PR Firms and their Mission

Looking at how public relations practitioners advertise their services, they do not primarily seem to be followers of the "social engineering" approach. Burson-Marsteller, the worlds leading PR agency, for example sells itself as a specialist in "... public affairs, government relations, crisis communication, investor relations, environmental issues and marketing communications ... experienced at orchestrating effective campaigns, which motivate the right behaviors.". Porter Novelli, third largest international PR company, somewhat more aggressive promises, that their marketing-based public relations "... penetrate the consumer psyche - where - your target audiences work, learn, play or shop, through everything they read, hear and see.". While Porter Novelli seems to be specialized in psychological warfare, Fleishman-Hillard highlights its know-how and experience in government relations programs. "We have handled some of the nation's most challenging public policy issues, including issues affecting the environment, from clean air to agricultural chemicals; aviation safety; regressive taxes; international trade; and human rights.". To handle those difficult tasks, Fleishman-Hillard maintains "... an effective, professional lobbying team that includes registered lobbyists recruited from the Senate and the House."

TEXTBLOCK 1/7 // URL: http://world-information.org/wio/infostructure/100437611652/100438658045
 
Challenges for Copyright by ICT: Copyright Owners

The main concern of copyright owners as the (in terms of income generation) profiteers of intellectual property protection is the facilitation of pirate activities in digital environments.

Reproduction and Distribution

Unlike copies of works made using analog copiers (photocopy machines, video recorders etc.) digital information can be reproduced extremely fast, at low cost and without any loss in quality. Since each copy is a perfect copy, no quality-related limits inhibit pirates from making as many copies as they please, and recipients of these copies have no incentive to return to authorized sources to get another qualitatively equal product. Additionally the costs of making one extra copy of intellectual property online are insignificant, as are the distribution costs if the copy is moved to the end user over the Internet.

Control and Manipulation

In cross-border, global data networks it is almost impossible to control the exploitation of protected works. Particularly the use of anonymous remailers and other existing technologies complicates the persecution of pirates. Also digital files are especially vulnerable to manipulation, of the work itself, and of the (in some cases) therein-embedded copyright management information.

TEXTBLOCK 2/7 // URL: http://world-information.org/wio/infostructure/100437611725/100438659526
 
An Economic and therefore Governmental Issue

While the digital divide might bring up the idea that enterprises will be able to sell more and more computers during the next years another truth looks as if there was no hope for a certain percentage of the population to get out of their marginalization, their position of being "have nots".

Studies show that the issue of different colors of skin play a role in this, but more than "racial" issues it is income, age and education that decides about the have and have nots.

There exist ~ 103 million households in the USA.
~6 million do not even have telephone access. Why should they care about computers?

The digital divide cuts the world into centers and peripheries, not into nations, as it runs through the boarder between the North and the South as well as through nations.

http://www.digitaldivide.gov/
http://www.digitaldividenetwork.org/
http://www.pbs.org/digitaldivide/
http://news.cnet.com/news/0-1005-200-344552.html
http://racerelations.about.com/newsissues/racerelations/msubdigdivide.htm
http://www.techweek.com/articles/11-1-99/divide.htm
http://www.ntia.doc.gov/ntiahome/net2/falling.html

The most different institutions with various interests in their background work in that field; not rarely paid by governments, which are interested in inhabitants, connected to the net and economy.
see also: http://www.washington.edu/wto/digital/

Searching information about the digital divide one will find informations saying that it is growing all the time whereas other studies suggest the contrary, like this one
http://news.cnet.com/news/0-1005-200-341054.html

TEXTBLOCK 3/7 // URL: http://world-information.org/wio/infostructure/100437611730/100438659326
 
Internet services

The Internet can be used in in different ways: for distributing and retrieving information, for one-to-one, one-to-many and many-to-many communication, and for the access services. Accordingly, there are different services on offer. The most important of these are listed below.

Telnet

FTP (File Transfer Protocol)

Electronic Messaging (E-Mail)

World Wide Web (WWW)

Bulletin Board Systems (BBS)

Electronic Data Interchange (EDI)

Internet Relay Chat (IRC)

Multiple User Dimensions (MUDs)

Gopher

TEXTBLOCK 4/7 // URL: http://world-information.org/wio/infostructure/100437611791/100438659819
 
Copyright Management and Control Systems: Pre-Infringement

Pre-infringement copyright management and control systems that inhibit or control infringement of intellectual property may be put into place by copyright owners before distributing their works. Examples are:

Contracts

Contracts are a pre-infringement control method, which very often is underestimated. Properly formed contracts enable copyright holders to restrict the use of their works in excess of the rights granted under copyright laws.

Copy Protection

This approach was standard in the 1980s, but rejected by consumers and relatively easy to break. Still copy protection, whereby the vendor limits the number of times a file can be copied, is used in certain situations.

Limited Functionality

This method allows copyright owners to provide a copy of the work, which is functionally limited. Software creators, for example, can distribute software that cannot print or save. A fully functional version has to be bought from the vendor.

Date Bombs

Here the intellectual property holder distributes a fully functional copy but locks off access at a pre-specified date or after a certain number of uses.

TEXTBLOCK 5/7 // URL: http://world-information.org/wio/infostructure/100437611725/100438659616
 
Examples of Mainly Corporate Funded Think Tanks: Cato Institute

Founded in 1977 the Cato Institutes 1998 budget made up US$ 11 million. Its funding consists of corporate and private donations (especially from corporations and executives in the highly regulated industries of financial services, telecommunications and pharmaceuticals industries) and sales of publications.

Catos corporate donors include tobacco firms: Philip Morris (Rupert Murdoch sits on Philip Morris board of directors) and R.J. Reynolds. Financial firms: American Express, Chase Manhattan Bank, Chemical Bank, Citicorp/Citibank, Commonwealth Fund, Prudential Securities and Salomon Brothers. Energy conglomerates: Chevron Companies, Exxon Company, Shell Oil Company and Tenneco Gas, as well as the American Petroleum Institute, Amoco Foundation and Atlantic Richfield Foundation. Furthermore the Cato Institute is funded by pharmaceutical firms: Eli Lilly & Company, Merck & Company and Pfizer, Inc., foundations, like Koch, Lambe and Sarah Scaife and companies from the telecommunications sector: Bell Atlantic Network Services, BellSouth Corporation, Microsoft, NYNEX Corporation, Sun Microsystems and Viacom.

TEXTBLOCK 6/7 // URL: http://world-information.org/wio/infostructure/100437611704/100438658297
 
Abolition of Resale Price Maintenance

The London-based Institute for Economic Affairs (AEI) from its beginning undertook an extensive publishing program to push forward its free-market ideology. Among its publications was one particular paper, which had a direct and immediate political impact. Published in 1960 "Resale Price Maintenance and Shoppers' Choice" by Basil Yamey argued for the abolition of Resale Price Maintenance, which by fixing prices in shops prevented large stores from necessarily under-cutting smaller shops. Yamey argued that a free market in shop prices would save the shoppers £180,000,000 a year, and prices would fall by five percent.

The publication of Yamey's paper was timed to coincide with a period of public debate on the subject to ensure maximum impact, and Yamey's suggestions were taken up by the incumbent Conservative Government. Although the Abolition of Resale Price Maintenance by Edward Heath in 1964, can not only be attributed to Yamey's paper, it for sure had a substantial impact.

TEXTBLOCK 7/7 // URL: http://world-information.org/wio/infostructure/100437611704/100438658247
 
Moral rights

Authors of copyrighted works (besides economic rights) enjoy moral rights on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise.

INDEXCARD, 1/5
 
Punch card, 1801

Invented by Joseph Marie Jacquard, an engineer and architect in Lyon, France, the punch cards laid the ground for automatic information processing. For the first time information was stored in binary format on perforated cardboard cards. In 1890 Hermann Hollerith used Joseph-Marie Jacquard's punch card technology for processing statistical data retrieved from the US census in 1890, thus speeding up data analysis from eight to three years. His application of Jacquard's invention was also used for programming computers and data processing until electronic data processing was introduced in the 1960's. - As with writing and calculating, administrative purposes account for the beginning of modern automatic data processing.

Paper tapes are a medium similar to Jacquard's punch cards. In 1857 Sir Charles Wheatstone applied them as a medium for the preparation, storage, and transmission of data for the first time. By their means, telegraph messages could be prepared off-line, sent ten times quicker (up to 400 words per minute), and stored. Later similar paper tapes were used for programming computers.

INDEXCARD, 2/5
 
Whitfield Diffie

Whitfield Diffie is an Engineer at Sun Microsystems and co-author of Privacy on the Line (MIT Press) in 1998 with Susan Landau. In 1976 Diffie and Martin Hellman developed public key cryptography, a system to send information without leaving it open to be read by everyone.

INDEXCARD, 3/5
 
Neighboring rights

Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

INDEXCARD, 4/5
 
Martin Hellman

Martin Hellman was Whitfield Diffie's collegue in creating pubylic key cryptography in the 1970s.

INDEXCARD, 5/5