|
Enforcement: Copyright Management and Control Technologies With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of |
|
|
|
Security Measures? The more so-called security measures are taken the more control and the less freedom is granted. Whereas criminals are flexible in their computer work/digital existence, the average person cannot be. So it is her/him who gets punished with an increase of control. Of course security can be in favor of the population as well - and this is the case if cryptography is legal so that everyone has access to it to protect his/her data. This one needs for e-commerce, secure payments and transmission of private data, mostly e-mails or access to websites where one needs a password. E-mails are nothing else than postcards, letters without envelopes. Without encryption they are easy to open, read and trace back, even without knowing the password. Rumors that Echelon works with a list of key-words, controlling any e-mail in the world and reacting to words of that list, led to actions like the Jam Eschelon Day, last time held on October 21st, 1999, to confuse the espionage system. for more information on Jam Eschelon Day see: But the respect for privacy stands for an essential values in democratic societies. So, how can it be regarded a governmental risk? At a conference: "How many people here fear a greater risk from government abuses of power than from criminal activity?" The majority raised their hands, one participant shouted "What's the difference?" (anonymous) If governments really care for the people and want to fight against cybercriminality they should rather support the work on the latest technologies for encryption than to restrict their access. Or even better: they should not intervene at all - to make sure they do not build in any trapdoors. Though it is already too late for discussion like this one as the trapdoors are already part of most of the key-systems. Rumors about PGP and trapdoors do not help the confidence in cryptology. for information about the risks of cryptography see: |
|
|
|
1980s: Artificial Intelligence (AI) - From Lab to Life Following the commercial success of New technologies were being invented in Japan. |
|
|
|
Basics: Infringement and Fair Use The Yet copyright laws also provide that the rights of copyright owners are subject to the doctrine of " - the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes (usually certain types of educational copying are allowed) - the nature of the copyrighted work (mostly originals made for commercial reasons are less protected than their purely artistic counterparts) - the amount and substantiality of the portion used in relation to the copyrighted work as a whole - the effect of the use upon the potential market for or value of the copyrighted work (as a general rule copying may be permitted if it is unlikely to cause economic harm to the original author) Examples of activities that may be excused as fair use include: providing a quotation in a book review; distributing copies of a section of an article in class for educational purposes; and imitating a work for the purpose of parody or social commentary. |
|
|
|
Advertising and the Media System Media systems (especially broadcasting) can be classified in two different types: Public Media Systems: Government control over broadcasting through ownership, regulation, and partial funding of public broadcasting services. Private Media System: Ownership and control lies in the hands of private companies and shareholders. Both systems can exist in various forms, according to the degree of control by governments and private companies, with mixed systems (public and private) as the third main kind. Whereas public media systems are usually at least partially funded by governments, private broadcasting solely relies on advertising revenue. Still also public media systems cannot exclude advertising as a source of revenue. Therefore both types are to a certain degree dependent on money coming in by advertisers. And this implies consequences on the content provided by the media. As the attraction of advertisers becomes critically important, interests of the advertising industry frequently play a dominant role concerning the structure of content and the creation of environments favorable for advertising goods and services within the media becomes more and more common. |
|
|
|
Noam Chomsky Noam Chomsky (* 1928) works as a U.S.-linguist, writer, political activist and journalist. He is teaching at the MIT (= Massachusetts Institute of Technology) as a professor of linguistics, specializing on structural grammar and the change of language through technology and economy - and the social results of that. When he stood up against the Vietnam War he became famous as a "radical leftist". Since then he has been one of the most famous critics of his country. |
|
|
|
The Flesh Machine This is the tile of a book by the |
|
|
|
Roman smoke telegraph network, 150 A.D. The Roman smoke signals network consisted of towers within visible range of each other and had a total length of about 4500 kilometers. It was used for military signaling. For a similar telegraph network in ancient Greece see |
|
|
|
Medieval universities and copying of books The first of the great medieval universities was established at Bologna. At the beginning, universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, |
|
|
|
Archbishop Oscar Arnulfo Romero Archbishop Oscar Arnulfo Romero († 1980) was elected archbishop because he was very conservative. But when he saw how more and more priests and definitely innocent people were murdered, he changed his attitudes and became one of the sharpest critics of the government. He gave shelter to those in danger, never stopped talking against violence and his Sunday sermons on the radio where moments to tell the truth to the Salvadorians, also mentioning the names of the disappeared or killed persons. As Romero got extremely popular and dangerous for the population he was killed by death squads, while reading a sermon. |
|
|
|
Montage Certain elements of two or more photographs can be put together, mixed, and the outcome is a new picture. Like this, people can appear in the same picture, even "sit at the same table" though they have never met in reality. |
|
|
|
World Wide Web (WWW) Probably the most significant Internet service, the World Wide Web is not the essence of the Internet, but a subset of it. It is constituted by documents that are linked together in a way you can switch from one document to another by simply clicking on the link connecting these documents. This is made possible by the Hypertext Mark-up Language (HTML), the authoring language used in creating World Wide Web-based documents. These so-called hypertexts can combine text documents, graphics, videos, sounds, and Especially on the World Wide Web, documents are often retrieved by entering keywords into so-called search engines, sets of programs that fetch documents from as many Among other things that is the reason why the World Wide Web is not simply a very huge database, as is sometimes said, because it lacks consistency. There is virtually almost infinite storage capacity on the Internet, that is true, a capacity, which might become an almost everlasting too, a prospect, which is sometimes According to the Internet domain survey of the |
|
|