Living in The IT ERA (INFORMATION, CONTROL, AND PRIVACY)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

CHAPTER 4

Information,
Control, and
Privacy

PRESENTERS: TAYAM,SANTOS,TAPAN,AND
ROSOS
Agenda
KEY TOPICS DISCUSSED IN
THIS PRESENTATION

INTRODUCTION TO RESOURCES
INFORMATION RESOURCE
INFORMATION ECONOMICS
INFORMATION OVERLOAD
INFORMATION CONTROL
INFORMATION PRIVACY
Intoduction to Resources
- Organizations treat company assets,
such as buildings, equipment, and
their manpower as important
resources. Resources are the total
means available to a company for
increasing production or profit,
including land, labor, capital, and raw.
Money
Physical Resources
- Usually start from
acquisition and are
then assembled to be Cement
available for use when
needed. They are
tangible and can be
easily identified. Steel
Conceptual Resources Cellphone
Files
- Conceptual resources
are non-tangible and
are considered valuable
for what they represent
rather than their
physical make- up.
E-books
INFORMATION
AS RESOURCE
Information can be simply defined as "facts about
something or someone that are provided or
learned." Facts are considered relevant truths
which have been validated and identified. Data are
considered facts; therefore, processed data are
considered as they are organized in such a way
that they have additional value beyond the value
of the facts themselves.
Overview
1 Expandable 4 Diffusive

2 Compressible 5 Shareble

3 Transportable
EXPANDABLE
Information can be expanded
without compromising its
integrity. In fact, by having
additional information, much
more can be understood from
it.
COMPRESSIBLE
Although expanded
information can give a more
detailed explanation, it may
not always be needed.
Transportable
-Information, especially digital
information, is easily Send Via Email Share Via Facebook
transportable. With the use of the
internet and various technologies,
information can be sent though
any of the following:

Copy Onto Flash Drive Upload on Youtube


DIFFUSIVE
Gossip or rumors tend to
spread easily. Unfortunately,
the same applies to any kind
of information-be it true or
not.
SHARABLE
Since information can be easily spread, it
is considered sharable as well.
Information can be kept calling it a secret
However, once a person decides to tell it
to someone, then he or she will no longer
have control over it.
VALUABLE INFORMATOON
Information is said to be valuable if it has
the following characteristics (Stair &
Reynolds, 2016):

Accurate Relevant Value of Information


Complete Simple Zero marginal cost
Economical Verifiable Non rivalrous
Reliable Accesible Non Exclusive
Flexible Secure No Transparensy
FORMAL INFORMATION VS INFORMAL INFORMATION

FORMAL INFORMATION INFORMAL INFORMATION

It is official and authoritative. It is more casual, and less


It is meant to be taken seriously authoritative.
My
and is presented in a formal It is presented
favorite in a less formal
film
manner. manner
It is usually more carefully prepared It is possibly less reliable.
and verified than informal
information, and its accuracy and
reliability should also be higher
INFORMATION ECONOMICS
Value-based pricing leads to differential pricing in the information
economy, as people have varying values for information. Experience
goods are considered valuable if consumers must experience them to
value them. Marketers use strategies like free samples, promotional
pricing, and testimonials to help consumers learn about new products.
However, information provides value through information about the
asset, not the asset itself. Organizations use strategies like browsing
previews, branding, and reputation to overcome customer reluctance
to purchase information before they know what they are getting.
This tension between providing information and charging for it is a
fundamental problem in the information economy.
) ) ) ) ) ) ) ) )
) ) ) ) ) ) ) ) )
BROWSING PREVIEWS
Movie trailers and iTunes songs both use
browsing previews to provide a glimpse into
the film's content and highlight highlights,
thereby boosting audience interest and
allowing them to decide if the song is worth
the purchase.
BRANDING

Branding is the process of creating a


strong, positive perception of a company,
its products or services in the customer’s
mind by combining such elements as
logo, design, mission statement, and a
consistent theme throughout all
marketing communications.
) ) ) ) ) ) ) ) )
) ) ) ) ) ) ) ) )
REPUTATION

When a movie is announced, people would


often be skeptical if it would be good
enough.
Information Overload
Information overload occurs
when the amount of input to a
system exceeds its processing
capacity.
MOBILE
SOCIAL MEDIA
Mobile social media is the accessing of
social media sites, such as Facebook
and Snapchat, using a mobile device.
The device may have an app installed
to open Instagram, for example, or it
can use a browser installed in the
mobile device to open Twitter.
M-COMMERCE (MOBILE
COMMERCE)
The use of mobile devices has paved the
way for data to be transmitted and received
much faster without compromising security
and scalability. The global trend in using
mobile devices for socializing and doing
commercial transactions is increasing.
Companies are now using digital platforms
to market their products and services.

3
Industries
that are now
Financial Services Mobile Ticketing
embracing
m-commerce
include:

6
Information Services
Service/Retail
Banks have introduced online banking a few years
FINANCIAL back. However, nowadays the majority of bank
transactions such as money transfers bills payment,
SERVICES and even stock portfolios and stock transactions can
now be done using the bank's mobile app.
As payments can be done online, receipts of

MOBILE transactions can also be sent on mobile devices.


Airline companies encourage their customers to book

TICKETING their flights online, after which, their booking


reservation is sent via email or through their mobile
app. The booking ticket can be shown at the airport
and is accepted even as an electronic copy.
As consumers are now able to place and pay for orders using
their mobile devices, the e-commerce trend has shifted from
SERVICE/ desktop computer to mobile devices. And it does not just include
retail items. It also includes content purchasing such as music,
RETAIL movies, and images, among others Another trend seen is the in-
application purchases made by mobile phone users. This is
prevalent in gaming applications in which users buy virtual goods
for power boost or upgrade to the next game level.
These include the delivery of news, stock quotes, sports figures,
emergency reports, and weather and traffic updates to a single
INFORMATION mobile device. Waze is an example of an application that delivers
customized traffic information which is based on a user’s actual travel
SERVICES patterns. It uses geo-location technology to pinpoint the whereabouts
of the user while on the move. Another example of an application
that uses location-based services is Google Maps.
Information Control
comes in the form of keeping secrets
inside a business or selling IPR
(Intellectual Property Rights) to those
prepared to purchase it.
is about allowing those who have
appropriate authority access to and use
of information on the basis of the
authority that they hold.

2
SOFTWARE PIRACY
●¡Idea
Awesome
According
genial!
idea!
to the Software Alliance
(www.bsa.org) (2018) software piracy is
"the unauthorised copying or distributing of
copyrighted software.
● Most software has licences, such as
activation keys, that are normally identified
with just one computer.
DISTRIBUTING SOFTWARE OR BUYING A SINGLE COPY OF A
MOBILE APPS FROM THE SOFTWARE PROGRAM AND
EXAMPLES OF INTERNET AS MANNER THAT INSTALLING IT ON MULTIPLE
SOFTWARE VIOLATES THE LICENSE DEVICES WITHOUT
TERMS. AUTHORIZATION.
PIRACY AS
IDENTIFIED BY
THE
3
SOFTWARE SHARING THE LOGIN
MAKING AND/OR CREDENTIALS (WITHOUT
ALLIANCE: SHARING COPIES OF AUTHORIZATION) USED TO
INSTALLATION CDS. ACCESS A WEB-BASED
SOFTWARE APPLICATION
(SOFTWARE AS A SERVICE).
4 ISSUES WITH FURTHER
COMPLICATE THE PROBLEM ON
INFORMATION CONTROL BY
ADAM THIERER (2011)

01 Convergence 03 Volume

Unprecedented
02 Scale 04 individual
empowerment
INTELLECTUAL PROPERTY
(IP)

● refers to a number of distinct types of


intangible assets for which a set of exclusive
rights are recognized.
● IP includes musical, literary, and artistic works
such as Taylor Swift's new album, J. K. Rowley's
new book, and the latest iPhone.
THE FF. ARE
TECHNIQUES
DESIGNED TO
CONTROL ACCESS 1. Encryption 2.Serial keys
AND
REPRODUCTION OF
ONLINE
INFORMATION

3. Scrambling 4. Tag embedding


ENCRYPTION

● Is the process of converting data or information in such a way that


only authorized parties can understand.
● Its primary purpose is to protect the confidentiality of digital data
stored on computer systems or tramsmitted via the internet or other
computer networks.
SERIAL KEYS

● Also known as the product key or software key, it is a series of


alphanumeric characters acting as a key to denote that the product
or software is original.
● In some cases, product keys are used for product Activation.
● Product key is used to activate the operating system online.
SCRAMBLING

● Is done to hide sensitive information from unauthorized users.


● Is accomplished by a addition of components to the original signal
or the changing of some important components of the original signal
in order to make the extraction of the original signal difficult.
● It is often done with the aid of encryption.
TAG EMBEDDING
● Similar to how pictures can include watermaks to denote
information of the owner of the picture, tag embedding does the
same to information content.
● In terms of data embedded into the actual content, the use of
metadata is included to identify the owners name, author and the
date of purchase among other pertinent information.
PATENT

● Is a set of exclusive rights granted by a


state to an inventor for a limited period of
time in exchange for the public disclosure of
an invention.

Example: Apple ipod


TRADEMARK
● IS A DISTINCTIVE SIGN USED BY AN INDIVIDUAL, BUSINESS ORGANIZATION, OR
OTHER LEGAL ENTITY TO IDENTIFY THE PRODUCTS OR SERVICES TO CONSUMERS.
● RIGHTS IN MARK SHALL BE ACQUIRED THROUGH REGISTRATION MADE VALIDLY
IN ACCORDANCE WITH THE PROVISIONS OF IP CODE.

EXAMPLE IS PAMPANGA'S BEST DELICACIES LOGO.


PROTECTION OF
UNDISCLOSED
INFORMATION
Trade Secret
- Is the term used to any method, formula,
device, process, or any information that
gives the business a unique competitive
advantage over its competition.
- Examples are Coca-Cola, Listerine, and
Kentucky Fried Chicken of KFC.
IPR TERMS OF PROTECTION AND
PENALTIES AS STATED IN R. A. 8293
Do you have
any questions?
Send it to us! We hope you
learned something new.

You might also like