|
Basics: Protected Persons Generally copyright vests in the author of the work. Certain national laws provide for exceptions and, for example, regard the employer as the original owner of a copyright if the author was, when the work was created, an employee and employed for the purpose of creating that work. In the case of some types of creations, particularly audiovisual works, several national laws provide for different solutions to the question that should be the first holder of copyright in such works. Many countries allow copyright to be assigned, which means that the owner of the copyright transfers it to another person or entity, which then becomes its holder. When the national law does not permit assignment it usually provides the possibility to license the work to someone else. Then the owner of the copyright remains the holder, but authorizes another person or entity to exercise all or some of his rights subject to possible limitations. Yet in any case the " |
|
|
|
Economic structure; transparent customers Following the dynamics of informatised economies, the consumption habits and lifestyles if customers are of great interest. New technologies make it possible to store and combine collected data of an enormous amount of people. User profiling helps companies understand what potential customers might want. Often enough, such data collecting takes place without the customer's knowledge and amounts to spying. "Much of the information collection that occurs on the Internet is invisible to the consumer, which raises serious questions of fairness and informed consent." (David Sobel, Electronic Privacy Information Center) |
|
|
|
Biometrics applications: privacy issues All biometric technologies capture biometric data from individuals. Once these date have been captured by a system, they can, in principle, be forwarded to other locations and put to many different uses which are capable of compromising on an individuals privacy. Technically it is easy to match biometric data with other personal data stored in government or corporate files, and to come a step closer to the counter-utopia of the transparent citizen and customer whose data body is under outside control. While biometric technologies are often portrayed as protectors of personal data and safeguards against identity theft, they can thus contribute to an advance in "Big Brother" technology. The combination of personalised data files with biometric data would amount to an enormous control potential. While nobody in government and industry would admit to such intentions, leading data systems companies such as EDS (Electronic Data Systems; Biometric technologies have the function of identification. Historically, identification has been a prerequisite for the exercise of power and serves as a protection only to those who are in no conflict with this power. If the digitalisation of the body by biometric technologies becomes as widespread as its proponents hope, a new electronic feudal system could be emerging, in which people are reduced to subjects dispossessed of their to their bodies, even if these, unlike in the previous one, are data bodies. Unlike the gatekeepers of medieval towns, wear no uniforms by they might be identified; biometric technologies are pure masks. |
|
|
|
In Search of Reliable Internet Measurement Data Newspapers and magazines frequently report growth rates of Internet usage, number of users, hosts, and domains that seem to be beyond all expectations. Growth rates are expected to accelerate exponentially. However, Internet measurement data are anything thant reliable and often quite fantastic constructs, that are nevertheless jumped upon by many media and decision makers because the technical difficulties in measuring Internet growth or usage are make reliable measurement techniques impossible. Equally, predictions that the Internet is about to collapse lack any foundation whatsoever. The researchers at the Size and Growth In fact, "today's Internet industry lacks any ability to evaluate trends, identity performance problems beyond the boundary of a single ISP (Internet service provider, M. S.), or prepare systematically for the growing expectations of its users. Historic or current data about traffic on the Internet infrastructure, maps depicting ... there is plenty of measurement occurring, albeit of questionable quality", says K. C. Claffy in his paper Internet measurement and data analysis: topology, workload, performance and routing statistics (http://www.caida.org/Papers/Nae/, Dec 6, 1999). Claffy is not an average researcher; he founded the well-known So his statement is a slap in the face of all market researchers stating otherwise. In a certain sense this is ridiculous, because since the inception of the So what are the reasons for this inability to evaluate trends, identity performance problems beyond the boundary of a single ISP? First, in early 1995, almost simultaneously with the worldwide introduction of the "There are many estimates of the size and growth rate of the Internet that are either implausible, or inconsistent, or even clearly wrong", K. G. Coffman and Andrew, both members of different departments of What is measured and what methods are used? Many studies are devoted to the number of users; others look at the number of computers connected to the Internet or count You get the clue of their focus when you bear in mind that the Internet is just one of many networks of networks; it is only a part of the universe of computer networks. Additionally, the Internet has public (unrestricted) and private (restricted) areas. Most studies consider only the public Internet, Coffman and Odlyzko consider the long-distance private line networks too: the corporate networks, the Hosts The Despite the small sample, this method has at least one flaw: Internet Weather Like daily weather, traffic on the Internet, the conditions for data flows, are monitored too, hence called Internet weather. One of the most famous Internet Hits, Page Views, Visits, and Users Let us take a look at how these hot lists of most visited Web sites may be compiled. I say, may be, because the methods used for data retrieval are mostly not fully disclosed. For some years it was seemingly common sense to report requested files from a Web site, so called "hits". A method not very useful, because a document can consist of several files: graphics, text, etc. Just compile a document from some text and some twenty flashy graphical files, put it on the Web and you get twenty-one hits per visit; the more graphics you add, the more hits and traffic (not automatically to your Web site) you generate. In the meantime page views, also called page impressions are preferred, which are said to avoid these flaws. But even page views are not reliable. Users might share computers and corresponding Especially the editors of some electronic journals (e-journals) rely on page views as a kind of ratings or circulation measure, Rick Marin reports in the More advanced, but just slightly better at best, is counting visits, the access of several pages of a Web site during one session. The problems already mentioned apply here too. To avoid them, newspapers, e.g., establish registration services, which require password authentication and therefore prove to be a kind of access obstacle. But there is a different reason for these services. For content providers users are virtual users, not unique persons, because, as already mentioned, computers and For If you like to play around with Internet statistics instead, you can use Robert Orenstein's Measuring the Density of Measuring the Density of Dodge and Shiode used data on the ownership of IP addresses from |
|
|
|
Intellectual Property and the "Information Society" Metaphor Today the talk about the so-called "information society" is ubiquitous. By many it is considered as the successor of the industrial society and said to represent a new form of societal and economical organization. This claim is based on the argument, that the information society uses a new kind of resource, which fundamentally differentiates from that of its industrial counterpart. Whereas industrial societies focus on physical objects, the information society's raw material is said to be knowledge and information. Yet the conception of the capitalist system, which underlies industrial societies, also continues to exist in an information-based environment. Although there have been changes in the forms of manufacture, the relations of production remain organized on the same basis. The principle of property. In the context of a capitalist system based on industrial production the term property predominantly relates to material goods. Still even as in an information society the raw materials, resources and products change, the concept of property persists. It merely is extended and does no longer solely consider physical objects as property, but also attempts to put information into a set of property relations. This new kind of knowledge-based property is widely referred to as " |
|
|
|
History: European Tradition Only in Roman times the first rights referring to artistic works appeared. Regulations resembling a lasting exclusive right to copy did not occur until the 17th century. Before copyright was a private arrangement between guilds able to reproduce copies in commercial quantities. In France and Western European countries "droits d'auteur" or author's rights is the core of what in the Anglo-American tradition is called copyright. Such rights are rooted in the republican revolution of the late 18th century, and the Rights of Man movement. Today in the European system the creator is front and center; later exploiters are only secondary players. France During the 18th century France gradually lost the ability to restrict In 1777 the King threatened the monopoly by reducing the duration of publisher's privileges to the lifetime of the authors. Accordingly a writer's work would go into the public domain after his death and could be printed by anyone. The booksellers fought back by argumenting that, no authority could take their property from them and give it to someone else. Seven months later, in August 1789, the revolutionary government ended the privilege system and from that time on anyone could print anything. Early in 1790 Marie-Jean-Antoine-Nicolas de Caritat, Marquis de Condorcet proposed giving authors power over their own work lasting until ten years after their deaths. The proposal - the basis for France's first modern copyright law - passed in 1793. |
|
|
|
Theoedore Roosevelt With the assassination of President McKinley, Theodore Roosevelt (1858-1919), not quite 43, became the youngest President in the Nation's history. Roosevelt's youth differed sharply from that of the log cabin Presidents. He was born in New York City in 1858 into a wealthy family. Roosevelt steered the United States more actively into world politics. He liked to quote a favorite proverb, "Speak softly and carry a big stick. . . . " He won the Nobel Peace Prize for mediating the Russo-Japanese War. for more information see the official website: |
|
|
|
Gaius Julius Caesar Gaius Julius Caesar (100-44 BC) was a Roman Statesman who came to power through a military career and by buying of votes. His army won the civil war, run over Spain, Sicily and Egypt, where he made Cleopatra a Queen. For reaching even more power he increased the number of senators. But he also organized social measures to improve the people's food-situation. In February 44 BC he did not accept the kingship offered by Marc Anthony, which made him even more popular. One month later he was murdered during a senate sitting. |
|
|
|
Ku Klux Klan The Ku Klux Klan has a long history of violence. It emerged out of the resentment and hatred many white Southerners. Black Americans are not considered human beings. While the menace of the KKK has peaked and waned over the years, it has never vanished. |
|
|
|
Netiquette Although referred to as a single body of rules, there is not just one Netiquette, but there are several, though overlapping largely. Proposing general guidelines for posting messages to newsgroups and mailing lists and using the Well-known Netiquettes are the |
|
|
|
Harold. D. Lasswell Harold. D. Lasswell (* 1902) studied at the London School of Economics. He then became a professor of social sciences at different Universities, like the University of Chicago, Columbia University, and Yale University. He also was a consultant for several governments. One of Lasswell's many famous works was Propaganda Technique in World War. In this he defines propaganda. He also discussed major objectives of propaganda, like to mobilize hatred against the enemy, to preserve the friendship of allies, to procure the co-operation of neutrals and to demoralize the enemy. |
|
|
|
water-clocks The water-clocks are an early long-distance-communication-system. Every communicating party had exactly the same jar, with a same-size-hole that was closed and the same amount of water in it. In the jar was a stick with different messages written on. When one party wanted to tell something to the other it made a fire-sign. When the other answered, both of them opened the hole at the same time. And with the help of another fire-sign closed it again at the same time, too. In the end the water covered the stick until the point of the wanted message. |
|
|