Entry
Reader's guide
Entries A-Z
Subject index
Spamming
Internet spamming is a term used to describe the high-volume sending of unsolicited electronic messages. The content of spam can range from harmless unwanted advertisements to potential scams and computer viruses. While spam is most commonly distributed via e-mail messages, it can be sent through all electronic channels that can receive messages, such as short message service (SMS) text messaging and social networks.
The word spam is in reference to the popular, processed canned-meat product with the same name. Internet spam got its nickname from a Monty Python skit in which a group of Vikings chanted “SPAM, SPAM, SPAM” loudly to drown out other conversations. The name was adopted to describe unsolicited Internet junk mail, perceived as overwhelming legitimate messages.
The ubiquity of the Internet coupled with the development of spam software in the mid-1990s allowed spammers to send high-volume messages cheaply and easily. Early spammers exploited mail relay servers using inexpensive software that automatically harvests e-mail addresses from America Online (AOL) member directories and other sources and sends bulk messages. Today, the Internet security company Symantec estimates that approximately 70% of all global e-mail is spam.
The volume and persistence of spam is very costly. Researchers at Microsoft and Google estimate that spam costs Americans $20 billion annually. Other researchers put the worldwide figure closer to $50 billion if one takes into account the cost in time workers spend sorting through and deleting spam. Other costs include storage on network servers, security software, and related expenses.
The nature and motivations for spamming often go beyond its common perception as an inexpensive, albeit annoying, form of mass advertising. Spam can serve as a mechanism for malicious activities that result in significant harm against victims. The varieties of spam, including its malicious forms and methods of defending against it, are discussed in the following section.
Types of Spam
The most common form of spam is unsolicited e-mail messages from advertisers. Many companies and organizations store e-mail addresses in a database that are commonly sold or distributed to other advertisers. Customer e-mail addresses are often matched with other personal information to create a direct marketing profile. Targeted advertising can include all types of electronic communication.
Companies are increasingly sending SMS text messaging spam to mobile devices. However, SMS spam is much less prevalent compared with e-mail spam. U.S. regulatory bodies, such as the Federal Communications Commission and the Federal Trade Commission, consider SMS spam illegal under the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM 15 U.S.C. § 7701). In addition, telephone service providers often flag and block large volumes of SMS messages sent through their networks.
More recently, social networks, blogs, and instant messenger services have been plagued by spam. For example, Facebook users who accept a fake friend request expose their entire friend network to unsolicited advertisements and fraudulent messages. Despite aggressive spam filtering, spammers continue to thrive on social networking sites. Facebook has reduced the number of spammers to only 0.9% of all users in 2013, but that still equates to 9.5 million spammers still on the site.
...
- Crime, Property
- Crime, Sex
- Crime, Violent
- Crime, White-Collar/Corporate
- Defining Deviance
- Changing Deviance Designations
- Cognitive Deviance
- Conformity
- Constructionist Definitions of Social Problems
- Death of Sociology of Deviance
- Defining Deviance
- Folk Crime
- Hegemony
- Homecomer
- Marginality
- Medicalization of Deviance
- Normal Deviance
- Normalization
- Norms and Societal Expectations
- Positive Deviance
- Positivist Definitions of Deviance
- Primary and Secondary Deviance
- Secret Deviance
- Social Change and Deviance
- Solitary Deviance
- Stranger
- Taboo
- Urban Legends
- Deviance in Social Institutions
- Deviant Subcultures
- Biker Gangs
- Body Modification
- Cockfighting
- Cosplay and Fandom
- Cults
- Dogfighting
- Drag Queens and Kings
- Eunuchs
- Female Bodybuilding
- Fortune-Telling
- Gangs, Street
- Goth Subculture
- Hooliganism
- Metal Culture
- Nudism
- Professional Wrestling
- Punk Subculture
- Rave Culture
- Roller Derby
- Satanism
- Skinheads
- Straight Edge
- Suspension
- Vegetarianism and Veganism
- Discrimination
- Drug Use and Abuse
- Age and Drug Use
- Alcohol and Crime
- Club Drugs
- Cocaine
- Decriminalization and Legalization
- Designer Drugs
- Drug Dependence Treatment
- Drug Normalization
- Drug Policy
- Drug War (War on Drugs)
- Gender and Drug Use
- Heroin
- Legal Highs
- Marijuana
- Methamphetamine
- Performance-Enhancing Drugs
- Prescription Drug Misuse
- Race/Ethnicity and Drug Use
- Socioeconomic Status and Drug Use
- Tobacco and Cigarettes
- Marriage and Family Deviance
- Measuring Deviance
- Mental and Physical Disabilities
- Methodology for Studying Deviance
- Autoethnography
- Collecting Data Online
- Cross-Cultural Methodology
- Edge Ethnography
- Ethics and Deviance Research
- Ethnography and Deviance
- Institutional Review Boards and Studying Deviance
- Interviews
- Participant Observation
- Qualitative Methods in Studying Deviance
- Quantitative Methods in Studying Deviance
- Self-Report Surveys
- Triangulation
- Self-Destructive Deviance
- Sexual Deviance
- Autoerotic Asphyxiation
- Bead Whores
- Bestiality
- Bisexuality
- Bondage and Discipline
- Buckle Bunnies
- Erotica Versus Pornography
- Escorts
- Feederism
- Fetishes
- Furries
- Intersexuality
- Masturbation
- Necrophilia
- Pornography
- Public Sex
- Road Whores
- Sadism and Masochism
- Sex Tourism
- Sexual Addiction
- Sexual Harassment
- Strippers, Female
- Strippers, Male
- Tearooms
- Transgender Lifestyles
- Transsexuals
- Transvestism
- Voyeurism
- Social and Political Protest
- Social Control and Deviance
- Studying Deviant Subcultures
- Technology and Deviance
- Theories of Deviance, Macro
- Anomie Theory
- Broken Windows Thesis
- Chicago School
- Code of the Street
- Conflict Theory
- Feminist Theory
- Institutional Anomie Theory
- Marxist Theory
- Peacemaking Criminology
- Queer Theory
- Routine Activity Theory
- Social Disorganization Theory
- Social Reality Theory
- Southern Subculture of Violence
- Structural Functionalism
- Theories of Deviance, Micro
- Accounts, Sociology of
- Biosocial Perspectives on Deviance
- Constructionist Theories
- Containment Theory
- Control Balance Theory
- Control Theory
- Differential Association Theory
- Dramaturgy
- Drift Theory
- Focal Concerns Theory
- General Strain Theory
- Identity
- Identity Work
- Individualism
- Integrated Theories
- Labeling Approach
- Neutralization Theory
- Phenomenological Theory
- Rational Choice Theory
- Reintegrative Shaming
- Self-Control Theory
- Self-Esteem and Deviance
- Self, The
- Social Bonds
- Social Learning Theory
- Sociolinguistic Theories
- Somatotypes: Sheldon, William
- Symbolic Interactionism
- Transitional Deviance
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches