256 ◾ A Comprehensive Look at Fraud Identiﬁcation and Prevention
access to personal and business computer systems, it all comes down to altering the
thought process of the individual operator.
Gone are the good old days when spam was a harmless can of processed meat.
An Internet search using the keyword “spam” will reveal discussion of the canned
meat product as well as a reference to unwanted e- mail. In the world of technology,
spam is basically unsolicited and mostly unwanted e- mail. A majority of the spam
generated is harmless advertising and will most likely wind up in the spam folder of
an individual’s e- mail account. Based on the company an individual uses for their
e- mail service, there are varying levels of spam ﬁlter settings.
Many users can manually set the spam ﬁlter settings provided by the e- mail
service provider. Spam ﬁlter settings usually range from “do not use a spam ﬁlter”
to an “extremely high spam ﬁlter.” E- mail recipients can choose to have all e- mails
posted in their inbox or select varying settings for spam ﬁltering. e higher the
spam ﬁlter setting selected, the user runs the risk of having desired e- mails sent to
the spam folder.
E- mail users who have selected a high level or any level of spam ﬁlter setting can
still access their spam folder and see the sender information and the e- mail subject
line. e more e- mails in the spam folder that remain unopened, the greater the
deviation the user has taken oﬀ the path of least resistance.
e goal of an individual sending spam e- mail for malicious purposes is to have
the recipient open the e- mail message and click on the link provided. To have the
recipient open the unsolicited e- mail and follow the instructions provided, there
has to be an attraction. Typically, the attraction described in the unsolicited e- mail
is an oﬀer to the recipient that falls in line with the adage that it is “too good to
Contained in the malicious links are varying forms of unwanted software that
can be used to access personal and business information contained within the com-
puter system. e malicious software could also be used for outright vicious intents,
with the focus on causing damage to the computer’s operating systems.
No matter the intent of the malicious software attached to various forms of
unsolicited spam- type e- mails, the goal of the computer user is to avoid the tempta-
tion level generated in the subject line of the e- mail.
12.3 Unsubscribing from Spam E- mails
E- mails sent from legitimate operations oﬀer the recipient the option of clicking on
the unsubscribe link at the bottom of the message. By clicking on the unsubscribe