On Spam Susceptibility and Browser Updating
نویسندگان
چکیده
This study examines the intersection between the group of users susceptible to spam and users who continue to use out-dated browsers. Specifically, it empirically determines if an association between unsafe user behaviour and the use of an out-dated browser exists. A case study is conducted wherein spam-like emails are sent to 25,000 random email users. The emails each contain a link to a webpage that records information on any visitors. The collected data is parsed and analyzed. Information was recorded on 90 distinct visitors. Analysis showed that approximately 66% of visitors were using out-dated browsers. The work implies that future research on the problem of spam should include browser version information (as a dichotomous variable) as a covariant in their analysis. The results suggest that greater effort must be put into educating the public about safe online behaviour and best practices, including the importance of updating software. DOI: 10.4018/jssoe.2012010103 International Journal of Systems and Service-Oriented Engineering, 3(1), 44-57, January-March 2012 45 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. improve online security. For example, if many users of up-to-date browsers exhibit unsafe behaviour, it suggests that further education and awareness is necessary for all; in the meantime, continued updates and improvements are helpful and effective. On the other hand, if unsafe behaviour is only seen among users of out-dated browsers, more effort should be put into ensuring that these users upgrade and patch their software as new versions become available. Security will always depend on the user as security programs and other safeguards can only do so much (Hazari, 2001, 2010; Orgill, Romney, Bailey, & Orgill, 2004; Werner, 2005). It is arguable that a user with good habits and knowledge of safe practices, even on an unprotected, out-dated system, is better off than a reckless user on an up-to-date and “secured” machine. Updates and patches are not as important if they only serve to protect those who can already protect themselves.
منابع مشابه
A Browser Malware Taxonomy
This restriction of IP space for mail solves one problem but it doesn’t solve others. On the one hand, it makes management of IPs scalable for machines that are bots. Today, most spam is sent from botnets. However, botnets do not always send out all of their spam directly – many bots compromise legitimate mail hosts or email accounts and send out spam that way, or create a throwaway account at ...
متن کاملAn Effective Model for SMS Spam Detection Using Content-based Features and Averaged Neural Network
In recent years, there has been considerable interest among people to use short message service (SMS) as one of the essential and straightforward communications services on mobile devices. The increased popularity of this service also increased the number of mobile devices attacks such as SMS spam messages. SMS spam messages constitute a real problem to mobile subscribers; this worries telecomm...
متن کاملارائه روشی مناسب برای دسته بندی نامه های الکترونیکی تبلیغاتی بر مبنای پروفایل کاربران
In general, Spam is related to satisfy or not satisfy the client and isn’t related to the content of the client’s email. According to this definition, problems arise in the field of marketing and advertising for example, it is possible that some of the advertising emails become spam for some users, and not spam for others. To deal with this problem, many researchers design an anti-s...
متن کاملA Case-Based Approach to Spam Filtering that Can Track Concept Drift
There are a few key benefits of a case-based approach to spam filtering. First, the many different sub-types of spam suggest that a local learner, such as Case-Based Reasoning (CBR) will perform well. Second, the lazy approach to learning in CBR allows for easy updating as new types of spam arrive. Third, the case-based approach to spam filtering allows for the sharing of cases and thus a shari...
متن کاملDetecting Stealth Web Pages That Use Click-Through Cloaking
Search spam is an attack on search engines’ ranking algorithms to promote spam links into top search ranking that they do not deserve. Cloaking is a wellknown search spam technique in which spammers serve one page to search-engine crawlers to optimize ranking, but serve a different page to browser users to maximize potential profit. In this experience report, we investigate a different and rela...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJSSOE
دوره 3 شماره
صفحات -
تاریخ انتشار 2012