An Empirical Study of Factors Affecting the Rate of Spam

Total Page:16

File Type:pdf, Size:1020Kb

An Empirical Study of Factors Affecting the Rate of Spam An Empirical Study of Factors Affecting the Rate of Spam Rodrigo Sanches Miani1, Danielle Oliveira1 Kil Jin Brandini Park2, Bruno Bogaz Zarpelao˜ 3 1Faculdade de Computac¸ao˜ (FACOM) Universidade Federal de Uberlandiaˆ (UFU) – Uberlandia,ˆ MG – Brasil 2Faculdade de Engenharia Eletrica´ (FEELT) Universidade Federal de Uberlandiaˆ (UFU) – Uberlandia,ˆ MG – Brasil 3Departamento de Computac¸ao˜ (DC) Universidade Estadual de Londrina (UEL) – Londrina, PR – Brasil fmiani,[email protected], [email protected], [email protected] Abstract. Several factors may influence the number of spam received by email users, from user’s profile information such as age or nationality to the way the email account is exposed on the Web. We propose a replication study of an ex- periment conducted more than a decade ago to understand the changes in the dynamics of the business of spam. To that end, using real email addresses cre- ated and managed only for the experiment, we simulate four different behavior profiles: i) interaction on social networks, ii) purchase in e-commerce sites, iii) interaction on forums and message boards and iv) use of file sharing tools, and analyze the amount of spam received on those accounts. The results indicate that linking an email account to a social network is the most significant influence on the spam rate. 1. Introduction The increasing use of the Internet and the resulting popularization of email caused a sig- nificant impact on people’s lives. A problem directly linked to the popularization of email involves receiving unsolicited electronic messages, also known as spam. The amount of spam generated is a direct consequence of the low financial cost of sending emails, especially when compared to the regular correspondence [Cerf 2005]. Hann et al. [Hann et al. 2006] suggested a study to understand the dynamics of spam and confirm whether spam follows some guidance or are randomly distributed. The authors conducted an experiment to evaluate whether some factors, such as email providers and interests declared in certain products or services, could determine the rate of spam. A secondary goal in [Hann et al. 2006] was to investigate the influence of other factors (age and geographic location of the owner’s account) in the delivery of unsolicited messages. To that end, 288 email accounts with distinct owner’s profiles were created on Hotmail, Lycos, Excite e Yahoo providers. 192 were exposed in the Yahoo Geocities, currently available only in Japan, website hosting provider. A web page was constructed for each one of these accounts. The definition of profiles included characteristics such as interests declared, e.g., ”computers and technology,” age, gender and geographic location. Over a 33 weeks period, spam sent to the email accounts were monitored and analyzed according to each feature. The conclusions gathered at the end of the experiment were: • Spam is not random but targeted at consumer segments that are relatively more likely to make online purchases, who declare an interest in specific products or services, adults, and US residents (US); • The most significant find was that the greatest influence on spam rate was the iden- tity of email service provider, since accounts on Hotmail received significantly more spam. The study proposed by Hann et al. [Hann et al. 2006] is particularly influential due to its design. The authors conducted a field study by establishing real email accounts and also proposed a way to other people interact with them using Geocities. The com- mon approach discussed in related studies consisted in analyzing a snapshot of a spam dataset provided by some university or ISP [Clayton 2008], [Garg and Niliadeh 2013] and [Almaatouq et al. 2016] or using survey data [Siponen and Stucke 2006]. The aim of this study is to replicate many aspects of the experiment conducted by [Hann et al. 2006], using an updated database that reflects the behavior of a Web user with different characteristics, such as using social networks, buying at online shopping sites, sharing files and posting on online forums. This type of replication study is known as triangulation which we have the same study goal but different design. At the end we will conduct a comparison between the results obtained by [Hann et al. 2006] and those achieved in this study. Since the prior study was performed more than ten years ago and the Internet behavior is constantly changing, we believe that a new and renovated investigation is necessary to provide a better understanding of other factors influencing the distribution of spam. Our idea is to verify which behavior profiles (online shopping, online social net- works, file hosting and online forums) affects the rate of spam, how email providers treated unsolicited messages and also establish a dataset of email accounts that could be used in future work. The rest of this paper is organized as follows: Section 2 outlines the main strat- egy adopted in the methodology applied. Section 3 presents the results obtained and the analysis of those results. Section 4 describes related work. Finally, Section 5 brings the conclusion and future work. 2. Methodology This paper aims to replicate, extend and update the findings of the work proposed by Hann et al. [Hann et al. 2006]. The main difference in this study is that the email accounts will be exposed to certain classes of online services, called ”exposure groups.” The proposal consists of the following steps: 1. Build the user profile: the first step consists in creating profiles for emails of fictitious persons. Each profile is formed by name, age, gender, nationality, service provider and exposure group that the account is associated. 2. Create email accounts: create fictitious accounts in three free email providers. Each account will be created respecting the users’ profiles defined in the previous step. Table 1. Summarization of the characteristics considered in this study. Age Gender Residence Mail service provider Exposure group 18, 35 and 60 Male and Fe- Brazil and GMX/Mail, India and i) Online Social male United States Zoho Network (Facebook); of Americca ii) Online Shopping (Amazon and Sub- marino), iii) File Hosting (4Shared) and iv) Discussion Forum (Reddit) 3. Association: with all the email accounts created, the next step, was to associate them with their respective exposure groups: online shopping, online social net- working, file hosting, and discussion forums. 4. Data collection: the email accounts were accompanied by a period of four months. They were monitored periodically to facilitate the analysis of the amount of spam received at the end of the review period. 5. Analysis: gathered spam was analyzed according to previously defined character- istics (age, gender, nationality, service provider and exposure groups). A compar- ison of the results acquired here and those found in [Hann et al. 2006] should be performed. The first step was to define the user profiles. The characteristics used to deter- mine each profile were the same as seen in [Hann et al. 2006]. For the age attribute, the possible choices are 18, 35 and 60 years. We choose those ages because they represent the main groups: youth, adults, and seniors, respectively. For nationality, there are two possibilities, United States or Brazil. For gender, choices are male and female. To explore other factors that influence the receipt of spam, we considered the email service provider and the exposure of email addresses to particular Web services. We classified every ser- vice in exposure groups. Table 1 summarizes the characteristics of the email accounts created in this experiment. The exposure groups were proposed based on a typical Web user’s behavior. Our idea was to answer the following question: “What kind of activities a Web user could do using an email account?”. Based on studies conducted by [Whang et al. 2003], we created the following exposure groups: • Online Social Networks (OSN) - Online social networking sites are very pop- ular, usually run by individual corporations (e.g., Google and Yahoo!), and are accessible via the Web. Participating users join a network, publish their profile and any content, and create links to any other users with whom they associate [Mislove et al. 2007]. In this work, we associated email accounts with a Face- book account; • Online Shopping (OS) - This is a shopping activity performed by a consumer via a computer-based interface, where the consumer’s computer is connected to and can interact with, a retailer’s digital storefront [Haubl¨ and Trifts 2000]. For Brazilian residents, email accounts were registered in submarino.com, while US residents were associated with amazon.com; • Discussion Forum (DF) - A discussion forum is a web application that provides a virtual environment supporting discussion and debate among peers without tem- poral or geographical barriers [Cheng et al. 2011]. Reddit accounts were created and linked to some of the email accounts; • File Hosting (FH) - File Hosting (FH) services are used daily by thousands of people as a way of storing and sharing files. 4Shared accounts were created and associated with some of the email accounts. We would like to verify the incidence of spam as follows: i) in every isolated group, ii) in the case of an email account is associated with all groups at the same time or, iii) an email account is associated with OSN and OS or iv) an email account is associated with exposure groups DF and FH. The division between OSN/OS and DF/FH is related to the e-commerce potential of both groups. Thus the total number of cases to analyze is seven, four separate groups added to each of the three combination alternatives. We created an email account for each combination of gender, nationality, age and exposure group. Based on the same method as proposed by Hann et al. [Hann et al.
Recommended publications
  • 1997 LETTER to SHAREHOLDERS (Reprinted from the 1997 Annual Report)
    1997 LETTER TO SHAREHOLDERS (Reprinted from the 1997 Annual Report) To our shareholders: Amazon.com passed many milestones in 1997: by year-end, we had served more than 1.5 million customers, yielding 838% revenue growth to $147.8 million, and extended our market leadership despite aggressive competitive entry. But this is Day 1 for the Internet and, if we execute well, for Amazon.com. Today, online commerce saves customers money and precious time. Tomorrow, through personalization, online commerce will accelerate the very process of discovery. Amazon.com uses the Internet to create real value for its customers and, by doing so, hopes to create an enduring franchise, even in established and large markets. We have a window of opportunity as larger players marshal the resources to pursue the online opportunity and as customers, new to purchasing online, are receptive to forming new relationships. The competitive landscape has continued to evolve at a fast pace. Many large players have moved online with credible offerings and have devoted substantial energy and resources to building awareness, traffic, and sales. Our goal is to move quickly to solidify and extend our current position while we begin to pursue the online commerce opportunities in other areas. We see substantial opportunity in the large markets we are targeting. This strategy is not without risk: it requires serious investment and crisp execution against established franchise leaders. It’s All About the Long Term We believe that a fundamental measure of our success will be the shareholder value we create over the long term. This value will be a direct result of our ability to extend and solidify our current market leadership position.
    [Show full text]
  • “Jeff, What Does Day 2 Look Like?” That's a Question I Just Got at Our
    “Jeff, what does Day 2 look like?” That’s a question I just got at our most recent all-hands meeting. I’ve been reminding people that it’s Day 1 for a couple of decades. I work in an Amazon building named Day 1, and when I moved buildings, I took the name with me. I spend time thinking about this topic. “Day 2 is stasis. Followed by irrelevance. Followed by excruciating, painful decline. Followed by death. And that is why it is always Day 1.” To be sure, this kind of decline would happen in extreme slow motion. An established company might harvest Day 2 for decades, but the final result would still come. I’m interested in the question, how do you fend off Day 2? What are the techniques and tactics? How do you keep the vitality of Day 1, even inside a large organization? Such a question can’t have a simple answer. There will be many elements, multiple paths, and many traps. I don’t know the whole answer, but I may know bits of it. Here’s a starter pack of essentials for Day 1 defense: customer obsession, a skeptical view of proxies, the eager adoption of external trends, and high-velocity decision making. True Customer Obsession There are many ways to center a business. You can be competitor focused, you can be product focused, you can be technology focused, you can be business model focused, and there are more. But in my view, obsessive customer focus is by far the most protective of Day 1 vitality.
    [Show full text]
  • A Study on the Web Portal Industry
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by KDI School Archives A STUDY ON THE WEB PORTAL INDUSTRY: By Chan-Soo Park THESIS Submitted to School of Public Policy and Management, KDI In partial fulfillment of the requirements for the degree of MASTER OF STRATEGY & GLOBAL MANAGEMENT Department of Strategy & International Management 2000 A STUDY ON THE WEB PORTAL INDUSTRY: By Chan-Soo Park THESIS Submitted to School of Public Policy and Management, KDI In partial fulfillment of the requirements for the degree of MASTER OF STRATEGY & GLOBAL MANAGEMENT Department of Strategy & International Management 2000 Professor Seung-Joo Lee 1 ABSTRACT A STUDY ON THE WEB PORTAL INDUSTRY By Chan –Soo Park A portal is a site on the Internet that provides a one-stop experience for Internet users, allowing them to check e-mail, search the Web, and get personalized news and stock quotes. Since 1998, the “portal” has been considered the most successful Internet business model. Portal sites have characteristics such as community facilitated by services, revenue that relies on advertising, a highly competitive market, heavy traffic, and an uncertain business. The world wide portal industry is like a battle zone for America’s top three, broad-based and vertical portals. The Web portal industry is dominated by the “top three portals,” which are AOL, Yahoo and MSN, and “vertical portals” such as Go Network and NBC. The broad-based portals --Lycos, Excite@home, AltaVista and Infoseek—do not lag far behind as major competitors. Many challenges face the three key players and broad-based portals.
    [Show full text]
  • DO YOU NEED MDM? in the Face of the BYOD Phenomenon, Some Businesses Will Need an All-Encompassing Mobile Device Management Solution
    VOICE OF THE I.T. COMMUNITY ITWorldCanada.com Volume 28, Number 3 I MARCH 2012 Bad guys have edge in cyberwar Canada doesn't have the resources to fight cyber crime: Critics PAGE 10 Is a ‘phablet’ right for everyone? We review Samsung's Android-powered Galaxy Note PAGE 22 DO YOU NEED MDM? In the face of the BYOD phenomenon, some businesses will need an all-encompassing mobile device management solution. But not all will PAGE 18 MOBILE WORLD CONGRESS NEWS FROM BARCELONA PAGE 14 PM 40063800 Streamlined provisioning. Introducing Microsoft Of ce 365. Collaborate Easy-to-use permissions. in the cloud with Of ce, Exchange, SharePoint, and Lync videoconferencing. Starting as low Enterprise-grade security. as $11.75 per user per month. Begin your It all works together. free trial now at CompWorld.Of ce365.ca Scan this tag with your smartphone to see Of ce 365 in action. 14842_MSA062_Security_ComputerWorld_8.125x10.875.indd 1 2/24/12 10:05 AM AGENDA OPINIONS AND COMMENTARY platform research and develop- fields. Now, the sources of data oretical example of the patterns A big ment for the company. aren’t so structured: we’re deal- that data mining can unlock, It’s a given that technology ing with documents, images, and factually, it wasn’t true. It’s changes everything, but that’s and media files, often without an item of small relevance, but data particularly true in the big data the appropriate meta data; for the fact that it lodged the analytics field. The ability to geo-location data that may or beer-and-diapers model of data ‘aha’ process the analytics of billions may not be associated with a mining in my head for the ensu- of lines of data in memory, inno- transaction; social media feeds ing 15 years.
    [Show full text]
  • Corporate Responsibility Report About Symantec
    2017 Corporate Responsibility Report About Symantec Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, enables organizations, governments, and consumers SYMANTEC to secure their most important data wherever it lives. Organizations and AT A GLANCE governments across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, the More than 163 million cloud, and infrastructure. Likewise, more than 50 million people rely on email users, 80 million web proxy users, and Symantec’s Norton and LifeLock product suites to protect their digital 175 million endpoints lives at home and across their devices. Symantec operates the world’s protected largest civilian threat intelligence network, enabling us to see and protect Operations in more than against the most advanced threats. 35 countries More than 2,600 patents We support the United Nations Global Compact and granted worldwide Sustainable Development Goals Approximately 12,000 Symantec is committed to helping shift the employees worldwide world onto a sustainable path. A Fortune 500 company Symantec became a signatory to the United with more than Nations Global Compact (UN Global Com- $4 billion in revenues pact) in 2006. We continue to follow the (fiscal year 2017) 10 principles of the UN Global Compact and we maintain active membership in the Headquarters in UN Global Compact Network USA. We par- Mountain View, ticipate in the UN Global Compact LEAD California program by hosting and participating in meetings and fully adhering to the UN Global Founded in 1982; Compact Advanced Criteria. IPO in 1989 In addition, we’ve aligned our corporate responsibility activities with the following UN Sustainable Development Goals (SDGs).
    [Show full text]
  • The Pre-Kansas Saga of James Henry Lane
    University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 5-2012 A Family Affair: The rP e-Kansas Saga of James Henry Lane James Robert Bird University of Arkansas, Fayetteville Follow this and additional works at: http://scholarworks.uark.edu/etd Part of the United States History Commons Recommended Citation Bird, James Robert, "A Family Affair: The rP e-Kansas Saga of James Henry Lane" (2012). Theses and Dissertations. 399. http://scholarworks.uark.edu/etd/399 This Dissertation is brought to you for free and open access by ScholarWorks@UARK. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected], [email protected]. A FAMILY AFFAIR: THE PRE-KANSAS SAGA OF JAMES HENRY LANE A FAMILY AFFAIR: THE PRE-KANSAS SAGA OF JAMES HENRY LANE A dissertation submitted in partial fulfillment Of the requirements for the degree of Doctor of Philosophy in History By James Robert Bird Pittsburg State University Bachelor of Arts in Political Science, 1969 Pittsburg State University Master of Science in Political Science, 1970 Pittsburg State University Master of Arts in History, 2003 May 2012 University of Arkansas ABSTRACT Historian Craig Miner suggests that territorial Kansas between 1854 and 1861 was “a nursery of weird and manic figures.” Foremost among the weird and manic figures of Kansas history stands James Henry Lane, formerly a U.S. congressman from Indiana, and destined to become one of Kansas’ first pair of senators. Writing at the midpoint of the twentieth century, Albert Castel pronounced Jim Lane “the most colorful and fascinating personality in the history of Kansas,” adding that “Very likely, too, he was mentally unbalanced and paranoid.” Yet, James H.
    [Show full text]
  • Download Download
    International Journal of Management & Information Systems – Fourth Quarter 2011 Volume 15, Number 4 History Of Search Engines Tom Seymour, Minot State University, USA Dean Frantsvog, Minot State University, USA Satheesh Kumar, Minot State University, USA ABSTRACT As the number of sites on the Web increased in the mid-to-late 90s, search engines started appearing to help people find information quickly. Search engines developed business models to finance their services, such as pay per click programs offered by Open Text in 1996 and then Goto.com in 1998. Goto.com later changed its name to Overture in 2001, and was purchased by Yahoo! in 2003, and now offers paid search opportunities for advertisers through Yahoo! Search Marketing. Google also began to offer advertisements on search results pages in 2000 through the Google Ad Words program. By 2007, pay-per-click programs proved to be primary money-makers for search engines. In a market dominated by Google, in 2009 Yahoo! and Microsoft announced the intention to forge an alliance. The Yahoo! & Microsoft Search Alliance eventually received approval from regulators in the US and Europe in February 2010. Search engine optimization consultants expanded their offerings to help businesses learn about and use the advertising opportunities offered by search engines, and new agencies focusing primarily upon marketing and advertising through search engines emerged. The term "Search Engine Marketing" was proposed by Danny Sullivan in 2001 to cover the spectrum of activities involved in performing SEO, managing paid listings at the search engines, submitting sites to directories, and developing online marketing strategies for businesses, organizations, and individuals.
    [Show full text]
  • ANNUAL REPORT to Our Shareowners
    2017 ANNUAL REPORT To our shareowners: The American Customer Satisfaction Index recently announced the results of its annual survey, and for the 8th year in a row customers ranked Amazon #1. The United Kingdom has a similar index, The U.K. Customer Satisfaction Index, put out by the Institute of Customer Service. For the 5th time in a row Amazon U.K. ranked #1 in that survey. Amazon was also just named the #1 business on LinkedIn’s 2018 Top Companies list, which ranks the most sought after places to work for professionals in the United States. And just a few weeks ago, Harris Poll released its annual Reputation Quotient, which surveys over 25,000 consumers on a broad range of topics from workplace environment to social responsibility to products and services, and for the 3rd year in a row Amazon ranked #1. Congratulations and thank you to the now over 560,000 Amazonians who come to work every day with unrelenting customer obsession, ingenuity, and commitment to operational excellence. And on behalf of Amazonians everywhere, I want to extend a huge thank you to customers. It’s incredibly energizing for us to see your responses to these surveys. One thing I love about customers is that they are divinely discontent. Their expectations are never static – they go up. It’s human nature. We didn’t ascend from our hunter-gatherer days by being satisfied. People have a voracious appetite for a better way, and yesterday’s ‘wow’ quickly becomes today’s ‘ordinary’. I see that cycle of improvement happening at a faster rate than ever before.
    [Show full text]
  • AMERICAN LITERARY MINIMALISM by ROBERT CHARLES
    AMERICAN LITERARY MINIMALISM by ROBERT CHARLES CLARK (Under the Direction of James Nagel) ABSTRACT American Literary Minimalism stands as an important yet misunderstood stylistic movement. It is an extension of aesthetics established by a diverse group of authors active in the late-nineteenth and early twentieth centuries that includes Amy Lowell, William Carlos Williams, and Ezra Pound. Works within the tradition reflect several qualities: the prose is “spare” and “clean”; important plot details are often omitted or left out; practitioners tend to excise material during the editing process; and stories tend to be about “common people” as opposed to the powerful and aristocratic. While these descriptors and the many others that have been posited over the years are in some ways helpful, the mode remains poorly defined. The core idea that differentiates American Minimalism from other movements is that prose and poetry should be extremely efficient, allusive, and implicative. The language in this type of fiction tends to be simple and direct. Narrators do not often use ornate adjectives and rarely offer effusive descriptions of scenery or extensive detail about characters’ backgrounds. Because authors tend to use few words, each is invested with a heightened sense of interpretive significance. Allusion and implication by omission are often employed as a means to compensate for limited exposition, to add depth to stories that on the surface may seem superficial or incomplete. Despite being scattered among eleven decades, American Minimalists share a common aesthetic. They were not so much enamored with the idea that “less is more” but that it is possible to write compact prose that still achieves depth of setting, characterization, and plot without including long passages of exposition.
    [Show full text]
  • MAN of DOUGLAS, MAN of LINCOLN: the POLITICAL ODYSSEY of JAMES HENRY LANE Ian Michael Spurgeon University of Southern Mississippi
    The University of Southern Mississippi The Aquila Digital Community Dissertations Summer 8-2007 MAN OF DOUGLAS, MAN OF LINCOLN: THE POLITICAL ODYSSEY OF JAMES HENRY LANE Ian Michael Spurgeon University of Southern Mississippi Follow this and additional works at: https://aquila.usm.edu/dissertations Part of the Military History Commons, Political History Commons, and the United States History Commons Recommended Citation Spurgeon, Ian Michael, "MAN OF DOUGLAS, MAN OF LINCOLN: THE POLITICAL ODYSSEY OF JAMES HENRY LANE" (2007). Dissertations. 1293. https://aquila.usm.edu/dissertations/1293 This Dissertation is brought to you for free and open access by The Aquila Digital Community. It has been accepted for inclusion in Dissertations by an authorized administrator of The Aquila Digital Community. For more information, please contact [email protected]. The University of Southern Mississippi MAN OF DOUGLAS, MAN OF LINCOLN: THE POLITICAL ODYSSEY OF JAMES HENRY LANE by Ian Michael Spurgeon A Dissertation Submitted to the Graduate Studies Office of The University of Southern Mississippi in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Approved: August 2007 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. COPYRIGHT BY IAN MICHAEL SPURGEON 2007 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. The University of Southern Mississippi MAN OF DOUGLAS, MAN OF LINCOLN: THE POLITICAL ODYSSEY OF JAMES HENRY LANE by Ian Michael Spurgeon Abstract of a Dissertation Submitted to the Graduate Studies Office of The University of Southern Mississippi in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2007 Reproduced with permission of the copyright owner.
