0% found this document useful (1 vote)
2K views17 pages

Module 4 Information Control and Privacy

The document discusses different types of resources including physical and conceptual resources such as information. It then covers topics around information as a resource including how information is expandable, compressible, transportable, diffusive and sharable. The document also discusses information economics, information overload and issues around information control and privacy.

Uploaded by

Junice Ilagan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
2K views17 pages

Module 4 Information Control and Privacy

The document discusses different types of resources including physical and conceptual resources such as information. It then covers topics around information as a resource including how information is expandable, compressible, transportable, diffusive and sharable. The document also discusses information economics, information overload and issues around information control and privacy.

Uploaded by

Junice Ilagan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

GEC 9: LIVING IN

THE IT ERA

CHAPTER 4:
INFORMATION, CONTROL,
AND PRIVACY
CHAPTER CONTENTS
01 Introduction to Resources
Physical Resources, Conceptual Resources

02 Information as a Resource
Expandable, Compressible, Transportable, Diffusive, Sharable

03 Information Economics
Browsing Previews, Branding, Reputation

04 Information Overload
Mobile Social Media, Mobile Commerce
CHAPTER CONTENTS
05 Information Control
Software Piracy, Intellectual Property, Copyright, DRM, Patent, Trademark

06 Information Privacy
Data Privacy Act 10173

Tasks
IndividualActivity, Group Activity
INTRODUCTION INTRODUCTION
TO RESOURCES TO RESOURCES
CONCEPTUAL
PHYSICAL
RESOURCES
RESOURCES
These are non-tangible and
Without resources, are considered valuable for
organizations would what they represent rather
cease to exist. Imagine a than their physical make-up.
bank w/o money, a
manufacturing plant w/o Human resources – while
forklifts, or a school w/o everyone can be considered
teachers. employees in a company,
their skills, knowledge, and
They are tangible and job experience set them
apart from one another, thus,
can be easily identified. It
identifying the staff,
usually start from
managers, executives, and
acquisition and are then laborers.
assembled to be
available for use when Money – for its monetary
needed. value
INTRODUCTION TO RESOURCES

CONCEPTUAL AND PHYSICAL RESOURCES


The pictures, videos, and contact list saved in the phone are considered conceptual
resources while the smartphone is the physical resource (managing the conceptual
resources).

The conceptual resources identified are called information.

Information can be simply defined as “facts about something or someone that are
provided or learned.”

Facts are considered relevant truths which have been validated and identified.
INFORMATION AS A RESOURCE
Information, Control and Privacy

EXPANDABLE COMPRESSIBLE TRANSPORTABLE

Knowing someone’s News’ one-liner headlines Information such as


name. either on TV, news sites, digital information are
or newspaper. easy to be transported.

DIFFUSIVE SHARABLE SECRET

Gossip or rumors tend to Spreading information There are information


spread easily, whether it’s are considered sharable. that can still be
true or not. considered secret though
it was shared.
VALUABLE INFORMATION
Information as a Resource

FLEXIBLE information can


be used for different
purposes.

RELEVANT information is
important to a decision-
maker.
ACCURATE COMPLETE ECONOMICAL RELIABLE

SIMPLE information must


not be overly complex
and/or such detailed
information.

COMPLEX information may


sometimes lead to
confusion w/c could result TIMELY VERIFIABLE ACCESSIBLE SECURE
to inaccuracy of details.
VALUE OF
INFORMATION
Valuable information helps managers make
good decisions which is why valuable or
useful information is called knowledge.

Information, as a resource, has four


characteristics, namely (1) has zero-
marginal cost; (2) is non-rivalrous; (3) is
non-exclusive; and (4) does not exhibit high
degrees of transparency.
INFORMATION ECONOMICS
Information, Control, and Privacy

BROWSING BRANDING REPUTATION


PREVIEWS Big names such as Directors’ such as
Movie trailers, 1-3 APPLE and Michael Bay for
minutes of glimpse. MICROSOFT have no Transformer; Steven
Music downloaded w/ issues when it comes to Spielberg for Titanic,
15 seconds preview. product launching. Jurassic Park, etc.
INFORMATION OVERLOAD
Information, Control, and Privacy

2018 GLOBAL DIGITAL SUITE of reports from We Are Social


and Hootsuite:
Easy duplication
and transition of 1. More than half the world now uses the internet (up to 7% year-
information on-year)
2. For 3 years in a row, Filipinos have been spending the greatest
amount of time on social media with an average of 4 hours a
Increase in
day.
communication 3. More than 2/3s of the world’s population now has a mobile
methods phone, with most people now using smartphones.
4. More than half of the world’s web traffic now comes from
mobile phones.
Growth archives 5. More than one in five of the world’s population shopped online
of historical in the past 30 days.
information
MOBILE SOCIAL MEDIA AND MOBILE COMMERCE

Mobile social media


is the accessing of
social media sites,
using a mobile device.

Mobile has grown so


fast that it’s now the
leading digital platform.

Mobile commerce
such as financial
services, mobile
ticketing, service/retail,
and information
services.
INFORMATION CONTROL
Information, Control, and Privacy

SOFTWARE PIRACY
01 Pirated DVD and Torrent downloaded file(s)

INFORMATION CONTROL ISSUES


-40 02 Convergence, Scale, Volume, Unprecedented Individual
Empowerment

INTELLECTUAL PROPERTY RIGHT


Refers to a number of distinct types of intangible assets
03 for w/c a set of exclusive rights are recognized such as
trademarks, copyright, designs, etc.

DIGITAL RIGHTS MANAGEMENT


04 Is used to describe the processes by which the author or
publisher of a work exerts his or her rights to control what
the purchaser of the work is entitled to do.
DIGITAL RIGHTS MANAGEMENT
Techniques designed to control access and reproduction of online information

ENCRYPTION is the process of converting


data or information in such a way that only
authorized parties can understand.

SERIAL KEYS SCRAMBLING TAG EMBEDDING


Known also as product key, Is done to hide sensitive Similar to how pictures can
a series of alphanumeric information from include watermarks to
characters acting as a key unauthorized users. denote information on the
to denote that the product or owner of the picture, it does
software is original. the same to information
content.
INFORMATION CONTROL
Information, Control, and Privacy

Another example on how information


will be controlled.

PROTECTION OF
UNDISCLOSED
INFORMATION
TRADEMARK Such as trade secrets,
companies require employees
A distinctive sign used by an
to sign contracts with non-
individual, business
disclosure agreements (NDAs)
organization, or other legal
PATENT entity to identify the products or
to protect these industry
A set of exclusive rights granted secrets.
services to consumers.
by a state to an inventor for a
limited period of time in exchange IPR terms of protection and
for the public disclosure of an penalties as stated in R.A.
invention. 8293 (see book page 139).
INFORMATION PRIVACY
Information, Control, and Privacy

IP ADDRESS COOKIE COOKIE cont… TRUSTED WEBSITE


Knowing a person’s IP A small file that is It contains addresses of Yahoo is considered as
address can help stored in computer’s websites visited, login one, that will never
identify that person’s directory, often a credentials, and even compromise their
physical location temporary folder. credit card information. privacy.
anywhere in the world.
DATA PRIVACY ACT 10173
Was also known as Data Privacy Act 2012 signed by Pres. Benigno Aquino III last August 15, 2012.
The law defines the following as sensitive personal information.

About an individual’s Issued by government


race, ethnic origin, agencies unique to an
marital status, age, individual, such as SSS
color, and religious, number, passport
philosophical, or number, etc.
political affiliations.

About an individual’s Marked as classified by


health, education, an Executive Order or
genetic or sexual life of an act of Congress.
a person, or to any
proceeding or any Help officers and
offense committed or agencies of the
alleged to have executive branch
committed. managed by
government.
THANK YOU
CHAPTER 4: Information, Control, and Privacy

Common questions

Powered by AI

Information privacy, intellectual property rights (IPR), and digital rights management (DRM) are interrelated in their focus on controlling access to and distribution of sensitive information. Information privacy seeks to protect individuals' data from unauthorized access and misuse, aligning with IPR's goal of safeguarding intangible assets such as trademarks and copyrights through exclusive rights. DRM supports these efforts by employing technology to reinforce the control of intellectual property, restricting copying and sharing of proprietary content without permission, thus ensuring both creators' control and user privacy are maintained .

