StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Danger of Spam - Essay Example

Cite this document
Summary
For the countless users of the World Wide Web, email has become a main source of communication for those who find themselves at opposite sides of the globe. Hundreds, if not thousands, of emails are sent on a daily basis. In most cases, users send high volume amounts of correspondence on an hourly time frame…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
The Danger of Spam
Read Text Preview

Extract of sample "The Danger of Spam"

The Danger of Spam For the countless users of the World Wide Web, email has become a main source of communication for those who find themselves at opposite sides of the globe. Hundreds, if not thousands, of emails are sent on a daily basis. In most cases, users send high volume amounts of correspondence on an hourly time frame. With that being said, a large contributor to the amount of email that an individual may find in their email account belongs to the Bulk Mail section, which is also considered the section which takes the "spam" email.

Like many other computer servers, email servers can crashed if overloaded, which can happen suddenly with the event of higher than usual junk mail being intercepted. With sometimes up to 150 pieces of spam email possible for an individual user, it can be said that spam email is a real problem, which in the end, needs a real solution as it comes to fixing it. To put into perspective the volume of spam capable, "E-mail spam has existed since before the beginning of the Internet, and has grown to about 90 billion messages a day, although about 80% is sent by fewer than 200 spammers.

Botnets, virus infected computers, account for about 80% of spam. Laws against spam have been sporadically implemented, with some being opt-out laws and others being opt-in. SPAM DUDE! The total amount of spam has leveled off slightly in recent years. The cost of spam is borne mostly by the recipient, so it is a form of postage due advertising," ("E-mail spam" p.1). One would have to wonder as to how it could even be legal to mass produce such email. According to the website spamelert.org in a piece on the legality of spam, they write that, "In the United States spam is legally permissible according to the CAN-SPAM Act of 2003, provided it follows certain criteria: a truthful subject line; no false information in the technical headers or sender address; "conspicuous" display of the postal address of the sender; and other minor requirements.

If the spam fails to comply with any of these requirements, then it is illegal. Aggravated or accelerated penalties apply if the spammer harvested the email addresses using methods described earlier," ("Legality" p.1). "Anti-spammers contend that spam is much more than just a nuisance or inconvenience to the message recipients in that it places physical as well as financial burdens on the Internet system and Internet service providers. This is because spam costs very little for the spammer to send while most of the costs, such as transmission costs and measured telephone service, are paid for by the carriers and recipients of the messages," ("Internet" p.1). All in all, spam is a type of email that serves no purpose to those who receive it and is a way for the sender to send out on a mass basis that which is not relevant to even is aware of.

Stronger enforcement of existing laws must be done to protect email users from this sort of 'attack' on the communication source which many have come to rely on. As it comes down to it, average citizens have the right to not want their email boxes inundated with useless junk mail on a massive basis. In an era of online shopping and web surfing, individuals still should have the legal right to have their privacy insured, even through something like their email box. As a citizen of the United States, an individual is granted rights to privacy and such.

With regular mail becoming more obsolete, with the exception of those few who still pay their bills by mail, email has become and continues to be a gateway for those who wish to transmit information as quickly as possible, as is the case especially for those who seek to pummel unsuspecting recipients with unwanted email. Each and every time someone goes to their email to check their inbox, it is a sad day when a good majority of the mail received is from not just a source they have never heard of, but a source of no value at all in the first place.

References"Legality of Spam- Your legal rights with respect to internet and email spam law." Accessed: 8 April 2008. URL: http://www.spamalert.org/articles/legal.phpRich, Lloyd R. "Internet Legal Issues: SPAM." Source: The Publishing Law Center. Copyright: 1999. Accessed: 8 April 2008. URL: http://www.publaw.com/spam.htmlWikipedia: The Free Online Encyclopedia. "E-mail spam." Accessed: 8 April 2008. URL: http://en.wikipedia.org/wiki/E-mail_spam

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Danger of Spam Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
The Danger of Spam Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/technology/1509559-the-danger-of-spam
(The Danger of Spam Essay Example | Topics and Well Written Essays - 500 Words)
The Danger of Spam Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/technology/1509559-the-danger-of-spam.
“The Danger of Spam Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/technology/1509559-the-danger-of-spam.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Danger of Spam

The Benefits and Dangers of Nuclear Energy

The benefits and dangers of nuclear energy The benefits and dangers of nuclear energy Energy crisis is causing big problems to all the countries irrespective of developed or developing.... Majority of the energy sources we are using at present and nonrenewable in nature and these sources may exhaust in near future itself....
5 Pages (1250 words) Essay

Public Cloud a Source of Danger to Businesses

This literature review "Public Cloud a Source of danger to Businesses" discusses information technology that has offered wonderful opportunities to business organizations.... hellip; Despite a lot of advantages of cloud computing, there are certain drawbacks also associated with this technology, which make it a source of danger to businesses.... In this scenario, organizations believe that the public cloud is a source of danger to businesses....
8 Pages (2000 words) Literature review

Cold War - USA and USSR

Cold war is a situation existed between Soviet Union and United States within the time span of forty years starting from the 1940s.... s both the parties possessed nuclear weapon, threatening from both sides endangered the social security of their respective citizens.... Due to the… Looking back in history the enmity of U....
2 Pages (500 words) Essay

Comparative Negligence and COA

According to Rhoda's testimony it occurs that the floor had been slippery on all the 25 occasions she used the facilities, but the defendant had failed to exercise duty of care by warning its members or other users of the impending danger of a slippery floor.... Under the Californian law on negligence there are numerous causes of action that must be taken into consideration before sustaining an action in negligence....
2 Pages (500 words) Assignment

Procurement Methods

Procurement is a term which portrays the exercises embraced by the customer or manager who is trying to realize the development or restoration of a building.... Construction procurement perhaps characterized… s the arrangement of techniques or exercises utilized to secure the erection or development of a predefined fabricated structure (structures, electrical plants and frameworks and so on....
9 Pages (2250 words) Assignment

Impact of Spam on Personal Computers

The paper 'Impact of spam on Personal Computers' focuses on The unwanted and unsolicited e-mails that internet users are forced to receive is known as Spam.... hellip; spam can also act as suitable carriers for viruses, worms and Trojans into the user's personal computers.... Spammers have developed a variety of spamming techniques, which vary by media: e-mail spam, instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, and mobile phone-messaging spam....
5 Pages (1250 words) Essay

History of Phishing and Development

This paper “History of Phishing and Development” will present a detailed analysis of using phishing for/in website verification.... This research is aimed at discussing and elaborating the phishing technique, its main implementation areas, disadvantages and its utilization for the website verification....
20 Pages (5000 words) Research Paper

Economic Change Effect Frauds

 In the essay “Economic Change Effect Frauds” the author discusses defensive significant insufficient economic capital, which has turned out to be a huge accuse.... Tumbling resources to deception strength is enough to push a before determined association to the financial edge.... hellip; The author states that self-worth is descending....
16 Pages (4000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us