Spam :: a Shadow History of the Internet /
The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come f...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, Massachusetts :
The MIT Press,
[2013]
|
Schriftenreihe: | Infrastructures series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780262313940 0262313944 129945772X 9781299457720 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn838102023 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130411s2013 mau ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d TEFOD |d IEEEE |d CUS |d OCLCF |d JSTOR |d RRP |d COO |d IDEBK |d CDX |d E7B |d OCLCQ |d TEFOD |d EBLCP |d DEBSZ |d NKT |d LOA |d JBG |d AZK |d CNNLC |d AGLDB |d OCLCQ |d MOR |d PIFAG |d MERUC |d OCLCQ |d ZCU |d IOG |d U3W |d EZ9 |d UUM |d STF |d WRM |d VNS |d OCLCQ |d VTS |d UOK |d CEF |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d MITPR |d WYU |d G3B |d YOU |d TKN |d OCLCQ |d LEAUB |d DKC |d AU@ |d OCLCQ |d OCL |d UKAHL |d OCLCQ |d MM9 |d RECBK |d INARC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SFB | ||
019 | |a 842892630 |a 923251993 |a 961654359 |a 962648552 |a 1167243413 | ||
020 | |a 9780262313940 |q (electronic bk.) | ||
020 | |a 0262313944 |q (electronic bk.) | ||
020 | |a 129945772X |q (ebk) | ||
020 | |a 9781299457720 |q (ebk) | ||
020 | |z 9780262018876 | ||
020 | |z 026201887X | ||
035 | |a (OCoLC)838102023 |z (OCoLC)842892630 |z (OCoLC)923251993 |z (OCoLC)961654359 |z (OCoLC)962648552 |z (OCoLC)1167243413 | ||
037 | |a 22573/ctt5mxz06 |b JSTOR | ||
037 | |a EF9FBFA2-55D8-4BDB-9298-E4ED60CDDE2D |b OverDrive, Inc. |n http://www.overdrive.com | ||
037 | |a 9384 |b MIT Press | ||
037 | |a 9780262313940 |b MIT Press | ||
050 | 4 | |a HE7553 |b .B78 2013eb | |
072 | 7 | |a COM |x 020020 |2 bisacsh | |
072 | 7 | |a COM080000 |2 bisacsh | |
072 | 7 | |a COM060040 |2 bisacsh | |
082 | 7 | |a 384.3/4 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Brunton, Finn, |d 1980- |1 https://id.oclc.org/worldcat/entity/E39PCjDyXPCxwjWDwPpjrFtcWC |0 http://id.loc.gov/authorities/names/n2012072714 | |
245 | 1 | 0 | |a Spam : |b a Shadow History of the Internet / |c Finn Brunton. |
260 | |a Cambridge, Massachusetts : |b The MIT Press, |c [2013] | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Infrastructures | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a 1. Ready For Next Message: 1971-1994 -- Spam And The Invention Of Online Community -- Galapagos -- The Supercommunity and the Reactive Public -- Royalists, Anarchists, Parliamentarians, Technolibertarians -- The Wizards -- In The Clean Room: Trust And Protocols -- Interrupting The Polylogue -- The Charivari -- Complex Primitives: The Usenet Community, Spam, And Newbies -- Shaming And Flaming: Antispam, Vigilantism, And The Charivari -- For Free Information Via Email -- The Year September Never Ended: Framing Spam's Advent -- This Vulnerable Medium: The Green Card Lottery -- 2. Make Money Fast: 1995-2003 -- Introduction: The First Ten Moves -- The Entrepreneurs -- Let's Get Brutal: Premier Services And The Infrastructure Of Spam -- Building Antispam -- The Cancelbot Wars -- Spam And Its Metaphors -- The Charivari In Power: Nanae -- You Know The Situation In Africa: Nigeria And 419 -- The Art Of Misdirection -- Robot-Readability -- The Coevolution Of Search And Spam -- 3. The Victim Cloud: 2003-2010 -- Filtering: Scientists And Hackers -- Making Spam Scientific, Part 1 -- Making Spam Hackable -- Poisoning: The Reinvention Of Spam -- Inventing Litspam -- The New Suckers -- "New Twist In Affect": Splogging, Content Farms, And Social Spam -- The Popular Vote -- The Quantified Audience -- In Your Own Words: Spamming And Human-Machine Collaborations -- The Botnets -- The Marketplace -- Inside The Library Of Babel: The Storm Worm -- Surveying Storm: Making Spam Scientific, Part II -- The Overload: Militarizing Spam -- Criminal Infrastructure -- Conclusion -- The Use Of Information Technology Infrastructure -- ... To Exploit Existing Aggregation Of Human Attention. | |
520 | |a The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves. | ||
650 | 0 | |a Spam (Electronic mail) |x History. | |
650 | 6 | |a Pourriels |x Histoire. | |
650 | 7 | |a COMPUTERS |x System Administration |x Email Administration. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x History. |2 bisacsh | |
650 | 7 | |a Spam (Electronic mail) |2 fast | |
653 | |a INFORMATION SCIENCE/Internet Studies | ||
653 | |a INFORMATION SCIENCE/General | ||
653 | |a SOCIAL SCIENCES/Media Studies | ||
655 | 0 | |a Electronic books. | |
655 | 7 | |a History |2 fast | |
776 | 0 | 8 | |i Print version: |a Brunton, Finn, 1980- |t Spam. |d Cambridge, Massachusetts : The MIT Press, [2013] |z 9780262018876 |w (DLC) 2012034252 |w (OCoLC)813540884 |
830 | 0 | |a Infrastructures series. |0 http://id.loc.gov/authorities/names/no2011170154 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=562440 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH33866729 | ||
938 | |a Coutts Information Services |b COUT |n 25249137 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL3339610 | ||
938 | |a ebrary |b EBRY |n ebr10686954 | ||
938 | |a EBSCOhost |b EBSC |n 562440 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis25249137 | ||
938 | |a IEEE |b IEEE |n 6504634 | ||
938 | |a Internet Archive |b INAR |n spamshadowhistor0000brun | ||
938 | |a Recorded Books, LLC |b RECE |n rbeEB00828542 | ||
938 | |a YBP Library Services |b YANK |n 10434963 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn838102023 |
---|---|
_version_ | 1816796908516016128 |
adam_text | |
any_adam_object | |
author | Brunton, Finn, 1980- |
author_GND | http://id.loc.gov/authorities/names/n2012072714 |
author_facet | Brunton, Finn, 1980- |
author_role | |
author_sort | Brunton, Finn, 1980- |
author_variant | f b fb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HE7553 |
callnumber-raw | HE7553 .B78 2013eb |
callnumber-search | HE7553 .B78 2013eb |
callnumber-sort | HE 47553 B78 42013EB |
callnumber-subject | HE - Transportation and Communications |
collection | ZDB-4-EBU |
contents | 1. Ready For Next Message: 1971-1994 -- Spam And The Invention Of Online Community -- Galapagos -- The Supercommunity and the Reactive Public -- Royalists, Anarchists, Parliamentarians, Technolibertarians -- The Wizards -- In The Clean Room: Trust And Protocols -- Interrupting The Polylogue -- The Charivari -- Complex Primitives: The Usenet Community, Spam, And Newbies -- Shaming And Flaming: Antispam, Vigilantism, And The Charivari -- For Free Information Via Email -- The Year September Never Ended: Framing Spam's Advent -- This Vulnerable Medium: The Green Card Lottery -- 2. Make Money Fast: 1995-2003 -- Introduction: The First Ten Moves -- The Entrepreneurs -- Let's Get Brutal: Premier Services And The Infrastructure Of Spam -- Building Antispam -- The Cancelbot Wars -- Spam And Its Metaphors -- The Charivari In Power: Nanae -- You Know The Situation In Africa: Nigeria And 419 -- The Art Of Misdirection -- Robot-Readability -- The Coevolution Of Search And Spam -- 3. The Victim Cloud: 2003-2010 -- Filtering: Scientists And Hackers -- Making Spam Scientific, Part 1 -- Making Spam Hackable -- Poisoning: The Reinvention Of Spam -- Inventing Litspam -- The New Suckers -- "New Twist In Affect": Splogging, Content Farms, And Social Spam -- The Popular Vote -- The Quantified Audience -- In Your Own Words: Spamming And Human-Machine Collaborations -- The Botnets -- The Marketplace -- Inside The Library Of Babel: The Storm Worm -- Surveying Storm: Making Spam Scientific, Part II -- The Overload: Militarizing Spam -- Criminal Infrastructure -- Conclusion -- The Use Of Information Technology Infrastructure -- ... To Exploit Existing Aggregation Of Human Attention. |
ctrlnum | (OCoLC)838102023 |
dewey-full | 384.3/4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 384 - Communications |
dewey-raw | 384.3/4 |
dewey-search | 384.3/4 |
dewey-sort | 3384.3 14 |
dewey-tens | 380 - Commerce, communications, transportation |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06816cam a2200757 a 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn838102023</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">130411s2013 mau ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">IEEEE</subfield><subfield code="d">CUS</subfield><subfield code="d">OCLCF</subfield><subfield code="d">JSTOR</subfield><subfield code="d">RRP</subfield><subfield code="d">COO</subfield><subfield code="d">IDEBK</subfield><subfield code="d">CDX</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">NKT</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">AZK</subfield><subfield