Examples of Mainly Corporate Funded Think Tanks: Brookings Institution
  
              
 With a budget of US$ 23 million and assets worth US$ 192 million the  Brookings Institution, based in Washington D.C., in 1998 was funded by: Corporate and private donations (38 %), endowment (30 %), revenue from conferences and seminars (18 %), sales of publications (9 %), government support (2 %). 
  Among the 138 corporate donors are: Bell Atlantic,  Citibank,  J.P. Morgan,  Goldman Sachs,  NationsBank,  Exxon,  Chevron,  Microsoft, Hewlett Packard,  Toyota,  Pfizer,  Johnson & Johnson,  Dupont,  Mobil and Lockheed Martin, and the foundations of companies like  American Express,  Travelers,  AT&T and McDonnell Douglas. A few media conglomerates, like  Time Warner and the  Washington Post Co.. Contributions of individual donors include executives from  Visa,  Procter and Gamble,  BankAmerica and U.S. Airways.
  
         | 
     TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611704/100438658213
 | 
  |   | 
  
    Educational Programs
  
              
As the dissemination of ideologies and ideas is crucial to think tanks they apply different strategies to reach as many audiences as possible. Therefore also the concept of education plays an important role. Educational and training programs are aimed at the influencers and future influencers of public opinion and shall lead to the acceptance of think tanks respective social, economical and political ideas. The label "educational activities" thus very often stands for nothing less than the dissemination of ideology.
  Most think tanks regularly organize conferences, symposia and seminars to deliver their findings and ideas to a broader audience. RAND for example also  runs a Ph.D. program at its Graduate School.
  
         | 
     TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611704/100438658230
 | 
  |   | 
        
              Fair use
  
        
Certain  acts normally restricted by copyright may, in circumstances specified in the law, be done without the authorization of the copyright owner. Fair use may therefore be described as the privilege to use copyrighted material in a reasonable manner without the owner's consent and allows the reproduction and use of a work for limited purposes such as criticism, comment, news reporting, teaching, and research. To determine whether a use is fair or not most copyright laws consider: 1) purpose and character of the use, 2) nature of the copyrighted work, 3) amount and substantiality of the portion used, and 4) effect of the use on the potential market. Examples of activities that may be excused as fair use include: providing a quotation in a book review; distributing copies of a section of an article in class for educational purposes; and imitating a work for the purpose of parody or social commentary.
  
               | 
     INDEXCARD, 1/9
 | 
    |   | 
      
              Intellectual property
  
        
Intellectual property, very generally, relates to the output that result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) industrial property ( inventions,  marks,  industrial designs, unfair competition and geographical indications), and 2) copyright. The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited  rights to control the use made of their products. 
  
               | 
     INDEXCARD, 2/9
 | 
    |   | 
      
              Expert system
  
        
Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to  artificial intelligence. The three main elements of expert systems are: (1) an interface which allows interaction between the system and the user, (2) a database (also called the knowledge base) which consists of axioms and rules, and (3) the inference engine, a computer program that executes the inference-making process. The disadvantage of rule-based expert systems is that they cannot handle unanticipated events, as every condition that may be encountered must be described by a rule. They also remain limited to narrow problem domains such as troubleshooting malfunctioning equipment or medical image interpretation, but still have the advantage of being much lower in costs compared with paying an expert or a team of specialists.
  
               | 
     INDEXCARD, 3/9
 | 
    |   | 
      
              Liability of ISPs
  
        
ISPs (Internet Service Provider), BBSs (Bulletin Board Service Operators), systems operators and other service providers (in the U.S.) can usually be hold liable for infringing activities that take place through their facilities under three theories: 1) direct liability: to establish direct infringement liability there must be some kind of a direct volitional act, 2) contributory liability: a party may be liable for contributory infringement where "... with knowledge of the infringing activity, [it] induces, causes or materially contributes to the infringing activity of another." Therefore a person must know or have reason to know that the subject matter is copyrighted and that particular uses violated copyright law. There must be a direct infringement of which the contributory infringer has knowledge, and encourages or facilitates for contributory infringement to attach, and 3) vicarious liability: a party may be vicariously liable for the infringing acts of another if it a) has the right and ability to control the infringer's acts and b) receives a direct financial benefit from the infringement. Unlike contributory infringement, knowledge is not an element of vicarious liability.
 
  
               | 
     INDEXCARD, 4/9
 | 
    |   | 
      
              Moral rights
  
        
Authors of copyrighted works (besides  economic rights) enjoy moral rights on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise.
  
               | 
     INDEXCARD, 5/9
 | 
    |   | 
      
              Automation
  
        
Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines,  automation generally implies the integration of machines into a self-governing system. Automation has revolutionized those areas in which it has been introduced, and there is scarcely an aspect of modern life that has been unaffected by it. Nearly all industrial installations of automation, and in particular  robotics, involve a replacement of human labor by an automated system. Therefore, one of the direct effects of automation in factory operations is the dislocation of human labor from the workplace. The long-term effects of automation on employment and unemployment rates are debatable. Most studies in this area have been controversial and inconclusive. As of the early 1990s, there were fewer than 100,000 robots installed in American factories, compared with a total work force of more than 100 million persons, about 20 million of whom work in factories.
  
               | 
     INDEXCARD, 6/9
 | 
    |   | 
      
              DMCA
  
        
The DMCA (Digital Millennium Copyright Act) was signed into law by U.S. President Clinton in 1998 and implements the two 1996  WIPO treaties (WIPO Performances and Phonograms Treaty and  WIPO Copyright Treaty). Besides other issues the DMCA addresses the influence of new technologies on traditional copyright. Of special interest in the context of the digitalization of  intellectual property are the titles no. 2, which refers to the limitation on the liability of online service providers for copyright infringement (when certain conditions are met), no. 3, that creates an exemption for making a copy of a computer program in case of maintenance and repair, and no. 4 which is concerned with the status of libraries and webcasting. The DCMA has been widely criticized for giving copyright-holders even more power and damage the rights and freedom of consumers, technological innovation, and the free market for information.
  
               | 
     INDEXCARD, 7/9
 | 
    |   | 
      
              Robot
  
        
Robot relates to any automatically operated machine that replaces human effort, though it may not resemble human beings in appearance or perform functions in a humanlike manner. The term is derived from the Czech word robota, meaning "forced labor." Modern use of the term stems from the play R.U.R., written in 1920 by the Czech author Karel Capek, which depicts society as having become dependent on mechanical workers called robots that are capable of doing any kind of mental or physical work. Modern robot devices descend through two distinct lines of development--the early  automation, essentially mechanical toys, and the successive innovations and refinements introduced in the development of industrial machinery.
  
               | 
     INDEXCARD, 8/9
 | 
    |   | 
      
              Caching
  
        
Caching generally refers to the process of making an extra copy of a file or a set of files for more convenient retrieval. On the Internet caching of third party files can occur either locally on the user's client computer (in the RAM or on the hard drive) or at the server level ("proxy caching"). A requested file that has been cached will then be delivered from the cache rather than a fresh copy being retrieved over the Internet.
  
               | 
     INDEXCARD, 9/9
 | 
    |   |