2,809 research outputs found

    Preemption of State Spam Laws by the Federal Can-Spam Act

    Get PDF
    Unsolicited bulk commercial email is an increasing problem, and though many states have passed laws aimed at curbing its use and abuse, for several years the federal government took no action. In 2003 that changed when Congress passed the CAN-SPAM Act. Though the law contains many different restrictions on spam messages, including some restriction of nearly every type that states had adopted, the Act was widely criticized as weak. Many of the CAN-SPAM Act\u27s provisions are weaker than corresponding provisions of state law, and the Act preempts most state spam laws that would go farther, including two state laws that would have banned all spam. Despite these weaknesses, this Comment argues that when properly interpreted the CAN-SPAM Act leaves key state law provisions in force, and accordingly is stronger than many spam opponents first thought. First, the law explicitly preserves state laws to the extent that they prohibit falsity or deception in any portion of a commercial electronic mail message or information attached thereto. Though Congress was primarily concerned with saving state consumer protection laws, this language can be applied much more broadly. Second, the law is silent on the question of state law enforcement methods. State enforcement can be, and frequently is, substantially stronger than federal enforcement, which is largely limited to actions by the federal government, internet service providers, and state agencies. The Comment concludes by arguing that this narrow interpretation of its preemption clause is most consistent with the CAN-SPAM Act\u27s twin policy goals. By limiting the substantive provisions states may adopt, the Act prevents states from enacting inconsistent laws and enforces a uniform national spam policy. At the same time, narrowly interpreting the preemption clause permits states to experiment within the limits of that policy, in hopes of finding the most effective set of spam regulations

    BlogForever: D2.5 Weblog Spam Filtering Report and Associated Methodology

    Get PDF
    This report is written as a first attempt to define the BlogForever spam detection strategy. It comprises a survey of weblog spam technology and approaches to their detection. While the report was written to help identify possible approaches to spam detection as a component within the BlogForver software, the discussion has been extended to include observations related to the historical, social and practical value of spam, and proposals of other ways of dealing with spam within the repository without necessarily removing them. It contains a general overview of spam types, ready-made anti-spam APIs available for weblogs, possible methods that have been suggested for preventing the introduction of spam into a blog, and research related to spam focusing on those that appear in the weblog context, concluding in a proposal for a spam detection workflow that might form the basis for the spam detection component of the BlogForever software

    Yours ever (well, maybe): Studies and signposts in letter writing

    Get PDF
    Electronic mail and other digital communications technologies seemingly threaten to end the era of handwritten and typed letters, now affectionately seen as part of snail mail. In this essay, I analyze a group of popular and scholarly studies about letter writing-including examples of pundits critiquing the use of e-mail, etiquette manuals advising why the handwritten letter still possesses value, historians and literary scholars studying the role of letters in the past and what it tells us about our present attitudes about digital communications technologies, and futurists predicting how we will function as personal archivists maintaining every document including e-mail. These are useful guideposts for archivists, providing both a sense of the present and the past in the role, value and nature of letters and their successors. They also provide insights into how such documents should be studied, expanding our gaze beyond the particular letters, to the tools used to create them and the traditions dictating their form and function. We also can discern a role for archivists, both for contributing to the literature about documents and in using these studies and commentaries, suggesting not a new disciplinary realm but opportunities for new interdisciplinary work. Examining a documentary form makes us more sensitive to both the innovations and traditions as it shifts from the analog to the digital; we can learn not to be caught up in hysteria or nostalgia about one form over another and archivists can learn about what they might expect in their labors to document society and its institutions. At one time, paper was part of an innovative technology, with roles very similar to the Internet and e-mail today. It may be that the shifts are far less revolutionary than is often assumed. Reading such works also suggests, finally, that archivists ought to rethink how they view their own knowledge and how it is constructed and used. © 2010 Springer Science+Business Media B.V

    InfoTech Update, Volume 15, Number 4, July/August 2006

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/5017/thumbnail.jp

    Creating a Positive Classroom Environment

    Get PDF
    Creating a positive classroom environment has long been a topic of research at the kindergarten through high school levels. However, less research is available at college/university level despite evidence that suggests its importance to the successful delivery of course content. Relevant information from the Faculty Academic Orientation Manual has been summarized to provide the backdrop for two paradigms. The journalistic paradigm Who, What, When, Where, How and Why is useful for assessing the characteristics of students and the challenges they face. A more recent paradigm Situation, Purpose, Audience, and Method (SPAM) presented by Dr. Laurie Rozakis has been adapted to facilitate utilization of data from the first paradigm. The use of such background data enhances the development of a positive classroom environment. Furthermore, the flexibility inherent in both paradigms permits the instructor to extrapolate additional information on an as needed basis. The expeditious delivery of course content to a focused, goal-oriented population in a positive classroom environment is deemed desirable. The paradigms expand available choices to faculty striving to achieve that goal

    Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample

    Get PDF
    In this paper we present a proposal to address the problem of the pricey and unreliable human annotation, which is important for detection of hate speech from the web contents. In particular, we propose to use the text that are produced from the suspended accounts in the aftermath of a hateful event as subtle and reliable source for hate speech prediction. The proposal was motivated after implementing emotion analysis on three sources of data sets: suspended, active and neutral ones, i.e. the first two sources of data sets contain hateful tweets from suspended accounts and active accounts, respectively, whereas the third source of data sets contain neutral tweets only. The emotion analysis indicated that the tweets from suspended accounts show more disgust, negative, fear and sadness emotions than the ones from active accounts, although tweets from both types of accounts might be annotated as hateful ones by human annotators. We train two Random Forest classifiers based on the semantic meaning of tweets respectively from suspended and active accounts, and evaluate the prediction accuracy of the two classifiers on unseen data. The results show that the classifier trained on the tweets from suspended accounts outperformed the one trained on the tweets from active accounts by 16% of overall F-score

    April-June 2008

    Get PDF
    • 

    corecore