{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:46:08Z","timestamp":1742384768101},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"9","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Queue"],"published-print":{"date-parts":[[2006,11]]},"abstract":"<jats:p>Internet e-mail was conceived in a different world than we live in today. It was a small, tightly knit community, and we didn\u2019t really have to worry too much about miscreants. Generally, if someone did something wrong, the problem could be dealt with through social means; \u201cshunning\u201d is very effective in small communities. Perhaps we should have figured out what was going to happen when Usenet started to go bad. Usenet was based on an inexpensive network called UUCP, which was fairly easy to join, so it gave us a taste of what happens when the community becomes larger and more distributed\u2014and harder to manage. Even the worst flame wars seemed fairly innocuous in the grand scheme of things, and kill files were really enough, but there was a seed of something ominous that was going to germinate all too soon.<\/jats:p>","DOI":"10.1145\/1180176.1180191","type":"journal-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T19:38:29Z","timestamp":1168976309000},"page":"30-34","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["E-mail Authentication: What, Why, How?"],"prefix":"10.1145","volume":"4","author":[{"given":"Eric","family":"Allman","sequence":"first","affiliation":[{"name":"Sendmail"}]}],"member":"320","published-online":{"date-parts":[[2006,11]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Salus P. H. 1995. Casting the Net. Boston: Addison-Wesley Professional.  Salus P. H. 1995. Casting the Net. Boston: Addison-Wesley Professional."},{"key":"e_1_2_1_2_1","unstructured":"Pelline J. 1998. Microsoft buys Hotmail. CNET News.com; http:\/\/news.com.com\/2100-1033-206717.html.  Pelline J. 1998. Microsoft buys Hotmail. CNET News.com; http:\/\/news.com.com\/2100-1033-206717.html."},{"key":"e_1_2_1_3_1","unstructured":"Microsoft. 1999. MSN Hotmail: From zero to 30 million members in 30 months; http:\/\/www.microsoft.com\/presspass\/features\/1999\/02-08hotmail.mspx.  Microsoft. 1999. MSN Hotmail: From zero to 30 million members in 30 months; http:\/\/www.microsoft.com\/presspass\/features\/1999\/02-08hotmail.mspx."},{"key":"e_1_2_1_4_1","unstructured":"Internet Systems Consortium. ISC Internet Domain Survey; http:\/\/www.isc.org\/index.pl?\/ops\/ds\/.  Internet Systems Consortium. ISC Internet Domain Survey; http:\/\/www.isc.org\/index.pl?\/ops\/ds\/."},{"key":"e_1_2_1_5_1","unstructured":"Microsoft. 2006. Microsoft reports fourth quarter results and announces share repurchase program; http:\/\/www.microsoft.com\/msft\/earnings\/FY06\/earn_rel_q4_06.mspx.  Microsoft. 2006. Microsoft reports fourth quarter results and announces share repurchase program; http:\/\/www.microsoft.com\/msft\/earnings\/FY06\/earn_rel_q4_06.mspx."},{"key":"e_1_2_1_6_1","unstructured":"Defense Communications Agency. 1985. DDN Protocol Handbook Volume 1 DOD Military Standard Protocols. NIC 50004 (December).  Defense Communications Agency. 1985. DDN Protocol Handbook Volume 1 DOD Military Standard Protocols. NIC 50004 (December)."}],"container-title":["Queue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1180176.1180191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T20:54:40Z","timestamp":1672260880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1180176.1180191"}},"subtitle":["Perhaps we should have figured out what was going to happen when Usenet started  to go bad."],"short-title":[],"issued":{"date-parts":[[2006,11]]},"references-count":6,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2006,11]]}},"alternative-id":["10.1145\/1180176.1180191"],"URL":"https:\/\/doi.org\/10.1145\/1180176.1180191","relation":{},"ISSN":["1542-7730","1542-7749"],"issn-type":[{"value":"1542-7730","type":"print"},{"value":"1542-7749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,11]]},"assertion":[{"value":"2006-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}