Editor's Note: Block Or Accept Mail, You Decide - InformationWeek
IoT
IoT
News
Commentary
4/5/2003
08:39 AM
Stephanie Stahl
Stephanie Stahl
Commentary
50%
50%
RELATED EVENTS
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

Editor's Note: Block Or Accept Mail, You Decide

"Hi," "info you requested," "your account," "urgent," "you've won." While these words sound innocent enough, they're just a few of the dozens of subject lines included on the E-mail messages that I delete every morning as part of my autopilot, first-cup-of-coffee-of-the-day, get-this-*&%$-out-of-my-in-box routine.

That's on top of ones that are far more descriptive and sometimes repulsive. Enough already. I applaud the efforts under way to help the industry reduce the amount of spam in our business and personal E-mail boxes. I was especially intrigued by news last week of a new product that uses several techniques to stop spam, including letting users set a payment rate to receive E-mail from unknown senders. In that same vein, a researcher at IBM's Watson Research Center has written a basic algorithm that can determine whether incoming E-mails hail from an addressee on a recipient-defined list of approved addresses.

These sorts of "accept" strategies versus the current "block" strategies are something legitimate E-mail marketing companies favor. Last week, I spoke with Scott Dorsey, CEO of one such company, ExactTarget, which recently joined a coalition with more than 20 other permission-based E-mail marketing companies to help find the right solutions. "It's a multifaceted problem that includes freedom of speech, legislation, and technology, but it's a problem that needs to be addressed," he says.

If the various accept strategies prevail, it will require us to change the rules by which we use E-mail. I don't like that it puts the onus on me to determine who can send E-mail to me or that I might have to establish a payment method to receive messages from unknown senders. But that might be just what it takes for us to continue to use a very effective medium.

Stephanie Stahl
Editor
sstahl@cmp.com

Comment on this column on Stephanie Stahl's forum in the Listening Post

Read some of the responses Stephanie has received from readers.


To discuss this column with other readers, please visit Stephanie Stahl's forum on the Listening Post.

To find out more about Stephanie Stahl, please visit her page on the Listening Post.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll