Using uncensored communication channels to divert spam traffic
نویسندگان
چکیده
We offer a microeconomic model of the market for bulk commercial advertising email (the dominant form of spam). We adopt an incentive-centered design approach to develop a simple, feasible improvement to the current email system: an uncensored communication channel. Such a channel could be an email folder or account, to which properly tagged commercial solicitations are routed. We characterize the circumstances under which spammers would voluntarily move much of their spam into the open channel, leaving the traditional email channel dominated by person-to-person, non-spam mail. Our method follows from observing that there is a real demand for unsolicited commercial email, so that everyone can be made better off if a channel is provided for spammers to meet spam-demanders. As a bonus, the absence of filtering in an open channel restores to advertisers the incentive to make messages truthful, rather than to disguise them to avoid filters. We show show that all email recipients are better off when an open channel is introduced. Only recipients wanting spam will use the open channel enjoying the less disguised messages, and for all recipients the satisfaction associated with desirable mail received increases, and dissatisfaction associated with undesirable received and desirable mail filtered out decreases. ∗We appreciate comments from Nat Bulkley, Nick Economides, Michael Hess, Peter Honeyman, Doug Van Houweling, the members of the Incentive-Centered Design Lab (especially Greg Gamette, Lian Jian, Kil-Sang Kim, John Lin, Anya Osepayshvili, Toinu Reeves, Ben Stearns, and Rick Wash), and participants at the STIET workshop in May 2006. We gratefully acknowledge financial support from the NET Institute and from NSF grants IIS-0414710 and IGERT-0114368. †School of Information, Univ. of Michigan, Ann Arbor, MI 48109 ‡Dept. of Economics, and School of Information, Univ. of Michigan, Ann Arbor, MI 48109
منابع مشابه
Análise e modelagem do comportamento de SPAMMERS e dos usuários legítimos em redes de email
Email is an increasingly important and ubiquitous mean of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. However, the relentless rising of automatic unauthorized emails, also known as spam, is eroding away much of the attractiveness of email communication. Most of the attention dedicated to spam detection has focused on the ...
متن کاملSoftware Download Management for Reconfigurable Terminals in UMTS/FDD
This paper introduces a novel approach of software download management for reconfigurable terminals using common channels in WCDMA system. We introduce in this paper protocols, which enhance cellgrouping broadcast approach for software downloads that, are mainly used to reduce interference in interference limited CDMA based system. In addition, it gives the fundamental load based criteria in sy...
متن کاملDesign of a Low-Latency Router Based on Virtual Output Queuing and Bypass Channels for Wireless Network-on-Chip
Wireless network-on-chip (WiNoC) is considered as a novel approach for designing future multi-core systems. In WiNoCs, wireless routers (WRs) utilize high-bandwidth wireless links to reduce the transmission delay between the long distance nodes. When the network traffic loads increase, a large number of packets will be sent into the wired and wireless links and can...
متن کاملA Critical Analysis of Financial Fraud Spam in English in Terms of Persuasive Strategies: Personalization, Presupposition, and Lexical Choices
The term ‘spam’ addresses unsolicited emails sent in bulk; therefore, the term‘financial fraud spam’ refers to unwanted bulk emails in which different tricks and techniques areemployed to swindle money from the recipients. Estimates show that more than 80% of worldwideemail traffic in 2011 was spam. It should be noted that while the number of daily spam emails in2002 was 2.4 billion, this numbe...
متن کاملGreystar: Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space
In this paper, we present the design of Greystar, an innovative defense system for combating the growing SMS spam traffic in cellular networks. By exploiting the fact that most SMS spammers select targets randomly from the finite phone number space, Greystar monitors phone numbers from the grey phone space (which are associated with data only devices like laptop data cards and machine-to-machin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Economics and Policy
دوره 24 شماره
صفحات -
تاریخ انتشار 2012