[go: up one dir, main page]

Campbell-Kelly et al., 2006 - Google Patents

An Empirical Study of the Patent Prospect Theory: An Evaluation of Anti-Spam Patents

Campbell-Kelly et al., 2006

View PDF
Document ID
17153981723812866652
Author
Campbell-Kelly M
Valduriez P
Publication year
Publication venue
Va. JL & Tech.

External Links

Snippet

This article is an empirical study of Edmund Kitch's patent prospect theory, based on an evaluation of anti-spam patents. The article seeks to contribute to the wider debates about the benefits and costs of patents in general, and of software patents in particular. The anti …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5855Message switching systems, e.g. electronic mail systems with selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/28Details regarding addressing issues
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Zdziarski Ending spam: Bayesian content filtering and the art of statistical language classification
Whitworth et al. Spam and the social-technical gap
Pelletier et al. Adaptive filtering of spam
Leiba et al. A Multifaceted Approach to Spam Reduction.
Hayes Computing science: Spam, spam, spam, lovely spam
Bambauer Solving the inbox paradox: an information-based policy approach to unsolicited e-mail advertising
Hedley A brief history of spam
Judge et al. Understanding and reversing the profit model of spam (position paper)
Campbell-Kelly et al. An Empirical Study of the Patent Prospect Theory: An Evaluation of Anti-Spam Patents
Banday et al. SPAM--Technological and Legal Aspects
Schryen Anti-spam legislation: An analysis of laws and their effectiveness
Chhabra Fighting spam, phishing and email fraud
Shaykevich The king of the CASL: canada's anti-spam law invades the United States
Goodman Spam: technologies and policies
Smith " Spam": An Overview of Issues Concerning Commercial Electronic Mail
Kelman E-Nuisance: Unsolicied Bulk E-Mail at the Boundaries of Common Law Property Rights
Yang CAN-SPAM: A first step to no-spam
Bolin Opting Out of Spam: A Domain Level Do-Not-Spam Registry
Mir et al. Control of Spam: A Comparative Approach with special reference to India
Park et al. Spam Detection: Increasing Accuracy with A Hybrid Solution.
Marks Spammers clog in-boxes everywhere: Will the CAN-SPAM act of 2003 halt the invasion
Bambauer et al. A comparative analysis of spam laws: the quest for a Model Law
De Freitas et al. Spam and the Internet. Is it here to stay or can it be eradicated?
Helman Spam-a-Lot: The States' Crusade against Unsolicited E-Mail in Light of the Can-Spam Act and the Overbreadth Doctrine
Chik Proposed anti-spam legislation model in Singapore: are we losing the war before even starting the battle?