Bishop, 2005 - Google Patents
Spam and the CAN-SPAM ActBishop, 2005
View PDF- Document ID
- 4291794677843792667
- Author
- Bishop M
- Publication year
- Publication venue
- Expert Reports, Federal Trade Commission
External Links
Snippet
The goal of the CAN-SPAM Act of 2003 [13](called “Act” or “CAN-SPAM Act” in this paper) is to prevent senders of commercial electronic mail (called “email”) from misleading recipients about the origin and content of email, and to give recipients the ability to decline to receive …
- 239000000463 material 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11595354B2 (en) | Mitigating communication risk by detecting similarity to a trusted message contact | |
US9130989B2 (en) | Securing email communications | |
US20060224677A1 (en) | Method and apparatus for detecting email fraud | |
US20060129644A1 (en) | Email filtering system and method | |
US20080313704A1 (en) | Electronic Message Authentication | |
US20060026246A1 (en) | System and method for authorizing delivery of E-mail and reducing spam | |
WO2004107137A2 (en) | Method and code for authenticating electronic messages | |
Heron | Technologies for spam detection | |
Leiba et al. | A Multifaceted Approach to Spam Reduction. | |
Cerf | Spam, spim, and spit | |
Cook et al. | Phishwish: a simple and stateless phishing filter | |
Bishop | Spam and the CAN-SPAM Act | |
Banday et al. | SPAM--Technological and Legal Aspects | |
Roman et al. | An anti-spam scheme using pre-challenges | |
US20070192420A1 (en) | Method, apparatus and system for a keyed email framework | |
Park et al. | Spam Detection: Increasing Accuracy with A Hybrid Solution. | |
Ismail et al. | Image spam detection: problem and existing solution | |
Dantu et al. | Classification of phishers | |
Srikanthan | An Overview of Spam Handling Techniques | |
Fuhrman | Forensic value of backscatter from email spam | |
Engelberth et al. | Mail-shake | |
Valeeva | SPAM AND ANTI-SPAM METHODS | |
Tung et al. | PISA Anti-Spam Project Group | |
Cobb | Spam, Phishing, and Trojans: Attacks Meant to Fool | |
Fanning et al. | Are you safe from son of spam? |