Bureaucratic data bunkers



Among the foremost of the data bunkers government bureaucracies. Bureaucracies are the oldest forms of bunkers and are today deeply engrained in modern societies. Bureaucracies have always had the function of collecting and administering the data of subjects. What make this process more problematic in the age of ICT is that a lot more data can be collected, they can be collected in clandestine ways (e.g. in surveillance situations), and the can be combined and merged using advanced data mining technologies. In addition, there is a greater rationale for official data collecting, as a lot more data is required for the functioning of public administration as in previous periods, as societies rush to adopt increasingly complex technologies, above all ICTs. The increasing complexity of modern societies means that an increasing number of bureaucratic decision is taken, all of which require a calculation process. Complexity, viewed through government spectacles, generates insecurity - a great deal of the bureaucratic activity therefore revolves around the topic of security.

In spite of the anti-bureaucratic rhetoric of most governments, these factors provides the bureaucracies with an increased hold on society. Foremost bureaucratic data bunkers include the following:

    Law enforcement agencies

    Fiscal agencies

    Intelligence agencies

    Social welfare agencies

    Social insurance institutions

    Public health agencies

    Educational institutions



These are agencies that enjoy the privileged protection of the state. Those among them that operate in the field of security are further protected against public scrutiny, as they operate in an area to which democratic reason has no access.

What makes the data repositories of these institutions different from private data bunkers is their "official", i.e. their politically binding and definitive character. CAE speak of the bureaucracy as a "concrete form of uninterruptible, official and legitimised memory."

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611761/100438659721
 
Copyright Management and Control Systems: Metering

Metering systems allow copyright owners to ensure payment to or at the time of a consumer's use of the work. Those technologies include:

Hardware Devices

Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works.

Digital Certificates

Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides information on the identity of the holder can also include rights associated with a particular person. Vendors can so control access system resources, including copyrighted files, by making them available only to users who can provide a digital certificate with specified rights (e.g. access, use, downloading).

Centralized Computing

Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access.

Access Codes

Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the intellectual property for a one-time license fee or by requiring periodic procurement of access codes.

Copyright Clearinghouses

Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property.


TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611725/100438659615
 
Digital Subscriber Line (DSL)

DSL connections are high-speed data connections over copper wire telephone lines. As with cable connections, with DSL you can look up information on the Internet and make a phone call at the same time but you do not need to have a new or additional cable or line installed. One of the most prominent DSL services is ISDN (integrated services digital network, for more information click here ( http://www.britannica.com/bcom/eb/article/4/0,5716,129614+15,00.html )).

http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 1/3
 
Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet.

More detailed information can be found here

http://www.anu.edu/people/Roger.Clarke/II/Pri...
INDEXCARD, 2/3
 
Electronic Data Interchange (EDI)

EDI is an international standard relating to the exchange of trade goods and services. It enables trading partners to conduct routine business transactions, such as purchase orders, invoices and shipping notices independent of the computer platform used by the trading partners. Standardization by EDI translation software assures the correct interpretation of data.

EDI might become increasingly important to electronic commerce.

INDEXCARD, 3/3