The History of Digital Spam

被引:38
|
作者
Ferrara, Emilio [1 ]
机构
[1] Univ Southern Calif, Informat Sci Inst, Appl Data Sci, Marina Del Rey, CA 90292 USA
关键词
Emerging technologies - Research communities;
D O I
10.1145/3299768
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
SPAM! THAT’S WHAT Lorrie Faith Cranor and Brian LaMacchia exclaimed in the title of a popular call-to-action article that appeared 20 years ago in Communications.10 And yet, despite the tremendous efforts of the research community over the last two decades to mitigate this problem, the sense of urgency remains unchanged, as emerging technologies have brought new dangerous forms of digital spam under the spotlight. Furthermore, when spam is carried out with the intent to deceive or influence at scale, it can. Copyright held by author/owner.
引用
收藏
页码:82 / 91
页数:10
相关论文
共 50 条
  • [31] Investment spam, digital libraries, video tours, solid-state PC
    Andrew, Alex M.
    KYBERNETES, 2007, 36 (1-2) : 13 - 16
  • [32] 'Spam'
    不详
    NOVYI MIR, 2008, (04): : 203 - 203
  • [33] Spam!
    AT&T Lab-Research, Florham Park, United States
    Commun ACM, 8 (74-83):
  • [34] Grounding Digital History in the History of Computing
    Turkel, William J.
    Muhammedi, Shezan
    Start, Mary Beth
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 2014, 36 (02) : 72 - 75
  • [35] International Journal of Digital Art History - What is Digital Art History
    Trindade Gago da Camara, Maria Alexandra
    QUIROGA-REVISTA DE PATRIMONIO IBEROAMERICANO, 2018, (14): : 159 - 161
  • [37] Spam
    Groeschel, CE
    COMMUNICATIONS OF THE ACM, 1997, 40 (10) : 24 - 24
  • [38] SPAM
    Casson, T.
    ANAESTHESIA, 2018, 73 : 72 - 72
  • [39] Spam!
    Cranor, LF
    LaMacchia, BA
    COMMUNICATIONS OF THE ACM, 1998, 41 (08) : 74 - 83
  • [40] Spam Mitigation using Spatio-Temporal Reputations from Blacklist History
    West, Andrew G.
    Aviv, Adam J.
    Chang, Jian
    Lee, Insup
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 161 - 170