Term Paper on "SPAM Filtering"

Term Paper 35 pages (10063 words) Sources: 1+

[EXCERPT] . . . .

spam filtering solution available and tries to analyze and compare the best way to fight email spam and come up with new ideas and approaches to decrease the amount of email spam received by the organizations. This is important because e-mail spam is causing the it industry billions of dollars annually and it is also interfering with legitimate e-commerce and communication. Therefore, this case study gives detailed and unbiased information on the current solutions being used by the it industry and shows the new approaches that will be used. The tactic involved in the data gathering process has been that of a collection of the largest possible number of existing information related to the spam filtering tools from articles published in various scientific journals and magazines by individual researchers, as well as, research institutions. From the data gathered, it is clear that no past studies of this magnitude on this subject have been conducted. The results indicate that whilst, numerous anti-spam products exist in the market, many diverse anti-spam methods and procedures are being used by these products to filter spam. Some of the most widely used techniques found in these products have been summarized and newer ideas and recommendations are also given so that comprehensive steps can be taken to eliminate the phenomenon of spam.

CHAPTER I

INTRODUCTION

Statement of the problem

The thesis takes a look at the current spam filtering solution available and tries to analyze and compare the best way to fight email spam and come up with new ideas and approaches to decrease the amount of email spam received by the organizations.

Continue scrolling to

download full paper
/>

Significance of the Study

E-mail Spam is causing the it industry billions of dollars annually and it is also interfering with legitimate e-commerce and communication.

Purpose of the Study

In my thesis I will give detailed unbiased information of the current solution used by the it industry and show the new approaches that will be used.

Introduction

Spam has become a nuisance for all email users because the element of privacy is compromised and also valuable time and money is at stake. Michael J. Blotzer (2002) highlights the difficulties related to spam. Besides attacking the secrecy and discretion of individuals and wasting valuable time, spam costs valuable money to the organizations. He writes, "Spam arrives at significant cost to the consumer. Spam typically makes up 10% to 30% of e-mail traffic and accounts for as much as 50% of all traffic at some Internet service providers (ISPs). The added expense of bandwidth, servers and engineering support to accommodate spam can cost an ISP millions of dollars per year. One telecommunication company estimates that each spam e-mail costs $1 in lost productivity. You can bet those costs are reflected in subscribers' monthly bills (Michael J. Blotzer, 2002)."

Spam causes financial losses to businesses through the traffic it generates, the time taken to delete these emails. The present environment presents significant threat to the businesses through increased competition and globalization and the last thing businesses want is for their employees to waste valuable and congested Internet traffic. Peter Piazza (2003) reveals the economic and financial problems related to spam: "What can be done to halt the onslaught of spam? The problem is reaching ever-higher proportions, both for corporations and users. On the corporate side, the concern is the rising cost of the traffic (more than $10 billion for American businesses this year, according to a recent report by technology research firm Ferris Research), while for Web surfers, the concern is time and convenience; for example, deleting offensive or annoying messages takes 10-20 minutes per day, according to antivirus firm Symantec. And according to a 2001 study for the European Commission, simply receiving spam cost users $10 billion euros a year worldwide. One pioneer has an idea that he believes may stem the tide: charging spammers for their messages (Peter Piazza, 2003)."

Eric Krapf (2003) explains that email has transformed the lives of ordinary people, business executives and organizations because of the extraordinary usefulness and efficiency of this tool. However, the application of this tool is being endangered by unsolicited commercial advertisements (also known as spam) because businesses are loosing valuable assets because of uncalled-for commercial advertisements. Over the years spam has become a global problem and it has become impossible for any individual nation to act individually to solve this problem. These complications have made businesses use other alternatives, which for now are less problematical, such as "instant messaging." (Eric Krapf, 2003).

Eric Krapf (2003) disagrees with this development and notes, "As if the spammers won't be able to figure out a way to reach us through IM (instant messaging). Right now, chat rooms and enterprise systems make up a universe that's narrow enough that protecting your privacy may not be too difficult. But if and when IM becomes the common mode of electronic communication, don't expect to keep your contact information private. Technology can't defeat a problem when the perpetrators are determined to use technology to further their own ends. The overwhelming popularity of the anti-telemarketing 'do not call' list shows that people want public networks to be used for the public good. it's time for 'do not spam' legislation with teeth (Eric Krapf, 2003)."

It has been revealed, in one latest study, that spam is more destructive and harmful that hackers and global viruses. While many studies have revealed that there has been a noteworthy decline is spamming, the costs of this menace are still staggering.

Tim Lemke (2003) writes, "London-based computer-security firm mi2G said in a report on Thursday that computer outages and lost productivity because of spam led to $10.4 billion in worldwide economic losses in October. Meanwhile, the company said viruses and worms - also known as malware - caused $8.4 billion in losses, while hackers contributed to $1 billion in financial damage worldwide (Tim Lemke, 2003)."

The war being waged against spam has become a household battle as Internet users, throughout the world, have been subscribing to spam filtering software companies. This is because the percentage of spam in the total quantity of emails is very high. William Powell (2003) reveals, "Gartner Research estimates that spam accounts for half of all corporate email. Surprising, isn't it? Spain filters keep much of it from reaching your in-box, but what slips through creates an increasing drain on productivity. Ferris Research estimates that drain will cost corporations U.S.$10 billion in 2003. Brightmail reports that nearly 40% of all email is spam. That figure is up 32% from late 2001 (William Powell, 2003)."

The future outlook of spamming is also not very encouraging because as the number of Internet users and businesses are increasing rapidly so are the figures of unsolicited commercial advertisements. As William Powell, 2003 notes, "Some people actually buy the products that spam advertises. Estimates for follow-ups run 0.1 to 1%. That may sound insignificant, but consider that eMarketer estimates that 76 billion messages are sent out annually through legitimate opt-in email marketing campaigns and that, all told, 2.3 billion spam messages are sent daily. Even at a 0.1% return, the dollars start adding up. Jupiter Media Metrix expects expenditures on legitimate email marketing alone to reach U.S.$9.4 billion by 2006 (William Powell, 2003)."

Spam affects more than one area as revealed by the elevated costs of damage and devastation done through spam. Celia Wren, (2003) writes, "That $9-billion figure takes into account variables like 'consumption of bandwidth' and 'loss of worker productivity' (the average worker, according to Ferris's analysts, wastes 4.5 seconds on each morsel of spam). What these figures do not measure or explain, of course, is the subjective dimension -- the pent-up fury experienced by the helpless spam recipient (Celia Wren, 2003)."

Fred S. Knight (2004) downplays the role technology may play in solving the menace of spam. He writes, "I'm sure that the spammers will find ways to fight and delay the deployment of new technology, and they will do everything they can to keep carriers from locking down the public network. Spam is one of those issues where technology's ability to solve the problem is limited by the public's will (Fred S. Knight, 2004)."

It is clear that spam is a significant threat to the it industry and it has become imperative that an in-depth study of the present spam filtering solutions available are examined and analyzed so that the best way to fight email spam can be discovered and new ideas and approaches to decrease the amount of email spam received by the organizations are also determined.

CHAPTER II

REVIEW of RELATED LITERATURE

This section examines the past studies conducted on this subject. From the data gathered, it is clear that no study of this magnitude on this subject has been conducted. This is because researchers in the 1990s and early 2000s had been dubious about any considerable part for spam in the financial costs of the organizations. This is quite surprising considering the number of spam filtering solutions being offered by… READ MORE

Quoted Instructions for "SPAM Filtering" Assignment:

We will offer a lot more for this order! Email *****cs1@aol.com for an additional file.

The these needs to be writting in APA format with 5 chapters like follows:

Abstract

CHAPTER I INTRODUCTION

CHAPTER II REVIEW OF RELATED LITERATURE

CHAPTER III METHODOLOGY

CHAPTER IV RESULTS

CHAPTER V CONCLUSIONS AND RECOMMENDATIONS

I will be sending more information about the format.

Thesis Objective: To take a look at the current spam filtering solution available and try to analyze and compare the best way to fight email spam and come up with new ideas and approaches to decrease the amount of email spam received by the organizations.

Thesis details:

In my thesis I will answer the following questions:

What is the problem to be addressed?

In my thesis I will discuss and compare the methods used to fight spam like Intelligent Message Filtering (IMF), Brightmail, and Sender/Receiver filtering and many other tools. I will give new solutions and recommendation to the best practice approaches.

Why is this problem worth solving or worth solving better?

E-mail Spam is causing the IT industry billions of dollars annually and it is also interfering with legitimate e-commerce and communication.

How will this study be better than previous approaches?

In my thesis I will give detailed unbiased information of the current solution used by the IT industry and show the new approaches that will be used.

