Missing Labeling of Online Ads

One of the most crucial issues in on-line advertising is the blurring of the line between editorial content and ads. Unlike on TV and in the print media, where guidelines on the labeling of advertisements, which shall enable the customer to distinguish between editorial and ads, exist, similar conventions have not yet evolved for Internet content. Labeling of online advertisement up to now has remained the rare exception, with only few sites (e.g. http://www.orf.at) explicitly indicating non-editorial content.

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611652/100438657963
 
World-Infostructure

World-Infostructure provides information on a variety of topics that enable to understand the context in which actual developments in the field of new media and technologies happen. The timeline of communication systems presents a chronological overview of the most important events in the history of communication systems and shows the acceleration in the storage and processing of information. Moreover World-Information.Org explores the level of concentration and exclusion between the north and south as well as between the corporate world and the public interest. On the basis of a world map it illustrates the levels of saturation with technology, and the power structures and assets of the commercial sphere vs. the civil sector and the public interest.

Slaves and expert systems is concerned with technological developments such as the invention of powered machines, computers, robots and artificial intelligence that enable the automation of labor processes. Also the role of expert systems in the workplace and the social status of machines vs. humans is examined. A history of disinformation and propaganda is given in disinformation vs. democracy. It demonstrates the methods of falsification and manipulation in digital environments, and shows the power and dangers of automated information systems and their potential for abuse. The fusion of flesh and machine, the rise of biometrics, the patenting of life, and the development of body implants is the issue of biotechnology convergence.

Related search: World-Infostructure
TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/researchareas/104853397832
 
Timeline 1900-1970 AD

1913 the wheel cipher gets re-invented as a strip

1917 William Frederick Friedman starts working as a cryptoanalyst at Riverbank Laboratories, which also works for the U.S. Government. Later he creates a school for military cryptoanalysis

- an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys

1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin

- Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected

1919 Hugo Alexander Koch invents a rotor cipher machine

1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded

1923 Arthur Scherbius founds an enterprise to construct and finally sell his Enigma machine for the German Military

late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly

1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts

1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939

1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of William Frederick Friedman. As the Japanese were unable to break the US codes, they imagined their own codes to be unbreakable as well - and were not careful enough.

1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett

- at the same time the British develop the Typex machine, similar to the German Enigma machine

1943 Colossus, a code breaking computer is put into action at Bletchley Park

1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type

1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems

1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ)

late 1960's the IBM Watson Research Lab develops the Lucifer cipher

1969 James Ellis develops a system of separate public-keys and private-keys

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658921
 
plaintext

the original, legible text

INDEXCARD, 1/4
 
codes

an algorithm for bringing a legible message into an illegible form. There has to exist some sort of code book to encode/decode it.

INDEXCARD, 2/4
 
PGP

A cryptographic software application that was developed by Phil Zimmerman at the Massachusetts Institute of Technology. Pretty Good Privacy (PGP) is a cryptographic product family that enables people to securely exchange messages, and to secure files, disk volumes and network connections with both privacy and strong authentication.

INDEXCARD, 3/4
 
ciphertext

the enciphered/encoded and primarily illegible text

INDEXCARD, 4/4