Bookshelf

Looking for a Good Read? Book Review: Spam: A Shadow History of the Internet

January 13, 2014 886

spamNeed a good book to help you get through the post-holiday doldrums?

Finn Brunton: Spam: A Shadow History of the Internet. Cambridge, MA: MIT Press, 2013. 296 pp. $27.95, hardcover. ISBN 13: 978-0262018876.

Read the review by Mikolaj Jan Piskorski of Harvard Business School, published in the December issue of Administrative Science Quarterly:

[The] constant co-evolutionary battle between those who seek to garner our attention through spam and those who seek to protect us from it is the theme that unites much of this book. Brunton documents many such dynamics, starting by examining interactions between spammers on bulletin board systems and Usenet groups and the administrators and users who sought to protect themselves in the mid-1990s. He then takes us through a fascinating history of commercially motivated junk email spamming, which led to the developmentof filtering software that protected our mailboxes from being inundated with unwanted messages. Here Brunton convincingly argues that the filtering software reduced spammers’ ability to reach us cheaply and thus priced many low margin herbal supplement and performance pill sellers out of the market. This ushered in the era of high-margin Nigerian wire scams, which promise to send you a fortune if you send just a little bit of money—and net as much as $2,000 per respondent. Next, Brunton takes us on a fascinating journey into the constant fight between Google’s search engineASQ_v58n4_72ppiRGB_150pixW and website spammers, who at some point built artificial communities of spammy pages and fake blogs, which attracted the attention of legitimate pages and blogs so well that they managed to fool Google’s advertising algorithms for a while. Finally, the book takes a very deep dive into an incredibly rich and quite scary world of spam computer programs that will infect your computer, attempt to discover your passwords and credit card numbers, and pass them on to a rogue programmer. Here, Brunton shows that not only are such programmers in competition to outwit security firms that seek to protect your computer, they are also in competition with each other to wrest control of infected computers away from each other. The forethought, the social relationships, and the complexity of the supply chain required to steal the data and use them for financial benefit, as described by the author, would make for a fascinating horror movie—one we would all watch with bated breath.

Click here to read more in Administrative Science Quarterly!

Business and Management INK puts the spotlight on research published in our more than 100 management and business journals. We feature an inside view of the research that’s being published in top-tier SAGE journals by the authors themselves.

View all posts by Business & Management INK

Related Articles

Doing the Math on Equal Pay
Insights
November 8, 2024

Doing the Math on Equal Pay

Read Now
Ninth Edition of ‘The Evidence’: Tackling the Gender Pay Gap 
Communication
October 31, 2024

Ninth Edition of ‘The Evidence’: Tackling the Gender Pay Gap 

Read Now
Diving Into OSTP’s ‘Blueprint’ for Using Social and Behavioral Science in Policy
Bookshelf
October 14, 2024

Diving Into OSTP’s ‘Blueprint’ for Using Social and Behavioral Science in Policy

Read Now
Eighth Edition of ‘The Evidence’: How Sexist Abuse Undermines Political Representation 
Bookshelf
September 25, 2024

Eighth Edition of ‘The Evidence’: How Sexist Abuse Undermines Political Representation 

Read Now
Seventh Edition of ‘The Evidence’: The Rise of Unsafe Abortions after Roe v Wade 

Seventh Edition of ‘The Evidence’: The Rise of Unsafe Abortions after Roe v Wade 

In this month’s edition of The Evidence newsletter, Josephine Lethbridge explores reproductive rights after the end of Roe v Wade, highlighting research on the potentially unsafe methods used in self-managed abortions. 

Read Now
Sixth Edition of ‘The Evidence’: We Need a New Approach to Preventing Sexual Violence

Sixth Edition of ‘The Evidence’: We Need a New Approach to Preventing Sexual Violence

In this month’s installment of The Evidence newsletter, journalist Josephine Lethbridge explores recent research into sexual violence prevention programs and interviews experts […]

Read Now
Fifth Edition of ‘The Evidence’: Do Peacebuilding Practices Exclude Women?

Fifth Edition of ‘The Evidence’: Do Peacebuilding Practices Exclude Women?

The June 2024 installment of The Evidence newsletter puts post-war conflict resolution practices under the microscope – taking a closer look at how women are adversely affected by these peacebuilding exercises.

Read Now
0 0 votes
Article Rating
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments