Effective Anti-Spam Strategies in Companies: An

Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
Effective Anti-spam Strategies in Companies: An International Study
Mikko Siponena
Carl Stuckeb
a
Department of Information Processing Science, University of Oulu, Oulu, Finland
b
Department of Computer Information Systems, Georgia State University, 35 Broad Street,
Atlanta, Georgia 30302, USA.
Abstract
While spam is considered a crucial problem for
both companies and ordinary computer users, little is
known about how spam actually affects companies
and which anti-spam techniques have been found
most useful in practice. To address these issues, we
explored the 500 biggest companies in the US (n=44)
and Finland (n=101). The results suggest that 81.6%
of all email traffic is spam, and that the respondents
use 13 minutes of their daily working time to deal
with spam. The time used for dealing with spam and
the age of the respondents influence attitudes towards
spam. There is marginal support that having an email address available on the Internet correlates with
the amount of spam one receives. Filters, blacklists,
restricting the disclosure of email addresses,
presenting modified or invalid email addresses, and
white lists were seen as the most effective anti-spam
techniques, in order of effectiveness. The respondents
saw that Internet Service Providers and legislation
should take strong action against spam.
1. Introduction
Spam, referring to the sending of unsolicited email,
is a crucial and increasing problem for both home
users and companies. A few recent years and spam
estimates for those years are: 2002 at 36 % [1], 2003
at 12-15 % [6], 2004 at 64 % [4], and 2004 again at
75% [11]. While these estimates vary as to how much
of all email traffic is spam, the overall increase is
clearly shown.
The extant research regarding spam has focused on
different anti-spam techniques, such as filters (e.g.,
[3]), blacklists [4] and helping Internet Service
Providers prevent sending outgoing spam [7].
Previous research has also studied the content of the
spam messages. For example, according to a study by
Cranor and LaMacchia [2], 35 % of all spam was
advertisements for money-making opportunities, while
25 % of the spam advertised different products [2].
Furthermore, while spam and the effectiveness of
technical anti-spam techniques have been studied at
one organization or one Internet Service Provided
level ([2]; [4 p. 372]), we find no academic studies
exploring how spam actually affects companies in
reality, and what anti-spam methods are found useful.
In order to address these issues, we explored 500
biggest companies in the US (Fortune 500) (n=44)
and Finland (n=101).
The remainder of this paper is organized as
follows. In the second section, the research
background, including the hypotheses, is described. In
the third section, the results of the study are presented.
The fourth section, the discussion, considers the
limitations and the implications of the study. Finally,
in the conclusion, the key findings of the study are
summarized.
2. Research background,
subjects and research methods
research
Extant research on spam motivated the 13
hypotheses listed next, along with open, unstructured,
qualitative questions to obtain more information on
these issues.
Effectiveness of anti-spam techniques. It is
important for practitioners to know which anti-spam
techniques really work in practice, and which
techniques are less useful. To explore this, we have
formulated the following hypotheses:
H1: There is no difference between the usefulness
of different anti-spam techniques.
H2: Respondent age and perceived usefulness of
anti-spam techniques are independent.
Small businesses are a larger target of SPAM [11].
Hence, company size might explain the differences in
usefulness between the anti-spam techniques.
Therefore, we hypothesize:
H3: Company size and usefulness of anti-spam
techniques are independent.
0-7695-2507-5/06/$20.00 (C) 2006 IEEE
.
1
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
Previous research has speculated, without
statistical explanatory power, that the more available
your address is on the Internet, the more spam you
will receive [2]. To study this, we hypothesize:
H4: The availability of one’s email address on the
Internet, and the amount of spam received, are
independent.
Attitude towards spam.
It is often speculated that spam is a serious threat
to companies. To study whether this anecdotal
evidence is true regarding Fortune 500 companies, we
study the following hypotheses:
H5A: Spam is not a problem in the company.
H5B: Spam will not be a problem in the company
in the future.
To study whether age explains attitude towards
(perceived problem of) spam, we test the hypotheses:
H6: Respondents’ age and perception of the
problem of spam (attitude towards spam) are
independent. A study [10] concluded that age was not
a significant influence on attitude toward spam. This
motivates analyzing whether age might influence
attitudes toward spam (H6) and perceptions of antispam technique usefulness.
H7: Respondents’ age and whether spam will be a
problem in the future (attitude towards spam) are
independent.
H8: Company size and amount of spam received
are independent.
Working time and spam.
H9: The working time used for dealing with spam
and the amount of spam received are independent.
H10: The time used for dealing with spam and the
perceived problem of spam (attitude towards spam)
are independent.
Attitude towards anti-spam strategies. To explore
whether the amount of spam and the perceived
usefulness of the anti-spam strategies are independent,
we hypothesize:
H11: The amount of spam received and the
usefulness of the anti-spam strategies are independent.
To consider whether the perceived problem of
spam (attitude towards spam) currently and in the
future, and the usefulness of the anti-spam strategies
are independent, the following hypotheses were
formulated:
H12: The perceived problem of spam (attitude
towards spam) and the usefulness of the anti-spam
strategies are independent.
H13: The perceived problem of spam (attitude
towards spam) in future and the usefulness of the antispam strategies are independent.
Data Collection. Based on the existing research
literature, a questionnaire was designed, to obtain
information on how spam actually affects companies
in reality, and what anti-spam techniques have been
found useful. The questionnaire consists of both
qualitative and quantitative items. Regarding the
latter, the respondents were asked to answer each
quantitative question using a seven-point Likert scale.
The questionnaire was put on the web page of the
Georgia State University, USA, and the respondents
were asked to fill out the questionnaire on this web
page.
To study how spam actually affects companies in
reality, and what anti-spam techniques have been
found useful, we selected 500 biggest companies in
the US (Fortune 500) and Finland as the target
population. Within these companies, the survey
instrument was sent to operational IT managers.
Operational IT managers typically have used different
anti-spam techniques and therefore may have
important insights about how the problem of spam
should be handled. Accordingly, the WWW-link to
the questionnaire was first emailed to operational IT
managers in our selected companies. Then, to increase
the response rate, and ensure that our email invitation
to fill out the questionnaire was not removed by the
companies’ spam filters (a frequent event), a request
to fill out the questionnaire was mailed to those
Finnish companies who did not respond in the first
round. No mail was sent to the U.S. firms which may
partially explain the low response rate. Instead, a
follow-up email was sent.
Altogether, we received responses from 101
Finnish and 44 US companies. The response rate in
Finland was about 20 percent, and in the US about 9
percent. The low US response rate is in accordance
with recent findings showing difficulty obtaining
security-related data from US companies [5]. The
collection of the data took about 10 months, and was
carried out in 2004.
3. Results of the study
The average age of our respondents was 43. Of 145
respondents, 122 respondents (84 %) were male and
23 respondents (16 %) were female. Our respondents
received 348 030 emails per day. Of those, 283 922,
or 81.6 %, were spam.
Of the 145 respondents, 52 (36 %) have and 92 (64
%) do not have their email address available on the
company’s website.
Of the 145 respondents, 58 respondents do not, and
81 do analyze the headers of spam messages (5
respondents do not know whether they analyze the
headers or not).
According to our respondents, spam takes up an
average of 13 minutes of working time each day.
2
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
The respondents estimated that 14 percent of the
spam they receive originates from their own country,
and 86 percent of the spam originates from a foreign
country (39 respondents did not know where the spam
comes from). When we asked the respondents to
estimate where most of the spam comes from, 47
respondents suggested the US as the main source of
spam, while 2 suggested Czech and 2 the UK as being
the main source of spam. Eastern Europe was
mentioned by 3 respondents, Africa and Asia by 2
respondents each, and Russia by 3 respondents.
3.1. Quantitative results
Anti-spam technique effectiveness
H1: There is no difference between the usefulness
of different anti-spam techniques. This hypothesis is
not supported.
H2: Respondent age and perceived usefulness of
anti-spam techniques are not related. This hypothesis
is supported, with the exception that there is statistical
evidence that the expected value of the perceived
usefulness of blacklist is related to the value of age.
H3 held that company size and perceived
usefulness of anti-spam techniques are independent.
As seen in Table 5, this not was the case in relation to
users deleting spam and displaying email addresses as
pictures. Otherwise, the hypothesis was supported.
Availability of email address on the Internet and
spam
H4: The availability of one’s email address on the
Internet, and the amount of spam received, are
independent. With p = .0520 for Pearson Correlation,
the availability of one’s e-mail address on the Internet
has a marginal influence on the amount of spam
received. However, if we eliminate two outlier
observations, ANOVA shows substantial influence.
Attitude towards spam.
As noted earlier, H5A (Spam is not a problem in the
company) received 137 responses with a mean of
4.408 with a standard deviation of 1.59. H5B (Spam
will not be a problem in the company in the future)
received 134 responses with a mean of 5.2 with a
standard deviation of 1.37. Given this view that spam
is to be more of a problem in the future, we
investigated potential influences on attitudes towards
spam.
To study whether age explains attitude towards
spam, we hypothesized as follows:
H6 postulated that age and perceived problem of
spam are independent. The Pearson Correlation gives
a p of .0346, showing dependence.
H7: Respondent’s age and whether spam will be a
problem in the future are independent as indicated by
a Pearson Correlation p of .2120
H8: Company size and amount of spam received
are independent since the Pearson Correlation yields a
p of .8239.
Working time and spam.
H9 held that the working time used for dealing
with spam and the amount of spam received are
independent. The Pearson Correlation p of .8180
supports this.
H10 proposed that the time used for dealing with
spam and the perceived problem of spam are
independent. This hypothesis is not supported. (The
Pearson Correlation p of .0076 suggested influence
between these two. Multiple regression and ANOVA
suggest there is strong statistical evidence that an
increase in time dealing with spam is associated with a
decrease in the expected value of the perceived
problem of spam)
Attitude towards anti-spam strategies.
H11 suggested that the amount of spam received
and the usefulness of the anti-spam strategies are
independent. This was supported, except in the case of
restricting Internet disclosure of email addresses (at
cut off with round off).
H12 postulated that the perceived problem of spam
and the usefulness of the anti-spam strategies are
independent. This hypothesis is supported, with the
exception of restricting Internet disclosure of email
addresses,
presenting
modified/invalid
email
addresses on the Internet, filters, and blacklists.
H13 suggested that the perceived problem of spam
in future and the usefulness of the anti-spam strategies
are independent. This hypothesis is supported, except
in the case of use of blacklists.
The role of Internet Service Providers and
legislation in fighting spam.
According to the respondents, Internet Service
Providers (average value on a 7-point Likert scale was
6.27; where 1 denoted 1 “overlook” and 7 “take
strong actions against the spammers”) and legislation
(average value on a 7-point Likert scale was 6.15)
alike should take strong action against spam.
3
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
Why spam will or will be not a problem?
Table 1. Volume and perceived problem of spam.
Standard
Deviation
(S)
145
Average
value on a
scale of 1
to 7
6.0
143
4.4
1.57
135
5.2
1.37
Number of
respondents
Has the volume
of spam been
increasing during
recent years?
Is spam
currently a
problem in your
company?
Do you think
that spam will
be a problem in
your company
in future?
1.32
As Table 1 suggests, 145 respondents see the volume
of spam as having increased considerably during
recent years, the average estimation on the 7-point
Likert scale being 6 (1 means that spam has
decreased, while 7 means that spam has increased
significantly). Recognizing this, it is interesting that,
as seen from Table 1, 143 respondents consider spam
to be a minor problem, the average value being close
to neutral. In this question, a value of 1 means spam is
not a problem, 4 is neutral, while 7 means that it is a
serious problem. However, the respondents believe
that in the future spam will be a problem, though not a
serious one, the average value being 5.2, where 1 is
“not a problem”, and 7 means “a serious problem”
(Table 1).
We asked respondents to provide further
information in the form of an open question as to why
spam will or will not be a problem in their company.
For this question, we received answers from 97
different respondents, of which 75 were Finns and 22
Americans. These answers can be placed into three
categories: reasons why spam will not be a problem,
reasons why spam will increase, reasons why spam
will be a problem. These reasons are discussed next.
3.2 Why spam is regarded as a problem
Table 2. Qualitative analysis of the reasons why spam
is regarded as being a problem in the future.
Category
Number of
respondents
Wastes time & human resources
28
Consumes technical resources
12
Malware
7
Reduces the use & reputation of
email and the Internet as a
communication medium
6
Complications of anti-spam
techniques
2
Frustration and anger
2
Wastes time and human resources. 28 respondents,
4 US and 24 Finnish, cited the waste of human
resources as the reason why spam will be a problem in
the future. A US respondent says:
“[it] consumes valuable staff time to deal with spam.”
Here the respondents consider that anti-spam efforts
require human resources and time, and this is time
“away from productive work”, as a Finnish respondent
puts it. Anti-spam activities also require updating the
software, e.g., filters, which takes time and resources.
In relation to this, it was also noted that dealing with
spam requires financial investments, such as
purchasing anti-spam techniques.
Consumes technical resources
12 respondents, of which 9 were Finnish and 3 were
from the US, considered that spam puts a strain on
computer and network resources:
“Spam adds unnecessary volume to our network and
server storage…” (A US respondent).
Malware. Seven (1 US and 6 Finnish)
respondents believed that viruses and other malware
programs spread through spam:
“The major problem with it [spam] is the viruses
spreading through it.”
Here the concern is that spam messages may contain
computer viruses, or that WWW-links in the spam
messages may point to websites containing viruses.
Either by opening messages or following links to sites
containing viruses, the users will receive the viruses in
their PC. Clearly, this causes several problems within
the company.
Reduces the use and reputation of email and the
Internet as a communication medium. Six Finnish
respondents considered spam to have a negative affect
on email and Internet use:
“it [spam] will take away the credibility of Internet
and email.”
According to our interpretation, these respondents are
concerned that increased spam results in emails not
being taken seriously. One respondent stated that
“email loses its true meaning, since real messages
need to be dug out from the mass of spam messages.”
Complications of anti-spam techniques. Two
respondents mentioned the complications of anti-spam
techniques as a problem. In particular, the deletion of
important messages was mentioned:
“We delete important messages by accident.”
4
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
new anti-spam techniques and activities will be
invented, and these will reduce the amount of spam.
The fourth Finnish respondent emphasized the fact
that co-operation between different parties will reduce
spam.
Here the issue is that anti-spam software may, for
example, delete important messages, or move these to
a spam folder.
Frustration and anger. Two Finnish respondents
believed that spam increases frustration and anger
among the employees who receive it: “spam messages
increase anger among workers.”
3.4. Why spam will increase
3.3 Why spam is not regarded as a problem
Table 4 presents the reasons as to why spam will
increase offered by the respondents.
Table 3 presents the qualitative analysis of the reasons
why spam is not regarded as being a big problem in
the future.
Table 3. Qualitative analysis of the reasons why spam
is not regarded as a big problem in the future.
Category
Table 4. Qualitative analysis of the reasons as to why
spam will increase
Category
Number of
respondents
New spam techniques
13
Users give their email addresses
5
Advertising and marketing through
web pages, and Internet use
4
Ineffective laws
2
Profitable and low-risk
1
Amount increases
1
Number of respondents
Effective anti-spam
techniques in use
20
Better techniques to protect
against spam
4
Effective anti-spam techniques in use. 8 Finnish and
12 US respondents (20 altogether) mentioned the use
of effective anti-spam techniques as the reason why
they do not see spam as a big problem. One Finnish
and two US respondents named the anti-spam
products they use successfully to fight spam, while 16
respondents did not reveal the exact technique they
used. Two Finnish respondents also mentioned the
culture and good compliance of end-user security
guidelines (forbidding users to give away their email
addresses) as another reason why they do not receive
much spam (and hence, spam is not a problem at the
moment). One Finnish respondent estimated that their
good situation with respect to spam stems from the
fact that their email addresses are not available on
their company website. One Finnish respondent
suggested the use of multiple solutions, from filters to
black and white lists, as being the key to avoiding
spam. One Finnish respondent saw the updating of
filters as the key way to avoid spam. Along those
lines, a US respondent described this situation:
“The filtering and blocking we are doing does a pretty
good job. A year ago I never got any spam at work.
Now I am getting a few each day so the filtering and
blocking becomes less effective as spammers find
ways around the systems.”
Better techniques to protect against spam.
Responses in this category (4 respondents) expressed
the view that spam would not be a big problem in the
future, since anti-spam activities will be improved in
the future. Three Finnish respondents mentioned that
New spam techniques
Six US and seven Finnish respondents believed that
spammers will improve their spam techniques. As a
result, spam will be a big problem in the future. One
Finnish respondent mentioned that spammers are able
to make messages and their subject fields look more
and more like subject fields in real messages.
