Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Spam

Cybersecurity Education for Awareness and Compliance
Unwanted or inappropriate messages sent via the Internet normally to a large volume of Internet users usually for advertising purpose or to entice individuals to reveal personal information or spreading malware.
Published in Chapter:
The Role of Education and Awareness in Tackling Insider Threats
Shaun Joseph Smyth (Ulster University, UK), Kevin Curran (Ulster University, UK), and Nigel McKelvey (Computer Science Department, Letterkenny Institute of Technology, Ireland)
Copyright: © 2019 |Pages: 20
DOI: 10.4018/978-1-5225-7847-5.ch003
Abstract
Insider threats present a major concern for organizations worldwide. As organizations need to provide employees with authority to access data to enable them to complete their daily tasks, they leave themselves open to insider attacks. This chapter looks at those who fall into the category which can be referred to as insiders and highlights the activity of outsourcing which is employed by many organizations and defines the term insider threat while pointing out what differentiates an accidental threat from a malicious threat. The discussion also considers various methods of dealing with insider threats before highlighting the role education and awareness plays in the process, the importance of tailoring awareness programs, and what the future holds for insider threats within organizations.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Routine Activity Theory-Based Framework for Combating Cybercrime
Use of electronic messaging systems to send unsolicited bulk messages.
Full Text Chapter Download: US $37.50 Add to Cart
Potential Threats of Social Engineering Practices to Social Work: Concepts, Challenges, and Solutions
It refers to unsolicited communications sent in bulk over the Internet or through electronic messaging systems.
Full Text Chapter Download: US $37.50 Add to Cart
Semantic Web Services
Spam can be defined as unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups.
Full Text Chapter Download: US $37.50 Add to Cart
E-Commerce: The Benefits, Security Risks, and Countermeasures
Unsolicited bulk e-mails that receivers are not willing to get. Today, it gradually becomes a serious problem, which results in the significant cost on e-mail receivers and ISPs (Internet Service Providers).
Full Text Chapter Download: US $37.50 Add to Cart
Honeypots and Honeynets: Analysis and Case Study
Unsolicited or unwanted emails, from an unknown sender, usually of a commercial kind and massively sent.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber-Victimization
The unsolicited bulk distribution of promotional emails.
Full Text Chapter Download: US $37.50 Add to Cart
Online Privacy Issues
Unsolicited communications, typically e-mail, that is unwanted and often offensive
Full Text Chapter Download: US $37.50 Add to Cart
Publishing an Internet E-Zine
This is any unwanted e-mail. The term comes from a Monty Python sketch where “spam” is repeated well over 200 times.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Artificial Intelligence Applications in Cybersecurity
This is unsolicited email or other messaging means that is sent to individuals in bulk.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Unwanted e-mail that usually contains unsolicited commercial advertisements, pornography, or attempts to lure recipients into opening malicious attachments or visiting malicious web sites.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Marketing for NPOs
Unsolicited and or bulk commercial emails often sent to several customers at once. Personalization: Utilizing consumer data to provide personal experiences to customers.
Full Text Chapter Download: US $37.50 Add to Cart
Publishing an Internet E-Zine
This is any unwanted e-mail. The term comes from a Monty Python sketch where “spam” is repeated well over 200 times.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Terrorism Attack: Types, Effects, and Prevention
Unrelated things sent over the internet that is completely irrelevant.
Full Text Chapter Download: US $37.50 Add to Cart
Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks
Spam in social networks refers to undesirable, malevolent, unsolicited content or behavior, exhibiting in different ways, comprising microblogs, tweets, malicious links, fake contacts, false reviews, etc.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
The Advancing Cybersecurity Ecosystem of Israel: An Overview of Current Challenges and Opportunities in the Early 2020s
All bulk unsolicited messages sent electronically. These are most often created by so-called infected computers and distributed through robotic networks. The most common form is commercial e-mail sent to many addresses, promoting products or services that in many cases do not even exist. Spamming can take place through a variety of channels, such as SMS, instant messaging applications, social media, or voice messaging.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Theft through the Web
unwanted e-mail of a commercial nature sent in bulk, analogous to junk mail
Full Text Chapter Download: US $37.50 Add to Cart
The Anatomy of Phishing Attacks and the Detection and Prevention of Fake Domain Names
It refers to unsolicited communications sent in bulk through electronic messaging systems or over the internet.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Laws in Malaysia
Messages sent via the internet often unimportant with the intent to advertise, induce malware and phishing programs.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR