The Phenomenon of Unsolicited E-mails with Attachments

Xingan Li
{"title":"The Phenomenon of Unsolicited E-mails with Attachments","authors":"Xingan Li","doi":"10.3138/SIM.7.2.003","DOIUrl":null,"url":null,"abstract":"Unsolicited e-mails became prevalent with the growing penetration of computer networks. The senders of unsolicited e-mails make every effort to get the attention of the recipient. The goal is for their messages and/or attachments to be opened. The victimization of recipients of unsolicited messages with attachments happens without the recipients actually accessing their e-mail accounts. The victimization-conspiracy model happens when the messages include contents offering products or services that need illegal involvement of the recipients. The recipients of messages with such offers are first victimized by the unsolicited messages; and if they accept the illegal services or purchase the illegal products, they are likely to become the co-conspirators of the senders. The senders and the recipient would reach an illegal double win effect. The unsolicited messages with attachments provide e-mail users many different options. The majority of messages in this study, however, offered recipients two alternatives; to conspire in tax evasion, or to be damaged by viruses.","PeriodicalId":206087,"journal":{"name":"Simile: Studies in Media & Information Literacy Education","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Simile: Studies in Media & Information Literacy Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3138/SIM.7.2.003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Unsolicited e-mails became prevalent with the growing penetration of computer networks. The senders of unsolicited e-mails make every effort to get the attention of the recipient. The goal is for their messages and/or attachments to be opened. The victimization of recipients of unsolicited messages with attachments happens without the recipients actually accessing their e-mail accounts. The victimization-conspiracy model happens when the messages include contents offering products or services that need illegal involvement of the recipients. The recipients of messages with such offers are first victimized by the unsolicited messages; and if they accept the illegal services or purchase the illegal products, they are likely to become the co-conspirators of the senders. The senders and the recipient would reach an illegal double win effect. The unsolicited messages with attachments provide e-mail users many different options. The majority of messages in this study, however, offered recipients two alternatives; to conspire in tax evasion, or to be damaged by viruses.
不请自来的带有附件的电子邮件现象
随着计算机网络的日益普及,未经请求的电子邮件变得非常普遍。发送不请自来的电子邮件的人会尽一切努力引起收件人的注意。目标是打开他们的消息和/或附件。不请自来的带有附件的邮件的收件人在没有实际访问他们的电子邮件帐户的情况下受害。当信息包含需要接收者非法参与的产品或服务内容时,就会发生受害-阴谋模式。收到附有此类要约的讯息的人首先会成为未经索取的讯息的受害者;如果他们接受非法服务或购买非法产品,他们很可能成为发送者的同谋。发送者和接收者将达到非法的双赢效果。带有附件的未经请求的消息为电子邮件用户提供了许多不同的选择。然而,在这项研究中,大多数信息为接收者提供了两种选择;共谋逃税,或被病毒破坏。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信