code="d">CNNLC</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">IOG</subfield><subfield code="d">U3W</subfield><subfield code="d">EZ9</subfield><subfield code="d">UUM</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VNS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">UOK</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MITPR</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">YOU</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MM9</subfield><subfield code="d">RECBK</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SFB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">842892630</subfield><subfield code="a">923251993</subfield><subfield code="a">961654359</subfield><subfield code="a">962648552</subfield><subfield code="a">1167243413</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780262313940</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0262313944</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">129945772X</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299457720</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780262018876</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">026201887X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)838102023</subfield><subfield code="z">(OCoLC)842892630</subfield><subfield code="z">(OCoLC)923251993</subfield><subfield code="z">(OCoLC)961654359</subfield><subfield code="z">(OCoLC)962648552</subfield><subfield code="z">(OCoLC)1167243413</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt5mxz06</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">EF9FBFA2-55D8-4BDB-9298-E4ED60CDDE2D</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9384</subfield><subfield code="b">MIT Press</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9780262313940</subfield><subfield code="b">MIT Press</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HE7553</subfield><subfield code="b">.B78 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">020020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM080000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">384.3/4</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brunton, Finn,</subfield><subfield code="d">1980-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDyXPCxwjWDwPpjrFtcWC</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2012072714</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Spam :</subfield><subfield code="b">a Shadow History of the Internet /</subfield><subfield code="c">Finn Brunton.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cambridge, Massachusetts :</subfield><subfield code="b">The MIT Press,</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Infrastructures</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Ready For Next Message: 1971-1994 -- Spam And The Invention Of Online Community -- Galapagos -- The Supercommunity and the Reactive Public -- Royalists, Anarchists, Parliamentarians, Technolibertarians -- The Wizards -- In The Clean Room: Trust And Protocols -- Interrupting The Polylogue -- The Charivari -- Complex Primitives: The Usenet Community, Spam, And Newbies -- Shaming And Flaming: Antispam, Vigilantism, And The Charivari -- For Free Information Via Email -- The Year September Never Ended: Framing Spam's Advent -- This Vulnerable Medium: The Green Card Lottery -- 2. Make Money Fast: 1995-2003 -- Introduction: The First Ten Moves -- The Entrepreneurs -- Let's Get Brutal: Premier Services And The Infrastructure Of Spam -- Building Antispam -- The Cancelbot Wars -- Spam And Its Metaphors -- The Charivari In Power: Nanae -- You Know The Situation In Africa: Nigeria And 419 -- The Art Of Misdirection -- Robot-Readability -- The Coevolution Of Search And Spam -- 3. The Victim Cloud: 2003-2010 -- Filtering: Scientists And Hackers -- Making Spam Scientific, Part 1 -- Making Spam Hackable -- Poisoning: The Reinvention Of Spam -- Inventing Litspam -- The New Suckers -- "New Twist In Affect": Splogging, Content Farms, And Social Spam -- The Popular Vote -- The Quantified Audience -- In Your Own Words: Spamming And Human-Machine Collaborations -- The Botnets -- The Marketplace -- Inside The Library Of Babel: The Storm Worm -- Surveying Storm: Making Spam Scientific, Part II -- The Overload: Militarizing Spam -- Criminal Infrastructure -- Conclusion -- The Use Of Information Technology Infrastructure -- ... To Exploit Existing Aggregation Of Human Attention.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Spam (Electronic mail)</subfield><subfield code="x">History.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pourriels</subfield><subfield code="x">Histoire.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">System Administration</subfield><subfield code="x">Email Administration.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">History.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Spam (Electronic mail)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">INFORMATION SCIENCE/Internet Studies</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">INFORMATION SCIENCE/General</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">SOCIAL SCIENCES/Media Studies</subfield></datafield><datafield tag="655" ind1=" " ind2="0"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">History</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Brunton, Finn, 1980-</subfield><subfield code="t">Spam.</subfield><subfield code="d">Cambridge, Massachusetts : The MIT Press, [2013]</subfield><subfield code="z">9780262018876</subfield><subfield code="w">(DLC) 2012034252</subfield><subfield code="w">(OCoLC)813540884</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Infrastructures series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011170154</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=562440</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH33866729</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">25249137</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL3339610</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10686954</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">562440</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis25249137</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">6504634</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">spamshadowhistor0000brun</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Recorded Books, LLC</subfield><subfield code="b">RECE</subfield><subfield code="n">rbeEB00828542</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10434963</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. History fast |
genre_facet | Electronic books. History |
id | ZDB-4-EBU-ocn838102023 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:09Z |
institution | BVB |
isbn | 9780262313940 0262313944 129945772X 9781299457720 |
language | English |
oclc_num | 838102023 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBU |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | The MIT Press, |
record_format | marc |
series | Infrastructures series. |
series2 | Infrastructures |
spelling | Brunton, Finn, 1980- https://id.oclc.org/worldcat/entity/E39PCjDyXPCxwjWDwPpjrFtcWC http://id.loc.gov/authorities/names/n2012072714 Spam : a Shadow History of the Internet / Finn Brunton. Cambridge, Massachusetts : The MIT Press, [2013] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Infrastructures Includes bibliographical references and index. Print version record. 1. Ready For Next Message: 1971-1994 -- Spam And The Invention Of Online Community -- Galapagos -- The Supercommunity and the Reactive Public -- Royalists, Anarchists, Parliamentarians, Technolibertarians -- The Wizards -- In The Clean Room: Trust And Protocols -- Interrupting The Polylogue -- The Charivari -- Complex Primitives: The Usenet Community, Spam, And Newbies -- Shaming And Flaming: Antispam, Vigilantism, And The Charivari -- For Free Information Via Email -- The Year September Never Ended: Framing Spam's Advent -- This Vulnerable Medium: The Green Card Lottery -- 2. Make Money Fast: 1995-2003 -- Introduction: The First Ten Moves -- The Entrepreneurs -- Let's Get Brutal: Premier Services And The Infrastructure Of Spam -- Building Antispam -- The Cancelbot Wars -- Spam And Its Metaphors -- The Charivari In Power: Nanae -- You Know The Situation In Africa: Nigeria And 419 -- The Art Of Misdirection -- Robot-Readability -- The Coevolution Of Search And Spam -- 3. The Victim Cloud: 2003-2010 -- Filtering: Scientists And Hackers -- Making Spam Scientific, Part 1 -- Making Spam