SPAM Research Papers - Academia.edu (original) (raw)
- by and +1
- •
- Open Access, Open Access Publishing, SPAM, Access To Information
COMO CITAR: RODRIGUES, Lucas Troyan; STANSKY, Maria Claudia . Análise do Spam à Luz da Proteção de Dados Pessoais. In: MORIM, José dos Campos; VEIGA, Fábio da Silva; AZEVEDO, Patrícia Anjos. (Org.). Desafios do Legaltech. 1ed.Porto:... more
COMO CITAR: RODRIGUES, Lucas Troyan; STANSKY, Maria Claudia . Análise do Spam à Luz da Proteção de Dados Pessoais. In: MORIM, José dos Campos; VEIGA, Fábio da Silva; AZEVEDO, Patrícia Anjos. (Org.). Desafios do Legaltech. 1ed.Porto: Iberojur e Instituto Superior de Contabilidade e Administração do Porto, 2020, v. 1, p. 213-223.
In this paper we discuss a new architecture to reduce unsolicited e-mail messages. We propose a system architecture that introduces two classes of messages-trusted e-mail and e-mail from untrusted sources. Trusted e-mail messages are... more
In this paper we discuss a new architecture to reduce unsolicited e-mail messages. We propose a system architecture that introduces two classes of messages-trusted e-mail and e-mail from untrusted sources. Trusted e-mail messages are signed with an S/MIME signature. To address usability problems that occurred previously with S/MIME signatures, outgoing e-mail messages are automatically signed on the e-mail server without
Crowdsourcing can be used to obtain the ground truth that is needed to evaluate information retrieval systems. However, the quality of crowdsourced ground truth may be questionable using workers of unknown quality with possible spammers... more
Crowdsourcing can be used to obtain the ground truth that is needed to evaluate information retrieval systems. However, the quality of crowdsourced ground truth may be questionable using workers of unknown quality with possible spammers amongst them. This study presents a new approach to detect close to all spammers by comparing judgments between workers. We compared the consistency of crowdsourced ground truth to the consistency of ground truth obtained from expert annotators, and conclude that crowdsourcing can match the quality obtained from expert annotators.
- by Jeroen Vuurens
- •
- SPAM, Crowdsourcing
Unsolicited communications currently accounts for over sixty percent of all sent e-mail with projections reaching the mid-eighties. While much spam is innocuous, a portion is engineered by criminals to prey upon, or scam, unsuspecting... more
Unsolicited communications currently accounts for over sixty percent of all sent e-mail with projections reaching the mid-eighties. While much spam is innocuous, a portion is engineered by criminals to prey upon, or scam, unsuspecting people. The senders of scam spam attempt to mask their messages as non-spam and con through a range of tactics, including pyramid schemes, securities fraud, and identity theft via phisher mechanisms (e.g. faux PayPal or AOL websites). To lessen the suspicion of fraudulent activities, scam messages sent by the same individual, or collaborating group, augment the text of their messages and assume an endless number of pseudonyms with an equal number of different stories. In this paper, we introduce ScamSlam, a software system designed to learn the underlying number criminal cells perpetrating a particular type of scam, as well as to identify which scam spam messages were written by which cell. The system consists of two main components; 1) a filtering mec...
Fake checks are one of the most common instruments used to commit fraud against consumers. This fraud is particularly costly for victims, since they generally loose thousands of dollars as well as being exposed to judicial proceedings.... more
Fake checks are one of the most common instruments used to commit fraud against consumers. This fraud is particularly costly for victims, since they generally loose thousands of dollars as well as being exposed to judicial proceedings. Currently, there is no existing solution to authenticate checks and detect fake ones instantly. Instead, banks must wait for a period of more than 48 hours to detect the scam. In this context, we propose a block chain based scheme to authenticate checks. More precisely, our approach helps the banks to share information about provided checks without exposing the banks' customers' personal data. A proof of concept of our scheme was realized using Python language and relying on Name coin block chain.
La comunicación corporativa está mutando y la gamificación se ha convertido en una herramienta poderosa a la hora de proveer de nuevos modelos y metodologías. Las Universidades, por sus especiales características, deben hacer un esfuerzo... more
La comunicación corporativa está mutando y la gamificación se ha convertido en una herramienta poderosa a la hora de proveer de nuevos modelos y metodologías. Las Universidades, por sus especiales características, deben hacer un esfuerzo a la hora de generar proyectos en este ámbito: ya sea por las implicaciones de ser una actividad de I+D+i, por la semi-olvidada función de divulgación del conocimiento o por la necesidad de adaptarse a los nuevos medios y usuarios. El objetivo de este artículo es mostrar las oportunidades y desventajas de los modelos de comunicación corporativa universitaria gamificada basados en Twitter. Para ello se ha utilizado como metodología el análisis crítico de las experiencias prácticas de consultoría y los proyectos en los que ha participado el autor: #dametuits, RT#dametuits y #PowerUp_ECAM. Los datos parecen indicar un potencial elevado de este tipo de estructuras en acciones puntuales, dudas sobre el impacto de generalización de lo aprendido a largo plazo y la importancia clave de la elección de mecánicas de gamificación con enfoque cuantitativo o cualitativo según sea el vínculo entre usuario e institución. Todo ello lleva a concluir que es necesario seguir haciendo una apuesta en investigando que lleve a optimizar este tipo de estructuras y seguir clarificando las variables más importantes a la hora de crear nuevos proyectos.
EN: Corporate communication is mutating and gamification has become a powerful tool when it comes to providing new models and methodologies. Universities, because of their special characteristics, must make an effort when it comes to generating projects in this area: either because of the implications of their R & D + innovation activities, their semi-forgotten function of spreading knowledge or the need to adapt to new media and users. The aim of this article is to show the opportunities and disadvantages of Twitter-based gamificated university corporate communication models. To achieve this, the methodology used has been the critical analysis of practical experiences and consulting projects in which the author participated: #dametuits, RT # dametuits and #PowerUp_ECAM. The data suggest a high potential of this type of structures in specific actions, concerns about the generalization impact of long-term acquired knowledge and the key importance of the choice of gamification mechanics with a quantitative or qualitative approach depending of the relationship of the user with the institution. This leads to the conclusion that it is necessary to continue supporting research that leads to optimize these structures and further clarify the most important variables when creating new projects.
Resumen Este artículo presenta una revisión general de los modelos de detección y filtrado de correo spam existentes en la actualidad. En concreto, se realiza una subdivisión de las técnicas existentes en dos grandes tipos: modelos... more
Resumen Este artículo presenta una revisión general de los modelos de detección y filtrado de correo spam existentes en la actualidad. En concreto, se realiza una subdivisión de las técnicas existentes en dos grandes tipos: modelos basados en la colaboración de usuarios y modelos basados en el análisis de contenido. Se presentan las características específicas del problema y se analizan los corpus públicos disponibles, así como las técnicas habituales empleadas en su preprocesamiento. Además, se realiza una revisión de los distintos sistemas implementados destacando las características distintivas de cada uno de ellos. El trabajo finaliza con la exposición de las conclusiones más destacables acerca del estado del arte actual. Palabras clave: spam, aproximaciones colaborativas, filtros basados en contenido, revisión.
With advancement in technology most of the modern day communication takes place through emails. This has made the process of communication much faster and easier as it saves time. One probable disadvantage of using emails as a prime mode... more
With advancement in technology most of the modern day communication takes place through emails. This has made the process of communication much faster and easier as it saves time. One probable disadvantage of using emails as a prime mode communication is advertisements. Many companies use them for their advertisement and keep on sending emails that contain unwanted information often referred to as Spam. Although many approaches have been developed for the identification of spam emails but none of them gives 100% accuracy in spam identification and screening. In this paper by using RapidMiner data mining tool a method has been proposed for identification and screening of spam emails. Initially pre-processing has been done by using different data mining pre-processing techniques. Major emphasis of proposed approach is on pre-processing and importance of pre-processing while doing text mining. After data pre-processing different algorithms for classification are applied over the taken sample dataset. Furthermore, cross authentication has been done on the basis of different parameters. In the end, a model with best classifier in combination of pre-processing technique for spam email is identified based on accuracy, precision, recall, execution time and error rate. Proposed model is used to identify spam emails. KEYWORDS A text mining approach to detect spam, pre-processing techniques for text mining, spam emails, how to deal with spam emails, Importance of pre-processing techniques, RapidMiner-Data mining.
With the expanded prominence of online informal community, spammers discover these stages effectively available to trap clients in noxious exercises by posting spam messages. In this work, we have taken the Twitter stage and performed... more
With the expanded prominence of online informal community, spammers discover these stages effectively available to trap clients in noxious exercises by posting spam messages. In this work, we have taken the Twitter stage and performed spam tweets identification. To stop spammers, Google Safe Perusing and Twitter's BotMaker instruments identify and square spam tweets. These instruments can square noxious connections, anyway, they can't ensure the client continuously as ahead of schedule as could be expected under the circumstances. Along these lines, businesses and specialists have connected diverse ways to deal with make spam free informal community stage. Some of them are just founded on client-based highlights while others depend on tweet based highlights as it were. Nonetheless, there is no extensive arrangement that can solidify tweet's content data alongside the client based highlights. To illuminate this issue, we proposed a system which takes the client and tweet based highlights alongside the tweet content component to order the tweets. The advantage of utilizing tweet content element is that we can recognize the spam tweets regardless of whether the spammer makes another record which was unrealistic just with client and tweet based highlights. We have evaluated our solution with two different machine learning algorithms namely-Support Vector Machine and Random Forest. We are able to achieve an accuracy of 86.75% and surpassed the existing solution by approximately 17%.
- by Ijariit Journal and +1
- •
- SPAM, Spam Detection
LAPORAN KUNJUNGAN LAPANGAN
BALAI TEKNIK AIR MINUM & KEMENTERIAN PEKERJAAN UMUM DAN PERUMAHAN RAKYAT DI BEKASI
- by Nada Noerhalimah
- •
- SPAM
The aim of this research was to determine how search engine exclusion policies and spam affect the indexing of e-Commerce websites. The Internet has brought along new ways of doing business. The unexpected growth of the World Wide Web... more
The aim of this research was to determine how search engine exclusion policies and spam affect the indexing of e-Commerce websites. The Internet has brought along new ways of doing business. The unexpected growth of the World Wide Web made it essential for firms to adopt e-commerce as a means of obtaining a competitive edge. The introduction of e-commerce in turn facilitated the breaking down of physical barriers that were evident in traditional business operations.
It is important for e-commerce websites to attract visitors, otherwise the website content is irrelevant. Websites can be accessed through the use of search engines, and it is estimated that 88% of users start with search engines when completing tasks on the web. This has resulted in web designers aiming to have their websites appear in the top ten search engine result list, as a high placement of websites in search engines is one of the strongest contributors to a commercial website’s success.
To achieve such high rankings, web designers often adopt Search Engine Optimization (SEO) practices. Some of these practices invariably culminate in undeserving websites achieving top rankings. It is not clear how these SEO practices are viewed by search engines, as some practices that are deemed unacceptable by certain search engines are accepted by others. Furthermore, there are no clear standards for assessing what is considered good or bad SEO practices. This confuses web designers in determining what is spam, resulting in the amount of search engine spam having increased over time, impacting adversely on search engine results.
From the literature reviewed in this thesis, as well as the policies of five top search engines (Google, Yahoo!, AskJeeves, AltaVista, and Ananzi), this author was able to compile a list of what is generally considered as spam. Furthermore, 47 e-commerce websites were analysed to determine if they contain any form of spam. The five major search engines indexed some of these websites. This enabled the author to determine to what extent search engines adhere to their policies. This analysis returned two major findings. A small amount of websites contained spam, and from the pre-compiled list of spam tactics, only two were identified in the websites, namely keyword stuffing and page redirects. Of the total number of websites analysed, it was found that 21.3% of the websites contained spam.
From these findings, the research contained in this thesis concluded that search engines adhere to their own policies, but lack stringent controls for the majority of websites that contained spam, and were still listed by search engines. In this study, the author only analysed e-commerce websites, and cannot therefore generalise the results to other websites outside ecommerce.
- by Melius Weideman
- •
- SPAM, E-Commerce
Social networks are recognized as popular communication channel but in this, there is one of the problems is spam messages. Spam messages can contain malware in the form of the executable file and the link to the malicious websites or the... more
Social networks are recognized as popular communication channel but in this, there is one of the problems is spam messages. Spam messages can contain malware in the form of the executable file and the link to the malicious websites or the links which do not exist. Most of the existing machine learning solutions are based on either Support Vector Machine or Naive Bayes but the existing solutions either slow or inaccurate in solving spam filtering problem. Support Vector Machine-based spam filter has great advantages on high precision and recall rate and Naive Bayes based spam filter give faster classification speed and require small training sets. By taking the advantages of both, we propose hybrid spam filtering algorithm which has more accuracy than separately implemented NB and SVM.
Jedną z "plag", jakie się pojawiły wraz z rozwojem Internetu i innych form elektronicznej komunikacji - jest tak zwany SPAM. Tą nazwą (jak wiadomo) określa się nie chciane i niepotrzebne odbiorcy informacje, które trafiają do skrzynek... more
Jedną z "plag", jakie się pojawiły wraz z rozwojem Internetu i innych form elektronicznej komunikacji - jest tak zwany SPAM. Tą nazwą (jak wiadomo) określa się nie chciane i niepotrzebne odbiorcy informacje, które trafiają do skrzynek email odbiorców lub do ich telefonów w formie sms. Te pasożytnicze, niepotrzebne informacje są szkodliwe, bo ich kasowanie związane jest ze stratą czasu. W felietonie przedstawiono ciekawe oszacowanie autorstwa prof. Waldemara Koczkodaja z Kanady, porównujące stratę czasu, jaką w skali globalnej powodują SPAM-y - z tą startą czasu, jaką wywołał (zabijając ludzi, czyli zabierając im czas, jaki mogli przeżyć) niechlubnej sławy huragan Katrina.
The main aim of this paper is to present briefly how “fear” contributes to the construction of deception through the abovementioned narratives. We will take into account not only the linguistic and psychological elements used to cause... more
The main aim of this paper is to present briefly how “fear” contributes to the construction of deception through the abovementioned narratives. We will take into account not only the linguistic and psychological elements used to cause real fears in their recipients, but also the fake and real fears their senders may have, adding examples to our findings. We will pay
specific attention to the influence of gender stereotypes in certain narratives where the senders’ gender/ed identity was faked, and to the connection between spam e-mails and
fairytales. The aim of this paper is to find out the relation between spam e-mails, fairytales and gender stereotypes regarding fear. Our analysis suggests a parallelism between the reproduction of gender stereotypes in the new communication tools and the same stereotypes found in traditional fairytales. We will focus on how fear connects spam and fairytales, and how this parallelism and the gender stereotypes found in both kinds of texts can take part in the linguistic mechanisms used by spammers to make their stories believable.
Electronic Mail (E-mail) is playing the most important and significant role taken in the world of information communication for users. Nowadays, Email is the most common and effective mode of communication technology for communication and... more
Electronic Mail (E-mail) is playing the most important and significant role taken in the world of information communication for users. Nowadays, Email is the most common and effective mode of communication technology for communication and sharing information with both end-users. With the rapid increase of email users, there will be an increase in the volume of spam emails too from the past few decades. Emails are categorized into ham and spam emails. This paper illustrates on different existing email spam filter system regarding Machine Learning Technique (MLT) such as Naive Bayes, SVM, J48 and presents the classifications, evaluation, and comparison on different email spam filtering algorithms using WEKA Software and performs various parameters like finding Accuracy, Recall, Precision, Measures and False Position Rate, etc. The final output result should be ‘1’ if it is finally spam present, otherwise, it should be ‘0’ for non-spam. In this analysis, the Final out presents that the J48 classifier is the best and efficient algorithm for spam or not spam emails among other algorithms.
–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters... more
–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters and List based spam filters. In this research work, we have studied the spam statistics of a famous Spambot 'Srizbi'. We have also discussed different approaches for Spam Filtering and finally proposed a new algorithm which is made on the basis of behavioral approaches of Spammers and to restrict the budding economical growth of Spam generating company's. We have used the hidden Honeypot and a Honeytrap module to minimize the spam generated from Contact and Feedback forms on public and social networking CMS websites.
- by Danilo Doneda
- •
- Privacy, SPAM, Internet
The most widely recognized form of spam is e-mail spam, however the term “spam” is used to describe similar abuses in other media and mediums. Spam 2.0 (or Web 2.0 Spam) is refereed to as spam content that is hosted on online Web 2.0... more
The most widely recognized form of spam is e-mail spam, however the term “spam” is used to describe similar abuses in other media and mediums. Spam 2.0 (or Web 2.0 Spam) is refereed to as spam content that is hosted on online Web 2.0 applications. In this paper: we provide a definition of Spam 2.0, identify and explain different entities within Spam 2.0, discuss new difficulties associated with Spam 2.0, outline its significance, and list possible countermeasure. The aim of this paper is to provide the reader with a complete understanding of this new form of spamming.
- by Elham Yeganeh
- •
- Computer Science, SPAM, Web, Robots
Dynamic analysis of malware is widely used to obtain a better understanding of unknown software. While existing systems mainly focus on host-level activities of malware and limit the analysis period to a few minutes, we concentrate on the... more
Dynamic analysis of malware is widely used to obtain a better understanding of unknown software. While existing systems mainly focus on host-level activities of malware and limit the analysis period to a few minutes, we concentrate on the network behavior of malware over longer periods. We provide a comprehensive overview of typical malware network behavior by discussing the results that we obtained during the analysis of more than 100,000 malware samples. The resulting network behavior was dissected in our new ...
- by Lorenzo Cavallaro and +1
- •
- SPAM, Dynamic Analysis, Network Traffic Analysis
In a previous paper we provided guidelines for scholars on optimizing research articles for academic search engines such as Google Scholar. Feedback in the academic community to these guidelines was diverse. Some were concerned... more
In a previous paper we provided guidelines for scholars on optimizing
research articles for academic search engines such as Google Scholar. Feedback in the
academic community to these guidelines was diverse. Some were concerned
researchers could use our guidelines to manipulate rankings of scientific articles and
promote what we call ‗academic search engine spam‘. To find out whether these
concerns are justified, we conducted several tests on Google Scholar. The results
show that academic search engine spam is indeed—and with little effort—possible:
We increased rankings of academic articles on Google Scholar by manipulating their
citation counts; Google Scholar indexed invisible text we added to some articles,
making papers appear for keyword searches the articles were not relevant for; Google
Scholar indexed some nonsensical articles we randomly created with the paper
generator SciGen; and Google Scholar linked to manipulated versions of research
papers that contained a Viagra advertisement. At the end of this paper, we discuss
whether academic search engine spam could become a serious threat to Web-based
academic search engines.
My post was banned by Facebook staff if it was a spam. In fact, it was my Personal Homepage and naturally, I bear full responsibility for every information placed in it. Since the responsible Facebook, employees do not give me the... more
My post was banned by Facebook staff if it was a spam. In fact, it was my Personal Homepage and naturally, I bear full responsibility for every information placed in it. Since the responsible Facebook, employees do not give me the opportunity to post its Internet link and in order to prove my case, I am trying now to attach the full version of my site in PDF or word-format, or by photos - if, they (Facebook staff) will give me such a possibility. Therefore, an interested reader will be able to judge whether my post is spam or not. I wonder what responsibility the employees of Facebook should bear in this case. I'll talk about the Georgian version of my site, which is completely identical to English, separately.
- by Hervé Debar
- •
- SPAM, Topology, Computers, Computer Viruses
Understanding the phenomenon of spam reviews in social media is now an emerging and important issue since some enterprises may hire spammers to post fake reviews to promote their product or demote product of their competitors. The hired... more
Understanding the phenomenon of spam reviews in social media is now an emerging and important issue since some enterprises may hire spammers to post fake reviews to promote their product or demote product of their competitors. The hired spammers are paid based on the fake reviews. Thus, these spammers may rewrite previous reviews as new review to earn the money. Thus, review similarity maybe a cue to detect fake reviews. Although literature had investigated the spam reviews, the review similarity of real review spammers is relatively unexplored. The objective of this paper is to explore the review spammers with a real case of fake reviews in Taiwan by investigating the cosine similarity and content length of reviews. We have proposed a text mining approach for a better understanding the phenomenon of fake reviews. The empirical results suggested that when comparing with normal reviews, the spam reviews were longer and with higher content similarity.
- by Winnie Soon
- •
- Art, SPAM, Email, Software
Laundering e-mail spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in the underground e-mail spam industry. Spammers have plagued the Internet by exploiting a large... more
Laundering e-mail spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in the underground e-mail spam industry. Spammers have plagued the Internet by exploiting a large number of spam proxies. The facility of breaking spam laundering and deterring spamming activities close to their sources, which would greatly benefit not only e-mail users but also victim ISPs, is in great demand but still missing. In this article, we reveal one salient characteristic of proxy-based spamming activities, namely packet symmetry, by analyzing protocol semantics and timing causality. Based on the packet symmetry exhibited in spam laundering, we propose a simple and effective technique, DBSpam, to online detect and break spam laundering activities inside a customer network. Monitoring the bidirectional traffic passing through a network gateway, DBSpam utilizes a simple statistical method, Sequential Probability Ratio Test, to detect the...
A speech to the Lions Clubs of Vienna and Fairfax, Virginia, on May 9, 2017. The movie "Witness" and Sam Cooke's song, "Wonderful World" open a discussion of civic knowledge, American history, and the weakened state of social studies... more
A speech to the Lions Clubs of Vienna and Fairfax, Virginia, on May 9, 2017. The movie "Witness" and Sam Cooke's song, "Wonderful World" open a discussion of civic knowledge, American history, and the weakened state of social studies education in the U.S. E.D. Hirsh's discussion of "civic competence" helps explain why. And highways, landmarks, movies, songs, and memories of Spam can help younger Americans appreciate their nation's past and ideals.
Today’s popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of adversaries who aim at unauthorized access to information being... more
Today’s popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of adversaries who aim at unauthorized access to information being shared over the internet medium. These are achieved via various means one of which is the distributed denial of service attacks-which has become a major threat to the electronic society. These are carefully crafted attacks of large magnitude that possess the capability to wreak havoc at very high levels and national infrastructures. This study posits intelligent systems via the use of machine learning frameworks to detect such. We employ the deep learning approach to distinguish between benign exchange of data and malicious attacks from data traffic. Results shows consequent success in the employment of deep learning neural network to effectively differentiate between acceptable and non-acceptable data packets (intrusion) on a network data traffic.
"Les attaques de spams sont désormais plus précises. Les récentes failles en matière de cybersécurité ont permis la capture de nombreuses données... et potentiellement plus d'arnaques. D'autant plus qu'en se focalisant sur... more
"Les attaques de spams sont désormais plus précises. Les récentes failles en matière de cybersécurité ont permis la capture de nombreuses données... et potentiellement plus d'arnaques. D'autant plus qu'en se focalisant sur l'individualisation des contenus, ils parviennent à tromper plus aisément."
- by Winnie Soon
- •
- Art, SPAM, Software, Zombie
The Internet of Things (IoT) enabled users to bring physical objects into the sphere of cyber world. This was made possible by different tagging technologies like NFC, RFID and 2D barcode which allowed physical objects to be identified and... more
The Internet of Things (IoT) enabled users to bring physical objects into the sphere of cyber world. This was made possible by different tagging technologies like NFC, RFID and 2D barcode which allowed physical objects to be identified and referred over the Internet. Due to less complexity and low development and deployment cost of 2D barcodes, they have become modus operandi for building an IoT system. This paper explores the possibility of spamming the Internet of Things. It tries to establish that web spammers can use 2D barcodes to flood the physical side of the IoT, trick users to see or reach unsolicited and unrelated content over the Internet and possibly destroy the legitimacy of correct content. Preliminary results from an experiment establishing the possibility of the problem are outlined. This paper also proposes the use of digital signatures (ECDSA) to address the problem of spamming the IoT. A prototype implementation of the solution and its experimental results are given in this paper.
Proyek Bendungan Merangin merupakan inisiasi penyediaan infrastruktur bendungan multiguna (multipurpose dam) pertama yang dilaksanakan melalui Kerjasama Pemerintah dengan Badan Usaha (KPBU) di Indonesia. Salah satu fungsi prioritas... more
Proyek Bendungan Merangin merupakan inisiasi penyediaan infrastruktur bendungan multiguna (multipurpose dam) pertama yang dilaksanakan melalui Kerjasama Pemerintah dengan Badan Usaha (KPBU) di Indonesia. Salah satu fungsi prioritas pembangunan Bendungan Merangin adalah memberikan suplai air baku untuk air minum wilayah sekitar di masa mendatang. Mengingat posisi Bendungan Merangin yang strategis dalam kerangka pengembangan wilayah, maka integrasi antara fungsi penyediaan air baku oleh Bendungan Merangin dengan potensi pengembangan Sistem Penyediaan Air Minum (SPAM) di masa mendatang menjadi sangat penting. Studi ini berupaya memberi gambaran umum kondisi layanan air minum eksisting serta menyajikan potensi pengembangan suplai dan kebutuhan air minum masa mendatang (tahun 2030 – 2050) yang didasarkan kepada rencana pembangunan dan pengembangan layanan air minum di Provinsi Jambi khususnya pada Kabupaten Merangin, Sarolangun, Bungo dan Tebo. Beberapa parameter yang dipandang berpengaruh dalam memetakan potensi pengembangan SPAM di masa mendatang, yaitu: Proyeksi kebutuhan air baku rumah tangga dan industri; Rencana strategi pengembangan SPAM wilayah; Kapasitas investasi PDAM dan Pemerintah Daerah (Pemda); dan Full Cost Recovery (FCR) PDAM. Dalam studi ini diperoleh total proyeksi kebutuhan air minum rumah tangga dan industri pada area tinjauan sebesar 6851,58 liter/detik pada tahun 2050. Kebijakan dan strategi daerah secara umum mendukung arah pengembangan SPAM dengan bentuk kerjasama antar daerah. Kapasitas Investasi PDAM dan Pemda di 4 (empat) Kabupaten tergolong rendah dan belum memenuhi FCR. Hasil kajian pada studi ini diharapkan dapat menjadi referensi dan suplemen kajian bagi implementasi rencana pengembangan SPAM dengan air baku yang bersumber dari Bendungan Merangin.
- by Agustia Larasari
- •
- SPAM, Air Minum, Bendungan, Skema KPBU
- by apurva desai
- •
- Text Mining, SPAM, Pornography, Email