Copyright Management and Control Systems: Post-Infringement

Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:

Steganography

Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.

Agents

Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.

Copyright Litigation

While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
 
Like that car? The tricks of the data body industry

2. Like that car? The tricks of the data body industry

In the New Economy, data have become a primary resource. Businesses unable to respond to the pressure of informatisation are quickly left behind. "Information is everything" has become the war-cry of the New Economy. More than ever, business companies now collect data related to their customers, their competitors, economic indicators, etc., and compile them in data warehouses. Large amounts of data acquired can be turned into a systematic collection called a data warehouse through data mining techniques. These data can be used for marketing, stock exchange transactions, risk assessment, and many other purposes.

However, there are also many companies that specialise in data body economics as the main line of business. They collect huge amount of data process and enhance them (thereby increasing the value of the data) and offer them on to other companies. Direct marketing companies belong to this category. Direct marketing companies carry out targeted marketing, also called strategic marketing, aimed at individual customers or groups of customers. This process is based on a consumer profile, a collection of data containing personal information such as age, sex, marital status, employment, address, and information about consumer and payment behaviour. Based upon this profile, conclusions regarding possible future consumption are drawn and offers are made.

For example, somebody who has been attracted by a car on display in an airport terminal and completes a card with name and address to participate in a draw reveals a lot of economically valuable information about him / herself. Apart from name and address, and other data that is completed on the card, this person also can be assumed to be a potential car buyer (evidently he / she wants a car) and to be relatively affluent (the poor do not normally travel by plane). The time when you complete the card also provides information: in July and August, you are more likely to be a holiday maker than in November. Possibly in small print somewhere on the ticket you complete you agree to receive more information about this and other products, and you agree also that your data are "electronically processed". The data acquired this way can normally be expected to be much more valuable than the car the is offered in the draw. Most people who completed the cards will not win in the draw, but instead end up on directs marketing data warehouses and one day receive offers of products and services which they never knew they wanted.

TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611761/100438659665
 
Industrial design

Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for intellectual property protection the design must be novel or original. Protection can be obtained through registration in a government office and usually is given for 10 to 15 years.

INDEXCARD, 1/4
 
The World Wide Web History Project

The ongoing World Wide Web History Project was established to record and publish the history of the World Wide Web and its roots in hypermedia and networking. As primary research methods are used archival research and the analysis of interviews and talks with pioneers of the World Wide Web. As result a vast of collection of historic video, audio, documents, and software is expected. The project's digital archive is currently under development.

http://www.webhistory.org/home.html

INDEXCARD, 2/4
 
Server

A server is program, not a computer, as it sometimes said, dedicated to store files, manage printers and network traffic, or process database queries.

Web sites, the nodes of the World Wide Web (WWW), e.g., are stored on servers.

INDEXCARD, 3/4
 
Internet Software Consortium

The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community.

http://www.isc.org

INDEXCARD, 4/4