Missing Labeling of Online Ads One of the most crucial issues in on-line advertising is the blurring of the line between editorial content and ads. Unlike on TV and in the print media, where guidelines on the labeling of advertisements, which shall enable the customer to distinguish between editorial and ads, exist, similar conventions have not yet evolved for Internet content. Labeling of online advertisement up to now has remained the rare exception, with only few sites (e.g. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
The Theory of the Celestro-Centric World In 1870 the U.S.-American for further details see: Those who believe in it, call it the truth, those who simply like the idea, may call it a parallel science. Others call it disinformation, asking for the reasons to spread it. The turning to the inside, where there is no way out, produces a different reality. It shows that realities are always produced. Political conservatives and racists like | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Private data bunkers On the other hand are the data bunkers of the private sector, whose position is different. Although these are fast-growing engines of data collection with a much greater degree of dynamism, they may not have the same privileged position - although one has to differentiate among the general historical and social conditions into which a data bunker is embedded. For example, it can safely be assumed that the databases of a large credit card company or bank are more protected than the bureaucracies of small developing countries. Private data bunkers include
Credit bureaus Credit card companies Direct marketing companies Insurance companies Telecom service providers Mail order stores Online stores | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Content Choice and Selective Reporting Media as today's main information sources unarguably have the power to influence political agenda-setting and public opinion. They decide which topics and issues are covered and how they are reported. Still, in many cases those decisions are not primarily determined by journalistic criteria, but affected by external factors. The importance of shareholders forces media to generate more profit every quarter, which can chiefly be raised by enlarging audiences and hence attracting more advertising money. Therefore the focus of media's programming in many cases shifts towards audience alluring content like entertainment, talk-shows, music and sports. Further pressure regarding the selection of content occurs from advertisers and marketers, who often implicitly or explicitly suggest to refrain from programming which could show them or their products and services (e.g. tobacco) in an unfavorable light. Interlocking directorships and outright ownerships can moreover be responsible for a selective coverage. Financial connections with defense, banking, insurance, gas, oil, and nuclear power, repeatedly lead (commercial) media to the withholding of information, which could offend their corporate partners. In totalitarian regimes also pressure from political elites may be a reason for the suppression or alteration of certain facts. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
1950: The Turing Test | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Key-Systems As stated, telecommunication is seen as an unreliable media for transporting secret messages. Therefore today, cryptography is needed more than ever before, especially for e-commerce. Key cryptosystems try to provide more privacy. symmetric-key cryptosystems: The same key is used for both encryption and decryption. In this case the encipherer and the recipient of the message/text have to agree on a common key before the enciphering-process can start. And most of all they should trust each other. And exactly this is the main problem of this system: how to exchange the key without offering an opportunity for stealing it? In former times messengers or pigeons were doing the exchange of those keys. Symmetric-key systems make sense in small entities. If a lot of people are spread over a wide area and belong to the same network, distributing the keys starts getting complicated. Today, those cryptosystems get controlled by other keys, based on highly complex mathematical algorithms. some symmetric-key systems are: - DES (Data Encryption Standard), the standard for credit cards - Triple-DES, which is a variation of DES, encrypting the plaintext three times. - IDEA (International Data Encryption Standard) - blowfish encryption algorithm, which is said to be faster than DES and IDEA Security and confidence are the key-words for a popular key-system: As DES and its successors have been used for so many years and by many people without having been broken, they are considered safe - safer than others, not used that frequently, no matter whether they are actually safer or not. For further information see: | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Roman smoke telegraph network, 150 A.D. The Roman smoke signals network consisted of towers within visible range of each other and had a total length of about 4500 kilometers. It was used for military signaling. For a similar telegraph network in ancient Greece see | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Optical communication system by Aeneas Tacitus, 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Industrial design Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Invention According to the | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
water-clocks The water-clocks are an early long-distance-communication-system. Every communicating party had exactly the same jar, with a same-size-hole that was closed and the same amount of water in it. In the jar was a stick with different messages written on. When one party wanted to tell something to the other it made a fire-sign. When the other answered, both of them opened the hole at the same time. And with the help of another fire-sign closed it again at the same time, too. In the end the water covered the stick until the point of the wanted message. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Moral rights Authors of copyrighted works (besides | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
News Corporation The News Corporation Ltd., a global media holding company, which governed News Limited (Australia), News International (U.K.), and News America Holdings Inc. (U.S.) was founded by the Australian-born newspaper publisher and media entrepreneur, Rupert Murdoch. Murdoch's corporate interests center on newspaper, magazine, book, and electronic publishing; television broadcasting; and film and video production, principally in the United States, the United Kingdom, and Australia. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Time Warner The largest media and entertainment conglomerate in the world. The corporation resulted from the merger of the publisher Time Inc. and the media conglomerate Warner Communications Inc. in 1989. It acquired the Turner Broadcasting System, Inc. (TBS) in 1996. Time Warner Inc.'s products encompass magazines, hardcover books, comic books, recorded music, motion pictures, and broadcast and cable television programming and distribution. The company's headquarters are in New York City. In January 2000 Time Warner merged with AOL (America Online), which owns several online-services like Compuserve, Netscape and Netcenter in a US$ 243,3 billion deal. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||