"Attention Brokerage" "Attention Brokerage" is one of the latest developments in the field of online advertising. The first Web-site applying the concept of selling and buying attention is Cybergold. Users, who want to earn money have to register and then look at ads, which, of course, they have to prove by e.g. downloading software. Attention, according to this idea, represents a good, which is worth being paid for. |
|
Anonymity "Freedom of anonymous speech is an essential component of free speech." Ian Goldberg/David Wagner, Someone wants to hide one's identity, to remain anonymous, if s/he fears to be holding accountable for something, say, a publication, that is considered to be prohibited. Anonymous publishing has a long tradition in European history. Writers of erotic literature or pamphlets, e. g., preferred to use pseudonyms or publish anonymously. During the Enlightenment books as d'Alembert's and Diderot's famous Encyclopaedia were printed and distributed secretly. Today The original design of the Net, as far as it is preserved, offers a relatively high degree of privacy, because due to the client-server model all what is known about you is a report of the machine from which information was, respectively is requested. But this design of the Net interferes with the wish of corporations to know you, even to know more about you than you want them to know. What is euphemistically called customer relationship management systems means the collection, compilation and analysis of personal information about you by others. In 1997 America Online member Timothy McVeigh, a Navy employee, made his homosexuality publicly known in a short autobiographical sketch. Another Navy employee reading this sketch informed the Navy. America Online revealed McVeigh's identity to the Navy, who discharged McVeigh. As the consequence of a court ruling on that case, Timothy McVeigh was allowed to return to the Navy. Sometimes anonymity really matters. On the Net you still have several possibilities to remain anonymous. You may visit web sites via an In Germany, in 1515, printers had to swear not to print or distribute any publication bypassing the councilmen. Today repressive regimes, such as Anonymity might be used for abuses, that is true, but "the burden of proof rests with those who would seek to limit it. (Rob Kling, Ya-ching Lee, Al Teich, Mark S. Frankel, Assessing Anonymous Communication on the Internet: Policy Deliberations, in: The Information Society, 1999). |
|
Cryptography's Terms and background "All nature is merely a cipher and a secret writing." Blaise de Vigenère In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security. Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work. The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected. We want to communicate with everybody - but do not want anybody to know. Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well. With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers. While the potential of global information is regarded as endless, it is those elements that reduce it. There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data. During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics. "Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw) For an introduction into cryptography and the mathematical tasks see: |
|
Advertising and the Media System Media systems (especially broadcasting) can be classified in two different types: Public Media Systems: Government control over broadcasting through ownership, regulation, and partial funding of public broadcasting services. Private Media System: Ownership and control lies in the hands of private companies and shareholders. Both systems can exist in various forms, according to the degree of control by governments and private companies, with mixed systems (public and private) as the third main kind. Whereas public media systems are usually at least partially funded by governments, private broadcasting solely relies on advertising revenue. Still also public media systems cannot exclude advertising as a source of revenue. Therefore both types are to a certain degree dependent on money coming in by advertisers. And this implies consequences on the content provided by the media. As the attraction of advertisers becomes critically important, interests of the advertising industry frequently play a dominant role concerning the structure of content and the creation of environments favorable for advertising goods and services within the media becomes more and more common. |
|
Timeline 1600 - 1900 AD 17th century Cardinal Richelieu invents an encryption-tool called grille, a card with holes for writing messages on paper into the holes of those cards. Afterwards he removes the cards and fills in the blanks, so the message looks like an ordinary letter. The recipient needs to own the same card - Bishop John Wilkins invents a cryptologic system looking like music notes. In a book he describes several forms of steganographic systems like secrets inks, but also the string cipher. He mentions the so-called Pig Latin, a spoken way of encryption that was already used by the ancient Indians - the English scientist, magician and astrologer 1605/1623 Sir Francis Bacon (= Francis Tudor = William Shakespeare?) writes several works containing ideas about cryptography. One of his most important advises is to use ciphers in such a way that no-one gets suspicious that the text could be enciphered. For this the steganogram was the best method, very often used in poems. The attempt to decipher Shakespeare's sonnets (in the 20th century) lead to the idea that his works had been written by Francis Bacon originally. 1671 Leibniz invents a calculating machine that uses the binary scale which we still use today, more advanced of course, called the ASCII code 18th century this is the time of the Black Chambers of espionage in Europe, Vienna having one of the most effective ones, called the "Geheime Kabinettskanzlei", headed by Baron Ignaz von Koch. Its task is to read through international diplomatic mail, copy letters and return them to the post-office the same morning. Supposedly about 100 letters are dealt with each day. 1790's Thomas Jefferson and Robert Patterson invent a wheel cipher 1799 the Rosetta Stone is found and makes it possible to decipher the Egyptian Hieroglyphs 1832 or 1838 Sam Morse develops the Morse Code, which actually is no code but an enciphered alphabet of short and long sounds. The first Morse code-message is sent by telegraph in 1844. 1834 the 1844 the invention of the telegraph changes cryptography very much, as codes are absolutely necessary by then 1854 the Playfair cipher is invented by Sir Charles Wheatstone 1859 for the first time a tomographic cipher gets described 1861 Friedrich W. Kasiski does a cryptoanalysis of the Vigenère ciphers, which had been supposed to be uncrackable for ages 1891 Major Etienne Bazeries creates a new version of the wheel cipher, which is rejected by the French Army 1895 the invention of the radio changes cryptography-tasks again and makes them even more important |
