My Account Log in

8 options

Spam : a shadow history of the Internet / Finn Brunton.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost Ebook Business Collection Available online

View online

EBSCOhost Ebook Public Library Collection - North America Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

Ebook Central University Press Available online

View online

Ebscohost Ebooks University Press Collection (North America) Available online

View online
Format:
Book
Author/Creator:
Brunton, Finn, 1980-
Series:
Infrastructures series.
Infrastructures
Language:
English
Subjects (All):
Spam (Electronic mail)--History.
Spam (Electronic mail).
Electronic mail messages.
Physical Description:
1 online resource (295 p.)
Edition:
1st ed.
Place of Publication:
Cambridge, MA : MIT Press, 2013.
Language Note:
English
Summary:
The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.
Contents:
Introduction: The shadow history of the internet
Ready for next message : 1971-1994
Make money fast : 1995-2003
The victim cloud : 2003-2010
Conclusion.
Notes:
Description based upon print version of record.
OCLC-licensed vendor bibliographic record.
Includes bibliographical references and index.
ISBN:
0-262-31395-2
1-299-45772-X
0-262-31394-4
OCLC:
838102023

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account