0% found this document useful (0 votes)
14 views10 pages

Information and Control Privacy g3 Reviewer

The document discusses the importance of information as a resource, highlighting its unique properties and characteristics that determine its value, such as accuracy, completeness, and security. It also addresses the challenges of information control and privacy, particularly in the context of software piracy and intellectual property rights. Additionally, it outlines the Data Privacy Act in the Philippines, which aims to protect individuals from data misuse and defines sensitive personal information.

Uploaded by

hannabebceez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views10 pages

Information and Control Privacy g3 Reviewer

The document discusses the importance of information as a resource, highlighting its unique properties and characteristics that determine its value, such as accuracy, completeness, and security. It also addresses the challenges of information control and privacy, particularly in the context of software piracy and intellectual property rights. Additionally, it outlines the Data Privacy Act in the Philippines, which aims to protect individuals from data misuse and defines sensitive personal information.

Uploaded by

hannabebceez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

INFORMATION AND CONTROL PRIVACY

INTRODUCTION TO RESOURCES
Organizations rely on resources such as land, labor,
capital, and raw materials to operate efficiently.
Physical resources (e.g., buildings, equipment,
materials) are tangible and essential for business
operations.

Figure4.1 A building construction site

CONCEPTUAL RESOURCES

These are intangible resources like money, skills, and


knowledge.
Conceptual resources help manage physical resources, such
as computers storing valuable information.

Figure4.2 Philippine peso bills representing monetary values

INFORMATION AS A RESOURCE

Information consists of validated facts and processed data.

It has unique properties:

EXPANDABLE

Can be increased without losing integrity.

COMPRESSIBLE

Can be summarized without losing meaning.

TRANSPORTABLE

Can be shared via email, social media, or storage devices.

DIFFUSIVE

Can spread easily, just like gossip, whether true or not.

SHARABLE
Once shared, control over it is lost, though some secrets can still be protected.

VALUABLE INFORMATION
Let us say your professor assigns you to research on the different parts of a computer system.
You plan to look for information online through search engines such as Google. How can you
tell if the information you get is useful, or in this case, valuable for your research?
Information is said to be valuable if it has the following characteristics (Stair & Reynolds,
2016):

ACCURATE
Accurate information is error-free. In some cases,
inaccurate information is generated because inaccurate
data was processed. Analysts call this as "garbage-
ingarbage-out." By typing "parts of a computer" in the
search bar, Google gives you a list of several websites
which contain the information you are looking for.
However, how do you determine which are accurate
and which are inaccurate? Usually, it is better to trust
sites that are formal in nature rather than informal ones such as blogs or forums.
Information, Control, and Privacy Formal information for your research work could come from
technical websites as well as academic websites. Pieces of informal information can still be
considered accurate as long as they provide enough reference and the data can later be verified
from the said reference. Bits of informal information include those from blogs, wikis, social
sites, and public forums. Nowadays, the use of wikis has become a norm when it comes to
information research. The most popular wiki today is Wikipedia.org. The question, however, is:
How accurate is the content in Wikipedia.org?

COMPLETE
Complete information contains all the important facts. This is especially important in the field of
medicine. Missing information could spell disaster, or worse, lead to death. If the information
regarding allergies has been left out, doctors might inadvertently give wrong medication that
could cause severe allergic reactions to the patient.

ECONOMICAL
Information should be relatively economical to produce. Decision-makers must always balance
the value of information with the cost of producing it. With the spread of the internet,
information dissemination has become easier, faster, and a lot cheaper. However, is the price
worth it for the integrity of the information?

RELIABLE
Reliable information can be depended on. In many cases, the reliability of information depends
on the validity of the data collection method. In other cases, reliability depends on the source of
information, which brings us back to valuable information being economical. Torrent sites offer
pirated software, music, and movies for free. However, the resolution of the movie downloaded,
for example, might not be clear and Living in the Information Technology Era might even
contain malware and virus that could infect the computer system.
FLEXIBLE
Flexible information can be used for different purposes. Depending on the situation, personal
information can be used for a variety of ways. A school ID can be used to enter the school
premises. The same ID can be used to transact business with the registrar's office during
enrolment. It can be used to open a bank account or to apply for a student driver's permit.

RELEVANT
Relevant information is important to the decision-maker. For example, your assignment calls for
searching "parts of a computer" online. You do not visit sites that tackle "parts of the human
body" because they are irrelevant to your research topic.

SIMPLE
Information should also be simple, not overly complex. Sophisticated and detailed information
may not be needed. Complex information may sometimes lead to confusion which could result
in inaccuracy of details.

TIMELY
Timely information is delivered when it is needed. This is true in the case of weather predictions,
stock market forecast, and traffic management.

VERIFIALE
This means that information can be checked for correctness and authenticity. Most authors
include references, bibliography, or citations in their works to enable readers to verify the
content.

ACCESSIBLE
Information should be easily accessible by authorized users to be obtained in the right format at
the right time to meet their needs. In Korea, the U.S ., the U.K ., and China, a mobile phone can
be used to pay for day-to-day transactions. A mobile pay app can be downloaded on the
smartphone in which the user's credit card or debit card is enrolled. Samsung Pay, Apple Pay,
and Google Pay all use near-field communications (NFC) technology so instead of swiping the
physical card for payment, the mobile phone is simply tapped on the card reader or terminal and
payment is immediately recorded (Savvides, 2017).

SECURE
Information should be secure from access by unauthorized users. Mobile pay systems such as
Samsung Pay and Apple Pay use biometric authentication, typically a fingerprint scan, before a
transaction is made. This ensures that only the owner of the phone can use the app for payments.

VALUE OF INFORMATION
Like physical resources, information has a lifecycle, starting from raw data and being processed
into valuable insights (e.g., weather forecasting, academic records).

CHARACTERISTICS OF INFORMATION
ZERO-MARGINAL COST
Producing the first copy of an information good is expensive, but reproducing additional copies
is minimal, as seen in the $250 million production cost of Avengers: Age of Ultron versus its $20
DVD price.
NON-RIVALROUS
Information goods can be consumed simultaneously by multiple users, such as movies available
through DVDs, online streaming, and digital downloads.

NON-EXCLUSIVE
While exclusion can be enforced, information is easily shared once known, as seen in emails,
SMS, and social media, where content can be forwarded or shared effortlessly.

NO TRANSPARENCY
Evaluating information requires investment in learning, such as programmers undergoing
training to acquire new skills, which demands time, effort, and cost.

INFORMATION ECONOMICS

Information has different values for different people, leading to value-based pricing.
Some goods, like movies or food, allow users to experience them before purchase, but
information is different—once consumed, it can't be unlearned.
Organizations use strategies like previews, branding, and reputation to convince people to pay
for information.

MARKETING STRATEGIES FOR INFORMATION

BROWSING PREVIEWS

(e.g., movie trailers, song previews) help consumers decide.

BRANDING builds trust, as seen with companies like

Microsoft and Apple.

REPUTATION

e.g., director Michael Bay's name adds credibility to a movie.

INFORMATION OVERLOAD

INFORMATION IS NOW PRODUCED AND SHARED RAPIDLY DUE TO:

EASY DUPLICATION AND TRANSMISSION OF INFORMATION


A single photo can be shared across multiple platforms like Facebook,
Instagram, and Twitter simultaneously.

INCREASE IN COMMUNICATION METHODS


Smartphones enable calls, texts, emails, and messaging through apps like
Viber and Messenger.

Figure4.3 Messaging apps: Messenger and Viber


INFORMATION OVERLOAD
INFORMATION IS NOW PRODUCED AND SHARED RAPIDLY DUE TO:
GROWTH ARCHIVES OF HISTORICAL INFORMATION
Physical copies are replaced by digital ones stored in cloud
servers, making vast resources like e-books and e-journals
easily accessible.

GLOBAL DIGITAL TRENDS (2018):


More than half of the world's population uses the internet.
Qatar and the UAE have the highest internet penetration (99%).
The Philippines ranks highest for time spent on social media
(about 4 hours daily).
Mobile devices dominate internet usage, with over 60% of mobile connections using
broadband.

DIGITAL GROWTH IN 2018


In 2018, digital information grew rapidly due
to the expanding internet and advancements in
mobile technology. Social media, led by
Facebook with over 2 billion
users, significantly impacted internet usage.
Despite having one of the slowest fixed
internet speeds (4.2 Mbps vs. the global
average of 6.3 Mbps), the Philippines had fast
mobile internet
(13.9 Mbps).
Figure4.5 Digital around the world in 2018

MOBILE SOCIAL MEDIA AND MOBILE COMMERCE

The rise of mobile devices has changed how people manage daily activities and conduct
business.
The shift from brick-and-mortar stores to online operations, known as e-commerce, allows
consumers to shop without needing a computer.

MOBILE SOCIAL MEDIA


Mobile social media enables access to platforms like Facebook, Snapchat, and Instagram through
mobile devices.
A study shows that 80% of individuals browse social media on their phones, with mobile being
the dominant digital platform.

M-COMMERCE (MOBILE COMMERCE)

Defined by Kevin Duffey in 1997 as the use of wireless technology for e-commerce.
1. FINANCIAL SERVICES

mobile banking, bill payments, stock trading

2. MOBILE TICKETING

airline ticket bookings, digital receipts

3. RETAIL & SERVICES

online shopping, in-app purchases for digital content like music, movies, and games

4. INFORMATION SERVICES
provide news, stock quotes, sports updates, emergency alerts, weather, and traffic reports to
mobile devices.

INFORMATION CONTROL
Information control is crucial for protecting data from illegal use, especially in commerce,
industry, and copyright management. It involves safeguarding business secrets and regulating the
sale of intellectual property rights (IPR) to authorized buyers.
Information control ensures that only authorized individuals can access and use specific data
based on their level of authority. This is necessary because information is non-rivalrous and
nonexclusive, meaning it can be easily shared. For example, movies are available in multiple
formats like DVDs and MP4s, raising concerns about unauthorized distribution. Proper control
measures help prevent illegal sharing and misuse.

SOFTWARE PIRACY
Software piracy occurs when unauthorized copies of digital content are distributed. For example,
instead of paying to watch a new movie in theaters, someone might buy a pirated DVD from a
marketplace. These copies are often low quality, recorded with a camera inside the cinema,
capturing audience noises and movements that disrupt the viewing experience.
Software piracy involves the unauthorized copying, sharing, or distribution of copyrighted
software. For example, someone might download a torrent hoping for a better-quality movie but
end up with the same pirated version. According to The Software Alliance (2018), piracy
includes distributing software illegally, installing a single-license program on multiple devices,
copying installation CDs, and sharing unauthorized login credentials. Purchasing software or a
movie does not grant ownership of the content itself but rather a license for personal use.
Therefore, making copies or distributing it without permission is illegal.
Controlling information is challenging despite measures like DVD region codes. Adam Thierer
(2011) identified four key issues that complicate this: convergence, scale, volume, and the rise of
user-generated content, which increases individual access and distribution.

1. CONVERGENCE
Technological advancements and social media have changed how media content is distributed.
Previously sold as CDs, music is now accessible through multiple platforms like Spotify, which
allows streaming and downloads for a fee. This convergence of devices and networks
complicates information control (Thierer, 2011). For example, apps like Video FX let users
create videos with music and share them online, raising concerns about unauthorized use of
copyrighted content.
2. SCALE
Fans of Japanese anime and Korean dramas rely on English subtitles, which were once delayed
for days but are now available within hours due to fast internet and tools like Google Translate.
This easy access to content worldwide raises copyright concerns. While some countries impose
online restrictions, Thierer (2011) notes that the vast scale of digital content makes information
control difficult.

3. VOLUME
News agencies like Manila Bulletin and The Philippine Star, along with broadcasters like
ABSCBN and GMA7, provide content in print, online, radio, and TV. The growing volume of
media and global communication makes government regulation of information increasingly
difficult.

4. UNPRECEDENTED INDIVIDUAL EMPOWERMENT


Social media platforms and blogs allow individuals to share content freely, making restriction
difficult unless reported. To address this, organizations like The Software Alliance, Microsoft,
IBM, and governments collaborate to combat software piracy by establishing intellectual
property rights, treating digital content like physical assets.

INTELLECTUAL PROPERTY (IP)


Intellectual property (IP) refers to intangible assets with exclusive rights, including musical,
literary, and artistic works (e.g., Taylor Swift’s album, J.K. Rowling’s book) as well as words,
phrases, symbols, and designs.

IP is any creation or product of the human mind and may be expressed in the form of original
ideas, expressions, and processes. Intellectual property rights (IPR) are the rights given to
persons over their creations. They usually give the creator an exclusive right over the use of his
or her creation for a certain period of time. According to the Intellectual Property Code of the
Philippines (Republic Act No. 8293 s. 1998), IPR consists of the following:

1. Copyright and related rights

2. Trademarks and service marks

3. Geographic indications

4. Industrial design

5. Patents

6. Layout designs (topographies) of Integrated Circuits (ICs)

7.Protection of undisclosed information

COPYRIGHT AND RELATED RIGHTS


Copyright gives creators exclusive rights to use and share their original works, such as books,
music, art, and software, for a limited time. It also protects digital content. In the Philippines,
copyrighted works are recorded at the National Library or Supreme Court Library (R.A. 10372,
2013).

DIGITAL RIGHTS MANAGEMENT


Digital Rights Management (DRM) uses technology to control and protect digital works from
unauthorized copying, printing, or sharing, especially with the rise of easy digital copying and
file sharing through P2P and torrent sites.
THE FOLLOWING ARE TECHNIQUES DESIGNED TO CONTROL ACCESS AND
REPRODUCTION OF ONLINE INFORMATION:

1. ENCRYPTION

Converts data into a secure format so only authorized users can access it.

DRM SYSTEMS

Restrict access to digital content to prevent unauthorized copying.

2. SERIAL KEYS

Unique alphanumeric codes verify software authenticity.

3. SCRAMBLING

Alters digital signals to prevent unauthorized access, often used with encryption.

4. TAG EMBEDDING

Similar to watermarks, it embeds ownership information into digital content.

PATENTS
Grant exclusive rights to inventors for a limited time in exchange for public disclosure (e.g., Apple’s iPod
design).

Figure4.7 Apple’s IPod

TRADEMARKS
Distinctive signs identifying products or services, ensuring authenticity and origin (e.g.,
Pampanga’s Best).

PROTECTION OF UNDISCLOSED INFORMATION


refers to safeguarding trade secrets methods, formulas,
processes, or information that give businesses a competitive
edge. Companies use non-disclosure agreements (NDAs) to
protect these secrets, such as Coca-Cola’s formula and KFC’s
recipe.
INFORMATION PRIVACY
Data is naturally prone to being copied, stored, and
transmitted, requiring vigilance for protection.
Social media platforms like Facebook and Twitter allow
users to share personal information, but this raises
concerns about privacy.
Yahoo’s privacy policy (now part of Oath) collects
device-specific data such as IP addresses, browser
versions, and mobile network details.
Cookies store login credentials and website data, which
can be a security risk, especially on public computers.

DATA PRIVACY ACT 10173 (PHILIPPINES)

Enacted to protect individuals from data misuse.

Addresses concerns about data being made available online and possible malicious use.
To protect citizens' privacy, Republic Act No. 10173 (Data Privacy Act of 2012) was signed into
law by President Benigno Aquino III on August 15, 2012.

THE LAW DEFINES SENSITIVE PERSONAL INFORMATION AS BEING:

• about an individual's race, ethnic origin, marital status, age, color, and religious,
philosophical, or political affiliations;

• about an individual's health, education, genetic or sexual life of a person, or to any


proceeding or any offense committed or alleged to have committed;

• issued by government agencies "peculiar" (unique) to an individual, such as social security


number; and

• marked as classified by an Executive Order or an act of Congress.

ALL PROCESSING OF SENSITIVE AND PERSONAL INFORMATION IS


PROHIBITED EXCEPT IN CERTAIN CIRCUMSTANCES. THE EXCEPTIONS ARE:

• consent of the data subject;

• pursuant to law that does not require consent; necessity to protect the life and health of a
person;

• necessity for medical treatment; and

• necessity to protect the lawful rights of data subjects in court proceedings, legal proceedings,
or regulation.
• The Data Privacy Act of 2012 defines a "security incident" as any event that affects data
protection, while a "personal data breach" involves actual unauthorized access, loss, or
disclosure of personal data.

You might also like