|
Individualized Audience Targeting New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like |
|
Another Question of Security Even with the best techniques it is impossible to invent a cryptographic system that is absolutely safe/unbreakable. To decipher a text means to go through many, sometimes nearly - but never really - endless attempts. For the computers of today it might take hundreds of years or even more to go through all possibilities of codes, but still, finally the code stays breakable. The much faster quantum computers will proof that one day. Therefore the decision to elect a certain method of enciphering finally is a matter of trust. For the average user of computers it is rather difficult to understand or even realize the dangers and/or the technological background of electronic transmission of data. For the majority thinking about one's own necessities for encryption first of all means to trust others, the specialists, to rely on the information they provide. The websites explaining the problems behind (and also the articles and books concerning the topic) are written by experts of course as well, very often in their typical scientific language, merely understandable for laymen. The introductions and other superficial elements of those articles can be understood, whereas the real background appears as untouchable spheres of knowledge. The fact that dangers are hard to see through and the need for security measures appears as something most people know from media reports, leads directly to the problem of an underdeveloped democracy in the field of cryptography. Obviously the connection between cryptography and democracy is rather invisible for many people. Those mentioned media reports often specialize in talking about the work computer hackers do (sometimes being presented as criminals, sometimes as heroes) and the danger to lose control over the money drawn away from one's bank account, if someone steals the credit card number or other important financial data. The term "security", surely connected to those issues, is a completely different one from the one that is connected to privacy. It is especially the latter that touches the main elements of democracy. for the question of security see: |
|
About Wines |
|
FEED |
|
French laws against anonymity on the Net Since the end of June in France anonymous publishing - on the World Wide Web, in newsgroups, mailing lists or chat rooms - is prohibited. The use of pseudonyms, so popular in chat rooms, e.g., is not restricted, but the true identities of those who "publish" on the Net must be known to the users' Internet service and Internet content providers. Additionally, Internet providers are obliged to point out the possibility of blocking access to material to their customers and to offer them appropriate technology for blocking access. Loi sur la communication audiovisuelle, http://www.legalis.net/jnet/2000/loi-audio/projetloi-fin.htm Source: Florian Rötzer, Frankreich hat mit der Anonymität im internet Schluss gemacht, in: |
|
Barnes and Noble Massive online retail bookstore housing more than a million titles. Includes a book recommendation "personalizer,", a comprehensive list of The New York Times bestsellers, a "live" community events calendar with a daily survey and several forums, "highlighted" books from 19 subject areas, browsable categories such as antiques, ethnic studies, and pop culture, Books in the News, and weekly features such as reviews, excerpts, recommendations, interviews, events, "roundups" of popular titles, and quizzes. |
|
Seagram Company Ltd. Seagram is the largest producer and marketer of distilled spirits in the world. It is headquartered in Montreal, Que. The company began when Distillers Corp., Ltd., a Montreal distillery owned by Samuel Bronfman, acquired Joseph E. Seagram & Sons in 1928. Under the leadership of the founder's son, Edgar M. Bronfman, who became head of the company in 1971, the firm diversified during the 1950s and '60s from its original base of blended whiskies into the production and marketing of scotch, bourbon, rum, vodka, gin, and many different wines. It also expanded into the European, Latin American, East Asian, and African markets with its products. The company adopted its present name in 1975. It produces more than 400 different brands of distilled spirits and wines. Edgar M. Bronfman, Jr., took over as head of the company in 1989. Seagram in 1995 purchased MCA Inc., a media and entertainment firm, from the Matsushita Electric Industrial Company. |
|
Bandwidth The bandwidth of a transmitted communications signal is a measure of the range of frequencies the signal occupies. The term is also used in reference to the frequency-response characteristics of a communications receiving system. All transmitted signals, whether analog or digital, have a certain bandwidth. The same is true of receiving systems. Generally speaking, bandwidth is directly proportional to the amount of data transmitted or received per unit time. In a qualitative sense, bandwidth is proportional to the complexity of the data for a given level of system performance. For example, it takes more bandwidth to download a photograph in one second than it takes to download a page of text in one second. Large sound files, computer programs, and animated videos require still more bandwidth for acceptable system performance. Virtual reality (VR) and full-length three-dimensional audio/visual presentations require the most bandwidth of all. In digital systems, bandwidth is data speed in bits per second (bps). Source: Whatis.com |
|
NSFNet Developed under the auspices of |
|