2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.

Slides:



Advertisements
Similar presentations
Small Business Resource Power Point Series Guide to Promotion Terminology.
Advertisements

An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Basic Communication on the Internet:
marketing. o is directly marketing a commercial message to a group of people using . o every sent to a potential or current customer.
CHAPTER 4 E-ENVIRONMENT
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Business Plug-In B7 Ethics.
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
AND SPAM BY OLUWATOBI BAKARE
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
E – Commerce and the Applicable Law Rules Judge Ehab Maher Elsonbaty Judge of South Sinai Court in Egypt and Visiting Scholar in the Institution for computer.
February 2005 e-solutions for a Global Economy Evangelos Moustakas – PhD Researcher Middlesex University London - UK Copyright February 2005 Evangelos.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
C4- Social, Legal, and Ethical Issues in the Digital Firm
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
E-Commerce Directive 2002 Overview. This Map It was derived from Complying with the E-Commerce Regulations 2002 by the DTI.
Dr. Omar Al Jadaan The Internet. Internet Service Provider (ISP) Content Providers: create and maintained material that can be accessed using the internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Legislation The need for computer laws Go to Contents.
Marketing Management Online marketing
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
E-commerce--is Based on the use of internet-commerce is fasting becoming an alternative.
Area Of Study 2 Information And Communications Technology(ICT)
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Kill Spam Volume IV The integrated scenario Evangelos Moustakas (BA, MSc, MPhil)
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Web-site Design Strategy.  For P4, learners are required to design a website for LocalBiz - Manningham, this is for a specified purpose and a defined.
Chapter 17 E-Commerce and Digital Law
The new Marketing Landscape
Monitoring Employees on Networks: Unethical or Good Business?
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Optimal Database Marketing Drozdenko & Drake,
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. Week 9: The Internet, ISP & WWW.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Internet, Intranet and extranet. By Ghazia Sohail And Elliot Goulding.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
Information Security Session October 24, 2005
3.06 Understand the use of direct marketing to attract attention and to build brand.
The Internet.
E-COMMERCE Learning Unit 4: ADVERTISING IN E-C0MMERCE
3.06 Understand the use of direct marketing to attract attention and to build brand.
Presentation transcript:

2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for Unsolicited Commercial Communication (Spam) by Mr. Evangelos Moustakas and Dr Penny Duquenoy Middlesex University School of Computing Science London, UK.

Structure Topic - Aims and objectives Using Advantages /Disadvantages Problems caused by Spam Spam Stakeholders Technical Approaches to Blocking Summary and Conclusions Questions - Discussion

–Benefits-Advantages >Share data more easily and efficiently >Efficient method of soliciting customers and selling products. >millions of families and home users. –Disadvantages >Unsolicited Commercial ‘Spam’, >Impinges on the privacy of individual Internet users >Time Consuming reading and deleting the messages where users pay time-based connection fees. >Spam is a violation of Internet etiquette.

Users spend €10 billion/year in connection costs just to receive "junk" s (Research undertaken for the EC)

Problems caused by Spam Customers: Spend on-line time downloading & reading spam ISPs:Cost of providing the infrastructure Frustrates their customers Support overheads - complaints from customers Several systems have collapsed Enterprises: Lost productivity E-Commerce: Threat to consumer confidence in e-commerce Computer viruses arrive via spam ‘I love you’ virus

Stakeholders Internet Service Providers (ISPs) Government – Legislation Customers – Individuals Corporations – Enterprises Marketing Associations Spammers

ISPs E-Commerce (EC Directive) Regulations 2002 Cases where ISPs do accept liability: > Contractual liability > Unauthorised form of messaging > Liability after notice > Liability deriving from Article 7 Data Protection Act > Non-Effective ISP Anti-Spam Techniques that raise liability.

Government - Legislation European Union, EU Directive 2002/58 Effectiveness of the Directive > Most spam originates from outside the EU. > Awareness of the larger companies >Reduction of market competition >Reduction in consumer choice. >Reduction of the impetus for business to develop effective software solutions >The Directive does not prescribe how to meet the requirements Canadian Code of Practice for Consumer Protection in E-Commerce 2003 USA Act of 2000 for UCE Mail

Customers – Individuals > Should be aware that ISPs offer a choice of services > Customers are the ones that will form the ISP’s services. > This will force ISPs to develop anti-spamming software applications > Caution when choosing browsers and other navigation tools > Caution when completing a transaction > Newsgroups - open discussion areas are frequently used to collect s

Corporations – Enterprises > Double role > Development of an e-Policy Guidelines about subscribing to newsletters and web-sites Specify how employees handle unsolicited Should detail how employees can use for personal use. > Employees must be properly educated.

Marketing Associations Control their members’ behaviour online. Ineffective - spammers are not members of the organisation Canadian Marketing Association (CMA) Consumers must be given the opportunity of "opting-out" of any further communication A marketer who fails to live up to the CMA code is expelled from the Association. Direct Marketing Association (DMA) Has launched an Preference Service with a special Web site (

Current Technical Approaches to Blocking Real-Time Blocking Lists MAPS Realtime Blackhole List (RBL)Lists of known spammers Best solution for ‘Dark spam’ e.g. known pornographic spammers BUT Not to ban the entire domain The originating address of a message can be spoofed

Current Technical Approaches to Blocking Content Filtering Technologies >Who can decide what words are offensive? Elron and Oxford English Dictionary (OED) >The problem of “false/positive” hits >Whether confidential information is read from unauthorised parties during the filtering process >“Bouncing back” suspect s >“Honeypot” approach

Summary and Conclusions Problems created by spam Legislative measures currently in operation - Weaknesses. The effectiveness of the EU Directive is small Technical measures (software applications) Cases where ISPs incorrectly blocked legitimate personal communication Co-operative approach is needed, utilised by Internet Service Providers as the primary gatekeepers between senders and recipients.

Thank you :) Evangelos Moustakas (B.A., MSc, MPhil) PhD Researcher Middlesex University