Data body mealplan

Here is an example of how the data body is fed by routine day-to-day activities, a data body meal plan:

Breakfast: phone calls, drive GPS (global positioning system) equipped car, emerge from surveillance camera equipped subway, go online, send E-mails, complete online registration forms, receive faxes

Lunch: pay lunch with credit card, use your customer card when shopping, use mobile phone, pass through biometric access controls, use smart card

Afternoon snack: visit doctor, file insurance claim

Dinner: respond to TV commercials, complete income tax form, visit chat rooms, use free web mail. Programme phone wake-up call.

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611761/100438659657
 
Biometrics applications: gate keeping

Identity has to do with "place". In less mobile societies, the place where a person finds him/herself tells us something about his/her identity. In pre-industrial times, gatekeepers had the function to control access of people to particular places, i.e. the gatekeepers function was to identify people and then decide whether somebody's identity would allow that person to physically occupy another place - a town, a building, a vehicle, etc.

In modern societies, the unambiguous nature of place has been weakened. There is a great amount of physical mobility, and ever since the emergence and spread of electronic communication technologies there has been a "virtualisation" of places in what today we call "virtual space" (unlike place, space has been a virtual reality from the beginning, a mathematical formula) The question as to who one is no longer coupled to the physical abode. Highly mobile and virtualised social contexts require a new generation of gatekeepers which biometric technology aims to provide.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611729/100438658757
 
Enforcement: Copyright Management and Control Technologies

With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of copyright management systems. Technological protection for their works, the copyright industry argues, is necessary to prevent widespread infringement, thus giving them the incentive to make their works available online. In their view the ideal technology should be "capable of detecting, preventing, and counting a wide range of operations, including open, print, export, copying, modifying, excerpting, and so on." Additionally such systems could be used to maintain "records indicating which permissions have actually been granted and to whom".

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659674