StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Avoiding Telephone Spam - Assignment Example

Cite this document
Summary
Spam is taking a serious toll on several businesses worldwide, companies in the US and other parts of the world have suffered whopping losses because of the people who spam. This paper will highlight some really useful ways in which spamming over the telephone can be tackled effectively…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Avoiding Telephone Spam
Read Text Preview

Extract of sample "Avoiding Telephone Spam"

Client’s 18 June Spamming has become very common these days; there are a lot of mails circulated each day by different people.In addition to this spamming has even begun over the telephones, unsolicited phone calls disturb countless people every day. Text messages have also become very common, almost everyone is aware of spamming but it is sad to see no concrete steps taken towards restricting people from spamming. This paper will highlight some really useful ways in which spamming over the telephone can be tackled effectively.

“Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.” (What is Spam?) Spam is taking a serious toll on several businesses worldwide, companies in the US and other parts of the world have suffered whopping losses because of the people who spam.

VOIP spam is relatively a new term for the people, even those who use internet telephony services know very little about this menace. SPIT or spam is a really big menace and one solution isn’t good enough to deal with it, in order to deal with this problem it is imperative to focus upon SIP[X], this application is used all across the globe and it can play the role of a linchpin in countering SPIT over the internet. The SIP protocol has to be understood and how it functions must also be understood inside-out.

There are a few issues when the SIP protocol is taken into account, there are other protocols used across the world and having understood the SIP protocol might not be enough to stop people from spamming. There are some very important aspects when the SIP is taken into account, some very important factors are, the location of the user, the willingness of the user to communicate, session setup and effective session management. The spammers spam in order to find new customers every day. Mails claiming that you have won a whopping amount are circulated each day; there are several other reasons why people spam.

Some of the most important reasons are selling and delivering a product and cheating gullible people. SPIT is going to become a huge problem in the future for the growth of the internet. People will become disinclined towards making calls to other people over the internet and companies will suffer heavy losses. The SPIT calls can be detected by checking human communication pattern. This is one good way of stopping the menace of SPIT from spreading all across this globe. Detecting SPIT is the most important step and stopping it is another very important step.

SIP servers can be established so as to stop the people from spamming, these servers are equipped with the ability to detect span and SPIT calls and when these calls are detected suitable action to prevent these calls can be take. Works Cited What is Spam? Spam Abuse. Web. Retrieved from:

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Avoiding Telephone Spam Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Avoiding Telephone Spam Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/social-science/1598863-avoiding-telephone-spam
(Avoiding Telephone Spam Assignment Example | Topics and Well Written Essays - 500 Words)
Avoiding Telephone Spam Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/social-science/1598863-avoiding-telephone-spam.
“Avoiding Telephone Spam Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/social-science/1598863-avoiding-telephone-spam.
  • Cited: 0 times

CHECK THESE SAMPLES OF Avoiding Telephone Spam

Criminology: Cyber Crime

Service denial attack may also involve filling the email of an individual victim with spam mail and thus inhibiting the victim from accessing the crucial services and information he/she is entitled.... Institution Date Criminology: Cyber Crime Introduction The invention and introduction of computer technology presented great advantages that made it receive warm welcome and appreciation from all corners of the world....
10 Pages (2500 words) Research Paper

Methods to Stop Different Cyber Crimes

nternet users are required to activate their spam blocker whenever they use the Internet.... spam blockers enable individuals to block messages that are not needed from getting into the inbox.... In addition, a spam blocker ensures that phishing emails that may be used to defraud Internet users are prevented from getting into the inbox.... Most Internet providers have spam blocking features (Ehow, 2012).... Passwords that are made based on names, nicknames, telephone numbers, and other obvious words should be avoided....
2 Pages (500 words) Essay

The Hospitality Management Process of Four Seasons Hotel

The foreign delegates from all over the world would visit the hotel in 2014 for G20 Summit, organized by the World Trade Organization (WTO).... Hence, it is highly rational for… This paper is a report for the department head containing consolidated information about services of different departments of the hotel....
5 Pages (1250 words) Assignment

How a chosen information system/s is used by NatWest

For instance, banks have also developed sophisticated information systems to cater for the overwhelming customer needs.... Banking information systems are comprised of multiple systems.... The systems such as accounting systems… Failure by banks to adopt latest technologies may see them phased out of the market....
12 Pages (3000 words) Essay

The Consideration of the Effectiveness of the Computer Misuse Act 1990

hellip; In most cases of cyberstalking, there will be more than one offensive or threatening letter or telephone call and the police will opt to charge under the Harassment Act 1997, where the court can make a restraining order preventing them from contacting the victim again and breach of this order is punishable with up to five years imprisonment....
10 Pages (2500 words) Term Paper

Development of Communication Throughout The History of Humanity

In this essay, an effort has been made to find out the path of communication development from the ancient to the modern age.... nbsp;The essay deals in the advent of communication through the ages and charters its growth path in accordance with the development of science and society.... hellip; Communication is the basic essence of the development of business in the modern world....
15 Pages (3750 words) Essay

Identity Theft

This paper is about  identity theft, which involves the criminals obtaining and using the personal information of different people like their credit card data, bank account details and insurance information as well as social security numbers to make purchases of goods and/or services in a fraudulent manner....
7 Pages (1750 words) Literature review

The Nursing Role Within The Multidisciplinary Team in Relation to the Rehabilitation Phase

 This paper discusses the nursing role relating to post-surgical care.... The advantages and disadvantages of amputation in patients suffering from vascular diseases and the steps that can delay or prevent amputation are also given a place in the discussion.... nbsp;… The rehabilitation in the previous days used to be limited to taking care of the wound and the patient's movements in the course of the hospital....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us