Spam : a shadow history of the Internet
Available copies
- 1 of 1 copy available at Kirtland Community College.
Current holds
0 current holds with 1 total copy.
Location | Call Number / Copy Notes | Barcode | Shelving Location | Status | Due Date |
---|---|---|---|---|---|
Kirtland Community College Library | HE 7553 .B78 2013 | 30775305464803 | General Collection | Available | - |
Record details
- ISBN: 9780262018876 (hardcover : alk. paper)
- ISBN: 026201887X (hardcover : alk. paper)
- ISBN: 9780262313933 (electronic bk.)
-
Physical Description:
print
xxiii, 270 pages ; 25 cm.
- Publisher: Cambridge, Massachusetts : The MIT Press, [2013]
Content descriptions
Bibliography, etc. Note: | Includes bibliographical references (pages ... Read More |
Formatted Contents Note: | Introduction: The shadow history of the internet ... Read More |
Summary, etc.: | The vast majority of all email sent every day is ... Read More |
Search for related items by subject
Subject: | Spam (Electronic mail) History |
Search for related items by series

CHOICE_Magazine Review
Spam : A Shadow History of the Internet
CHOICE
Copyright American Library Association, used with permission.
Brunton (NYU) enriched his doctoral dissertation to produce a well-crafted, masterfully researched, and engaging scholarly history of Internet spam. He defines spam as "the use of information technology infrastructure to exploit [or waste] existing aggregations of human attention." Something is not spam when it "respects our attention and the finite span of our lives expended at the screen." Such statements warrant close reflection as people experience the Internet and its various expressions: the web, e-mail, search engines, and social networks. Spam entered the Internet lexicon early; the word "spam" was repeated across screens of primitive computers to wipe away user text, a running gag and tribute to a 1970 Monty Python's Flying Circus sketch. The first major use of spam occurred on April 12, 1994, when 6,000 Usenet newsgroup participants received an advertisement marketing legal services for a green card lottery; retribution came quickly in the guise of a distributed denial-of-service attack on the lawyer's phone, fax, and network connections. Today, automated spam bots are largely orchestrated by organized crime; some spam bots even masquerade as blogs, and justice is ludicrous--sources are untraceable. Overall, a thought-provoking discussion of a topic that should interest all Internet users. Summing Up: Recommended. All levels/libraries. M. Mounts Dartmouth College