Databody economy and the surveillance state
The glamour of the data body economy clouds economic practices which are much less than glamorous. Through the seizure of the data body, practices that in the real political arena were common in the feudal age and in the early industrial age are being reconstructed. The data body economy digitally reconstructs exploitative practices such as slavery and wage labour. However, culturally the data body is still a very new phenomenon: mostly, people think if it does not hurt, it cannot be my body. Exploitation of data bodies is painless and fast. Nevertheless, this can be expected to change once the awareness of the political nature of the data body becomes more widespread. As more and more people routinely move in digitised environments, it is to be expected that more critical questions will be asked and claims to autonomy, at present restricted to some artistic and civil society groups trying to get heard amidst the deafening noise of the commercial ICT propaganda, will be articulated on a more general level. The more problematic aspect of this development may be something else: the practices of the data body economy, themselves a reconstruction of old techniques of seizure, have begun to re-colonise real political space. Simon Davis, Director of the London-based privacy campaigners The constant adaptation process required from the modern individual has anonymised and structuralized punishment, which now appears in the guise of error messages and the privatisation of risk. | |||||||||||||||
| |||||||||||||||
2000 A.D. 2000 Digital technologies are used to combine previously separated communication and media systems such as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence". Classical dichotomies as the one of computing and telephony and traditional categorizations no longer apply, because these new services no longer fit traditional categories. Convergence and Regulatory Institutions Digital technology permits the integration of telecommunications with computing and audiovisual technologies. New services that extend existing communication systems emerge. The convergence of communication and media systems corresponds to a convergence of corporations. Recently, For further information on this issue see Natascha Just and Michael Latzer, The European Policy Response to Convergence with Special Consideration of Competition Policy and Market Power Control, http://www.soe.oeaw.ac.at/workpap.htm or | |||||||||||||||
| |||||||||||||||
Basics: Protected Persons Generally copyright vests in the author of the work. Certain national laws provide for exceptions and, for example, regard the employer as the original owner of a copyright if the author was, when the work was created, an employee and employed for the purpose of creating that work. In the case of some types of creations, particularly audiovisual works, several national laws provide for different solutions to the question that should be the first holder of copyright in such works. Many countries allow copyright to be assigned, which means that the owner of the copyright transfers it to another person or entity, which then becomes its holder. When the national law does not permit assignment it usually provides the possibility to license the work to someone else. Then the owner of the copyright remains the holder, but authorizes another person or entity to exercise all or some of his rights subject to possible limitations. Yet in any case the " | |||||||||||||||
| |||||||||||||||
Copyright Management and Control Systems: Post-Infringement Steganography Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store Agents Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses. Copyright Litigation While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement. | |||||||||||||||
| |||||||||||||||
Technological measures As laid down in the proposed EU Directive on copyright and related | |||||||||||||||
| |||||||||||||||
Mark A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." ( | |||||||||||||||
| |||||||||||||||
Vladimir Putin Vladimir Putin is Russian President, | |||||||||||||||
| |||||||||||||||
Memex Animation by Ian Adelman and Paul Kahn | |||||||||||||||
| |||||||||||||||
Internet Societal Task Force The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation. | |||||||||||||||
| |||||||||||||||