skip to main content
article
Free Access

Spam, spim, and spit

Published:01 April 2005Publication History
Skip Abstract Section

Abstract

Abolishing spam, and its morphing forms, will take more than public protest and current filtering and legislative quick fixes.

Index Terms

  1. Spam, spim, and spit

              Recommendations

              Reviews

              Jack Noel Rose

              If you find spam annoying, be forewarned by Cerf's article about additional unwanted technological impositions, called spim and spit. "Spim" refers to unwanted instant messaging (IM) sessions, while "spit" refers to "spam over Internet telephony." As if that weren't disturbing enough, Cerf postulates spamming of the mobile telephone text message system. Focusing on spam, Cerf begins with a knowledgeable history of email. It turns out that closed commercial systems have given way to global connectivity, with wide-open opportunities for abuse. In searching for answers to mitigate or eliminate spam, Cerf looks toward network providers to offer some level of protection, with well-designed acceptable use policies, as opposed to relying on the legislative process, which tends to be slow. In the conclusion, the essay is said to be intended to inspire thoughtful discussion about Internet abuse. It certainly doesn't solve the problem of spam, but does live up to its objective. Online Computing Reviews Service

              Access critical reviews of Computing literature here

              Become a reviewer for Computing Reviews.

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 48, Issue 4
                Transforming China
                April 2005
                106 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/1053291
                Issue’s Table of Contents

                Copyright © 2005 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 April 2005

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format