Here is the source:

Order Number: A1073644

Hello, these are the requirements for the thesis, there must be 5 chapters as shown below.

PART I: GUIDELINES FOR PUBLICATION

The American Psychological Association Publication Manual (5th Edition,

2001) is the standard for the publication of the thesis.

Margins

1. The top and bottom margins are to be set at 2.54 cm (1 inch).

2. The left margin must be set at 3.75 cm (1.25 inches) and the right margin

is to be set at 2.54 cm (1 inch).vi

3. The maximum line length is 15.875 cm (6.25 inches).

4. Use the “File/Page Setup” option of your wordprocessor to ensure that

these settings are active for your thesis essay or project document at the

outset of the writing.

Line spacing

1. Text must be double-spaced except as specified in the Publication

Manual.

Font

1. Either Arial OR Times New Roman is to be used. Both are installed with

most Windows applications and thus are readily available.

2. Ensure that the entire document – i.e., all headings, sub-headings, text,

figure captions, figure labels, etc. - is displayed in either (but not both) of

these two fonts.

Point Size

1. The point size must be 12 for the main text.

2. For the chapter designation (e.g., CHAPTER IV), capitalize, embolden and

centre the text using 14 point.

3. For the chapter heading (e.g., REVIEW OF RELATED LITERATURE),

capitalize and centre the text using 12 point.

Page numbering

1. All page numbers are to be centred and located at the bottom of the page.

2. The first and second pages of the document are NOT to be numbered.

vii

3. The pages that follow the second page of the document and that precede

the first numbered page (see next bullet) – i.e., the abstract through to the

table of contents - are to be designated as “i” through “viii” although this

last small Roman numeral may vary depending on whether or not a

DEDICATION or ACKNOWLEDGMENT page is are included. The feature

that you can exploit to enable the two pagination schemes (small Roman

numbers and Arabic numbers) is the “Section” option. A section is an

arbitrarily defined set of pages that has its own formatting protocols

(including page number attributes). Most theses or projects will have three

sections (first page, signatory to “List of Figures”, INTRODUCTION to

REFERENCES). See your word processor manual for details.

4. The first numbered page is the first page of CHAPTER I – i.e., the

INTRODUCTION. The page numbers continue consecutively to the end of

the document.

ABSTRACT

1. Center the word “ABSTRACT” on this page and then begin typing on the very

next line (i.e., do not insert any blank lines between the heading “ABSTRACT”

and the first sentence).

2. Type this section as a single paragraph in block format (i.e., do not use

indentation).

3. The purpose of this section is to provide a brief (250-300 words),

comprehensive summary of the study. The abstract includes a succinct

description of the problem or question that has been investigated, of the

methodology (if any), of the results, and of their implications.

4. It is a good idea to write this section last - i.e., after all of the other sections are

written. One way to help in the writing of the abstract is to take the lead

sentence or two from the introduction, method, results, and discussion

sections and integrate them.

5. Finally, do not cite references in the abstract.

CHAPTER I

INTRODUCTION

1. Start a new page for this section. Set “CHAPTER I” to the Heading 1 style and

“INTRODUCTION” to the Heading 2 style. Do not insert a blank line between

Heading 1 and Heading 2 but do insert a blank, double-spaced line between

the Heading 2 text and the first paragraph.

2. The introduction begins the pagination for the document. That is, the first page

of the “INTRODUCTION” is page 1 of the entire document.

3. The main purpose of this section is to inform the reader why you carried out

the study. In other words, you have to inform the reader of the research

problem or question and indicate why it is important, and how it is unique when

compared to previous studies. This chapter starts out in a general way and

then becomes more and more specific.

4. The first line is indented five characters for all paragraphs in the manuscript.

5. Single space after sentence terminators (i.e., “.”, “?”, “!”).

6. All text is left-aligned - i.e., the left margin forms a straight line and the right

margin is ragged.

7. Do not hyphenate (split) words at the end of a line.

8. Use complete sentences.

9. The first sentence of a paragraph must be independent (i.e., able to stand on

its own).

10. Do not use slang (e.g., “. . put a damper on . .”).

11. Do not use contractions. That is, instead of “it's”, use “it is”.

12. Assume you are writing the paper for submission to a scientific journal.

13. Avoid use of the terms “I”, “me”, and “my” as well as the phrase “personally

speaking”’.