Hackable -- Poisoning: The Reinvention Of Spam -- Inventing Litspam -- The New Suckers -- "New Twist In Affect": Splogging, Content Farms, And Social Spam -- The Popular Vote -- The Quantified Audience -- In Your Own Words: Spamming And Human-Machine Collaborations -- The Botnets -- The Marketplace -- Inside The Library Of Babel: The Storm Worm -- Surveying Storm: Making Spam Scientific, Part II -- The Overload: Militarizing Spam -- Criminal Infrastructure -- Conclusion -- The Use Of Information Technology Infrastructure -- ... To Exploit Existing Aggregation Of Human Attention. The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand. This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms -- spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves. Spam (Electronic mail) History. Pourriels Histoire. COMPUTERS System Administration Email Administration. bisacsh COMPUTERS History. bisacsh Spam (Electronic mail) fast INFORMATION SCIENCE/Internet Studies INFORMATION SCIENCE/General SOCIAL SCIENCES/Media Studies Electronic books. History fast Print version: Brunton, Finn, 1980- Spam. Cambridge, Massachusetts : The MIT Press, [2013] 9780262018876 (DLC) 2012034252 (OCoLC)813540884 Infrastructures series. http://id.loc.gov/authorities/names/no2011170154 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=562440 Volltext |
spellingShingle | Brunton, Finn, 1980- Spam : a Shadow History of the Internet / Infrastructures series. 1. Ready For Next Message: 1971-1994 -- Spam And The Invention Of Online Community -- Galapagos -- The Supercommunity and the Reactive Public -- Royalists, Anarchists, Parliamentarians, Technolibertarians -- The Wizards -- In The Clean Room: Trust And Protocols -- Interrupting The Polylogue -- The Charivari -- Complex Primitives: The Usenet Community, Spam, And Newbies -- Shaming And Flaming: Antispam, Vigilantism, And The Charivari -- For Free Information Via Email -- The Year September Never Ended: Framing Spam's Advent -- This Vulnerable Medium: The Green Card Lottery -- 2. Make Money Fast: 1995-2003 -- Introduction: The First Ten Moves -- The Entrepreneurs -- Let's Get Brutal: Premier Services And The Infrastructure Of Spam -- Building Antispam -- The Cancelbot Wars -- Spam And Its Metaphors -- The Charivari In Power: Nanae -- You Know The Situation In Africa: Nigeria And 419 -- The Art Of Misdirection -- Robot-Readability -- The Coevolution Of Search And Spam -- 3. The Victim Cloud: 2003-2010 -- Filtering: Scientists And Hackers -- Making Spam Scientific, Part 1 -- Making Spam Hackable -- Poisoning: The Reinvention Of Spam -- Inventing Litspam -- The New Suckers -- "New Twist In Affect": Splogging, Content Farms, And Social Spam -- The Popular Vote -- The Quantified Audience -- In Your Own Words: Spamming And Human-Machine Collaborations -- The Botnets -- The Marketplace -- Inside The Library Of Babel: The Storm Worm -- Surveying Storm: Making Spam Scientific, Part II -- The Overload: Militarizing Spam -- Criminal Infrastructure -- Conclusion -- The Use Of Information Technology Infrastructure -- ... To Exploit Existing Aggregation Of Human Attention. Spam (Electronic mail) History. Pourriels Histoire. COMPUTERS System Administration Email Administration. bisacsh COMPUTERS History. bisacsh Spam (Electronic mail) fast |
title | Spam : a Shadow History of the Internet / |
title_auth | Spam : a Shadow History of the Internet / |
title_exact_search | Spam : a Shadow History of the Internet / |
title_full | Spam : a Shadow History of the Internet / Finn Brunton. |
title_fullStr | Spam : a Shadow History of the Internet / Finn Brunton. |
title_full_unstemmed | Spam : a Shadow History of the Internet / Finn Brunton. |
title_short | Spam : |
title_sort | spam a shadow history of the internet |
title_sub | a Shadow History of the Internet / |
topic | Spam (Electronic mail) History. Pourriels Histoire. COMPUTERS System Administration Email Administration. bisacsh COMPUTERS History. bisacsh Spam (Electronic mail) fast |
topic_facet | Spam (Electronic mail) History. Pourriels Histoire. COMPUTERS System Administration Email Administration. COMPUTERS History. Spam (Electronic mail) Electronic books. History |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=562440 |
work_keys_str_mv | AT bruntonfinn spamashadowhistoryoftheinternet |