Consequently, anti-spam techniques have difficulties
finding such spam messages, and users may open
these messages by mistake (by regarding these as nonspam messages). Moreover, two US and three Finnish
respondents stated that anti-spam mechanisms will
always lag behind spam techniques. A US respondent
describes this situation:
“Spammers and anti-spam solutions will continue to
battle and the [spam problem] will continue to exist.”
Users give their email addresses
One US and four Finnish respondents considered that
users feed their email addresses too easily into
different websites:
“Users give/write their email addresses everywhere
[on the Internet], against company policies.”
These email addresses end up with spammers, who
use them for spamming purposes.
5
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
Advertising and marketing through web pages,
and Internet use
Two Finnish respondents took up the issue that
companies advertise on their web pages: “Companies
use the Internet more and more [e.g., advertisements
on the company’s website] to advertise and to inform
[customers] about their products.” Email addresses are
available in these advertisements. As a result, spamharvesting programs can find the email addresses, and
add these addresses to spam lists.
Similarly, one Finnish respondent believed that
increasing use of the Internet will increase one’s
exposure to spam. Additionally, one respondent saw
increased use of email as the main cause of spam.
Ineffective laws
One Finnish and one US respondent were skeptical
about the effectiveness of legislation in stopping
spam. While they did not provide any information on
why they reached this conclusion, we assume that it
may be because stopping spamming would require
international laws, since spammers can always send
spam through servers outside of those countries
banning spam.
Profitable and low-risk
One US respondent believed that as long as spamming
is a profitable and low-risk activity, spammers will
find ways to send spam. In our interpretation,
according to this respondent, this is the reason why
spammers send spam. Consequently, by making
spamming less profitable and more risky, we would be
able to reduce spam.
3.5 Use of anti-spam techniques
The most used anti-spam techniques were filters (74
%), closely followed by letting the users themselves
delete spam messages manually (73 %), restricting the
disclosure of email addresses on the Internet (70 %),
blacklists (62 %) and presenting modified/invalid
email addresses on the Internet (50 %). Complaining
to the spammers was tried by 35 % of the respondents,
while the respective figure for complaining to Internet
Service Providers was 34 %, and use of white lists
was 31 %. Block-out lists (29 %), legal action (25 %)
and displaying email addresses in the form of a picture
(21 %) were the least-used anti-spam techniques.
Table 5 summarizes these results.
Table 5. Use of anti-spam techniques.
Techniques
Filters
Letting
the
users
themselves delete spam
messages manually
Frequency
114
112
Percentage
74
73
Restricting the disclosure
of email addresses on the
Internet
Blacklists
Presenting
modified/invalid
email
addresses on the Internet
Complaining
to
the
spammers
108
70
96
77
62
50
54
35
Complaining to Internet
Service Providers
White lists
52
34
48
31
Blocking opt-out listed
persons who do not want
to receive spam
Legal action
44
29
39
25
Displaying
email
addresses in the form of a
picture
Some other method
33
21
33
21
27 respondents (14 Finnish and 13 from the US)
commented on these techniques. While 17
respondents provided more information on the
techniques they use (and can these techniques be find
from the list below), 9 respondents listed additional
means not found in the list above (the list seen in
Table 5). These were: introduction of user education
and policies (2 respondents), changing the domain
name of the company (1 respondent), not sending
emails to “no mail” lists, since the spammers see that
the address is active (1 respondent), introducing a fee
for sending email (1 respondent), authenticating the
sender or source of the message (1 respondent),
removing all .exe files from incoming emails (1
respondent) and blocking messages from those
domains that send a lot of email to the company
though the company does not send email to these
domains (1 respondent).
3.5
Anti-spam
usefulness
techniques
perceived
The most useful of anti-spam techniques were filters,
blacklists, restricting the disclosure of email addresses
on the Internet, and presenting modified/invalid email
addresses on the Internet. White lists, displaying email
addresses in the form of a picture and letting the users
themselves delete spam messages manually were
regarded as quite neutral. Complaining to spammers
was seen as the least useful method, followed by
complaining to Internet Service Providers and taking
legal action.
6
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
Table 6. Usefulness of the different anti-spam
techniques.
