LEADER 03888nam 2200685 450 001 9910452840403321 005 20200520144314.0 010 $a1-299-45772-X 010 $a0-262-31394-4 035 $a(CKB)2550000001018771 035 $a(EBL)3339610 035 $a(SSID)ssj0000860832 035 $a(PQKBManifestationID)11943768 035 $a(PQKBTitleCode)TC0000860832 035 $a(PQKBWorkID)10914986 035 $a(PQKB)10232500 035 $a(MiAaPQ)EBC3339610 035 $a(CaBNVSL)mat06504634 035 $a(IDAMS)0b00006481d40249 035 $a(IEEE)6504634 035 $a(OCoLC)838102023$z(OCoLC)842892630$z(OCoLC)923251993$z(OCoLC)961654359$z(OCoLC)962648552 035 $a(OCoLC-P)838102023 035 $a(MaCbMITP)9384 035 $a(Au-PeEL)EBL3339610 035 $a(CaPaEBR)ebr10686954 035 $a(CaONFJC)MIL477022 035 $a(OCoLC)838102023 035 $a(EXLCZ)992550000001018771 100 $a20151223d2013 uy 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSpam $ea shadow history of the Internet /$fFinn Brunton 210 1$aCambridge, Massachusetts :$cMIT Press,$d[2013] 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2013] 215 $a1 online resource (295 p.) 225 1 $aInfrastructures 300 $aDescription based upon print version of record. 311 $a0-262-52757-X 311 $a0-262-01887-X 320 $aIncludes bibliographical references and index. 327 $aIntroduction: The shadow history of the internet -- Ready for next message : 1971-1994 -- Make money fast : 1995-2003 -- The victim cloud : 2003-2010 -- Conclusion. 330 $aThe vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves. 410 0$aInfrastructures 606 $aSpam (Electronic mail)$xHistory 606 $aElectronic mail messages 608 $aElectronic books. 615 0$aSpam (Electronic mail)$xHistory. 615 0$aElectronic mail messages. 676 $a384.3/4 700 $aBrunton$b Finn$f1980-$0848393 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910452840403321 996 $aSpam$92027118 997 $aUNINA