Editor's Note: Block Or Accept Mail, You Decide - InformationWeek
IoT
IoT
News
Commentary
4/5/2003
08:39 AM
Stephanie Stahl
Stephanie Stahl
Commentary
50%
50%

Editor's Note: Block Or Accept Mail, You Decide

"Hi," "info you requested," "your account," "urgent," "you've won." While these words sound innocent enough, they're just a few of the dozens of subject lines included on the E-mail messages that I delete every morning as part of my autopilot, first-cup-of-coffee-of-the-day, get-this-*&%$-out-of-my-in-box routine.

That's on top of ones that are far more descriptive and sometimes repulsive. Enough already. I applaud the efforts under way to help the industry reduce the amount of spam in our business and personal E-mail boxes. I was especially intrigued by news last week of a new product that uses several techniques to stop spam, including letting users set a payment rate to receive E-mail from unknown senders. In that same vein, a researcher at IBM's Watson Research Center has written a basic algorithm that can determine whether incoming E-mails hail from an addressee on a recipient-defined list of approved addresses.

These sorts of "accept" strategies versus the current "block" strategies are something legitimate E-mail marketing companies favor. Last week, I spoke with Scott Dorsey, CEO of one such company, ExactTarget, which recently joined a coalition with more than 20 other permission-based E-mail marketing companies to help find the right solutions. "It's a multifaceted problem that includes freedom of speech, legislation, and technology, but it's a problem that needs to be addressed," he says.

If the various accept strategies prevail, it will require us to change the rules by which we use E-mail. I don't like that it puts the onus on me to determine who can send E-mail to me or that I might have to establish a payment method to receive messages from unknown senders. But that might be just what it takes for us to continue to use a very effective medium.

Stephanie Stahl
Editor
sstahl@cmp.com

Comment on this column on Stephanie Stahl's forum in the Listening Post

Read some of the responses Stephanie has received from readers.


To discuss this column with other readers, please visit Stephanie Stahl's forum on the Listening Post.

To find out more about Stephanie Stahl, please visit her page on the Listening Post.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll