771 resultados para Protest Music
Resumo:
Boberach: Freiligrath wird vorgeworfen, die Märzgefallenen zu Unrecht für die Forderungen der Linken in Anspruch zu nehmen. - Welsch (Projektbearbeiter): In Umformung seines Gedichts 'Die Toten an die Lebenden', einem revolutionären Nachruf auf die Berliner Märtyrer des 18./19. März 1848
Resumo:
Boberach: Die Änderungsvorschläge zu den Plänen des Kultusministeriums wie diese selbst verstoßen wegen ihrer Bemühungen um Modernisierung des Lehrplans gegen das Ideal des Gymnasiums, in dem die Beschäftigung mit der klassischen Antike weiterhin im Mittelpunkt stehen muß
Resumo:
Welsch (Projektbearbeiter): Ablehnung einer absoluten Gewerbefreiheit im Interesse des Handwerks. Vorschlag der Bildung von Gewerbekammern sowie von geregelten Ausbildungs- und Prüfungsbedingungen
Resumo:
Welsch (Projektbearbeiter): 74 unterzeichnete Urwähler des 83. Berliner Bezirks vertreten in Reaktion auf ein Flugblatt vom Vortag die Ansicht, daß "eine wahrhafte Verfassung auf der breitesten volksthümlichen Grundlage" bereits existiert und allfällige Veränderungen nur auf dem Wege der Gesetzgebung vorgenommen werden können. Zurückweisung des Vorwurfes, man hätte ausschließlich zur Wahl von Vertretern der "Brandenburg-Fraktion" aufgerufen
Resumo:
Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.
Resumo:
Digital Rights Management Systems (DRMS) are seen by content providers as the appropriate tool to, on the one hand, fight piracy and, on the other hand, monetize their assets. Although these systems claim to be very powerful and include multiple protection technologies, there is a lack of understanding about how such systems are currently being implemented and used by content providers. The aim of this paper is twofold. First, it provides a theoretical basis through which we present shortly the seven core protection technologies of a DRMS. Second, this paper provides empirical evidence that the seven protection technologies outlined in the first section of this paper are the most commonly used technologies. It further evaluates to what extent these technologies are being used within the music and print industry. It concludes that the three main Technologies are encryption, password, and payment systems. However, there are some industry differences: the number of protection technologies used, the requirements for a DRMS, the required investment, or the perceived success of DRMS in fighting piracy.
Resumo:
Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.
Resumo:
This paper scrutinizes the impact of intolerance toward diverse ethnic, religious, and cultural groups on an individuals willingness to actively engage in non-violent protest. Following new insights, we examine the individual as well as the ecological effect of social intolerance on protest behavior. Drawing from insights of social psychology and communication science, we expect that the prevalence of intolerance reinforces the positive effect of individual-level intolerance on protest participation. From a rational choice perspective, however, a negative moderating effect is expected, as the expression of opinions becomes redundant for intolerant individuals in an intolerant society. We base our multilevel analyses on data from the World Values Surveys covering 32 established democracies. Our results reveal that intolerance leads to more non-violent protest participation. This relationship, however, is strongly influenced by the prevalence of intolerance in a country.
Resumo:
In this article, we are interested in the extent to which federalism is able to deal with peripheral protest through shared rule channels. Shared rule as a key dimension of federal states has not thus far received adequate academic attention. Empirically, we analyse the use of all cantonal initiatives in Switzerland over the past 25 years as a particular instrument of shared rule, subsequently focusing on two peripheral regions with successful regionalist parties, Ticino and Geneva. We find that regionalist parties contribute towards radicalizing peripheral demands in search of attention from the centre. This leads to the mainstreaming of peripheral demands by pulling other parties along. We conclude that shared rule properly designed gives even the most peripheral regions a voice in national decisions, but that regionalist parties may also use shared rule instruments to mobilize their electorate at home to fight their non-regionalist competitors.