Tuesday, September 10, 2019
Spam (Computing) Essay Example | Topics and Well Written Essays - 1500 words
Spam (Computing) - Essay Example Proponents of permission-based emails argue that the receiver can simply hit the delete button or use an opt-out option listed in the electronic advertisement if they do not want to view the email. (Godin, 1999, pg. 43). Opponents charge anything that arrives in the inbox that the recipient didnââ¬â¢t request is spam and that just because a purchase is made doesnââ¬â¢t give that company the right to inundate them with junk mail. The debate is joined whether this tactic serves to generate trade or to drive potential customers away. Spam is considered not only intrusive but is generally viewed as a scheme of some kind. Those that donââ¬â¢t differentiate between the two are driven away from these emails thus questioning their effectiveness. The question then becomes are permission based emails an unwanted and ineffective or a necessary and reasonable method of advertising? Argument Spammers have long attempted to justify their intrusive form of advertising. So-called permission -based marketing is just another example of spam. According to their logic, if a person forgets to check a button at the end of an online order form requesting no further correspondence, this constitutes permission. If a lawn care or maintenance man had access to your property does that give implied permission to sell you Viagra? When a service or product is purchased on the Internet, does this give implied permission for the company to suggest sell on a daily basis via your email account? If a consumer is required to type in an email address to visit the site or bought a related product from another company that, in turn, sold their email lists, this is all considered permission to inundate an email box with spam. An opt-in list can be purchased, on the Internet, of course, thus making even a respectable companyââ¬â¢s permission list suspect. Many companies, including utility and service companies assume that an individual has granted spam permission if they have used a product or service of that company. These emails typically announce that this email is not spam; you have opted to receive this information. It goes on to espouse the companyââ¬â¢s spam policy and that itââ¬â¢s policy prohibits spam of any kind. There seems to be a perception chasm between marketers and the consumer. (Dean, 2003). If the old adage ââ¬Ëtime is moneyââ¬â¢ is correct, then stolen time is stolen money. The theft of a few seconds will not cause a person to lose their livelihood but that is similar to saying stealing one item from a chain store wonââ¬â¢t bankrupt the company. Wrong on a small scale is still wrong. Spammers may argue that junk mail does not have the same effect as stealing because there is an opt-out option choice on the email, but the time spent reading, following the link and then the steps necessary to stop the spam is time lost. Multiply that 30 seconds of effort by 100ââ¬â¢s of spam emails and that is significant money stolen from an individ ual and/or their employer. (Rhode, 2003). Adopting Opt-in anti-spam email rules worldwide would limit spam messages, perceived or otherwise, as the consumer would have to make a deliberate choice to receive company generated email. The Opt-out option addresses the spam issue only after the unwanted message was sent. The loss of time and irritation to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.