1998
DOI: 10.1145/280324.280336
|View full text |Cite
|
Sign up to set email alerts
|

Spam!

Abstract: Junk email-yes, its annoying, but it can also be overwhelming. A new study evaluates the current extent of the spamming problem and suggests there are no quick fixes to solve the situation.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
113
0
3

Year Published

2003
2003
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 219 publications
(119 citation statements)
references
References 6 publications
3
113
0
3
Order By: Relevance
“…Casual evidence is consistent with our claim that there is non-trivial demand for much spam: Cranor and LaMacchia [1998] show that the largest fraction of spam content is commercial advertising for products hard to find through other advertising channels. We refer to these as "censored" commercial solicitations.…”
Section: Introductionsupporting
confidence: 87%
See 1 more Smart Citation
“…Casual evidence is consistent with our claim that there is non-trivial demand for much spam: Cranor and LaMacchia [1998] show that the largest fraction of spam content is commercial advertising for products hard to find through other advertising channels. We refer to these as "censored" commercial solicitations.…”
Section: Introductionsupporting
confidence: 87%
“…The proposals include rule-based, Bayesian, and community ("collaborative") filtering, disposable identities using extended email addresses [Bleichenbacher et al, 1998], DomainKeys Identified Mail [Perez, 2005], Sender ID or Sender Policy Framework [Crocker, 2006] 6 , challenge-response [Dwork andNaor, 1993, Laurie andClayton, 2004], whitelists, and blacklists. See Cranor and LaMacchia [1998] for an overview.…”
Section: Technologicalmentioning
confidence: 99%
“…In policy-based systems [4] , policies are encoded inside the address and an email is discarded at its destination if the policy is not fulfilled. In password-based systems [5][6][7] , the receiver's address is extended with a sequence of characters that act like a password, which can be obtained with a proof of computational task [10] . These solutions work well in some scenarios (e.g., using mail addresses in computer-based systems like web forums).…”
Section: Previous Workmentioning
confidence: 99%
“…If you search at Google for "bulk email" you will find organizations willing to deliver your email to one million addresses (provided by them) for a total cost of $190 (i.e., 0.019 cents per message). Accordingly, there is a lot of current work on techniques for deterring spam [4,9,12,13,15,20].…”
Section: Motivationmentioning
confidence: 99%