The Concept Of Spam In Email Communication

Nonfiction, Entertainment, Drama, Anthologies
Cover of the book The Concept Of Spam In Email Communication by Alena Rudnitskaya, GRIN Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Alena Rudnitskaya ISBN: 9783640401574
Publisher: GRIN Publishing Publication: August 17, 2009
Imprint: GRIN Publishing Language: English
Author: Alena Rudnitskaya
ISBN: 9783640401574
Publisher: GRIN Publishing
Publication: August 17, 2009
Imprint: GRIN Publishing
Language: English

Seminar paper from the year 2006 in the subject English Language and Literature Studies - Linguistics, grade: keine, LMU Munich (Department für Anglistik und Amerikanistik), course: Internet Communication, language: English, abstract: The communication by email has become one of the most important means of communication in cooperate and private. An internet user is constantly confronted by mass emails containing undesired information. Spam, defined as bulk unsolicited emailing, generally commercial in nature, and predominately fraudulent. Spam causes high charges and damages. Nucleus Research announced that the spam epidemic is costing US businesses $712 per employee each year in lost worker productivity. As a result, users are spending 16 seconds identifying and deleting each spam e-mail, which translates into an annual cost of $70 bln to all US businesses. Looking at the total e-mail traffic, Nucleus estimates that at least 90% of e-mail reaching corporate servers is spam. The average user receives 21 spam messages to their inbox each day. (Moskalyuk 2007) Regardless of the inefficient time spent, there are further costs caused by spam, such as (cf Filterpoint 2008): ·Deleted emails remain stored in the trash folder. ·Higher storage costs through higher server expenses. ·Higher bandwith essential to store the spam mails. ·Time spent by IT staff for anti-spam measures. ·Recovery costs after a virus attack. Various experts provide a spam calculator that enables to determine the approximate annual costs for an enterprise created by spam. (Gibbs 2003, Commtouch 2007) The calculator introduced by Gibbs differentiates productivity, connectivity, storage and support costs. This Spam Cost Analysis Model can be found in appendix 1 of this work. In this work different types of spam in general and in specific will be pointed out and characterized. Measures against unsolicited emails will be reviewed. First I start with the definition of spam and where it comes from, followed with the spam history. Then I briefly list the most common categories and variants of spam used. The next step will be the revision of a present situation captured by Commtouch and Symantec, as well as statistics on the information learned through spam monitoring during the last few months, with the examples of its usage. I conclude with an overview of spam solutions offered and point out further research topics in the area.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Seminar paper from the year 2006 in the subject English Language and Literature Studies - Linguistics, grade: keine, LMU Munich (Department für Anglistik und Amerikanistik), course: Internet Communication, language: English, abstract: The communication by email has become one of the most important means of communication in cooperate and private. An internet user is constantly confronted by mass emails containing undesired information. Spam, defined as bulk unsolicited emailing, generally commercial in nature, and predominately fraudulent. Spam causes high charges and damages. Nucleus Research announced that the spam epidemic is costing US businesses $712 per employee each year in lost worker productivity. As a result, users are spending 16 seconds identifying and deleting each spam e-mail, which translates into an annual cost of $70 bln to all US businesses. Looking at the total e-mail traffic, Nucleus estimates that at least 90% of e-mail reaching corporate servers is spam. The average user receives 21 spam messages to their inbox each day. (Moskalyuk 2007) Regardless of the inefficient time spent, there are further costs caused by spam, such as (cf Filterpoint 2008): ·Deleted emails remain stored in the trash folder. ·Higher storage costs through higher server expenses. ·Higher bandwith essential to store the spam mails. ·Time spent by IT staff for anti-spam measures. ·Recovery costs after a virus attack. Various experts provide a spam calculator that enables to determine the approximate annual costs for an enterprise created by spam. (Gibbs 2003, Commtouch 2007) The calculator introduced by Gibbs differentiates productivity, connectivity, storage and support costs. This Spam Cost Analysis Model can be found in appendix 1 of this work. In this work different types of spam in general and in specific will be pointed out and characterized. Measures against unsolicited emails will be reviewed. First I start with the definition of spam and where it comes from, followed with the spam history. Then I briefly list the most common categories and variants of spam used. The next step will be the revision of a present situation captured by Commtouch and Symantec, as well as statistics on the information learned through spam monitoring during the last few months, with the examples of its usage. I conclude with an overview of spam solutions offered and point out further research topics in the area.

More books from GRIN Publishing

Cover of the book Human Resource Due Diligence within the Context of Mergers & Acquisitions by Alena Rudnitskaya
Cover of the book Dorian Gray - devil or rebel? by Alena Rudnitskaya
Cover of the book Damenstift Essen - Lebensalltag der Stiftsdamen by Alena Rudnitskaya
Cover of the book Determinants Of The Capital Structure Of The Cement Industry From Pakistan by Alena Rudnitskaya
Cover of the book Has the Financial Crisis Induced a Credit Crunch for Small and Medium-Sized Enterprises in Germany? by Alena Rudnitskaya
Cover of the book Using a Winogradsky Column to enrich microbes as they are by simulating various conditions and to predict Microcosm Biofilm Patterns using time lapse tracing and regression analysis by Alena Rudnitskaya
Cover of the book Security Policy for e-Fence Corporation's Network by Alena Rudnitskaya
Cover of the book Business Marketing - the case of Microsoft by Alena Rudnitskaya
Cover of the book Transatlantic Trade and Investment Partnership. Side effects of an economic treaty on national security policy by Alena Rudnitskaya
Cover of the book China's projected image - A structured, focused comparison in the United States of America by Alena Rudnitskaya
Cover of the book With reference to the sources and relevant secondary literature examine the reasons for the success of the First Crusade. by Alena Rudnitskaya
Cover of the book There Is No Business Like Show Business by Alena Rudnitskaya
Cover of the book A bubble about to burst? The Spanish Real Estate Market by Alena Rudnitskaya
Cover of the book Reflective Writing by Alena Rudnitskaya
Cover of the book The social system according to Talcott Parson by Alena Rudnitskaya
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy