Internet Commercial free speech Spam does not mean that it is unwanted Dont place ones address publicly accessible Spam – not different from junk mails

Defending Spam Technological tools like filters are available to block spam The more aggressive they are, the more legitimate mail gets discarded in the process!

Ethical issues Wasting time without allowing the opportunity to avoid that waste Legitimate mail gets lost Biggest cost – consumption of computer resources Hand outs on the streets are acceptable but barging in my front door uninvited is inexcusable Do not have right to force it on someone

Legal Status Protection of privacy Prevent revelation of personal information Keep others from invading personal space In Israel, spam is regulated by the Protection of Privacy Act Easy to evade these laws In Feb. 99, State of Virginia became the first to adopt legislation that deems spam a criminal act

Conclusion Spam – a troubling public policy issue There should be some certain norms of advertising and promotional mailings Users should be willing to receive and absorb their costs