Bookshelf

Looking for a Good Read? Book Review: Spam: A Shadow History of the Internet

January 13, 2014 1301

spamNeed a good book to help you get through the post-holiday doldrums?

Finn Brunton: Spam: A Shadow History of the Internet. Cambridge, MA: MIT Press, 2013. 296 pp. $27.95, hardcover. ISBN 13: 978-0262018876.

Read the review by Mikolaj Jan Piskorski of Harvard Business School, published in the December issue of Administrative Science Quarterly:

[The] constant co-evolutionary battle between those who seek to garner our attention through spam and those who seek to protect us from it is the theme that unites much of this book. Brunton documents many such dynamics, starting by examining interactions between spammers on bulletin board systems and Usenet groups and the administrators and users who sought to protect themselves in the mid-1990s. He then takes us through a fascinating history of commercially motivated junk email spamming, which led to the developmentof filtering software that protected our mailboxes from being inundated with unwanted messages. Here Brunton convincingly argues that the filtering software reduced spammers’ ability to reach us cheaply and thus priced many low margin herbal supplement and performance pill sellers out of the market. This ushered in the era of high-margin Nigerian wire scams, which promise to send you a fortune if you send just a little bit of money—and net as much as $2,000 per respondent. Next, Brunton takes us on a fascinating journey into the constant fight between Google’s search engineASQ_v58n4_72ppiRGB_150pixW and website spammers, who at some point built artificial communities of spammy pages and fake blogs, which attracted the attention of legitimate pages and blogs so well that they managed to fool Google’s advertising algorithms for a while. Finally, the book takes a very deep dive into an incredibly rich and quite scary world of spam computer programs that will infect your computer, attempt to discover your passwords and credit card numbers, and pass them on to a rogue programmer. Here, Brunton shows that not only are such programmers in competition to outwit security firms that seek to protect your computer, they are also in competition with each other to wrest control of infected computers away from each other. The forethought, the social relationships, and the complexity of the supply chain required to steal the data and use them for financial benefit, as described by the author, would make for a fascinating horror movie—one we would all watch with bated breath.

Click here to read more in Administrative Science Quarterly!

Business and Management INK puts the spotlight on research published in our more than 100 management and business journals. We feature an inside view of the research that’s being published in top-tier SAGE journals by the authors themselves.

View all posts by Business & Management INK

Related Articles

Why Men Have a Bigger Carbon Footprint Than Women  
Insights
July 8, 2025

Why Men Have a Bigger Carbon Footprint Than Women  

Read Now
Who Gets to Flourish? 
Public Policy
June 5, 2025

Who Gets to Flourish? 

Read Now
Pope Francis, Human Dignity, and the Right to Stay, Migrate and Return
International Debate
May 5, 2025

Pope Francis, Human Dignity, and the Right to Stay, Migrate and Return

Read Now
Banning Social Media Won’t Solve Teen Misogyny
Bookshelf
May 2, 2025

Banning Social Media Won’t Solve Teen Misogyny

Read Now
The End of the Free Trade Era?

The End of the Free Trade Era?

On April 2, United States President Donald Trump declared “liberation day,” unveiling a new tariff (tax on imported goods) regime that targets […]

Read Now
Yes, Cities Can Be Sexist 

Yes, Cities Can Be Sexist 

In this month’s issue of The Evidence newsletter, Josephine Lethbridge examines how city designs exacerbate gender inequalities – and what we can […]

Read Now
What Can We Learn From The Women Of The Iron Age? 

What Can We Learn From The Women Of The Iron Age? 

In this month’s issue of The Evidence newsletter, Josephine Lethbridge examines new research into prehistoric gender dynamics – and what this tells […]

Read Now
0 0 votes
Article Rating
Subscribe
Notify of
guest


This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments