Economic structure; transparent customers
Following the dynamics of informatised economies, the consumption habits and lifestyles if customers are of great interest. New technologies make it possible to store and combine collected data of an enormous amount of people.
User profiling helps companies understand what potential customers might want. Often enough, such data collecting takes place without the customer's knowledge and amounts to spying.
"Much of the information collection that occurs on the Internet is invisible to the consumer, which raises serious questions of fairness and informed consent."
(David Sobel, Electronic Privacy Information Center)
|
TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611726/100438658925
|
| |
Legal Protection: European Union
Within the EU's goal of establishing a European single market also intellectual property rights are of significance. Therefore the European Commission aims at the harmonization of the respective national laws of the EU member states and for a generally more effective protection of intellectual property on an international level. Over the years it has adopted a variety of Conventions and Directives concerned with different aspects of the protection of industrial property as well as copyright and neighboring rights.
An overview of EU activities relating to intellectual property protection is available on the website of the European Commission (DG Internal Market): http://www.europa.eu.int/comm/internal_market/en/intprop/intprop/index.htm
|
TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659574
|
| |
Timeline BC
~ 1900 BC: Egyptian writers use non-standard Hieroglyphs in inscriptions of a royal tomb; supposedly this is not the first but the first documented example of written cryptography
1500 an enciphered formula for the production of pottery is done in Mesopotamia
parts of the Hebrew writing of Jeremiah's words are written down in " atbash", which is nothing else than a reverse alphabet and one of the first famous methods of enciphering
4th century Aeneas Tacticus invents a form of beacons, by introducing a sort of water-clock
487 the Spartans introduce the so called " skytale" for sending short secret messages to and from the battle field
170 Polybius develops a system to convert letters into numerical characters, an invention called the Polybius Chequerboard.
50-60 Julius Caesar develops an enciphering method, later called the Caesar Cipher, shifting each letter of the alphabet an amount which is fixed before. Like atbash this is a monoalphabetic substitution.
|
TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438659084
|
| |
Martin Hellman
Martin Hellman was Whitfield Diffie's collegue in creating pubylic key cryptography in the 1970s.
|
INDEXCARD, 1/3
|
| |
New World Order
http://www.douzzer.ai.mit.edu:8080/conspiracy...
http://www.geocities.com/CapitolHill/Lobby/18...
|
INDEXCARD, 2/3
|
| |
Ku Klux Klan
The Ku Klux Klan has a long history of violence. It emerged out of the resentment and hatred many white Southerners. Black Americans are not considered human beings. While the menace of the KKK has peaked and waned over the years, it has never vanished.
|
INDEXCARD, 3/3
|
| |