    [Show full text]
  • Excite® User's Guides
    User’s Guides ❖ excite® Write User’s Guide ❖ excite® Pro User’s Guide If you need assistance: ❖ Toshiba’s Support Web site tabletsupport.toshiba.com For more information, see “If Something Goes Wrong” on page 118 in this guide. GMAD00367010 07/13 User’s Guide If you need assistance: ❖ Toshiba’s Support Web site tabletsupport.toshiba.com For more information, see “If Something Goes Wrong” on page 118 in this guide. 2 Handling the cord on this product will expose you to lead, a chemical known to the State of California to cause birth defects or other reproductive harm. Wash hands after handling. For the state of California only. Model: AT10PE - A Series Regulatory Information Protection of Stored Data For your important data, please make periodic back-up copies of all the data stored on the hard disk or other storage devices as a precaution against possible failures, alteration, or loss of the data. IF YOUR DATA IS ALTERED OR LOST DUE TO ANY TROUBLE, FAILURE OR MALFUNCTION OF THE HARD DISK DRIVE OR OTHER STORAGE DEVICES AND THE DATA CANNOT BE RECOVERED, TOSHIBA SHALL NOT BE LIABLE FOR ANY DAMAGE OR LOSS OF DATA, OR ANY OTHER DAMAGE RESULTING THEREFROM. WHEN COPYING OR TRANSFERRING YOUR DATA, PLEASE BE SURE TO CONFIRM WHETHER THE DATA HAS BEEN SUCCESSFULLY COPIED OR TRANSFERRED. TOSHIBA DISCLAIMS ANY LIABILITY FOR THE FAILURE TO COPY OR TRANSFER THE DATA CORRECTLY. Critical Applications The device you have purchased is not designed for any “critical applications.” “Critical applications” means life support systems, medical applications, connections to implanted medical devices, commercial transportation, nuclear facilities or systems or any other applications where product failure could lead to injury to persons or loss of life or catastrophic property damage.
    [Show full text]
  • Looksmart Expands Strategic Relationship with Infospace, Bringing Its Search Results to Excite and Webcrawler
    LookSmart Expands Strategic Relationship With InfoSpace, Bringing Its Search Results to Excite and Webcrawler SAN FRANCISCO & BELLEVUE, Wash.--(BUSINESS WIRE)--May 7, 2002-- LookSmart's Search Results, Found Within InfoSpace's Next Generation Meta-Search Product, Launches Today at Excite.com and WebCrawler.com LookSmart (Nasdaq:LOOK; ASX:LOK), a global leader in search targeted marketing, and InfoSpace, Inc. (Nasdaq:INSP), a provider of wireless and Internet software and application services, today announced that they have extended and expanded their search relationship. Under the agreement, LookSmart search listings will now appear on InfoSpace's newly-launched, next generation, meta-search product found at Excite (www.excite.com) and WebCrawler (www.webcrawler.com). Excite is one of the leading personalization portals on the Internet, offering world-class content and functionality from more than 75 leading sources with more than 14 million monthly unique users. Additionally, LookSmart will continue to provide results for InfoSpace's other meta-search solutions, which include Dogpile (www.dogpile.com) and MetaCrawler (www.metacrawler.com). InfoSpace's proprietary meta-search technology allows users to search multiple engines at once, returning comprehensive results fast. "LookSmart is pleased to expand its relationship with InfoSpace by playing a significant role in the new search product that is served on Excite and WebCrawler," said Scott Stanford, senior vice president of business development for LookSmart. "LookSmart will meet an immediate need for high-quality search results and we look forward to continue working together to create great search for users of InfoSpace's properties." "LookSmart's search listings produce highly relevant results for users of our meta-search products, including the next generation engine launched at Excite and WebCrawler," said York Baur, InfoSpace executive vice president, wireline and broadband.
    [Show full text]