Techniques
Frequency
S
Filters
Blacklists
Blocking opt-out
listed persons who
do not want to
receive spam
Displaying email
addresses in the
form of a picture
Restricting the
disclosure of email
addresses on the
Internet
Presenting
modified/invalid
email addresses on
the Internet
White lists
Legal action
Some other method
114
96
108
Average
effectiveness
for those
using the
technique
4.9
4.8
2.9
33
3.9
1.24
108
4.5
1.73
Complaining to
Internet Service
Providers
Letting the users
themselves delete
spam messages
manually
Complaining to the
spammers
1.37
1.67
1.56
77
4.4
1.37
48
39
33
4.1
2.9
5.4
1.70
1.45
1.36
52
2.8
1.25
112
3.8
1.56
54
1.7
1.30
We also asked respondents to comment on the
techniques presented in Table 6. 24 respondents
commented on these techniques. 2 Finnish
respondents suggested restricting the disclosure of
email addresses on the Internet. One said that while
such restriction of disclosure of email addresses is a
good way to avoid spam, it cannot be used in all
cases. The other respondent shed some light on why
this might be so: organizations need to put some email
addresses on their website, including the email
addresses of their postmaster or webmaster.
Five (3 Finnish and two US) respondents
commented on filters. All five respondents stated that
filters also filter legitimate emails. One Finnish
respondent said that this problem occurs with
international emails in particular. One Finnish
respondent also mentioned that filters filtering
messages by finding certain spam words are too time-
consuming to maintain. One US respondent
commented on this problem by saying that “the
balance between blocking spam and creating false
positives is difficult to achieve.”
In relation to this, three US respondents and one
Finnish respondent mentioned that spammers change
their methods regularly, and that this makes anti-spam
activities difficult, as a US respondent writes:
“Spammer technology is getting too good for this to
be useful; they are now injecting fragments of Mark
Twain or other writing” (a US respondent).
Here the concern is that spammers make spam
messages look like legitimate mails with the result that
automatic anti-spam filtering does not work properly.
Another respondent saw a similar problem in the use
of other techniques, as well:
“What worked very well a year ago is showing some
signs of compromise today. Spammers are getting
smarter by changing their source addresses to look
different every time they send and resend a spam. It
makes address blocking less effective” (a US
respondent).
In the above passage, the respondent sees that by
changing their source addresses, spammers make
blocking based on the address of the sender less
effective. The same phenomenon is perceived in the
case of blacklists and white lists:
“Blacklists and white lists work best but spammers
have adapted and are able to ‘get around’ those means
of reducing spam” (a US respondent).
Moreover, one Finnish respondent hopes to see
improved spam filters in the future, while a US
respondent hopes that sender authentication and
sender reputation technologies will affect the spam
problem in a positive way. One Finnish respondent
reported that in his/her organization, 99% of spam can
be tackled by using a combination of several
techniques: filters, blacklists, white lists and restricted
disclosure of email addresses.
Some respondents also believed that Internet
Service Providers should increase filtering, before the
spam gets into the company’s network (2 Finnish
respondents). One of these respondents was also
skeptical about the role of legislation. One Finnish
respondent mentioned that users delete the spam
messages which are not recognized by spam-filter
software.
3.7. Future anti-spam preferences
Filters were listed as being the most common antispam technique in the future. Blacklists were in
7
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
second place, followed by opt-out lists, displaying
email addresses in the form of a picture, restricting the
disclosure of email addresses on the Internet,
presenting modified/invalid email addresses on the
Internet, and while lists. The fourth and third favored
techniques were legal action and complaining to
Internet Service Providers. Letting the users
themselves delete spam messages manually was the
second-least favored anti-spam technique for the
future, whilst complaining to the spammers was the
least preferred technique for the future.
Table 7. Future anti-spam preferences: frequency and
percentages.
Techniques
Frequency Percentage
Filters
Blacklists
Blocking opt-out listed persons
who do not want to receive
spam
Displaying email addresses in
the form of a picture
58
31
26
38
20
17
26
17
Restricting the disclosure of
email addresses on the Internet
25
16
Presenting
modified/invalid
email addresses on the Internet
25
16
White lists
Some other method
Legal action
Complaining
to
Internet
Service Providers
Letting the users themselves
delete spam messages manually
25
16
15
12
16
10
10
8
10
6
Complaining to the spammers
6
4
Some other methods (are there some other methods
that could or should be used to minimize spam?)
included qualitative answers by 32 respondents, which
suggested seven categories (Table 8).
Table 8. Other methods that could or should be used
to minimize spam.
Category
Number of
respondents
Improvement of technical infrastructure
and methods
9
Development of new laws
6
A fee and/or registration for sending
email
4
User awareness and restrictions
4
Bigger role of ISP
2
Use of cryptographic methods
2
Other: use of Scandinavian characters,
action by Microsoft, focus on operators
that do not take spammers seriously
These seven categories, capturing respondents’ views
on other methods that could or should be used to
minimize spam, are discussed next.
Improvement of technical infrastructure and
methods
The respondents believed that technical
infrastructure should be improved (9 respondents).
For example, a Finnish IT manager wrote:
“SMTP needs to be improved. The credibility of
email and the whole Internet has suffered dramatically
[due to spam].”
Four respondents suggested that RMX records or
caller-id for email should be used. For example, a US
respondent stated the following view:
“RMX records added to the DNS specification, a
“Reverse-Mail-eXchanger” record, would allow
servers to positively identify whether the current
sender is ALLOWED to send email on behalf of the
user they are CLAIMING to be sending from…”
Development of new laws
In the category “development of new laws”, the
respondents suggested that international laws should
be established to fight spam (2 respondents), and one
respondent mentioned the introduction and
enforcement of legislation in general. Moreover, three
Finnish respondents believed that US legislation
should prohibit the sending of spam, as the following
passage shows:
“Spam [should be] regarded as a criminal offence,
especially in the USA”.
These three views are explained by the fact that
these three Finnish respondents considered most spam
to originate in the US.
A fee and/or mandatory registration for
sending email
In this category, four respondents suggested that
emails should be chargeable, with, as a Finnish
respondent said:
“a small fee for [sending] emails”.
This would reduce spam, since it would not be
feasible to send spam. As a US respondent put it: “We
have money; spammers don’t.” One respondent
8
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
suggested that the price could be one cent per email.
While the others (3 respondents) did not propose an
exact amount, they suggested that the amount should
be small.
User awareness and restrictions
Three Finnish respondents considered user
negligence to be a cause of spam, as the following
quote suggests:
“Users should not use the email address of the
company to register [with different services on the
Internet]”.
Here the respondents believe that users reveal their
email address too freely to different websites, and that
this information ends up with spammers. To minimize
this activity, two Finnish respondents suggested user
education, while one US respondent requested
stronger actions in restricted employees’ access to the
Internet.
Bigger role of ISP
In this category, three respondents called for
Internet Service Providers to take a bigger role in
minimizing spam. As a US respondent writes:
“ISPs should be a bigger part of the solution in the
case of spam…”
Additionally, one Finnish respondent also
suggested that other operators should try to block
those Internet Service Providers who allow spammers
to send spam.
Use of cryptographic methods
Three respondents (one from Finland and two
from the US) proposed the use of cryptographic
techniques to cope with spam.
“… Encryption will need to be incorporated into
email soon ... That, in my opinion, is the only way to
slow spam down or kill it completely” (a US
respondent).
Other
The category “other” included: the use of
Scandinavian characters, anti-spam action by
Microsoft, and pressure on operators that do not take
spammers seriously. However, one respondent
believed IP scanning to be a more common and
problematic phenomenon than spam.
One respondent also suggested that spam should
be dealt with by laws or at the ISP level only after the
receiver has refused to receive the spam.
4. Discussion
4.1 Reliability and limitations of the study
In qualitative studies, reliability is an important issue.
The qualitative data that the respondents provided
comes directly from the respondents. As in the case of
text analysis in general, the authors have not in any
way changed the respondents’ answers. Given this, the
question of reliability in this paper relates to the
categorizations and the interpretations made
(Silverman, p. 148). To address the issue of reliability
regarding the categorizations and the interpretations
made, we have provided citations from the
respondents’ answers.
The study is subject to typical limitations. The
sample size with respect to the US data is small. The
qualitative answers, while adding important
information not captured by the quantitative survey,
are relatively short, and lack the deep insights which
could be captured by interviews.
4.2 Implications for practice
For practitioners, the results of this study suggests that
filters, blacklists, restricting the disclosure of email
addresses on the Internet, presenting modified or
invalid email addresses, and white lists are the most
effective anti-spam strategies, in this order. Insights
from the qualitative data indicate that a combination
of these techniques should be used. The qualitative
data also reveals that anti-spam methods, such as the
use of filtering, require careful effort in monitoring
and updating. The former is required to ensure that
important and welcomed business-related messages
are not deleted or moved to spam folders. The latter is
necessary because, since spammers seem to improve
their spamming strategies to avoid filters and other
anti-spam techniques, companies are constantly
required to update their anti-spam strategies.