The control of information is challenged by the growth of social media and online platforms through increased difficulty in managing the accuracy, spread, and security of information. Social media facilitates rapid dissemination of both accurate and misleading information, complicating efforts to verify facts and control narratives. Additionally, the vast data collected by these platforms poses privacy risks, making it challenging to ensure compliance with regulatory standards. The decentralized nature of online platforms complicates enforcement of intellectual property rights and digital rights management, as users globally can easily share and modify content without authorization .

The non-rivalrous and non-exclusive characteristics of information influence mobile commerce strategies by allowing companies to scale their services and reach more users with minimal additional cost. Since digital information can be reproduced and shared infinitely without diminishing in quality, mobile commerce can offer a wide range of services and content globally, enhancing market penetration and customer engagement. Businesses can leverage these traits to innovate their offerings, personalize user experiences, and optimize resources, while retaining flexibility in pricing models to attract and retain diverse customer bases .

Mobile social media and mobile commerce exemplify the characteristics of information by showcasing zero marginal cost, non-rivalrousness, non-exclusiveness, and varying degrees of transparency. These platforms allow vast amounts of data to be shared instantly, often at no additional cost per user, demonstrating zero marginal cost. They are non-rivalrous as the use of digital information by one person does not prevent others from using the same information. These platforms are generally non-exclusive since many mobile applications allow free access with optional paid features. Finally, they can exhibit varying transparency as some aspects are clear to users, while others, such as data privacy implications, may not be immediately visible .

The proliferation of mobile devices contributes to information overload by exponentially increasing the volume and speed of data generation and sharing. With more than half of all web traffic now coming from mobiles, and with widespread social media usage, individuals are constantly bombarded with vast amounts of information, making it difficult to filter and prioritize relevant data. For organizations, this trend necessitates adopting strategies to manage and analyze data efficiently, ensuring critical information remains accessible and actionable. Failure to manage information overload can lead to decision-making difficulties and decreased productivity as both individuals and entities struggle to cope with the constant influx of data .

Distinguishing between physical and conceptual resources is significant because it helps organizations efficiently manage and allocate their assets. Physical resources, such as equipment and facilities, are tangible and require maintenance and space. Conceptual resources, including information and human capital, represent non-tangible assets that are crucial for innovation and strategic planning. Understanding the nature and value of these resources allows organizations to balance their investments, optimize their operations, and remain competitive by leveraging the strengths of both types of resources effectively .

Encryption is critical for information control and privacy as it protects sensitive data from unauthorized access by converting it into a code that can only be deciphered with the correct key. This safeguards personal and corporate information from breaches and ensures compliance with privacy regulations. Encryption ties closely to digital rights management, where it is used to secure digital content, ensuring only authorized users can access and use digital products as intended by content creators. By preventing unauthorized copying and distribution, both encryption and DRM help maintain the integrity and economic value of digital intellectual property .

To comply with the Data Privacy Act of 2012, organizations should adopt practices such as implementing data protection protocols, conducting regular privacy impact assessments, and fostering a culture of security awareness among employees. They must ensure transparency by informing individuals how their data is used, obtain explicit consent for data collection, and provide mechanisms for individuals to access, correct, and delete their data. Additionally, organizations should appoint data protection officers and continuously update security measures to protect sensitive personal information from unauthorized access and comply with legal and regulatory requirements .

The concepts of compressibility and transportability enhance the sharing and utilization of information in the IT era by enabling efficient data storage and rapid transmission across vast networks. Compressibility allows large volumes of data to be reduced in size, facilitating faster processing and reduced storage costs. Transportability ensures data can be easily moved and accessed across different devices and locations. These attributes support the seamless flow of information critical to real-time communication, cloud computing, and global collaboration, driving innovation and operational efficiencies in the information technology landscape .

Reputation plays a pivotal role in branding and information economics on digital platforms by influencing consumer trust and decision-making. A strong reputation can enhance brand value and customer loyalty, which is especially crucial in digital environments where users rely heavily on reviews and ratings. Reputable brands can more effectively capitalize on the non-rivalrous and non-exclusive nature of information, as their established trust simplifies market entry and expansion. Consequently, reputation underpins competitive advantage and influences economic outcomes by dictating user engagement, retention, and revenue generation strategies on digital platforms .

You might also like