Bookshelf

Looking for a Good Read? Book Review: Spam: A Shadow History of the Internet

January 13, 2014 902

spamNeed a good book to help you get through the post-holiday doldrums?

Finn Brunton: Spam: A Shadow History of the Internet. Cambridge, MA: MIT Press, 2013. 296 pp. $27.95, hardcover. ISBN 13: 978-0262018876.

Read the review by Mikolaj Jan Piskorski of Harvard Business School, published in the December issue of Administrative Science Quarterly:

[The] constant co-evolutionary battle between those who seek to garner our attention through spam and those who seek to protect us from it is the theme that unites much of this book. Brunton documents many such dynamics, starting by examining interactions between spammers on bulletin board systems and Usenet groups and the administrators and users who sought to protect themselves in the mid-1990s. He then takes us through a fascinating history of commercially motivated junk email spamming, which led to the developmentof filtering software that protected our mailboxes from being inundated with unwanted messages. Here Brunton convincingly argues that the filtering software reduced spammers’ ability to reach us cheaply and thus priced many low margin herbal supplement and performance pill sellers out of the market. This ushered in the era of high-margin Nigerian wire scams, which promise to send you a fortune if you send just a little bit of money—and net as much as $2,000 per respondent. Next, Brunton takes us on a fascinating journey into the constant fight between Google’s search engineASQ_v58n4_72ppiRGB_150pixW and website spammers, who at some point built artificial communities of spammy pages and fake blogs, which attracted the attention of legitimate pages and blogs so well that they managed to fool Google’s advertising algorithms for a while. Finally, the book takes a very deep dive into an incredibly rich and quite scary world of spam computer programs that will infect your computer, attempt to discover your passwords and credit card numbers, and pass them on to a rogue programmer. Here, Brunton shows that not only are such programmers in competition to outwit security firms that seek to protect your computer, they are also in competition with each other to wrest control of infected computers away from each other. The forethought, the social relationships, and the complexity of the supply chain required to steal the data and use them for financial benefit, as described by the author, would make for a fascinating horror movie—one we would all watch with bated breath.

Click here to read more in Administrative Science Quarterly!

Business and Management INK puts the spotlight on research published in our more than 100 management and business journals. We feature an inside view of the research that’s being published in top-tier SAGE journals by the authors themselves.

View all posts by Business & Management INK

Related Articles

Gazan Publisher, Late Ukrainian Writer Receive Publisher Group’s Prix Voltaire Award
Bookshelf
December 6, 2024

Gazan Publisher, Late Ukrainian Writer Receive Publisher Group’s Prix Voltaire Award

Read Now
Tenth Edition of The Evidence: Why We Need to Change the Narrative Around Part-Time Work
Bookshelf
December 2, 2024

Tenth Edition of The Evidence: Why We Need to Change the Narrative Around Part-Time Work

Read Now
Doing the Math on Equal Pay
Insights
November 8, 2024

Doing the Math on Equal Pay

Read Now
Ninth Edition of ‘The Evidence’: Tackling the Gender Pay Gap 
Communication
October 31, 2024

Ninth Edition of ‘The Evidence’: Tackling the Gender Pay Gap 

Read Now
Diving Into OSTP’s ‘Blueprint’ for Using Social and Behavioral Science in Policy

Diving Into OSTP’s ‘Blueprint’ for Using Social and Behavioral Science in Policy

Just in time for this past summer’s reading list, in May 2024 the White House Office of Science and Technology Policy (technically, […]

Read Now
Eighth Edition of ‘The Evidence’: How Sexist Abuse Undermines Political Representation 

Eighth Edition of ‘The Evidence’: How Sexist Abuse Undermines Political Representation 

In this month’s issue of The Evidence newsletter, Josephine Lethbridge explores rising levels of abuse directed towards women in politics, spotlighting research […]

Read Now
Seventh Edition of ‘The Evidence’: The Rise of Unsafe Abortions after Roe v Wade 

Seventh Edition of ‘The Evidence’: The Rise of Unsafe Abortions after Roe v Wade 

In this month’s edition of The Evidence newsletter, Josephine Lethbridge explores reproductive rights after the end of Roe v Wade, highlighting research on the potentially unsafe methods used in self-managed abortions. 

Read Now
0 0 votes
Article Rating
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments