|This article is an orphan, as no other articles link to it. Please introduce links to this page from ; try the Find link tool for suggestions. (September 2011)|
Spam 2.0 is termed as propagation of unsolicited, anonymous, mass content to infiltrate legitimate Web 2.0 applications. An unsolicited blog comment, a promotional post in online discussion boards, a manipulated Wiki pages, a fake and attractive user profiles in social networking website are examples of this new generation of spam. Abuse any kind of Web 2.0 application for the purpose of spamming is known as Spam 2.0, therefore it includes comment spam, wiki spam, online classified ads spam, Internet forum spam, social networking spam, and social spam.
The key element in Spam 2.0 definition is the distribution of spam content through legitimate websites. It differentiates this form of spamming from other types like email spam & web spam. Previously spammers use media such as email, instant messengers, Internet Telephony etc. to spread spam hence such media serves as a communication medium between spammer and genuine users. However, spam 2.0 acts differently which uses legitimate web 2.0 applications to host spam. In spam 2.0, spammers no longer host their own email/web servers. Instead, they post spam on legitimate websites. Legitimate websites here refer to those genuine website used by users such as governmental, universities, companies, homepages websites etc. Spam 2.0 infiltrates legitimate websites by posting/hosting on them.
Spam 2.0 offers a far more attractive proposition for spammers as compared to traditional spam specifically email spam. Web 2.0 applications can be discovered through a simple search engine query that contains domain keywords and a web 2.0 application (e.g. "photography forum" for web 2.0 forum groups that are interested in photographs). Email addresses are procured in a similar fashion except email address details are commonly tightly controlled online and are far more difficult to source.
Spam 2.0 is parasitic in nature. They may exist on legitimate and often official websites. If such information persists, the trust in such pages is diminished, spam is effectively promoted by trusted sources, many users can be mislead or lead to scams and computer malware and such legitimate sites may be blacklisted which then deprives all others of legitimate content. As a result of the success and impact rates of spam 2.0, it is far more popular amongst spammers and has far greater negative socio-economic impact.
- Hayati, Pedram; Potdar, Vidyasagar; Talevski, Alex; Smyth, William F. (2010). "Rule-Based On-the-fly Web Spambot Detection Using Action Strings". Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010). July 13–14. Redmond, Washington, US.
- Potdar, Vidyasagar; Ridzuan, Farida; Hayati, Pedram; Talevski, Alex; Yeganeh, Elham; Firuzeh, Nazanin; Sarencheh, Saeed (2010). "Spam 2.0: The Problem Ahead". In Taniar, David; Gervasi, Osvaldo; Murgante, Beniamino; Pardede, Eric; Apduhan, Bernady. Lecture Notes in Computer Science. Computational Science and Its Applications (ICCSA 2010). Springer Berlin / Heidelberg. p. 11. doi:10.1007/978-3-642-12165-4_32.
- Hayati, Pedram; Potdar, Vidyasagar; Talevski, Alex; Firuzeh, Nazanin; Sarencheh, Saeed; Yeganeh (2010). "Definition of spam 2.0: New spamming boom". IEEE Digital Ecosystem and Technologies (DEST), 12–15 April. Dubai, UAE: IEEE. doi:10.1109/DEST.2010.5610590.