Advertisers and Marketers Perspective

With the rapid growth of the Internet and its audience advertisers now have a new medium at their disposal. The placement of the first banner ads in 1994 marks the birth of Internet advertising. Although the advertising industry at first hesitated to adopt the new medium, two facts brushed away their doubts:

Migrating Television Audiences: The increased use of the Internet led people to redistribute their time budget. Whereas some cut down on eating and sleeping, more than a third reduced watching television and instead uses the WWW.

Interesting Internet Demographics: While methodologies and approaches of research organizations studying the demographic composition of the Internet vary, the findings are relatively consistent: Internet users are young, well educated and earn high incomes.

Considering those findings, the Internet in the first place seems to become inevitable to be included in media planning, as part of the audience shifts from TV to the WWW, and secondly, because demographics of the Internet user population are irresistible for marketers.

TEXTBLOCK 1/11 // URL: http://world-information.org/wio/infostructure/100437611652/100438657907
 
Commercial vs. Independent Content: Human and Financial Resources

Concerning their human and financial resources commercial media and independent content provider are an extremely unequal pair. While the 1998 revenues of the world's leading media conglomerates (AOL Time Warner, Disney, Bertelsmann, Viacom and the News Corporation) amounted to US$ 91,144,000,000 provider of independent content usually act on a non-profit basis and to a considerable extent depend on donations and contributions.

Also the human resources they have at their disposal quite differ. Viacom for example employs 112,000 people. Alternative media conversely are mostly run by a small group of activists, most of them volunteers. Moreover the majority of the commercial media giants has a multitude of subsidiaries (Bertelsmann for instance has operations in 53 countries), while independent content provider in some cases do not even have proper office spaces. Asked about their offices number of square meters Frank Guerrero from RTMark comments "We have no square meters at all, because we are only on the web. I guess if you add up all of our servers and computers we would take up about one or two square meters."

TEXTBLOCK 2/11 // URL: http://world-information.org/wio/infostructure/100437611734/100438659145
 
Governmental Regulations

The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit DES and similar products are allowed after a technical review, just like encryption commodities and software with key lengths of 64-bits or less which meet the mass market requirements.
For more information see:
http://www.wassenaar.org/

Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries.

This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently.

For more information on this see:
http://www.heise.de/ct/97/04/032/
http://www.fitug.de/ulf/krypto/verbot.html#welt

Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom.
The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily.

"Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible."
(Arnold G. Reinhold)


The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the PGP, stay under governmental control.

The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably?
Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands.
What about civil rights or Human Rights?

TEXTBLOCK 3/11 // URL: http://world-information.org/wio/infostructure/100437611776/100438659135
 
Content Choice and Selective Reporting

Media as today's main information sources unarguably have the power to influence political agenda-setting and public opinion. They decide which topics and issues are covered and how they are reported. Still, in many cases those decisions are not primarily determined by journalistic criteria, but affected by external factors. The importance of shareholders forces media to generate more profit every quarter, which can chiefly be raised by enlarging audiences and hence attracting more advertising money. Therefore the focus of media's programming in many cases shifts towards audience alluring content like entertainment, talk-shows, music and sports.

Further pressure regarding the selection of content occurs from advertisers and marketers, who often implicitly or explicitly suggest to refrain from programming which could show them or their products and services (e.g. tobacco) in an unfavorable light. Interlocking directorships and outright ownerships can moreover be responsible for a selective coverage. Financial connections with defense, banking, insurance, gas, oil, and nuclear power, repeatedly lead (commercial) media to the withholding of information, which could offend their corporate partners. In totalitarian regimes also pressure from political elites may be a reason for the suppression or alteration of certain facts.

TEXTBLOCK 4/11 // URL: http://world-information.org/wio/infostructure/100437611734/100438658492
 
Advertising

Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology.

TEXTBLOCK 5/11 // URL: http://world-information.org/wio/infostructure/100437611652/100438658361
 
Missing Labeling of Online Ads

One of the most crucial issues in on-line advertising is the blurring of the line between editorial content and ads. Unlike on TV and in the print media, where guidelines on the labeling of advertisements, which shall enable the customer to distinguish between editorial and ads, exist, similar conventions have not yet evolved for Internet content. Labeling of online advertisement up to now has remained the rare exception, with only few sites (e.g. http://www.orf.at) explicitly indicating non-editorial content.

TEXTBLOCK 6/11 // URL: http://world-information.org/wio/infostructure/100437611652/100438657963
 
Censorship and Free Speech

There is no society - in the past or in the present - free of censorship, the enforced restriction of speech. It is not restricted to authoritarian regimes. Democratic societies too aim at the control of the publication and distribution of information in order to prevent unwanted expressions. In every society some expressions, ideas or opinions are feared. Censored are books, magazines, films and videos, and computer games, e.g.

