Campbell-Kelly et al., 2006 - Google Patents
An Empirical Study of the Patent Prospect Theory: An Evaluation of Anti-Spam PatentsCampbell-Kelly et al., 2006
View PDF- Document ID
- 17153981723812866652
- Author
- Campbell-Kelly M
- Valduriez P
- Publication year
- Publication venue
- Va. JL & Tech.
External Links
Snippet
This article is an empirical study of Edmund Kitch's patent prospect theory, based on an evaluation of anti-spam patents. The article seeks to contribute to the wider debates about the benefits and costs of patents in general, and of software patents in particular. The anti …
- 238000011156 evaluation 0 title abstract description 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5855—Message switching systems, e.g. electronic mail systems with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/28—Details regarding addressing issues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zdziarski | Ending spam: Bayesian content filtering and the art of statistical language classification | |
Whitworth et al. | Spam and the social-technical gap | |
Pelletier et al. | Adaptive filtering of spam | |
Leiba et al. | A Multifaceted Approach to Spam Reduction. | |
Hayes | Computing science: Spam, spam, spam, lovely spam | |
Bambauer | Solving the inbox paradox: an information-based policy approach to unsolicited e-mail advertising | |
Hedley | A brief history of spam | |
Judge et al. | Understanding and reversing the profit model of spam (position paper) | |
Campbell-Kelly et al. | An Empirical Study of the Patent Prospect Theory: An Evaluation of Anti-Spam Patents | |
Banday et al. | SPAM--Technological and Legal Aspects | |
Schryen | Anti-spam legislation: An analysis of laws and their effectiveness | |
Chhabra | Fighting spam, phishing and email fraud | |
Shaykevich | The king of the CASL: canada's anti-spam law invades the United States | |
Goodman | Spam: technologies and policies | |
Smith | " Spam": An Overview of Issues Concerning Commercial Electronic Mail | |
Kelman | E-Nuisance: Unsolicied Bulk E-Mail at the Boundaries of Common Law Property Rights | |
Yang | CAN-SPAM: A first step to no-spam | |
Bolin | Opting Out of Spam: A Domain Level Do-Not-Spam Registry | |
Mir et al. | Control of Spam: A Comparative Approach with special reference to India | |
Park et al. | Spam Detection: Increasing Accuracy with A Hybrid Solution. | |
Marks | Spammers clog in-boxes everywhere: Will the CAN-SPAM act of 2003 halt the invasion | |
Bambauer et al. | A comparative analysis of spam laws: the quest for a Model Law | |
De Freitas et al. | Spam and the Internet. Is it here to stay or can it be eradicated? | |
Helman | Spam-a-Lot: The States' Crusade against Unsolicited E-Mail in Light of the Can-Spam Act and the Overbreadth Doctrine | |
Chik | Proposed anti-spam legislation model in Singapore: are we losing the war before even starting the battle? |