1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Characteristics and generation scenarios of SPIM
7 Functional IM architecture for countering SPIM
7.1 Overview
7.2 Components functionality
8 Working procedures
8.1 Working procedure of sending rate control
8.2 Working procedure of blacklists
8.3 Procedures of authorization management
8.4 Procedures of user registration management
8.5 Procedures for SPIM complaints
8.6 Procedure of SPIM filtering
Appendix I – Roles and functions of IM system
Bibliography