Part oneSection a: History of spam and spam filters
Spam came about from the need to send messages to potential customers in an unsolicited manner. The history of spam dates back to Arpanet – which preceded the internet computer network. Gary Turk sent an email to 400 individuals through this network in 1978. He advertised his brand of computers. However, the effort proved futile, and it was in 1994 when the act was repeated. This time, it was conducted over Usenet by two lawyers – Laurence Canter and Martha Siegel. These lawyers sent an advertisement on immigration law services. To date, sending of spam has grown, and it forms the majority of emails sent daily. Spammers use disposable email addresses to send spam emails from different computers to avoid blockage. Spam filters emerged to counter the spread of spam. This was motivated by complaints regarding intrusion of privacy by internet users. The first spam filter was made by Listserv . This system allowed internet users to receive emails from other users who have similar interests. This created a group, which was protected by spam filters designed by this company.
Section b: Clear definitions of spam and spam filters
Spam is defined as any email sent to a group of individuals for commercial or other purposes, without permission of such individuals. In this case, the spammer sends such content to market a product without minding whether the receiver forms part of the users of the product . Spam filters are software programs, which are intended, to block the spread of spam content. They filter messages with specific contents by detecting some key words in the messages.
Section c: Business examples of spam and spam filter
A business example of spam and spam filters is their effects on marketers. In this case study, it is clear that spam filters have resulted in a decline in deliverable rates for marketing newsletters. This has been occasioned by an increase in spam emails, which have resulted in an increase in spam blocking. Another business example is in terms of court cases and penalties. A case is the US $ 711 million awarded to Face Book in 2009 after winning against Sanford Wallace, who was an email marketer . In this case, Wallace used ill-gotten passwords to send adverts without user permission.
Section d: Pros and cons of spam and spam filters
The pros of spam and spam filters are that marketers gain a free marketing platform. This enables them to reach a high number of internet users with minimal cost. They also increase their target group in a short time period. In addition, there is a pro of spam filters in that their manufacturers reap profits from this business. Since spammers emerge with new ways of avoiding spam filters, a continuous spam filter improvement provides a lucrative venture for spam filter manufacturers. The cons impact on online users. They feel disturbed by adverts for products that they don’t use at times. In addition, accessing important emails is delayed by spam content. The other con of spam is that it may carry software which has a virus. This may damage files that have been stored by users..
Section e: The next thing for spam and spam filters
Given the inconvenience that spam causes internet users, the future revolves around strict regulation. These regulations will increase the regulatory power of Federal Trade Commission in curbing spammers. For professionals, this means buying software to block spam emails and following employee accounts in a strict manner to ensure that they do not send spam content to customers . For teams, they must be vigilant to ensure that they are updated on spam regulations from time to time.
Part twoSection a: History of identity theft
In the past, identity theft was a personal issue and it involved faking of the identity of an individual in order to obtain certain favors or opportunities. This was the case when individuals sought for a job. This was the case in the 1950s with the emergence of credit cards . In this period of emergence of credit cards, identity theft involved faking photo identification to access credit. It was a period of a shift from the use of cash to the use of credit cards. Given that some credit card users had no previous experience, financial losses were quite high during this period. Identity theft gained roots when the exchange of personal information increased through the use of computers. With technological advancements, global purchases have increased over the internet. Identity theft has been accelerated by this manner of doing business whereby online pirates have been obtaining credit card information in an illegal manner. Government agencies have had to respond to this issue after learning its potential dangers. The first notable step in regulation of this crime was done in 1998 by the US Congress . It adopted the Identity Theft and Assumption Act. This legislation gives federal agencies power to investigate any suspected ID fraud cases.
Section b: Clear definitions on identity theft
Identity theft is varied to a high degree. A concise definition is difficult for this term. However, identity theft can be seen as any attempt to extract personal information without due permission from its owner . This crime is committed for criminal gains in order to gain funds illegally. A clear definition of attempt, in this case, is any action based on intent to obtain such personal information in an illegal manner. This intent may lead to a certain action or it may be based on strategizing for implementation of such action.
Section c: Business examples of identity theft
A business example of identity theft is a case involving Tele-Data Communications. In this case, a help desk worker sold passwords of customers. The buyers of these passwords downloaded credit reports of such customers without their knowledge. These unsuspecting victims lost over US $ 2.7 million to this scheme . Another business example is a case regarding Todd Davis, the CEO of an identity theft protection company – Life Lock. This CEO starred in an advert by sharing his social security number with all viewers of the advert. However, an identity theft occurred whereby 87 individuals obtained an advance loan by using this number .
Section d: Pros and cons of identity theft
The only pros of identity theft are for criminals themselves. They gain from the proceeds they make in an unscrupulous manner. This has been done by criminal groups in order to fund their criminal activities. The cons affect victims of identity theft in that they lose funds to such criminals. The other loss is to financial services companies through which such victims lose their funds. These companies lose credibility of customers and hence their turnovers.
Section e: The next thing in identity theft
The future for identity theft revolves around strict regulation and consumer education. The Federal Trade Commission has plans of launching an interactive website for victims of identity theft. In addition, this website will be used by those individuals who suspect that there are certain cases of identity theft. The Federal Trade Commission plans on gaining such information in order to curb this crime . In addition, financial services companies will be involved in intensifying consumer education in the future. This will reduce chances of falling prey to such identity thieves.
Works Cited
Cole, A. "How We Got Where We Are." The Infamous Identity Theft Crime (2012): 45-46.
Fletcher, Dan. "A Brief History of Spam and Spam Filters." Journal of Business and Money (2011): 32-34.
Hammer, E. and J. Frater. "An Insight into Spam and Spam Filters." Business and Entrepreneurship (2012): 17-19.
Page, Peter. "How Identity Theft Has evolved." Identity Theft and Business (2012): 78-80.