Professional Documents
Culture Documents
Book Relationship With Readings
Book Relationship With Readings
Name
Institution of Affiliation
BOOK RELATIONSHIP WITH READINGS 2
Spam has had an extraordinary impact on the world of internet with virtually everyone
who has used the internet having encountered it in one way or another. In his book, Brunton
(2013) discusses spam and its effect on digital technology, including its impact on laws, cultures,
economies, and languages. Reflecting on the class readings, the book provides details about
spam and its dark history in information technology. Spamming encompasses a wide variety of
bad behavior, malfeasance, and exploitation with the various spam terminologies branching out
into explicit domains from “419 spam” to phishing, to content farms, flood bots, link farms, and
splogs. Rather than being a force of nature, spam is a product of particular populations
distributed across the globe, including government officials, sysadmins, identity thieves, hackers,
marketers, pill merchants, con artists, lawyers, cops, programmers, bots, and their botmasters.
The book provides an understanding of what spam is, how it works, and its history from the
technology. The first one was between the 1970s and 1995 when the internet became privatized,
and spam emerged in the Green Card lottery message on Usenet. The next one was from 1995 to
2003 when the Can-Spam Act was approved in the United States. In this period, spam underwent
massive diversification following the innovations on the internet and the web. The most recent
phase from 2003 involves the use of algorithms by antispammers to block spamming messages.
Having analyzed its history, Burton (2013) explains spam as any use of information technology
resources to abuse the online human aggregations. He portrayed an obverse portrait of spam and
its shadow history with the internet. Spam serves both commercial and non-commercial purposes
while they can be made from both human and non-human sources. They attack networks of both
BOOK RELATIONSHIP WITH READINGS 3
limited and unlimited bandwidths. Therefore, spam is significant in information technology, and
References