Catalog

Record Details

Catalog Search


Back To Results
Showing Item 1 of 1

Spam : a shadow history of the Internet  Cover Image Book Book

Spam : a shadow history of the Internet

Summary: The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.

Record details

  • ISBN: 9780262018876 (hardcover : alk. paper)
  • ISBN: 026201887X (hardcover : alk. paper)
  • ISBN: 9780262313933 (electronic bk.)
  • Physical Description: print
    xxiii, 270 pages ; 25 cm.
  • Publisher: Cambridge, Massachusetts : The MIT Press, [2013]

Content descriptions

Bibliography, etc. Note: Includes bibliographical references (pages [229-254)and index.
Formatted Contents Note: Introduction: The shadow history of the internet -- Ready for next message : 1971-1994 -- Make money fast : 1995-2003 -- The victim cloud : 2003-2010 -- Conclusion.
Subject: Spam (Electronic mail) History

Available copies

  • 1 of 1 copy available at Kirtland Community College.

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Kirtland Community College Library HE 7553 .B78 2013 30775305464803 General Collection Available -

Syndetic Solutions - CHOICE_Magazine Review for ISBN Number 9780262018876
Spam : A Shadow History of the Internet
Spam : A Shadow History of the Internet
by Brunton, Finn
Rate this title:
vote data
Click an element below to view details:

CHOICE_Magazine Review

Spam : A Shadow History of the Internet

CHOICE


Copyright American Library Association, used with permission.

Brunton (NYU) enriched his doctoral dissertation to produce a well-crafted, masterfully researched, and engaging scholarly history of Internet spam. He defines spam as "the use of information technology infrastructure to exploit [or waste] existing aggregations of human attention." Something is not spam when it "respects our attention and the finite span of our lives expended at the screen." Such statements warrant close reflection as people experience the Internet and its various expressions: the web, e-mail, search engines, and social networks. Spam entered the Internet lexicon early; the word "spam" was repeated across screens of primitive computers to wipe away user text, a running gag and tribute to a 1970 Monty Python's Flying Circus sketch. The first major use of spam occurred on April 12, 1994, when 6,000 Usenet newsgroup participants received an advertisement marketing legal services for a green card lottery; retribution came quickly in the guise of a distributed denial-of-service attack on the lawyer's phone, fax, and network connections. Today, automated spam bots are largely orchestrated by organized crime; some spam bots even masquerade as blogs, and justice is ludicrous--sources are untraceable. Overall, a thought-provoking discussion of a topic that should interest all Internet users. Summing Up: Recommended. All levels/libraries. M. Mounts Dartmouth College

Back To Results
Showing Item 1 of 1

Additional Resources