Toward a Sustainable Email Marketing Infrastructure: A System Dynamics Perspective Oleg Pavlov1 Nigel Melville Robert Plice 1 Corresponding author. Oleg V. Pavlov is Assistant Professor of Economics and System Dynamics, Worcester Polytechnic Institute, USA, opavlov@wpi.edu. Nigel Melville is Assistant Professor of Business Information Technology, Stephen M. Ross School of Business, University of Michigan, Ann Arbor, npmelv@umich.edu. Robert Plice is Assistant Professor of Information and Decision Systems, San Diego State University, rplice@mail.sdsu.edu. The authors acknowledge the helpful comments and suggestions of participants in the 13th International Conference on Computing in Economics and Finance, Montreal, Canada, June 14-16, 2007 and 25th International Conference of the System Dynamics Society, Boston, MA, July 29- August 2, 2007 2 Abstract Email marketing is a legitimate, lucrative, and widely used business tool, but it is in danger of being overrun by unwanted commercial email (also known as spam). Conventional approaches to maintaining the robustness of legitimate email attack pieces of the problem. In contrast, this article asserts that the email marketing infrastructure is a complex system requiring holistic analysis. A system dynamics model is developed to identify the underlying dynamics and enable an examination of alternative mitigation strategies. Results reveal that the system conforms with the limits-to-growth generic structure, filtering may have the unintended consequence of increasing the amount of unwanted email, and the unexpected increase comes about because better filters can actually assist spammers by mitigating an information deficit. Keywords: Email, marketing, spam, system dynamics 3 1. Introduction The Internet offers a new paradigm for marketing, engendering a shift from product to customer focus that includes micro-level customization and customer relationship management (Rust and Espinoza 2006). An example is search-based advertising, which grew from virtually nothing in the early 1990s to a $14 billion industry in 2006 (Elkin 2007). Another example is email marketing, which provides twice the return on investment (ROI) relative to other forms of online marketing: $57.25 for each dollar spent versus $22.52 (Direct Marketing Association). Email marketing is now employed by 70% of all retailers and growing 10% annually (McCloskey 2006). Ironically, email marketing may be its own worst enemy. The Internet drastically lowers communication costs – an underlying driver of high email marketing ROI relative to other channels. In turn, low production costs spur greater production, inducing entry to the industry by legitimate and not-so-legitimate marketers, further increasing the volume of email messages sent. As a result, consumers are awash in a sea of ads and information, some useful and some not. Knowledge workers sift through hundreds of such emails per week, more than one-half of which are spam, leading to information overload – a situation when more information is not better (Schwartz 2004; Simon 1971). The bottom line is that useful email marketing messages are lost in the background noise with negative consequences for short-term ROI and long-term industry health. The spiraling situation of email marketing overload and its deleterious impact on ROI has been acknowledged by the industry, for example: “I recommend we all keep our ears to the ground on this and work through organizations like the Email Sender and Provider Coalition to help find balanced solutions that stop spam, but allow businesses to continue to use the email medium for legitimate, permission-based communications.” (Nussey 2007). But, is the email-marketing industry sufficiently motivated to work jointly to make the necessary changes to ensure industry health? And, if not, how long will a focus just on creative content and timing of delivery continue to provide a consistent return on investment for marketing organizations? The fundamental thesis of this article is that the email marketing infrastructure is a complex adaptive system whose behavior is best understood by examining the system as a whole, rather than isolated components (Kofman and Senge 1993; Woodside 2006). The limitations of applying reductionist thinking to social, technical, and biological systems is well documented (Senge 1991), and exacerbated by inherent human blind spots to the effects of dynamics and feedback (Moxnes 2000). As explicated below, such limitations have impeded attempts to stem the tide of spam and maintain a robust email marketing infrastructure. Consistent with its systems nature, email marketing is analyzed in this article using system dynamics (SD), a method that embodies the logic of feedbacks and causality and employs mathematical equations to simulate dynamic behavior. Given their complexity, the equations are solved numerically and results presented in graphical form, typically of a given variable, such as volume of sent spam, versus time. The result is a better understanding of the underlying drivers of the behavior of the email ecosystem: “Causal processes, causal interactions, and causal laws provide the mechanisms by which the world works; to understand why certain things happen, we need to see how they are produced by these mechanisms.” (Salmon 1984, p. 132). The method is thus consistent 4 with the twin objectives of raising awareness of the hidden dynamics that impact industry health and examining the effectiveness of various mitigation strategies. The system dynamics analysis undertaken in this article reveals several mechanisms that explain key phenomena associated with the email marketing infrastructure and that can inform the management of that infrastructure. The first mechanism is that limited human attention acts as a limit to growth of the email marketing system. The second mechanism is that filters have an unintended consequence. That is, filters lead to fewer emails in user inboxes but much greater volumes of spam in the email system as a whole. Finally, the targeting mechanism explains why this unintended consequence comes about: filters can be viewed as a proxy for an information resource that spammers lack, enabling them to achieve the effect of message targeting. The next section includes a review of prior research examining email marketing and spam, revealing that most approaches involve a focus on one particular aspect of the email marketing system, rather than analysis of the system as a whole. It also provides an overview of system dynamics methodology. Then, an analysis of the behavior of developed system dynamics models reveals causal mechanisms explaining underlying dynamics. Concluding remarks discuss implications for marketing professionals and policy markers. 2. Approaches to Analyzing Email Marketing Prior Research Prior research on email marketing and spam can broadly be classified into two groups. The first includes studies that focus specifically at reducing spam, from a broad range of perspectives. The second includes studies from the marketing literature that examine more broadly relevant phenomena associated with email marketing. Most studies of email marketing and spam reduce the problem to one or two core components, analyze those components, and make recommendations based on that analysis. A frequent topic has been the development of more efficient algorithms for distinguishing regular email from spam and filtering it (Fawcett 2003; Gray and Haahr 2004). Filtering techniques are one of the most popular topics of the two major conferences on spam, the Conference on Email and Anti-Spam (CEAS) and the MIT Spam Conference. To enhance filtering, email providers maintain lists of computers from which they do not accept any email, the so-called blackhole lists (Goodman and Rounthwaite 2004). There is also a movement to augment filters by maintaining lists of “good” senders – email from any computer that is not on the list will be rejected on the premise that it is spam (Goodman and Rounthwaite 2004). The implicit logic of filtering approaches is that better filters block more spam, lower spammer profit, and lead to less spam. In other words, better filters mitigate the problem. However, despite apparent improvement in filtering techniques, spam only appears to be growing in volume (Garretson 2007). Another vigorous area of research examines the regulatory environment and the impact of legislation on email marketing and spam (Goldman 2006; Gratton 2004). Here the thinking is that laws can constrain the type of email marketing that will be sent, and so can be designed to allow “good” email marketing and eliminate “bad” email marketing. But, the CAN-SPAM Act of 2003 in the U.S. does not so far appear to have 5 stopped the flood of spam (although a number of legal cases have been brought, potentially resulting in a signaling mechanism to less-than-legitimate operators). Beyond filtering and legal mechanisms, other approaches include reducing email overload by aiding recipients with information processing, specifically, presorting arriving email (Croson et al. 2005). Similarly, another proposal involves innovative use of a filter as part of a dynamic pricing mechanism, where price is determined proportionally to the filter score assigned to the message by a filter (Dai and Li 2004). Increasing the cost of sending email may alter the economics of spam toward enhanced overall efficiency (Goodman and Rounthwaite 2004). In particular, email service providers may impose a reverse Turing test (to test that the sender is human) and require that computers of spammers solve difficult computations in order to increase the cost of sending spam. Researchers have also employed welfare economics to examine the distribution of surplus between sender and receiver based on whether a message has value to a given receiver (Loder et al. 2006). One analysis uses game theoretic approaches to analyze the two-agent non-cooperative game between sender and receiver, finding a unique Nash equilibrium and enabling prediction of the optimal point in the tradeoff between Type I and Type II filter errors (Androutsopoulos et al. 2005). Another study demonstrates the potential of systems thinking by developing an exploratory model of email communication, suggesting that this may be a very fruitful approach (Pavlov et al. 2005). Several marketing research studies concentrate on predicting response rates, such as for catalog mailing (Basu et al. 1995). Recent studies have looked specifically at email communication. For example, a model of online clicking behavior attempts to predict and improve response rates for email communications (Ansari and Mela 2003). In this study, the focus is on learning how to use individual preferences to custom-design marketing emails, including aspects of content inclusion and presentation design. The model accounts for the heterogeneity in preferences and the existence of some unobservable variables. Customization is found to be very desirable, but not easily achievable. There are also companies that specialize in email customization for commercial clients, including Yesmail and DoubleClick. Overall, marketing studies tend to be narrowly focused on manipulating specific, short-term behaviors with the goal of improving return on investment. In sum, extant research has improved the effectiveness of filters, even though their deployment has not seemed to stem the flow of spam. Prior research has also helped inform regulatory mechanisms, given rise to proposals for new methods of spam mitigation, and demonstrated the viability and usefulness of systems thinking applied to the spam problem. To complement and extend existing studies, we model email marketing as a social system and examine how the system behaves under various conditions, in order to reveal underlying causal mechanisms. Achieving such insights requires that we take a systems approach, viewing the phenomenon as a whole rather than in terms of its isolated components. The analytical tools of system dynamics are particularly appropriate for such an investigation. System Dynamics Methodology System dynamics provides a holistic approach to the analysis of systems (Sterman 2001). Though an event-oriented approach is common, such a view ignores feedback 6 effects, which are inevitably present. Systems thinking in the context of email marketing motivates the development of a system dynamics model representation of the system. Developing a system dynamics model of email marketing involves a series of five steps (Randers 1980). First is defining the boundaries of the system by drawing on observation, prior research, and similar sources. The email marketing system includes senders of email (broadcasters and sponsors), receivers of email, and technology vendors that sell products intended to automate the decision problem faced by receivers of email (McWilliams 2004). The second step is defining key variables of the system, which include volumes of various types of messages sent, the stock of messages received, the processing capacity of the receiver, the revenue paid to sponsors of messages, and filter quality (misspecification rates, such as false positives and false negatives). Third, reference modes of the system are explicated, that is, how do individuals and organizations think and react within the system over time. For example, what actions do recipients take when their daily stock of attention is exhausted? The fourth step prior to building the model is to embody relationships among variables in causal diagrams that may involve causal links and feedback loops. Based on these preliminary steps, the simulation model is developed and validated in the fifth step, and policy recommendations are suggested based on dynamic behavior of the system. Given the focus of this article on raising awareness of the hidden dynamics that impact the robustness of the lucrative email marketing channel as well as examining the effectiveness of various mitigation strategies, results of SD modeling are discussed in terms of underlying causal mechanisms (Hedstrom and Swedberg 1998). 3. Causal Mechanisms in Email Marketing System Systems thinking and the model development steps outlined above motivate the construction of a system dynamics model of email marketing. Because the model takes a causal approach to examining system behavior, the terminology of causal mechanisms is employed to discuss and systematize model findings (Hedstrom and Swedberg 1998). A causal mechanism is what lies within the black box of causality, that is, the “Nuts and bolts, cogs and wheels – that can be used to explain quite complex social phenomena.” (Elster 1989, p. 3). As an example, threshold-based behavior is a causal mechanism involving individuals that decide whether to act in a certain way based on how many others are doing likewise – such as dining in a restaurant based on the number of others dining in the restaurant (Granovetter 1978). Another example is the selffulfilling prophecy, which describes the process underlying bank runs: a) a rumor of bank insolvency occurs; b) some depositors withdraw assets; c) rumor is reinforced by b) via substantive and perceptive means; d) further withdrawal; e) trust in bank and solvency reduced; f) bankruptcy (Merton and Rossi 1968). Similar to threshold-based behavior and bank runs, system dynamics analysis of the email marketing system reveals a causal mechanism that lies at the heart of system behavior. To emphasize, the analysis allows not only the identification of each mechanism (such as x causes y) but also the identification of the process (how x causes y) (Brady 2002). We now explain the causal mechanism, the baseline dynamic behavior it generates, and two effects that emerge from the analysis: unintended consequence of filtering and filtering as targeting. 7 Attention as a Limiting Condition Conventional research on email marketing and spam examines individual variables while acknowledging some simple causality between the variables. The email marketing context is viewed as another advertising medium with differences in key characteristics relative to print media: it is cheaper, information intensity is higher, personalization is easier, and so forth. The causal logic is that more and better volumes of email marketing lead to desired consumer actions. This view of email marketing is overly simplistic. Email is part of a complex social system that is stimulated by economic forces and constrained by cognitive limitations of the receiving side. A schematic view of the situation is in Figure 1. The diagram shows some key variables, and arrows indicate the causality between the variables. Positive arrows imply a positive relationship between variables and negative arrows show that variables move in the opposite directions. Thinking in terms of systems reveals two primary feedback effects: the reinforcing loop leading to a wealth of information and the balancing loop leading to a poverty of attention. These loops are marked by letters R (for reinforcing) and B (for balancing) respectively. While the reinforcing loop comprises the supply of spam, the balancing loop acts to quell the growth of messages. In the email infrastructure, the growth process of spam volume is driven by message broadcasters and their sponsors. Suppliers of commercial email messages – whether legitimate newsletters from a consumer’s bank, legitimate but unsolicited messages from online shoe stores, or illegitimate messages intended to defraud – produce and send messages to email recipients, thus increasing the message backlog in individual inboxes (hence a positive arrow between spam production and message backlog). The messages can be either left in the mailbox for some duration of time, processed, or deleted. Recipients spend some time daily reading messages, which is the daily time endowment dedicated to processing messages. The number of valuable messages that are processed daily depends on whether or not there are messages waiting to be processed in the backlog, the daily time endowment and a share of valuable messages in the backlog. Each of these three determinants has a positive effect on the number of valuable messages processed. If a message is valuable, it generates a sale and the sponsor receives some revenue. Assuming that spam funding is positively related to the revenue generated by spam, we connect revenue and spam funding with a positive arrow. More spam funding means more money on spam production, and, ultimately, the number of messages in the backlog. We just completed the wealth of information circle, which comprises the supply of spam. When information load is greater than the processing capacity of an individual, information overload occurs. In the email context, processing capacity may be viewed as an attention endowment that is measured in units of time. Prior research suggests that overload manifests itself in situations when the time required to complete a task is greater than the time budget (Schultz and Vandenbosch 1998). When recipients receive excessive amounts of email they either ignore it, adding to the backlog, or delete it. In other words, the greater the overload of messages, the more messages will be deleted. This completes the balancing circle called the poverty of attention. To understand the dynamics of a system depicted in Figure 1, we build a corresponding computational model. A detailed description of the model is given in the 8 Appendix. In the following sections we describe the baseline experiment and some insights. spam production deletion + spam funding R + revenue + message bac klog wealth of information + + valuable spam messages proc essed + B poverty of attention + information overload - + + daily time endowment fraction of valuable spam messages in bac klog Figure 1: Causal relationships in the spam system Baseline Behavior To emulate the growth of spam (Figure 2), we start the simulation at low levels of spam funding (line 2) and correspondingly, spam production (line 3) – they are set to near zero levels. Message backlog (line 4) is also relatively low. Email recipients have enough time to process messages and hence experience relatively low levels of information load (line 5) due to email. Correspondingly, hardly any email is deleted (line 6) without being processed. Gradually, the revenue from spam encourages more spam production. Among the growing inflow of spam that arrives into recipients’ inboxes, some of the messages are deemed valuable by the recipients and are being processed (line 1). If attention of recipients were not limited, the reinforcing feedback effect, marked with an R in Figure 1, would create an exponential growth in spam production. However, spam does not increase indefinitely. Around the time 80, information load (line 5) starts to increase rapidly and the forces of the balancing loop become significant. The revenue and spam production stagnate. The initial dominance of the reinforcing feedback effect is reduced 9 by the effect of the balancing loop leading to the distinctive S-shaped variable trajectories in Figure 2. growth 200 500,000 40,000 10,000 1 2,000 6 6 6 4 4 4 4 6 4 100 250,000 20,000 5,000 0.5 1,000 0 0 0 0 0 0 5 5 5 5 5 3 3 3 1 1 1 1 1 6 1 3 5 2 2 2 2 3 2 1 2 3 5 4 5 4 5 4 5 4 5 5 5 6 1 2 3 10 6 1 2 3 6 1 2 3 20 valuable messages processed 2 spam funding 3 spam production 4 message backlog 5 informaiton overload 6 6 deletion 30 6 1 2 5 6 1 5 5 6 5 6 5 6 5 6 2 3 4 3 4 5 6 150 1 2 3 4 140 1 2 3 4 130 1 2 3 4 120 1 2 3 4 110 1 2 3 4 100 1 2 3 6 90 1 2 5 6 6 6 70 80 Time (Day) 4 5 6 6 60 3 4 5 2 3 2 3 4 2 1 2 3 4 6 50 1 2 3 1 2 3 40 2 3 1 1 2 3 0 4 1 4 4 4 4 5 6 Figure 2: Transitory and Steady State Behavior of Email Marketing System The convergence of the system to a steady state may seem unreasonable in light of the global growth of spam volume. But Melville et al. (2006) find that the spam flow to an educational institution, which has a fixed number of email inboxes, is rather steady during an academic year. Unintended Consequences of Filtering Available empirical evidence suggests two apparently contradictory facts. First, the amount of spam arriving in email inboxes appears to be diminishing, at least as viewed from the perspective of individuals. Second, the amount of aggregate spam as a percentage of all email messages appears to be increasing with time. A view at email as a system reconciles these observed outcomes. Research on email marketing and spam has focused on the development of evermore effective spam filters. In theory, such mechanisms work well at mitigating the information overload by accurately detecting a message with text that indicates that it is likely to be unwanted. There is thus a logic embedded in the decision to deploy filters as a solution, and to the expectation that better filters will lead to less spam. However, viewed from a systems perspective, there are unintended outcomes of filtering, as we demonstrate with the help of the following simulation. The results of the simulation are presented in Figure 3. To avoid the transitory dynamics, we start the simulation in the steady state. We allow for the filtering technology to improve beginning at time 30. In the industry jargon, 6 10 the misspecification rate (Cormack, 2006) of the filter is gradually reduced (line 1). Since the filter identifies and discards many spam messages that are clearly of no interest to recipients, the average fraction of valuable spam messages (line 2) in the recipients’ inboxes is improving. The daily attention endowment does not change, but the share of valuable messages in the backlog is improving (line 2), and therefore the aggregate amount of valuable messages processed (line 3) is be increasing (confirm the causal logic in Figure 1). More valuable messages processed leads to more revenue (line 4). Because of the increasing revenue, spam funding is also increased, which contributes to spam production (line 5). The filter only temporarily reduces the information overload (line 6), which reaches the old level due to the increased spam production. In summary, spam production is higher in the presence of better filtering, which is an unintended consequence of filtering. filter 0.2 0.08 180 430,000 40,000 1.1 2 2 2 2 2 4 4 5 4 3 3 4 5 4 5 4 5 5 4 5 4 5 4 5 5 2 3 4 1 23 4 5 6 1 2 3 45 6 1 2 3 4 5 3 3 3 3 3 3 2 3 0.1 0.056 112.5 225,000 20,500 0.9125 2 2 2 2 5 6 6 6 6 6 6 6 6 1 6 6 6 1 0 0.032 45 20,000 1,000 0.7250 1 0 10 20 30 1 misspecification rate av fraction of valuable spam messages valuable messages processed 3 4 4 sponsor revenue 5 5 spam production 6 6 information overload 40 1 50 1 2 5 6 100 6 6 2 3 4 5 150 1 3 4 5 140 2 3 4 1 1 2 3 5 130 1 2 4 1 120 1 3 6 1 110 2 5 6 1 1 4 5 6 90 3 4 5 1 2 3 4 1 1 2 3 5 6 1 2 4 5 6 1 3 4 1 70 80 Time (Day) 2 3 4 60 1 2 3 1 4 5 6 Figure 3: Unintended Consequences of Filtering The targeting effect of filters The outcome that filtering contributes to the growth of spam may be puzzling at first. But this result can be better understood if one realizes that filtering mitigates the problem of asymmetric information. An information asymmetry occurs when one party participating in an exchange knows something that the other party does not (Varian, 1992). A classical example of a situation with information asymmetries is a used car market (Akerlof, 1970; Jensen, 2007). In the case of email, the information asymmetry is due to the fact that spammers do not know the preferences of recipients. Targeting improves response rates of a marketing campaign (Chittenden and Rettie, 2003; Ansari and Mela, 2003). Message targeting involves choosing message content, format, and timing so that it matches the particular needs and preferences of the recipient to whom it is addressed. Spammers tend not to use targeting, which is not only 6 11 because targeting is costly, but also because spammers – more so than legitimate email marketers – have a limited ability to obtain information needed to customize their messages to the preferences of each recipient. Instead, they rely on mass mailings rather than customized messages. We use our model to examine the impact of targeting. The improved targeting starting at time 30 leads to the increase in the average fraction of valuable spam messages in backlog (line 1 in Figure 4). This increase is qualitatively the same as in the case when the filter was improved. As can be seen in Figure 4, trajectories for some key variables, including sponsor revenue and spam production, are similar to the trajectories in Figure 3 for the case of filtering. Filtering and targeting have the same effect on the system because they increase the fraction of valuable spam messages in the backlog (Figure 1). Thus, by deploying the filter, the inbox owners have inadvertently enabled the same outcome as if asymmetry of information was reduced and spammers were able to target their messages. targeting 0.08 180 430,000 50,000 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 0.0638 134.5 292,500 30,250 3 3 4 4 4 4 4 3 3 3 3 3 3 2 3 3 4 4 3 4 3 4 3 4 3 4 3 4 3 4 4 4 1 4 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 0.0476 89 155,000 10,500 0 10 20 30 av fraction of valuable spam messages 2 valuable messages processed 3 3 3 sponsor revenue 4 4 4 spam production 40 50 1 2 1 2 3 4 1 2 3 1 2 3 4 70 80 Time (Day) 1 2 3 4 60 3 4 1 2 1 2 3 4 90 4 1 2 3 1 2 3 4 110 1 2 3 4 100 4 1 2 3 1 2 3 4 140 1 2 3 4 130 1 2 3 4 120 4 1 2 3 150 2 3 4 Figure 4: Targeting and Filtering: Two Sides of a Coin 4. Summary and Recommendations Despite the lucrative nature of email marketing, consumers are overloaded with information, including both wanted and unwanted communication. However, the overall result of mitigation strategies addressing individual dimensions of the problem has led to “record growth, and record irritation,” with spam accounting for 88 percent of all e-mail traffic in August of 2007 (Garretson 2007). The fundamental thesis of this article is that the email marketing infrastructure is a complex system requiring analysis that takes account of the whole system. A system dynamics model that captures the relationships in 3 4 4 12 the complex system is shown to identify underlying dynamics and reveal unexpected consequences. Thus far, the primary industry response to excessive levels of spam has been to deploy filters. As the model developed herein explains, this has had an effect opposite to that intended, and has given spammers the equivalent of a useful information tool equivalent to targeting their messages. A number of other approaches to mitigating information overload have been proposed, including variants of email postage, attention bonds, and reverse Turing tests. Before industry and regulators choose any of these approaches for general implementation, it would be beneficial to turn to system dynamics for an analysis of the likely outcomes. Unlike filtering, some of these proposals would change the nature of email as a free, anonymous communications medium. The experience with filtering suggests that before taking such drastic measures to stem the flow of spam, there should be confidence that the resulting system has been thoroughly evaluated, and that the behavioral and informational consequences of the proposed changes have been analyzed. Such an analysis must take into account the dynamic feedback and causal-loop mechanisms that govern the system. The model presented and analyzed in this paper exemplifies the approach, and demonstrates the benefits of SD modeling to analyze the email-marketing industry. Appendix: System Dynamics Model Below we present a mathematical formulation of the model, which enables complete reproduction and simulation of the model. The model includes recipients of email messages, a message sponsor, two types of message broadcasters and a technology firm that provides a filtering product. A regular broadcaster (denoted by subscript A) sends only regular email -- each regular message is valuable. Spammer (denoted by subscript B) is financed by the sponsor and sends spam. Only a fraction of spam is valuable. The model has been implemented in Vensim DSS and solved using the RungeKutta method. Model Parameters number of recipients average volume of regular communication time a typical employee spends on email normal response delay base price of sending a spam message time it takes to process a message spam budget duration 100 recipients 10 messages/period/recipient fraction of valuable spam messages 0.01 dimensionless d average sensitivity to overload 3 dimensionless fraction of surplus to funding communication 0.1 dimensionless R aR TR pB S 20 minute/(period *recipient) 4 periods 1 $/message 1 minute/message 10 period 13 * tolerable misspecification rate 0.1 dimensionless filter improvement delay 10 periods r marginal revenue per spam message initial percent of false-positives 2000 $/message initial percent of false-negatives 0.12 dimensionless 1 2 0.01 dimensionless Variables volumes of arriving messages of type A messages that are identified as valuable are added to the backlog blocked messages a aR R mi 1 1 a b 2 1 b mb a b mi message backlog (d / dt ) M mi mo md budget of time T RTR mo min(T , M ) processed messages the daily time required to process messages rate of deletion T * M number of valuable messages in the backlog dV AB viAB voAB dt AB vi 1 1 a b new valuable messages added to the backlog valuable messages that are either processed or deleted average fraction of valuable messages of all types in the backlog number of valuable spam messages in the backlog new valuable spam messages added to the backlog valuable spam messages that are either processed or deleted average fraction of valuable spam messages in the backlog number of spam messages in the backlog addition of new spam messages to the backlog removal of spam messages from the backlog either through processing or deletion average fraction of spam messages (valuable and non-valuable) in the backlog communication funding md eod d M voAB mo md V AB M dV B viB voB dt B vi 1 1 b voB mo md VB M dB bi bo dt bi 1 1 b 2 1 b bo mo md d B M dt S i e 14 expenditure on spam by sponsors e S S sponsor revenue RS rmo sponsor cost CS e allocation i max( RS CS ,0) flow of spam messages b e pb d misspecification rate improvements to the effectiveness of the filtering software a percent of false-positives percent of false-negatives dt i o o * 1 1 , 2 2 Steady state values for variables Variable Message backlog M 7293 messages 2412 messages valuable messages in backlog 406 messages valuable spam messages in backlog spam B messages in backlog communication funding S aggregate misspecification rate 5287 messages 202797 $ 0.1 dimensionless References Androutsopoulos, I., Magirou, E., and Vassilakis, D. "A Game Theoretic Model of Spam E-mailing," The 2nd Conference on Email and Anti-Spam (CEAS 2005), Palo Alto, CA, 2005, pp. 1-8. Aronson, D. "Overview of Systems Thinking," pp. 1-2. Brady, H.E. "Models of Causal Inference: Going Beyond the Neyman-RubinHolland Theory," Annual Meetings of the Political Methodology Group, University of Washington, Seattle, WA, 2002, pp. 1-108. Elkin, T. "Jefferies: Online Ad Spending Could Exceed $60B By 2010," in: Online Media Daily, 2007. Elster, J. Nuts and Bolts for the Social Sciences Cambridge University Press, Cambridge, 1989. Fawcett, T. "“In vivo” spam filtering: A challenge problem for data mining," KDD Explorations (5:2) 2003. Garretson, C. "The Summer of Spam: Record Growth, Record Irritation," in: Network World, 2007. 15 Goldman, E. "A Coasean Analysis of Marketing," Wisconsin Law Review (2006:4) 2006. Granovetter, M. "Threshold Models of Collective Behavior," American Journal of Sociology (83) 1978, pp 1420-1443. Gratton, E. "Dealing with Unsolicited Commercial Emails: A Global Perspective," Journal of Internet Law (7:12) 2004, pp 3-13. Gray, A., and Haahr, M. "Personalised, Collaborative Spam Filtering," 2004. Hedstrom, P., and Swedberg, R. Social Mechanisms: An Analytical Approach to Social Theory Cambridge University Press, New York, NY, 1998. Kofman, F., and Senge, P. "Communities of Commitment: The Heart of Learning Organizations," Organizational Dynamics) 1993, pp 5-23. Loder, T., Van Alstyne, M., and Wash, R. "An Economic Response to Unsolicited Communication," Advances in Economic Analysis and Policy (6:1) 2006, pp 1-38. McCloskey, W. "2006 Retail White Paper," Email Data Source, New York, pp. 115. McWilliams, B. Spam Kings O'Reilly, UK, 2004. Merton, R.K., and Rossi, A.S. "Contributions to the Theory of Reference Group Behavior," in: Social Theory and Social Structure, Free Press, New York, 1968. Moxnes, E. "Not Only the Tragedy of the Commons: Misperceptions of Feedback and Policies for Sustainable Development," System Dynamics Review (16:4) 2000, pp 325-348. Nussey, B. "Spam is on the Rise Again.," silverPOP, 2007. Pavlov, O., Melville, N., and Plice, R. "Mitigating the Tragedy of the Digital Commons: the Problem of Unsolicited Commercial E-mail," Communications of the AIS (16), July 2005, pp 73-90. Randers, J. "Guidelines for Model Conceptualization," in: Elements of the System Dynamics Method, J. Randers (ed.), MIT Press, Cambridge, MA, 1980, pp. 117-138. Rust, R.T., and Espinoza, F. "How Technology Advances Influence Business Research and Marketing Strategy," Journal of Business Research (59) 2006, pp 10721078. Salmon, W. Scientific Explanation and the Causal Structure of the World Princeton University Press, Princeton, 1984. Schwartz, B. The Paradox of Choice: Why More is Less HarperCollins, New York, NY, 2004. Senge, P. The Fifth Discipline: The Art and Practice of the Learning Organization Currency Doubleday, 1991. Simon, H. "Designing organizations for an information-rich world," in: Computers, communications, and the public interest, The Johns Hopkins University Press, Baltimore, MD, 1971, pp. 38-52. Woodside, A. "Advancing Systems Thinking and Building Microworlds in Business and Industrial Marketing," Journal of Business and Industrial Management (21:1) 2006, pp 24-29. Akerlof G A (1970). The market for "lemons": Quality uncertainty and the market mechanism. Quarterly Journal of Economics 84: 488-500. 16 Ansari A and Mela C F (2003). E-customization. Journal of Marketing Research 40 (2): 131-146. Chittenden L and Rettie R (2003). An evaluation of email marketing and factors affecting response. Journal of Targeting, Measurement and Analysis for Marketing 11 (3): 203 – 218. Cormack G V (2006). The trec 2005 spam filter evaluation track. Virus Bulletin (January): S2. JENSEN C (2007). Their titles laundered, the cars are still lemons. The New York Times Online (August 26). Melville N, Stevens A, Plice R K and Pavlov O V (2006). Unsolicited commercial email: Empirical analysis of a digital commons. International Journal of Electronic Commerce 10 (4): 143-168. Varian H (1992). Microeconomic analysis. W. W. Norton & Company: New York.