Positions Towards the Future of Copyright in the "Digital Age" With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified: Eliminate Copyright Anti-copyrightists believe that any Enlarge Copyright Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other |
|
Copyright Management and Control Systems: Metering Hardware Devices Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works. Digital Certificates Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides Centralized Computing Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access. Access Codes Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the Copyright Clearinghouses Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property. |
|
Cyborg manifesto The full title of Dona Haraway's Cyborg Manifesto is "A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century", published by Routledge, New York, in 1991. Online e excerpts of this classic are located at |
|
Frankenstein Written by Mary Shelley, Frankenstein tells the story of a doctor who builds a creature half man and half machine. While at first the creature is celebrated a s big success, it soon realizes that it is awakens fear among humans. As a result of the growing distance between Frankenstein's creature and the people, its longing for love and affection remains unfulfilled. Frankenstein's creature eventually turns hostile to its human environment and kills its own maker. |
|
Wide Area Network (WAN) A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too. |
|
Electronic Messaging (E-Mail) Electronic messages are transmitted and received by computers through a network. By E-Mail texts, images, sounds and videos can be sent to single users or simultaneously to a group of users. Now texts can be sent and read without having them printed. E-Mail is one of the most popular and important services on the Internet. |
|