Spam and Beyond: An Information-Economic Analysis of Unwanted Commercial Messages

The phenomenon of unwanted commercial messages (UCM), including e-mail spam and emerging forms that target other Internet communications facilities, is analyzed from an information-economics perspective. UCM traffic pays off for its senders when it is noticed and consumed by Internet users; the industry is, therefore, dependent on a common-pool resource that is accessed through an information asset. An analytical model of the industry is derived and solved computationally, and two dimensions of information quality held by the senders of UCM traffic are manipulated in the model. It is shown that such manipulations can moderate over time both the number of UCM campaigns undertaken and the amount of Internet bandwidth consumed by UCM. Manipulations of the information-quality dimensions affected by e-mail filtering reduce the amount of traffic that penetrates an Internet user's attention space but increase the amount of Internet bandwidth consumed. This is consistent with data reported by e-mail security providers as filters have been deployed. It is also shown that both public and private entities have adopted policies and practices with unintentional informational side effects. These effects may have led to more rather than less, spam e-mail traffic. It is concluded that the lessons learned from the case of e-mail spam can be applied to the development of policies and practices for mitigating newer, emerging forms of UCM, including versions targeting instant-messaging systems and Web logs.

[1]  Tom Rodden,et al.  Proceedings of the 2002 ACM conference on Computer supported cooperative work , 2002 .

[2]  P. McFedries Technically Speaking: Slicing the Ham from the Spam , 2004, IEEE Spectrum.

[3]  C. F. Phillips Industrial Market Structure and Economic Performance , 1971 .

[4]  C. Shapiro,et al.  Informative Advertising with Differentiated Products , 1984 .

[5]  P. Libby The Scientific American , 1881, Nature.

[6]  Joseph S. Valacich,et al.  Information Systems Today , 2002 .

[7]  Nigel Melville,et al.  Unsolicited Commercial E-Mail: Empirical Analysis of a Digital Commons , 2006, Int. J. Electron. Commer..

[8]  Spammer-X. Inside the Spam Cartel: Trade Secrets from the Dark Side , 2004 .

[9]  Richard Damania,et al.  The Economics of Protecting Tiger Populations: Linking Household Behaviour to Poaching and Prey Depletion , 2001 .

[10]  Gordon V. Cormack,et al.  Spam and the ongoing battle for the inbox , 2007, CACM.

[11]  Sirkka L. Jarvenpaa,et al.  Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence , 2003, Int. J. Electron. Commer..

[12]  Deborah Fallows,et al.  Spam: How it is hurting e-mail and degrading life on the internet , 2003 .

[13]  Scott E. Fahlman,et al.  Selling interrupt rights: A way to control unwanted e-mail and telephone calls , 2002, IBM Syst. J..

[14]  Simson L. Garfinkel,et al.  Stopping Spam , 1998 .

[15]  Timothy Van Zandt,et al.  Information Overload in a Network of Targeted Communication , 2001 .

[16]  Eric K. Clemons,et al.  Newly vulnerable markets in an age of pure information products: an analysis of online music and online news , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[17]  James Morris,et al.  Markets for attention: will postage for email help? , 2002, CSCW '02.

[18]  S. Fahlman Technical forum , 2002 .

[19]  Uyless Black TCP/IP and Related Protocols , 1991 .

[20]  Marie-Christine Robert Dealing with Unsolicited Commercial Emails: A Global Perspective , 2004 .

[21]  Ray Hunt,et al.  An analysis of the tools used for the generation and prevention of spam , 2004, Comput. Secur..

[22]  Nigel Melville,et al.  Mitigating the Tragedy of the Digital Commons: The Problem of Unsolicited Commercial E-Mail , 2005, Commun. Assoc. Inf. Syst..

[23]  Ewan Nettleton Electronic marketing and the new anti-spam regulations , 2004 .

[24]  G. Hardin,et al.  The Tragedy of the Commons , 1968, Green Planet Blues.