ABUSIVE EMAIL

Authors

  • Vladica Ubavić Business School of Applied Studies in Blace, Serbia
  • Branislav Bogdanović Business School of Applied Studies in Blace, Serbia
  • Violeta Milićević Business School of Applied Studies in Blace, Serbia

Keywords:

Electronic mail, spam, Information, Internet

Abstract

When we want to explain in a good and reasonable manner how the Internet operates and functions, we should clearly emphasize that it is a completely informal and open media. On the Internet, information (data) flow freely and if they are freely flowing and accessible, the aim is to for everyone to be able to send their information to the world. Many would say that it is a true Democracy in every respect. However, unfortunately, it looks more like a complete anarchy. More and more Internet users interpret that freedom, or anonymity, which provides a "global network" in a completely wrong way. These people make use of the Internet services in such a way that inflicts major damage not only to other Internet users, but also to large organizations and systems that operate in the "network". Taking into account the importance of the security of electronic mail, the negative effects of abuse and ways of protecting Electronic junk mail are analyzed in this paper.

Downloads

Download data is not yet available.

References

Boyd, C.A., Mathuria, A. 2003. Protocols for Authentication and Key Establishment. Berlin: Springer.

Beal, V., 2006. How to Defend Yourself Against Identity Theft. online (01.09.2006.) Dostupno na: Pristup 15.12.2014..

Ellison, C., Schneier, B. 2000. Ten risks of PKI: What you’re not being told about public key infrastructure. Computer Security Journal. 16(1), pp. 1-7.

Matijašević, J., Spalević, Z., Ignjatijević, S., 2012. Vrste internet prevara - pojam, značaj i uticaj na ekonomske i moralne aspekte društvene zajednice. Međunarodni naučno-stručni simpozijum Infoteh-Jahorina. Jahorina, Bosna i Hercegovina, 21-23 Mart 2012. Vol. 11, Mart 2012. Istočno Sarajevo: Elektrotehnički fakultet Istočno Sarajevo.

Menezes, A., Van Oorschot, P., Vanstone, S. 1996. Handbook of Applied Cryptography. New York: CRC Press.

Microsoft, 2014. Email and web scams: How to help protect yourself. online Dostupno na: <http://www.microsoft.com/security/online-privacy/phishing-scams.aspx> Pristup 16.12.2014..

National Cyber Security Alliance. ID Theft, Fraud & Victims of Cybercrime. online Dostupno na: <http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud> Pristup 16.12.2014..

Federal Trade Commission, U.S. Department of Education, 2010. Preventing Online Identity Theft. online Dostupno na: <http://www.utexas.edu/its/secure/articles/identity_theft.php> Pristup 15.12.2014..

Federal Bureau of Investigation, 2013. Identity Theft. online Dostupno na: <http://www.fbi.gov/about-us/investigate/cyber/identity_theft> Pristup 15.12.2014..

Downloads

Published

2014-12-31

How to Cite

Ubavić, V., Bogdanović, B., & Milićević, V. (2014). ABUSIVE EMAIL. BizInfo (Blace) Journal of Economics, Management and Informatics, 5(2), 57–65. Retrieved from http://www.bizinfo.edu.rs/index.php/bizinfo/article/view/33

Most read articles by the same author(s)