Virtual cartels, oligopolistic structures

Global networks require global technical standards ensuring the compatibility of systems. Being able to define such standards makes a corporation extremely powerful. And it requires the suspension of competitive practices. Competition is relegated to the symbolic realm. Diversity and pluralism become the victims of the globalisation of baroque sameness.

The ICT market is dominated by incomplete competition aimed at short-term market domination. In a very short time, new ideas can turn into best-selling technologies. Innovation cycles are extremely short. But today's state-of-the-art products are embryonic trash.

    According to the Computer and Communications Industry Association, Microsoft is trying to aggressively take over the network market. This would mean that AT&T would control 70 % of all long distance phone calls and 60 % of cable connections.



    AOL and Yahoo are lone leaders in the provider market. AOL has 21 million subscribers in 100 countries. In a single month, AOL registers 94 million visits. Two thirds of all US internet users visited Yahoo in December 1999.



    The world's 13 biggest internet providers are all American.



    AOL and Microsoft have concluded a strategic cross-promotion deal. In the US, the AOL icon is installed on every Windows desktop. AOL has also concluded a strategic alliance with Coca Cola.


TEXTBLOCK 1/4 // URL: http://world-information.org/wio/infostructure/100437611709/100438658963
 
Virtual cartels, introduction

Among the most striking development of the 1990s has been the emergence of a global commercial media market utilizing new technologies and the global trend toward deregulation.
This global commercial media market is a result of aggressive maneuvering by the dominant firms, new technologies that make global systems cost-efficient, and neoliberal economic policies encouraged by the World Bank, IMF, WTO, and the US government to break down regulatory barriers to a global commercial media and telecommunication market.

A global oligopolistic market that covers the spectrum of media is now crystallizing the very high barriers to entry."

(Robert McChesney, author of "Rich Media, Poor Democracy")

The network structure of information and communication technologies means that even deregulated markets are not "free". The functional logic of global networks only tolerates a small number of large players. Mergers, strategic alliances, partnerships and cooperations are therefore the daily routine of the ICT business. They bypass competition and create "virtual cartels".

TEXTBLOCK 2/4 // URL: http://world-information.org/wio/infostructure/100437611709/100438658911
 
Actual Findings on Internet Advertising

Although Web advertising becomes a significant portion of marketing budgets, advertisers are still unsure on how to unlock the potential of the Internet. Current findings show that:

- Consumer brands spend only a fraction of their advertising budget on on-line advertising.

- Technology companies spend five times more on advertising in the WWW.

- While banner campaigns are still popular, there is no standardized solution for on-line advertising.

- Ad pricing is based on CPM (costs per 1.000 visitors), rather than on results.

- Personalized targeting has not yet taken hold. Instead advertisers mainly target on content.

At the moment three dominant models are used for Internet advertising:

Destination Sites: They use entertainment, high production values and information to pull users in and bring them back again.

Micro Sites: Content sites or networks host small clusters of brand pages.

Banner Campaigns: Those include other forms of Web advertising like sponsorships.

TEXTBLOCK 3/4 // URL: http://world-information.org/wio/infostructure/100437611652/100438657982
 
Public Relations and the Advertising Industry

The public relations industry, the same as advertising, is concentrated in the hands of few dominant firms. Still, the striking element about corporate public relations is that PR firms are tightly related to advertising companies. Nine out of the ten biggest international PR agencies have close ties with the advertising industry. Also, looking at the largest acquisitions involving U.S. PR firms from 1997 to 1999 it is apparent that money coming from advertising agencies has played an important role.


Table: Top 10 PR Firms 1998


Rank 1998

PR Firm

Advertising Agency Related

1998 Net Fees (in U.S. $)

1997 - 1998 % Change

1

Burson-Marsteller

yes

258,417,000

4.2

2

Hill and Knowlton

yes

206,000,000

8.9

3

Porter Novelli Int.

yes

183,050,000

23.6

4

Shandwick

yes

170,300,000

7.3

5

Fleishman-Hillard

yes

160,692,000

19.1.

6

Edelman PR Worldwide

no

157,840,530

18.1

7

Ketchum

yes

125,248,000

29.6

8

BSMG Worldwide

yes

118,963,000

93.0

9

Weber PR Worldwide

yes

83,166,000

36.2

10

GCI/APCO

yes

79,667,957

28.4




With many PR agencies sold to advertising companies, the advertising industry's influence further increases; enabling them to offer their clients not only advertising services, but also know-how in marketing, public opinion, crisis and issues management and political lobbying.

Table: Acquisition of PR Agencies (1997 - 1999)

Acquired Company

Buyer

Buyers Industry

Estimated Purchase Price (in millions of U.S. $)

International PR

Interpublic Group of Cos.

Advertising

230

Fleishman-Hillard

Omicom Group

Advertising

85

Ketchum

Omnicom Group

Advertising

60

Dewe Rogerson

Incepta

Advertising

40

Financial Rel. Bd.

BSMG/TN

Public Relations

33

Weber PR

Interpublic Group of Cos.

Advertising

15

Alexander

WPP Group

Advertising

15

Charles Barker

BSMG/TN

Public Relations

15



Source: Odwyerpr.com.

TEXTBLOCK 4/4 // URL: http://world-information.org/wio/infostructure/100437611652/100438658092
 
The Internet Engineering Task Force

The Internet Engineering Task Force contributes to the evolution of the architecture, the protocols and technologies of the Net by developing new Internet standard specifications. The directors of its functional areas form the Internet Engineering Steering Group.

Internet Society: http://www.ietf.org

http://www.ietf.org/
INDEXCARD, 1/8
 
Fair use

Certain acts normally restricted by copyright may, in circumstances specified in the law, be done without the authorization of the copyright owner. Fair use may therefore be described as the privilege to use copyrighted material in a reasonable manner without the owner's consent and allows the reproduction and use of a work for limited purposes such as criticism, comment, news reporting, teaching, and research. To determine whether a use is fair or not most copyright laws consider: 1) purpose and character of the use, 2) nature of the copyrighted work, 3) amount and substantiality of the portion used, and 4) effect of the use on the potential market. Examples of activities that may be excused as fair use include: providing a quotation in a book review; distributing copies of a section of an article in class for educational purposes; and imitating a work for the purpose of parody or social commentary.

INDEXCARD, 2/8
 
Memex Animation by Ian Adelman and Paul Kahn


INDEXCARD, 3/8
 
RSA

The best known of the two-key cryptosystems developed in the mid-1980s is the Rivest-Shamir-Adleman (RSA) cryptoalgorithm, which was first published in April, 1977. Since that time, the algorithm has been employed in the most widely-used Internet electronic communications encryption program, Pretty Good Privacy (PGP). It is also employed in both the Netscape Navigator and Microsoft Explorer web browsing programs in their implementations of the Secure Sockets Layer (SSL), and by Mastercard and VISA in the Secure Electronic Transactions (SET) protocol for credit card transactions.

INDEXCARD, 4/8
 
Whitfield Diffie

Whitfield Diffie is an Engineer at Sun Microsystems and co-author of Privacy on the Line (MIT Press) in 1998 with Susan Landau. In 1976 Diffie and Martin Hellman developed public key cryptography, a system to send information without leaving it open to be read by everyone.

INDEXCARD, 5/8
 
Ron Rivest

Ronald L. Rivest is Webster Professor of Electrical Engineering and Computer Science in MIT's EECS Department. He was one of three persons in a team to invent the RSA public-key cryptosystem. The co-authors were Adi Shamir and Leonard M. Adleman.

INDEXCARD, 6/8
 
Clipper Chip

The Clipper Chip is a cryptographic device proposed by the U.S. government that purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone
would be used to encrypt data. The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA).

INDEXCARD, 7/8
 
Bruce Schneier

Bruce Schneier is president of Counterpane Systems in Minneapolis. This consulting enterprise specialized in cryptography and computer security. He is the author of the book Applied Cryptography and inventor of the Blowfish and Twofish encryption algorithms.

INDEXCARD, 8/8