|
Global data bodies - intro - Education files, insurance files, tax files, communication files, consumption files, medical files, travel files, criminal files, investment files, files into infinity ... Critical Art Ensemble Global data bodies 1. Introduction Informatisation has meant that things that once were "real", i.e. whose existence could be experienced sensually, are becoming virtual. Instead of the real existence of a thing, the virtual refers to its possibility of existence. As this process advances, an increasing identification of the possible with the real occurs. Reality migrates into a dim and dematerialised grey area. In the end, the possible counts for the real, virtualisation creates an "as-if" experience. The experience of the body is also affected by this process. For example, in bio-technology, the human body and its functions are digitised, which prepares and understanding of the body exlusively in terms of its potential manipulation, the body becomes whatever it could be. But digitisation has not only affected the understanding and the social significance of the body, it has also altered the meaning of presence, traditionally identified with the body. The advance of information and communication technologies (ICTs) has meant that for an increasing number of activities we no longer need be physically present, our "virtual" presence, achieved by logging onto a electronic information network, is sufficient. This development, trumpeted as the pinnacle of convenience by the ICT industries and governments interested in attracting investment, has deeply problematic aspects as well. For example, when it is no longer "necessary" to be physically present, it may soon no longer be possible or allowed. Online-banking, offered to customers as a convenience, is also serves as a justification for charging higher fees from those unwilling or unable to add banking to their household chores. Online public administration may be expected to lead to similar effects. The reason for this is that the digitalisation of the economy relies on the production of surplus data. Data has become the most important raw material of modern economies. In modern economies, informatisation and virtualisation mean that people are structurally forced to carry out their business and life their lives in such a way as to generate data. Data are the most important resource for the New Economy. By contrast, activities which do not leave behind a trace of data, as for example growing your own carrots or paying cash rather than by plastic card, are discouraged and structurally suppressed. | ||||||||||||||||
|
| ||||||||||||||||
|
Basics: Infringement and Fair Use The Yet copyright laws also provide that the rights of copyright owners are subject to the doctrine of " - the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes (usually certain types of educational copying are allowed) - the nature of the copyrighted work (mostly originals made for commercial reasons are less protected than their purely artistic counterparts) - the amount and substantiality of the portion used in relation to the copyrighted work as a whole - the effect of the use upon the potential market for or value of the copyrighted work (as a general rule copying may be permitted if it is unlikely to cause economic harm to the original author) Examples of activities that may be excused as fair use include: providing a quotation in a book review; distributing copies of a section of an article in class for educational purposes; and imitating a work for the purpose of parody or social commentary. | ||||||||||||||||
|
| ||||||||||||||||
|
Basics: Introduction Copyright law is a branch of | ||||||||||||||||
|
| ||||||||||||||||
|
Databody convergence In the phrase "the rise of the citizen as a consumer", to be found on the When the citizen becomes a consumer, the state must become a business. In the data body business, the key word behind this new identity of government is "outsourcing". Functions, that are not considered core functions of government activity are put into the hands of private contractors. There have long been instances where privately owned data companies, e.g. credit card companies, are allowed access to public records, e.g. public registries or electoral rolls. For example, in a normal credit card transaction, credit card companies have had access to public records in order to verify identity of a customer. For example, in the UK citizen's personal data stored on the Electoral Roll have been used for commercial purposes for a long time. The new British Data Protection Act now allows people to "opt out" of this kind of commercialisation - a legislation that has prompted protests on the part of the data industry: While this may serve as an example of an increased public awareness of privacy issues, the trend towards outsourcing seems to lead to a complete breakdown of the barriers between commercial and public use of personal data. This trend can be summarised by the term "outsourcing" of government functions. Governments increasingly outsource work that is not considered core function of government, e.g. cooking meals in hospitals or mowing lawns in public parks. Such peripheral activities marked a first step of outsourcing. In a further step, governmental functions were divided between executive and judgemental functions, and executive functions increasingly entrusted to private agencies. For these agencies to be able to carry out the work assigned to them, the need data. Data that one was stored in public places, and whose handling was therefore subject to democratic accountability. Outsourcing has produced gains in efficiency, and a decrease of accountability. Outsourced data are less secure, what use they are put to is difficult to control. The world's largest data corporation, Technically the linking of different systems is already possible. It would also create more efficiency, which means generate more income. The question, then, whether democracy concerns will prevent it from happening is one that is capable of creating But what the EDS example shows is something that applies everywhere, and that is that the data industry is whether by intention or whether by default, a project with profound political implications. The current that drives the global economy deeper and deeper into becoming a global data body economy may be too strong to be stopped by conventional means. However, the convergence of political and economic data bodies also has technological roots. The problem is that politically motivated surveillance and economically motivated data collection are located in the same area of information and communication technologies. For example, monitoring internet use requires more or less the same technical equipment whether done for political or economic purposes. Data mining and data warehousing techniques are almost the same. Creating transparency of citizens and customers is therefore a common objective of intelligence services and the data body industry. Given that data are exchanged in electronic networks, a compatibility among the various systems is essential. This is another factor that encourages "leaks" between state-run intelligence networks and the private data body business. And finally, given the secretive nature of state intelligence and commercial data capturing , there is little transparency. Both structures occupy an opaque zone. | ||||||||||||||||
|
| ||||||||||||||||
|
Global hubs of the data body industry While most data bunkers are restricted to particular areas or contexts, there are others which act as global data nodes. Companies such as
The size of these data repositories is constantly growing, so it is only a matter of time when everybody living in the technologically saturated part of the world will be registered in one of these data bunkers. Among these companies, For many years, EDS has been surrounded by rumours concerning sinister involvement with intelligence agencies. Beyond the rumours, though, there are also facts. EDS has a special division for | ||||||||||||||||
|
| ||||||||||||||||
|
Virtual cartels; mergers In parallel to the deregulation of markets, there has been a trend towards large-scale mergers which ridicules dreams of increased competition. Recent mega-mergers and acquisitions include SBC Communications - Ameritech, $ 72,3 bn Bell Atlantic - GTE, $ 71,3 AT&T - Media One, $ 63,1 AOL - Time Warner, $ 165 bn MCI Worldcom - Spring, $ 129 bn The total value of all major mergers since the beginnings of the 1990s has been 20 trillion Dollars, 2,5 times the size of the USA's GIP. The AOL- Time Warner reflects a trend which can be observed everywhere: the convergence of the ICT and the content industries. This represents the ultimate advance in complete market domination, and a alarming threat to independent content. "Is TIME going to write something negative about AOL? Will AOL be able to offer anything other than CNN sources? Is the Net becoming as silly and unbearable as television?" (Detlev Borchers, journalist) | ||||||||||||||||
|
| ||||||||||||||||
|
Individualized Audience Targeting New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like | ||||||||||||||||
|
| ||||||||||||||||
|
Challenges for Copyright by ICT: Digital Content Providers Providers of digital information might be confronted with copyright related problems when using some of the special features of hypertext media like Framing Frames are often used to help define, and navigate within, a content provider's website. Still, when they are used to present (copyrighted) third party material from other sites issues of passing off and misleading or deceptive conduct, as well as copyright infringement, immediately arise. Hyperlinking It is generally held that the mere creation of a hyperlink does not, of itself, infringe copyright as usually the words indicating a link or the displayed URL are unlikely to be considered a "work". Nevertheless if a link is clicked on the users browser will download a full copy of the material at the linked address creating a copy in the RAM of his computer courtesy of the address supplied by the party that published the link. Although it is widely agreed that the permission to download material over the link must be part of an implied license granted by the person who has made the material available on the web in the first place, the scope of this implied license is still the subject of debate. Another option that has been discussed is to consider linking Furthermore hyperlinks, and other "information location tools", like online directories or search engines could cause their operators trouble if they refer or link users to a site that contains infringing material. In this case it is yet unclear whether providers can be held liable for infringement. | ||||||||||||||||
|
| ||||||||||||||||
|
Timeline BC ~ 1900 BC: Egyptian writers use non-standard 1500 an enciphered formula for the production of pottery is done in Mesopotamia parts of the Hebrew writing of Jeremiah's words are written down in " 4th century 487 the Spartans introduce the so called " 170 50-60 | ||||||||||||||||
|
| ||||||||||||||||
|
CIM To perform manufacturing firm's functions related to design and production the CAD/CAM technology, for computer-aided design and computer-aided manufacturing, was developed. Today it is widely recognized that the scope of computer applications must extend beyond design and production to include the business functions of the firm. The name given to this more comprehensive use of computers is computer-integrated manufacturing (CIM). | ||||||||||||||||
|
| ||||||||||||||||
|
Operating system An operating system is software that controls the many different operations of a computer and directs and coordinates its processing of programs. It is a remarkably complex set of instructions that schedules the series of jobs (user applications) to be performed by the computer and allocates them to the computer's various hardware systems, such as the | ||||||||||||||||
|
| ||||||||||||||||
|
Montage Certain elements of two or more photographs can be put together, mixed, and the outcome is a new picture. Like this, people can appear in the same picture, even "sit at the same table" though they have never met in reality. | ||||||||||||||||
|
| ||||||||||||||||
|
Cutting The cutting of pictures in movies or photographs is highly manipulative: it is easy to produce a new video out of an already existing one. The result is a form of manipulation that is difficult to contradict. A reputation destroyed by this, is nearly impossible to heal. | ||||||||||||||||
|
| ||||||||||||||||
|
Neighboring rights Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large. | ||||||||||||||||
|
| ||||||||||||||||
|
John Dee b. July 13, 1527, London, England d. December 1608, Mortlake, Surrey English alchemist, astrologer, and mathematician who contributed greatly to the revival of interest in mathematics in England. After lecturing and studying on the European continent between 1547 and 1550, Dee returned to England in 1551 and was granted a pension by the government. He became astrologer to the queen, Mary Tudor, and shortly thereafter was imprisoned for being a magician but was released in 1555. Dee later toured Poland and Bohemia (1583-89), giving exhibitions of magic at the courts of various princes. He became warden of Manchester College in 1595. | ||||||||||||||||
|
| ||||||||||||||||
|
retouch The retouch is the simplest way to change a picture. Small corrections can be made through this way. A well-known example is the correction of a picture from a Bill Clinton-visit in Germany. In the background of the photograph stood some people, holding a sign with critical comments. In some newspapers the picture was printed like this, in others a retouch had erased the sign. Another example happened in Austria in 1999: The right wing party FPÖ had a poster for the Parliamentarian elections which said: 1999 reasons to vote for Haider. Others answered by producing a retouch saying: 1938 reasons to not vote for Haider (pointing to the year 1939, when the vast majority of the Austrians voted for the "Anschluss" to Germany). | ||||||||||||||||
|
| ||||||||||||||||
|
Blue Box The blue box-system works with a special blue colored background. The person in front can act as if he/she was filmed anywhere, also in the middle of a war. | ||||||||||||||||
|
| ||||||||||||||||
|
Sun Microsystems Founded in 1982 and headquartered in Palo Alto, USA, Sun Microsystems manufactures computer workstations, For more detailed information see the Encyclopaedia Britannica: | ||||||||||||||||
|
| ||||||||||||||||
|
Adolf Hitler Adolf Hitler (1889-1945) was the head of the NSdAP, the National Socialist Workers' Party. Originally coming from Austria, he started his political career in Germany. As the Reichskanzler of Germany he provoked World War II. His hatred against all non-Aryans and people thinking in a different way killed millions of human beings. Disinformation about his personality and an unbelievable machinery of propaganda made an entire people close its eyes to the most cruel crimes on human kind. | ||||||||||||||||
|
| ||||||||||||||||
|
Leni Riefenstahl Leni Riefenstahl (* 1902) began her career as a dancer and actress. Parallel she learnt how to work with a camera, turning out to be one of the most talented directors and cutters of her time - and one of the only female ones. | ||||||||||||||||
|
| ||||||||||||||||
|
Braille Universally accepted system of writing used by and for blind persons and consisting of a code of 63 characters, each made up of one to six raised dots arranged in a six-position matrix or cell. These Braille characters are embossed in lines on paper and read by passing the fingers lightly over the manuscript. Louis Braille, who was blinded at the age of three, invented the system in 1824 while a student at the Institution Nationale des Jeunes Aveugles (National Institute for Blind Children), Paris. | ||||||||||||||||
|
| ||||||||||||||||
|
Colouring In November 1997, after the assassination of (above all Swiss) tourists in Egypt, the Swiss newspaper Blick showed a picture of the place where the attack had happened, with a tremendous pool of blood, to emphasize the cruelty of the Muslim terrorists. In other newspapers the same picture could be seen - with a pool of water, like in the original. Of course the manipulated coloured version of the Blick fit better into the mind of the shocked Swiss population. The question about death penalty arose quickly .... | ||||||||||||||||
|
| ||||||||||||||||