Catalog

Record Details

Catalog Search


Back To Results
Showing Item 1 of 1

Spam : a shadow history of the Internet  Cover Image Book Book

Spam : a shadow history of the Internet

Summary: The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.

Record details

  • ISBN: 9780262018876 (hardcover : alk. paper)
  • ISBN: 026201887X (hardcover : alk. paper)
  • ISBN: 9780262313933 (electronic bk.)
  • Physical Description: print
    xxiii, 270 pages ; 25 cm.
  • Publisher: Cambridge, Massachusetts : The MIT Press, [2013]

Content descriptions

Bibliography, etc. Note: Includes bibliographical references (pages [229-254)and index.
Formatted Contents Note: Introduction: The shadow history of the internet -- Ready for next message : 1971-1994 -- Make money fast : 1995-2003 -- The victim cloud : 2003-2010 -- Conclusion.
Subject: Spam (Electronic mail) History

Available copies

  • 1 of 1 copy available at Kirtland Community College.

Holds

  • 0 current holds with 1 total copy.
Show All Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Kirtland Community College Library HE 7553 .B78 2013 30775305464803 General Collection Available -

Syndetic Solutions - Table of Contents for ISBN Number 9780262018876
Spam : A Shadow History of the Internet
Spam : A Shadow History of the Internet
by Brunton, Finn
Rate this title:
vote data
Click an element below to view details:

Table of Contents

Spam : A Shadow History of the Internet

SectionSection DescriptionPage Number
Acknowledgmentsp. xi
Introduction: The Shadow History of the Internetp. xiii
    Prelude: The Global Spam Machinep. xiii
    The Technological Drama of Spam, Community, and Attentionp. xvi
    The Three Epochs of Spamp. xxii
1Ready for Next Message: 1971-1994p. 1
    Spam and the Invention of Online Communityp. 1
        Galapagosp. 1
        The Supercommunity and the Reactive Publicp. 5
        Royalists, Anarchists, Parliamentarians, Technolibertariansp. 11
    The Wizardsp. 17
        In the Clean Room: Trust and Protocolsp. 19
        Interrupting the Polyloguep. 29
    The Charivarip. 34
        Complex Primitives: The Usenet Community, Spam, and Newbiesp. 34
        Shaming and Flaming: Antispam, Vigilantism, and the Charivarip. 43
        For Free Information Via Emailp. 48
    The Year September Never Ended: Framing Spam's Adventp. 48
        This Vulnerable Medium: The Green Card Lotteryp. 53
2Make Money Fast: 1995-2003p. 63
    Introduction: The First Ten Movesp. 63
    The Entrepreneursp. 67
        Let's Get Brutal: Premier Services and the Infrastructure of Spamp. 71
    Building Antispamp. 81
        The Cancelbot Warsp. 81
        Spam and Its Metaphorsp. 86
        The Charivari in Power: Nanaep. 93
    You Know the Situation in Africa: Nigeria and 419p. 101
    The Art of Misdirectionp. 110
        Robot-Readabilityp. 110
        The Coevolution of Search and Spamp. 113
3The Victim Cloud: 2003-20 10p. 125
    Filtering: Scientists and Hackersp. 125
        Making Spam Scientific, Part Ip. 125
        Making Spam Hackablep. 133
    Poisoning: The Reinvention of Spamp. 143
        Inventing Litspamp. 143
        The New Suckersp. 152
    "New Twist in Affect": Splogging, Content Farms, and Social Spamp. 155
        The Popular Votep. 155
        The Quantified Audiencep. 161
        In Your Own Words: Spamming and Human-Machine Collaborationsp. 166
    The Botnetsp. 171
        The Marketplacep. 175
        Inside the Library of Babel: The Storm Wormp. 180
        Surveying Storm: Making Spam Scientific, Part IIp. 184
        The Overload: Militarizing Spamp. 187
        Criminal Infrastructurep. 192
Conclusionp. 199
    The Use of Information Technology Infrastructure ...p. 199
    ... To Exploit Existing Aggregation of Human Attentionp. 201
Notesp. 205
Bibliographyp. 229
Indexp. 255
Back To Results
Showing Item 1 of 1

Additional Resources