In defence of its monopoly of truth, the Catholic Church published a blacklist of books not allowed to be read: the Index librorum prohibitorum. As indicated by the fact that every declaration of human rights - including the United Nations' Declaration of Human Rights and the European Convention on Human Rights - embraces free expression, democratic societies censorship is not imposed to protect a monopoly on truth or to foster the prevailing orthodoxy, as it seems. (With the remarkable exceptions of the prohibition of Nazi or Nazi-like publications and censorship practiced during wartime.) On the contrary, it is the point of free speech that we do not know the truth, that truth is something to strive for in a kind of public discourse or exchange intended to contribute to or even to constitute democracy. So "we cannot think coherently about free speech independently of issues about equality." (Susan Dwyer, A Plea to Ignore the Consequences of Free Speech, in: Computer-Mediated Communication Magazine, January 1, 1996, http://www.december.com/cmc/mag/1996/jan/dwyer.html) Racist expressions prove that. There are good reasons for supporting censorship to avoid violations of human dignity, as there are reasons to support unrestricted discussions of all topics.

To a high degree the Protestant Reformation was made possible by the invention of the printing press. Now those who were capable of writing and reading no longer needed to rely on the priests to know what is written in the Bible. They could compare the Bible with the sermons of the priests. This may be one of the reasons why especially in countries with a strong Protestant or otherwise anti-catholic tradition (with the exception of Germany), free speech is held in such high esteem.

There seems to be no alternative: free speech without restriction or censorship. But censorship is not the only kind of restriction of speech. Speech codes as politically correct speech are restrictions, sometimes similar to censorship; copyright, accessibility and affordability of means of communication are other ones. Because of such restrictions different to censorship, we cannot think coherently about free speech independently of issues about social justice. Many campaigns for free speech, the right of free expression are backed by the concept of free speech as unconstrained speech. That is perfectly well understood under the auspices of regimes prominently, which try to silence their critics and restrict access to their publications. But the concept of free speech should not solely focus on such constrains. Thinking of free speech as unconstrained speech, we tend to forget to take into account - to campaign against - these other restrictions. Additionally, free expression understood in that way offers no clue how to practice this freedom of expression and what free speech is good for.

In liberal democratic societies censorship is not justified by recurring to absolute truth. Its necessity is argued by referring to personal integrity. Some kind of expression might do harm to individuals, especially to children, by traumatize them or by disintegrating personal morality. Some published information, such as the names of rape victims, might infringe some people's right on privacy or some, as others say, such as pornographic images or literature, e.g., infringes some people's right on equality (how?).

For more information on the history of censorship see The File Room Project.

TEXTBLOCK 7/11 // URL: http://world-information.org/wio/infostructure/100437611742/100438658951
 
Internet services

The Internet can be used in in different ways: for distributing and retrieving information, for one-to-one, one-to-many and many-to-many communication, and for the access services. Accordingly, there are different services on offer. The most important of these are listed below.

Telnet

FTP (File Transfer Protocol)

Electronic Messaging (E-Mail)

World Wide Web (WWW)

Bulletin Board Systems (BBS)

Electronic Data Interchange (EDI)

Internet Relay Chat (IRC)

Multiple User Dimensions (MUDs)

Gopher

TEXTBLOCK 8/11 // URL: http://world-information.org/wio/infostructure/100437611791/100438659819
 
1900 - 2000 A.D.

1904
First broadcast talk

1918
Invention of the short-wave radio

1929
Invention of television in Germany and Russia

1941
Invention of microwave transmission

1946
Long-distance coaxial cable systems and mobile telephone services are introduced in the USA.

1957
Sputnik, the first satellite, is launched by the USSR
First data transmissions over regular phone circuits.

At the beginning of the story of today's global data networks is the story of the development of satellite communication.

In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it in the end it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defense. As the US Department of Defense encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry.

The same year as the USA launched their first satellite - Explorer I - data was transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks.

Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. Yet up to now, most satellites are designed for military purposes such as reconnaissance.

1969
ARPAnet online

ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. An experimental network it mainly served the purpose of testing the feasibility of wide area networks and the possibility of remote computing. It was created for resource sharing between research institutions and not for messaging services like E-mail. Although US military sponsored its research, ARPAnet was not designed for directly martial use but to support military-related research.

In 1969 ARPANET went online and linked the first two computers, one located at the University of California, Los Angeles, the other at the Stanford Research Institute.

Yet ARPAnet did not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972.

Before it was decommissioned in 1990, NSFnet, a network of scientific and academic computers funded by the National Science Foundation, and a separate new military network went online in 1986. In 1988 the first private Internet service providers started offering access to NSFnet to a general public. After having become the backbone of the Internet in the USA, in 1995 NSFnet was turned into a consortium of commercial backbone providers. This and the launch of the World Wide Web added to the success of the global data network we call the Net.

In the USA it was already in 1994 that commercial users outnumbered military and academic users.

Despite the rapid growth of the Net, most computers linked to it are still located in the United States.

1971
Invention of E-Mail

1979
Introduction of fiber-optic cable systems

1992
Launch of the World Wide Web

TEXTBLOCK 9/11 // URL: http://world-information.org/wio/infostructure/100437611796/100438659828
 
The Private against the Public?

"The multiple human needs and desires that demand privacy
among two or more people in the midst of social life must
inevitably lead to cryptology wherever men thrive
and wherever they write."

David Kahn, The Codebreakers

In the age of the vitreous man, whose data are not only collected by different institutions but kept under disclosure, out of reach, uncontrollable and unmanageable for the individual, privacy obtains new importance, receives a much higher value again.
The irony behind is that those who long for cryptography in order to preserve more privacy actually have to trust the same people who first created the methods to "produce" something like that vitreous man; of course not the same individual but persons of the same area of science. It is the reign of experts.
So far about self-determination.

for a rather aesthetic view on privacy and cryptography see:
http://www.t0.or.at/franck/d_franck.htm

TEXTBLOCK 10/11 // URL: http://world-information.org/wio/infostructure/100437611776/100438658809
 
Association for Progressive Communication (APC)

The APC is a global federation of 24 non-profit Internet providers serving over 50,000 NGOs in 133 countries. Since 1990, APC has been supporting people and organizations worldwide, working together online for social, environmental and economic justice. The APC's network of members and partners spans the globe, with significant presence in Central and Eastern Europe, Africa, Asia and Latin America.

History

Between 1982 and 1987 several independent, national, non-profit computer networks emerged as viable information and communication resources for activists and NGOs. The networks were founded to make new communication techniques available to movements working for social change.

In 1987, people at GreenNet in England began collaborating with their counterparts at the Institute for Global Communications (IGC) in the United States. These two networks started sharing electronic conference material and demonstrated that transnational electronic communications could serve international as well as domestic communities working for peace, human rights and the environment.

This innovation proved so successful that by late 1989, networks in Sweden, Canada, Brazil, Nicaragua and Australia were exchanging information with each other and with IGC and GreenNet. In the spring of 1990, these seven organizations founded the Association for Progressive communications to co-ordinate the operation and development of this emerging global network of networks.

Strategies and Policies

The APC defends and promotes non-commercial, productive online space for NGOs and collaborates with like-minded organizations to ensure that the information and communication needs of civil society are considered in telecommunications, donor and investment policy. The APC is committed to freedom of expression and exchange of information on the Internet.

The APC helps to build capacity between existing and emerging communication service providers.

The APC Women's Networking Support Program promotes gender-aware Internet design, implementation and use.

Through its African members, the APC is trying to strengthen indigenous information sharing and independent networking capacity on the continent.

Members of APC develop Internet products, resources and tools to meet the advocacy, collaboration and information publishing and management needs of civil society. Recent APC initiatives have included the APC Toolkit Project: Online Publishing and Collaboration for Activists and the Mission-Driven Business Planning Toolkit.

The APC also runs special projects like the Beijing+5, which shall enable non-governmental organizations to actively participate in the review of the Beijing Platform for Action.

TEXTBLOCK 11/11 // URL: http://world-information.org/wio/infostructure/100437611734/100438659269
 
ARPAnet

ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. Being an experimental network mainly serving the purpose to test the feasibility of wide area networks, the possibility of remote computing, it was created for resource sharing between research institutions, not for messaging services like E-mail. Although research was sponsored by US military, ARPAnet was not designed for directly martial use but to support military-related research.

In 1969 ARPANET went online and links the first two computers, one of them located at the University of California, Los Angeles, the other at the Stanford Research Institute.

But ARPAnet has not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972.

Before it was decommissioned in 1990, NSFnet, a network of scientific and academic computers funded by the National Science Foundation, and a separate new military network went online in 1986. In 1988 the first private Internet service providers offered a general public access to NSFnet. Beginning in 1995, after having become the backbone of the Internet in the USA, NSFnet was turned over to a consortium of commercial backbone providers. This and the launch of the World Wide Web added to the success of the global data network we call the Net.

