Concluding Recommendations

We have highlighted, in this work, the fundamental role that electronic mail plays in the modern company. We have proposed a more comprehensive definition of spam by developing the notions of friendly spam, hostile spam, and finally, fraudulent spam, which may go beyond the current notion of commercial spam.

We have noted that users’ behaviors have an important role in “altering” the nature of electronic communications and transforming a legitimate message into spam.

As an observer of electronic communications’ international policies, I could note, together with my peers, that despite the efforts of the international community, spam still exists and it will probably be impossible to ward it off.

What can be done?

It seems that the answer to this question also encompasses individual behaviors.

Our research has, in effect, allowed us to identify three typical profiles of users of electronic communication tools. One of these profiles describes a very meticulous use of e-mail, the second seems to correspond to a distressing sensitivity to spam, and the third to a well managed exposure to spam.

The user is advised to adopt the way that is most convenient for him.

Uses and behaviors

Discrete and parsimonious

The first type is representative for individuals who never receive spam.

According to a study conducted in 2011 [LAG 11], this profile corresponds approximately to 20% of users. These are individuals who never receive spam in their inboxes, though ...

Get E-mail and Behavioral Changes now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.