Skip to main content
  • 97 Accesses

Abstract

Spam has emerged as a modern day threat to electronic communications networks. Spam affects governments, service providers, commercial and private users alike. Spamming constitutes a breach of privacy, consumer protection laws, cyber crime laws and can have severe consequences for the party apprehended. Law enforcement that currently remains a cross border issue has yet to be enhanced in order to allow for law enforcement. Cooperation among service providers and the implementation of technical methods is likely to also make an impact. Enhanced end-user awareness can alleviate the burden of managing the huge amounts of spam without, however, necessarily solving the problem. A significant break through can be sought in the direction of authentication mechanisms including electronic identities that protect privacy and allow for personalized services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Deprest, J., Robben, F., E-Government: the approach of the Belgian federal government, FEDICT and CBBSS, 2003.

    Google Scholar 

  2. eEurope Smart Cards, Identification and Authentication in eGovernment, a policy report for eEurope Smart Card Charter Trailblazer 2, 2002.

    Google Scholar 

  3. ETSI TS 101 042, Policy requirements for certification authorities issuing public key certificates, 2001.

    Google Scholar 

  4. Hoernle, J., Sutter, G., Waiden, I. Directivee 97/7/EC on the protection of consumers in respect of distance contracts, in Lodder, A., Kaspersen, H.W.K., eDirectives: Guide to European Union Law on e-commerce, Kluwer law International, 2002.

    Google Scholar 

  5. Mitrakas, A., Citizen Centric Identity Management: Chip Tricks?, Network Security, MCC International, 2002.

    Google Scholar 

  6. Pfleeger C, Security in Computing, Prentice Hall 2000.

    Google Scholar 

  7. Reed, C, Internet Law: Text and Materials, Butterworths, 2000.

    Google Scholar 

  8. Transcrime Research Centre, University of Trento, Transatlantic Agenda EU/US Co-operation for Preventing Computer Related Crime — Final Report, 2002.

    Google Scholar 

  9. UNCITRAL, Model Law on electronic commerce, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Mitrakas, A. (2004). Spam is Here to Stay. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84984-7_18

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05910-1

  • Online ISBN: 978-3-322-84984-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics