References 203
[172] Templeton, B.: n.d.b, Origin of the term “spam” to mean net abuse,
http://www.templetons.com/brad/spamterm.html.
[173] Templeton, B.: n.d.c, Reaction to the DEC Spam of 1978,
http://www.templetons.com/brad/spamreact.html.
[174] The Government of Hongkong: n.d., Nigerian letters,
http://www.info.gov.hk/police/pda/con-tricks/con7.htm.
[175] The Honeynet Project & Research Alliance: 2005, Know your Enemy:
Tracking Botnets, Technical report.
[176] The New York Times: 2003, We Hate Spam, Congress Says (Except
Ours), http://www.nytimes.com.
[177] The Radicati Group: 2003, ANTI-SPAM MARKET TRENDS
OVERVIEW 2003-2007.
[178] THE LONDON ACTION PLAN On International Spam Enforcement
Cooperation: 2004, http://www.londonactionplan.org.
[179] Tompkins, T. and Handley, D.: 2003, Giving E-mail Back to the Users:
Using Digital Signatures to Solve the Spam Problem, FirstMonday 8(9).
[180] Troost, R., Dorner, S. and Moore, K.: 1997, Communicating Presenta-
tion Information in Internet Messages: The Content-Disposition Header
Field, RFC 2183, IETF Network Working Group.
[181] Turner, D. A. and Havey, D. M.: 2004, Controlling Spam through
Lightweight Currency, Proceedings of the 37th Annual Hawaii Interna-
tional Conference on System Sciences.
[182] Turner, D. and Ross, K.: 2003, A Lightweight Currency Paradigm for
the P2P Resource Market.
[183] United Nations: 2005, List of Member States,
http://www.un.org/Overview/ unmember.html.
[184] UWG: 2004, Bundesgesetzblatt Jahrgang 2004 Teil I Nr. 32.
[185] Vaudreuil, G.: 1996, Enhanced Mail System Status Codes, RFC 1893,
IETF Network Working Group.
[186] von Ahn, L., Blum, M., Hopper, N. and Langford, J.: 2003, CAPTCHA:
Using hard AI problems for security, Proceedings of Eurocrypt, pp. 294–
311.
[187] von Ahn, L., Blum, M. and Langford, J.: 2004, Telling Humans
and Computers Apart Automatically, Communications of the ACM
47(2), 57–60.
[188] W3C: 2003, SOAP Version 1.2 Part 1: Messaging Framework,
http://www.w3.org/TR/soap12-part1/.
[189] Wirtz, B.: 2001, Electronic Business, 2 edn, Gabler.
[190] Wong, M. and Schlitt, W.: 2005, Sender Policy Framework (SPF) for
Authorizing Use of Domains in E-MAIL, version 1, Internet draft, IETF
Network Working Group.
[191] Zhou, F., Zhuang, L., Zhao, B., Huang, L., Joseph, A. and Kubiatowicz,
J.: 2003, Approximate object location and spam filtering on peer-to-peer
systems, Proceedings of ACM/IFIP/USENIX International Middleware
Conference.