University of Computer Studies (Magway) Ethics In Information Technology (CST - 3213) Ethical Issues Related with Spam Supervised by: U Zaw Win Myint Presented by: Group_4 Ma Mya Hmue Thwe UCSMG_19084 Ma Khin Myat Mon UCSMG_19087 Ma Wai Zin Oo UCSMG_19102 Ma Phyo Ei San UCSMG_19093 Ma Chit Su Kyaw UCSMG_19197 Ma Pan Yoon San Eain UCSMG_18 202
Outlines
Objectives The objectives of this report are: To understand the nature of spam To know the various types of spam To protect againsts phishing ,malware and other cyber threats often delivered through spam To enhance email filtering systems to reduce the amount of spam that reaches users To know how to fight spam
Spam definition What is spam? Unsolicited: Sent without the recipient's consent. Mass Distribution: Sent to a large number of recipients simultaneously. Irrelevant Content: Often not relevant to the recipient's interests or needs. Common Forms: It typically includes emails, but can also encompass text messages, social media posts, and comments. Potentially Harmful: Can include links to phishing sites, malware, or scams.
Why is it called Spam? Monty Python Sketch: Originates from a 1970 sketch where "spam" (the canned meat) is mentioned repeatedly. Annoyance Factor: In the sketch, "spam" is used annoyingly and excessively, similar to unwanted messages. Adoption by Internet Users: Early internet users adopted the term to describe the intrusive and repetitive nature of unsolicited emails and messages.
Types Of Spam
Spam Email Unsolicited, often irrelevant or inappropriate messages sent over email to a large number of recipients. First spam email sent in 1978. Evolved with the rise of the internet and email usage. Characteristics of Spam Emails Unsolicited: Received without prior consent. Mass Distribution: Sent to large groups of people. Commercial Intent: Often promoting products, services, or scams. Spam Email
SEO Spam SEO spam refers to unethical practices used to manipulate search engine rankings, often by violating search engine guidelines to achieve higher visibility in search results. Developed with the rise of search engines and SEO. Initially used to exploit loopholes in search algorithms for ranking advantages. Characteristics of SEO Spam Manipulative Techniques: Employs deceptive methods to improve rankings artificially. Violation of Search Engine Guidelines: Methods often go against search engine policies and best practices. Short-Term Gains: Aimed at achieving quick improvements in search engine rankings without long-term sustainability. SEO Spam
Content spam refers to the deliberate insertion of irrelevant, low-quality, or misleading content into online platforms, including websites, forums, and social media, to manipulate or exploit search engine algorithms or mislead users. Emerged with the growth of the internet and search engines. Aimed at gaming search engine algorithms to gain higher rankings. Characteristics of Content Spam Low-Quality Content: Often lacks substance and value. Keyword Stuffing: Excessive use of keywords to manipulate search engine rankings. Duplicate Content: Repeating the same content across multiple sites or pages. Content Spam
Link Spam Link spam is the practice of posting irrelevant, excessive, or misleading links on websites or social media to drive traffic, manipulate search engine results, or spread malicious content.
Social media spam Social media spam is the posting of unsolicit Social media spam is the posting of unsolicited, irrelevant, or repetitive content on social media platforms, often for promotional or malicious purposes, which can clutter user feeds and degrade platform quality.ed, irrelevant, or repetitive content on social media platforms, often for promotional or malicious purposes, which can clutter user feeds and degrade platform quality.
Spam Text Message and Spam Calls
Tech Support Scams A tech support scam is a type of fraud where scammers pose as technical support representatives from reputable companies to trick you into paying for unnecessary services or giving them access to your personal information.
Current events scams are fraudulent schemes that exploit recent news, trends, or significant events to deceive people. Scammers use these events to create a sense of urgency or legitimacy, making their scams more convincing. Malware spam, often called malspam , is a type of spam email that contains malicious software as its payload. Current events scams Malware Spam
Why Spam is evil? Spam can be considered "evil" for several reasons: Security Risks: Spam often includes malicious links or attachments that can lead to phishing attacks, malware infections, or identity theft. Privacy Violations: Spammers may harvest email addresses and other personal information without consent, infringing on privacy. Resource Drain: Spam wastes valuable resources such as storage space, bandwidth, and processing power for both individuals and organizations. Productivity Loss: The time spent dealing with spam, including sorting and deleting unwanted messages, can reduce productivity and distract from more important tasks. Erosion of Trust: Persistent spam can erode trust in electronic communications, making users more skeptical of legitimate messages. Beyond the annoyance and the time wasted sifting through unwanted messages, spam can cause significant harm by infecting users’ computers with malicious software capable of damaging systems and stealing personal information. It also can consume network resources.
How does Spam work? Spam is rarely sent directly by a company advertising itself. It's usually sent by a "spammer". An advertiser enters into an agreement with a spammer. The cost of spam is far less than postal bulk mailings. How do spammers find you? Sometimes they might buy your address or they obtain them by using software programs known as "harvesters". Here's a brief overview of how it works: Collection of Addresses Sending the Spam Content of the message Avoiding detection Monetization. Spam can distribute through various methods: Email Spam ,Social media spam, Web spam, SMS spam, Instant Messaging Spam
Spam users
How to fight Spam?
Conclusion Summary: Diverse spam users, motives, and ethical boundaries. Defense Strategies: Advanced filters, security tools, proactive culture. Ongoing Education: Stay informed on evolving spam tactics. Collective Effort: Importance of individual and organizational vigilance. Further Resources: Websites, books, organizations for spam prevention.