In the USA commercial users already outnumbered military and academic users in 1994.

Despite the rapid growth of the Net, most computers linked to it are still located in the United States.

INDEXCARD, 1/12
 
Enigma

Device used by the German military command to encode strategic messages before and during World War II. The Enigma code was broken by a British intelligence system known as Ultra.

INDEXCARD, 2/12
 
Polybius Checkerboard


 

1

2

3

4

5

1

A

B

C

D

E

2

F

G

H

I

K

3

L

M

N

O

P

4

Q

R

S

T

U

5

V

W

X

Y

Z



It is a system, where letters get converted into numeric characters.
The numbers were not written down and sent but signaled with torches.

for example:
A=1-1
B=1-2
C=1-3
W=5-2

for more information see:
http://www.ftech.net/~monark/crypto/crypt/polybius.htm

http://www.ftech.net/~monark/crypto/crypt/pol...
INDEXCARD, 3/12
 
cryptology

also called "the study of code". It includes both, cryptography and cryptoanalysis

INDEXCARD, 4/12
 
International Cable Protection Committee (ICPC)

The ICPC aims at reducing the number of incidents of damages to submarine telecommunications cables by hazards.

The Committee also serves as a forum for the exchange of technical and legal information pertaining to submarine cable protection methods and programs and funds projects and programs, which are beneficial for the protection of submarine cables.

Membership is restricted to authorities (governmental administrations or commercial companies) owning or operating submarine telecommunications cables. As of May 1999, 67 members representing 38 nations were members.

http://www.iscpc.org

INDEXCARD, 5/12
 
Vandana Shiva

Vandana Shiva is the Director of the Research Foundation for Science, Technology and Ecology in New Delhi. She has been a tireless and one of the most original campaigners for ecological diversity, eco-feminism and against "official" development policies and commercial exploitation. Book publications include Ecofeminism (1993), Monocultures of the Mind (1993) and Biopiracy : The Plunder of Nature and Knowledge (1997

INDEXCARD, 6/12
 
Censorship of Online Content in China

During the Tian-an men massacre reports and photos transmitted by fax machines gave notice of what was happening only with a short delay. The Chinese government has learned his lesson well and "regulated" Internet access from the beginning. All Internet traffic to and out of China passes through a few gateways, a few entry-points, thus making censorship a relatively easy task. Screened out are web sites of organizations and media which express dissident viewpoints: Taiwan's Democratic Progress Party and Independence Party, The New York Times, CNN, and sites dealing with Tibetan independence and human rights issues.

Users are expected not to "harm" China's national interests and therefore have to apply for permission of Internet access; Web pages have to be approved before being published on the Net. For the development of measures to monitor and control Chinese content providers, China's state police has joined forces with the MIT.

For further information on Internet censorship, see Human Rights Watch, World Report 1999.

http://www.dpp.org/
http://www.nytimes.com/
http://www.hrw.org/worldreport99/special/inte...
INDEXCARD, 7/12
 
Internet Software Consortium

The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community.

http://www.isc.org

INDEXCARD, 8/12
 
DMCA

The DMCA (Digital Millennium Copyright Act) was signed into law by U.S. President Clinton in 1998 and implements the two 1996 WIPO treaties (WIPO Performances and Phonograms Treaty and WIPO Copyright Treaty). Besides other issues the DMCA addresses the influence of new technologies on traditional copyright. Of special interest in the context of the digitalization of intellectual property are the titles no. 2, which refers to the limitation on the liability of online service providers for copyright infringement (when certain conditions are met), no. 3, that creates an exemption for making a copy of a computer program in case of maintenance and repair, and no. 4 which is concerned with the status of libraries and webcasting. The DCMA has been widely criticized for giving copyright-holders even more power and damage the rights and freedom of consumers, technological innovation, and the free market for information.

INDEXCARD, 9/12
 
to decipher/decode

to put the ciphers/codes back into the plaintext

INDEXCARD, 10/12
 
Gateway

A gateway is a computer supplying point-to-multipoint connections between computer networks.

INDEXCARD, 11/12
 
Human Genome Project

The Human Genome Project is an international colaborative research project that aims to map the human genome. It's goal is to idenitfy the 100,000 genes of the human DNA as well as to sequence the 3 billion chemical base pairs that make up the DNA. The HGP is designed on an open source basis, i.e. the information that is obtained and stored in databases should, in principle, be available to researchers and businesses all over the world. However, the HGP's work has been challenged by private businesses such as Celera whose objective is the private exploitation of genome information.

INDEXCARD, 12/12