14. Avoid the use of sexist language. For example, consistently referring to a

person as “him” or “he” when it is just as likely for the person to be “she” or

“her”, is sexist. However, using (s)he or him/her all of the time can also be

awkward. If you phrase it correctly, you can often use the word “person”

instead.

15. Avoid using “empty words” or words that serve no purpose. For example, “In

the Smith (1990) study, it was found that . . .” should read “Smith (1990) found

that . . .”.

16. Generally speaking, use the past tense in the ABSTRACT, INTRODUCTION,

and METHODOLOGY sections. The RESULTS and CONCLUSION AND

RECOMMENDATIONS sections can be in the present tense.

17. When abbreviating any terms, spell them out the first time (in both the

abstract and again in the body of the manuscript, if need be). For example,

“The Computer-aided software engineering (CASE) tool was used to...”.

18. Do not use too many abbreviations. Whereas one, two, or three can be

helpful, four or five can be confusing.

21. All measurement reporting is done in metric units.

22. The numbers zero through nine are spelled out (except when it is a table or

figure number, or a metric measurement). The numbers 10 and above are

written as numbers.

23. Capitalize nouns followed by numerals or letters that denote a specific place

in a numbered series. For example, “As can be seen in Figure 3, during Block

4 of Session 2, such and such occurred.”

24. Spell out any number when it is the first thing in a sentence. For example, the

sentence “34 students were used.”, is not appropriate and should read “Thirtyfour

students were used.”

4

25. Be consistent with number formats. That is, if you are reporting a series of

related numbers, then they should all be presented with the same number of

decimal places.

26. If you cite someone's words or ideas, then you must give them credit with a

citation. This is particularly important as the penalties for plagiarism are

severe.

27. Avoid the use of footnotes.

CHAPTER II

REVIEW OF RELATED LITERATURE

1. Start a new page for this section. Set “CHAPTER II” to the Heading 1 style and

“REVIEW OF RELATED LITERATURE” to the Heading 2 style. Do not insert a

blank line between Heading 1 and Heading 2 but do insert a blank, doublespaced

line between the Heading 2 text and the first paragraph.

2. Go on to review the relevant literature. Avoid an exhaustive and historical

review. Your goal is to make clear the connection between previous research

and the present work.

3. You might include any hypotheses and the rationale for them.

4. The final paragraph usually contains a statement which clearly and explicitly

states why the study was performed, such as “The purpose of this study was

to . . .” or “The present study was designed to investigate the . . .”

5. Thus, this section should contain an absolute minimum of four components

(these may or may not constitute sub-headings in this chapter):

•general introduction

•literature review

•connection of the present study to the literature

•explicit statement of purpose of your study

6. Avoid providing the reader with a lengthy and sequential exposition of the

material that you are citing to support your study. The task is to generate a

convincing rationale and a typical strategy is to present a summary of the

trends that you discovered in the previous research in tables or figures.

CHAPTER III

METHODOLOGY

1. Start a new page for this section. Set “CHAPTER III” to the Heading 1 style

and “METHODOLOGY” to the Heading 2 style. Do not insert a blank line

between Heading 1 and Heading 2 but do insert a blank, double-spaced line

between the Heading 2 text and the first paragraph.

2. The purpose of this section is to describe in detail how you performed the study or project. Another researcher should be able to replicate your study based on the information you provide in this section.

3. Use a professional style. That is, do not make it sound like a class project.

Assume you are writing for submission to a scientific journal.

4. Avoid unnecessary details. For example, do not describe the fact that the data

were displayed on a computer screen and recorded on the data sheet(s).

5. If you carried out a simulation or experimental study, then you may need to

define the environment, parameters, and procedure. Use a Heading 3 style for

this section and Heading 4 style for subsections.

CHAPTER IV

RESULTS

1. Start a new page for this section. Set “CHAPTER IV” to the Heading 1 style

and “RESULTS” to the Heading 2 style. Do not insert a blank line between

Heading 1 and Heading 2 but do insert a blank, double-spaced line between

the Heading 2 text and the first paragraph.

2. Look carefully at the results. If you carried out an experimental study, then

take a good hard look at all those numbers you collect. Think of different ways

to summarize them, as well as to make sense of them. The articles that you

scrutinized for inclusion in the REVIEW OF THE LITERATURE section should

provide models for the table and figure configurations that you would use.

3. Do not discuss the implications of the results in this section.

4. Briefly state the main findings in words. That is, first give a general description,

then go into the details.

5. If you are presenting a great deal of material in this section, you may wish to

employ subsections (see “RESULTS” section above of the sample “TABLE OF

CONTENTS” in this document). These subsections (use Heading 4 style)

should have meaning and relevance to the data and should help to organize

your presentation. In other words, they should not be organized by the type of

analysis employed. Since this is not expected by the reader, it is a good idea

to precede the subsections with a paragraph informing the reader of the logical

organization of this section.

6. In cases where the reader would expect something to be significant and it is

not, you should address the issue.

7. Do not provide raw data unless you have carried out a qualitative or

ethnographic study.

8. Displayed below is a sample table. These tables can be generated with margin

and tab settings. However, they can also be generated with the “Table”

function in word processors. The caption for a table can be generated with the

“Insert/Caption” option. If you use the “Table” function, then you will have to

right-justify the data in the rightmost column to set the horizontal lines to

terminate correctly:

CHAPTER V

CONCLUSIONS AND RECOMMENDATIONS

1. Start a new page for this section. Set “CHAPTER V” to the Heading 1 style

and “CONCLUSIONS AND RECOMMENDATIONS” to the Heading 2 style. Do

not insert a blank line between Heading 1 and Heading 2 but do insert a blank,

double-spaced line between the Heading 2 text and the first paragraph.

2. The purpose of this section is to evaluate, to interpret and to discuss the

results, especially with respect to the original research problem(s) or

question(s).

3. Start off with a brief, non-technical summary of the results. In other words, tell

the reader about the main findings without using statistical terminology.

4. Proceed to discuss the implications of the results.

5. It is also important to discuss how the results relate to the literature you cited

in the introduction, that is, emphasize any theoretical consequences of the

results.

6. You might (or might not) also mention any limitations of the study and any

suggestions for future research in this section.

7. Finally, you need an ending paragraph in which you make a final summary

statement of the conclusions that you have drawn.

How to Reference "SPAM Filtering" Term Paper in a Bibliography

SPAM Filtering.” A1-TermPaper.com, 2005, https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086. Accessed 1 Jul 2024.

SPAM Filtering (2005). Retrieved from https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086
A1-TermPaper.com. (2005). SPAM Filtering. [online] Available at: https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086 [Accessed 1 Jul, 2024].
”SPAM Filtering” 2005. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086.
”SPAM Filtering” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086.
[1] ”SPAM Filtering”, A1-TermPaper.com, 2005. [Online]. Available: https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086. [Accessed: 1-Jul-2024].
1. SPAM Filtering [Internet]. A1-TermPaper.com. 2005 [cited 1 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086
1. SPAM Filtering. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/spam-filtering-solution-available/6151086. Published 2005. Accessed July 1, 2024.

Related Term Papers:

Attitude Against Spam Together With Virus Epidemics Term Paper

Paper Icon

attitude against spam together with virus epidemics online, does email marketing still play a role in a business' marketing plans?

Point, click, and delete. Internet users perform these actions countless… read more

Term Paper 1 pages (311 words) Sources: 0 Topic: Computers / IT / Internet


Impact of SPAM and Related Threats on Business Productivity and Security Research Proposal

Paper Icon

Business Productivity

The Affects of Span and Junk eMail on Business Productivity and Security

SPAM and junk email is a growing problem on the worldwide web. SPAM is a cheap… read more

Research Proposal 23 pages (6188 words) Sources: 1+ Style: Harvard Topic: Business / Corporations / E-commerce


Malware Since the Earliest Days of Humankind Term Paper

Paper Icon

Malware

Since the earliest days of humankind, inventions from the wheel to nanotechnology have been used and abused for unethical or illegal purposes. Why would it be any different for… read more

Term Paper 6 pages (1957 words) Sources: 1+ Topic: Computers / IT / Internet


Computer Networks Network Security Research Paper

Paper Icon

Concealing Email Senders

As the Internet and computer technical revolution of the last two to three decades has unfolded, the depth and breadth in which people obscure the source of… read more

Research Paper 6 pages (1910 words) Sources: 0 Topic: Computers / IT / Internet


Children's Safety on the Internet Term Paper

Paper Icon

Children's Safety On The Internet

State and federal Internet laws and regulations have made it safer for children online.

One of the most frequent headlines hitting newspapers and also receiving… read more

Term Paper 15 pages (4143 words) Sources: 1+ Topic: Child Development / Youth / Teens


Mon, Jul 1, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!