|
1000 B.C. - 0 900 B.C. A postal service is used for governmental purposes in China. 500 B.C. In ancient Greece trumpets, drums, shouting, beacon, fires, smoke signals, and mirrors are used for message transmission. 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of a message transmission while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by a torch signal that the appropriate water level had been reached. The methods disadvantage was that the possible messages were restricted to a given code, but as the system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand the messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, 3rd century B.C. Wax tablets are used as writing material in Mesopotamia, ancient Greece, and Etruria. 2nd century B.C. In China paper is invented. 1st century B.C. The use of codices instead of scrolls - basically the hardcover book as we know it today - is an essential event in European history. To quote accurately by page number, to browse through pages and to skip chapters - things that were impossible when reading scrolls - becomes possible. In the computer age we are witnesses to a kind of revival of the scrolls as we scroll up and down a document. The introduction of hypertext possibly marks the beginning of a similar change as has taken place with the substitution of scrolls with codices. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Legal Protection: National Legislation | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Individualized Audience Targeting New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Linking and Framing: Cases Mormon Church v. Sandra and Jerald Tanner In a ruling of December 1999, a federal judge in Utah temporarily barred two critics of the Mormon Church from posting on their website the Internet addresses of other sites featuring pirated copies of a Mormon text. The Judge said that it was likely that Sandra and Jerald Tanner had engaged in contributory copyright infringement when they posted the addresses of three Web sites that they knew, or should have known, contained the copies. Kaplan, Carl S.: Universal Studios v. Movie-List The website Movie-List, which features links to online, externally hosted movie trailers has been asked to completely refrain from linking to any of Universal Studio's servers containing the trailers as this would infringe copyright. Cisneros, Oscar S.: Universal: Don't Link to Us. In: More cases concerned with the issue of linking, Ross, Alexandra: Copyright Law and the Internet: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Timeline Cryptography - Introduction Besides oral conversations and written language many other ways of information-transport are known: like the bush telegraph, drums, smoke signals etc. Those methods are not cryptography, still they need en- and decoding, which means that the history of language, the history of communication and the history of cryptography are closely connected to each other The timeline gives an insight into the endless fight between enciphering and deciphering. The reasons for them can be found in public and private issues at the same time, though mostly connected to military maneuvers and/or political tasks. One of the most important researchers on Cryptography through the centuries is | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Online data capturing Hardly a firm today can afford not to engage in electronic commerce if it does not want to be swept out of business by competitors. "Information is everything" has become something like the Lord's prayer of the New Economy. But how do you get information about your customer online? Who are the people who visit a website, where do they come from, what are they looking for? How much money do they have, what might they want to buy? These are key questions for a company doing electronic business. Obviously not all of this information can be obtained by monitoring the online behaviour of web users, but there are always little gimmicks that, when combined with common tracking technologies, can help to get more detailed information about a potential customer. These are usually online registration forms, either required for entry to a site, or competitions, sometimes a combination of the two. Obviously, if you want to win that weekend trip to New York, you want to provide your contact details. The most common way of obtaining information about a user online is a But cookies record enough information to fine-tune advertising strategies according to a user's preferences and interests, e.g. by displaying certain commercial banners rather than others. For example, if a user is found to respond to a banner of a particular kind, he / she may find two of them at the next visit. Customizing the offers on a website to the particular user is part of one-to-one marketing, a type of One-to-one marketing can create very different realities that undermine traditional concepts of demand and supply. The ideal is a "frictionless market", where the differential between demand and supply is progressively eliminated. If a market is considered a structure within which demand / supply differentials are negotiated, this amounts to the abolition of the established notion of the nature of a market. Demand and supply converge, desire and it fulfilment coincide. In the end, there is profit without labour. However, such a structure is a hermetic structure of unfreedom. It can only function when payment is substituted by credit, and the exploitation of work power by the exploitation of data. In fact, in modern economies there is great pressure to increase spending on credit. Using credit cards and taking up loans generates a lot of data around a person's economic behaviour, while at the same restricting the scope of social activity and increasing dependence. On the global level, the consequences of credit spirals can be observed in many of the developing countries that have had to abandon most of their political autonomy. As the data body economy advances, this is also the fate of people in western societies when they are structurally driven into credit spending. It shows that data bodies are not politically neutral. The interrelation between data, profit and unfreedom is frequently overlooked by citizens and customers. Any company in a modern economy will apply data collecting strategies for profit, with dependence and unfreedom as a "secondary effect". The hunger for data has made IT companies eager to profit from e-business rather resourceful. "Getting to know the customer" - this is a catchphrase that is heard frequently, and which suggests that there are no limits to what a company may want to about a customer. In large online shops, such as But there are more advanced and effective ways of identification. The German company Bu there are much less friendly ways of extracting data from a user and feeding the data body. Less friendly means: these methods monitor users in situations where the latter are likely not to want to be monitored. Monitoring therefore takes place in a concealed manner. One of these monitoring methods are so-called Bugs monitoring users have also been packaged in seemingly harmless toys made available on the Internet. For example, The cursor image technology relies on what is called a GUID (global unique identifier). This is an identification number which is assigned to a customer at the time of registration, or when downloading a product. Many among the online community were alarmed when in 1999 it was discovered that However, in the meantime, another possible infringement on user anonymity by Microsoft was discovered, when it as found out that MS Office documents, such as Word, Excel or Powerpoint, contain a bug that is capable of tracking the documents as they are sent through the net. The bug sends information about the user who opens the document back to the originating server. A document that contains the bug can be tracked across the globe, through thousands of stopovers. In detailed description of the bug and how it works can be found at the Of course there are many other ways of collecting users' data and creating appropriating data bodies which can then be used for economic purposes. Indeed, as Bill Gates commented, "information is the lifeblood of business". The electronic information networks are becoming the new frontier of capitalism. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Definition During the last 20 years the old "Digital divide" describes the fact that the world can be divided into people who do and people who do not have access to (or the education to handle with) modern information technologies, e.g. cellular telephone, television, Internet. This digital divide is concerning people all over the world, but as usually most of all people in the formerly so called third world countries and in rural areas suffer; the poor and less-educated suffer from that divide. More than 80% of all computers with access to the Internet are situated in larger cities. "The cost of the information today consists not so much of the creation of content, which should be the real value, but of the storage and efficient delivery of information, that is in essence the cost of paper, printing, transporting, warehousing and other physical distribution means, plus the cost of the personnel manpower needed to run these `extra' services ....Realizing an autonomous distributed networked society, which is the real essence of the Internet, will be the most critical issue for the success of the information and communication revolution of the coming century of millennium." (Izumi Aizi) for more information see: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Satellites Communications satellites are relay stations for radio signals and provide reliable and distance-independent high-speed connections even at remote locations without high-bandwidth infrastructure. On point-to-point transmission, the transmission method originally employed on, satellites face increasing competition from In the future, satellites will become stronger, cheaper and their orbits will be lower; their services might become as common as satellite TV is today. For more information about satellites, see How Satellites Work ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Adi Shamir Adi Shamir was one of three persons in a team to invent the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Montage Certain elements of two or more photographs can be put together, mixed, and the outcome is a new picture. Like this, people can appear in the same picture, even "sit at the same table" though they have never met in reality. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Intellectual property Intellectual property, very generally, relates to the output that result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) industrial property ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Mark A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Black Propaganda Black propaganda does not tell its source. The recipient cannot find out the correct source. Rather would it be possible to get a wrong idea about the sender. It is very helpful for separating two allies. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Apple Founded by Steve Jobs and Steve Wozniak and headquartered in Cupertino, USA, Apple Computer was the first commercially successful personal computer company. In 1978 Wozniak invented the first personal computer, the Apple II. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/6/0,5716,115726+1+108787,00.html | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Seneca Lucius Annaeus Seneca (~4 BC - 65 AD), originally coming from Spain, was a Roman philosopher, statesman, orator and playwright with a lot of influence on the Roman cultural life of his days. Involved into politics, his pupil | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||