5. Conclusions
While spam is regarded as a key problem for both
companies and ordinary computer end-users, little is
known about how spam actually affects companies in
reality and which anti-spam techniques have been
found most useful in practice. In order to address
these issues, we explored the 500 biggest companies
in the US (n=44) and Finland (n=101). The research
instrument was a quantitative and qualitative survey.
According to the respondents (n=145), 81.6 % of all
email traffic is spam, and respondents use 13 minutes
of their daily working time to deal with spam.
Respondents held the unanimous view that spam will
increase in the future, because of (i) new spam
9
Proceedings of the 39th Hawaii International Conference on System Sciences - 2006
techniques used by the spammers, (ii) careless users
who reveal their email address too easily, (iii)
advertisements on the web page of the company, and
(iv) ineffective laws. However, despite these figures,
while the respondents believe that spam will be a
small problem in the future, they currently have a
neutral attitude towards spam. Qualitative answers
revealed that the waste of money and human
resources, the consumption of computer and network
resources, the risk of malware and viruses and the
reduction in the reputation of email as a
communication method were seen as the reasons why
spam was regarded as a problem, according to the
respondents. In turn, the reasons why spam is not
perceived as a problem related to the effective antispam techniques used by these respondents. In terms
of these techniques, filters, blacklists, restricting the
disclosure of email addresses, presenting modified or
invalid email addresses, and white lists were seen as
the most effective anti-spam methods, in this order.
Complaining to the spammers was regarded as the
least effective method. Filters were the most
commonly-used technique, letting the users delete
spam manually being the second-most common, and
restricting the disclosure of email addresses was in
third place. Finally, the respondents wished for
improvements in technical infrastructures to deal with
spam, and stated unanimously that Internet Service
Providers and legislation should take strong actions
against spam.
This study analyzed spam on rather a limited time
interval (the 2004 spam environment). Rapidly
evolving spammer techniques and spam blocking
techniques provide a rich opportunity for continued
research, which also study the spam trend within a
longer interval of time.
.
[5] Kotulic, A.G. and J.G. Clark “Why There Aren’t More
Information Security Research Studies” Information &
Management, Vol. 41, (May, 2004) pp. 597-607.
[6] Lazar, J., and Preece, J. (2003). Spam, Spam, Spam,
Spam: How can we stop it? Proceedings of the ACM CHI:
Human Factors in Computing Systems 2003 Conference,
706-707.
[7] Goodman, J. T. & Rounthwaite, R., (2004) Stopping
outgoing spam. ACM Conference on Electronic Commerce
2004: 30-39
[8] Goodman, J., (2004) Filtering, Stamping, Blocking,
Anti-Spoofing: How to Stop the Spam. LISA 2004.
[9] Silverman, D., (1997), Interpreting Qualitative Data:
Methods for Analyzing Talk, Text and Interaction. SAGA
Publications, UK.
[10] Grimes, G. A., Hough, M. G., & Signorella, M. L.
(2003). User attitudes towards spam in three age groups.
ACM Conference on Universal Usability, Vancouver,
Canada.
[11] Postini (2005). Email Security for Small Businesses:
What’s the Right Solution For You? Retrieved from
http://www.myspamfilter.com/whitepapers/SMB_WP.pdf
on 9/11/2005
10. References
[1] Clifford, M., Faigin, D., Bishop, M., & Brutch, T.,
(2003), Miracle Cures and Toner Cartridges: Finding
Solutions to the Spam Problem. Proceedings of the 19th
annual computer security applications conference (ACSAC
2003).
[2] Cranor, L.F. & LaMacchia, B.A. (1998), Spam!,
Communications of the ACM, Vol.41, No.8, Aug., 74-83.
[3] Fawcett, T., (2003), "In vivo spam filtering: A challenge
problem for data mining”. KDD Explorations vol.5 no.2,
Dec., pp.140-148.
[4] Jung, J. & Emil, S., (2004), An Empirical Study of
Spam Traffic and the Use of DNS Black Lists. In the
Proceedings of Internet Measurement Conference,
Taormina, Italy, October.
10