You are on page 1of 9

MODULE III: INFORMATION AS RESOURCE WITH CONTROL AND PRIVACY

Lesson 1 Information as Resource and Commodity


Information is a resource - whether intangible or tangible.
Other organizational resources, information is considered:
Expandable - is a Information can be expanded without compromising its integrity.
Compressible - Although expanded information can give a more detailed explanation, it may not always
be needed. Data is also compressed to be compatible with other resources.
Transportable - is easily transportable. Information can be sent through but not limited to any of the
following:
1. Send via email 2. Share via Facebook
3. Copy onto a flash drive 4. Upload on Youtube
Diffusive - is a Gossip or rumors tend to spread easily.
Shareable - information can be easily spread, it is considered sharable as well.

Information is said to be valuable if it has the following characteristics


(Stair & Reynolds, 2016).
Accurate is error-free. In some cases, inaccurate information is generated because inaccurate data was
processed.
Timely is the accuracy of information changes over time. What is true today may not be true tomorrow.
Information must then be timely, which means that it must be kept updated.
Complete information contains all the important facts. This is especially important in the field of medicine.
Economical is relatively economical to produce. There must be a balance between the value of
information and the cost of producing it.
Reliable can be depended on. In many cases, the reliability of information depends on the validity of the
data collection method or the source of the data.
Secured is the integrity of your information and must be kept safe from unwanted access. Most of us
today have already put various information online that carry our identity, actions, relations, and/or privacy.

Information Economics
Economics is defined as the study of how society uses its limited resources.
Information or information systems have the power to affect the economy and economic decisions. It has
an economic value because of its potency in influencing decisions.
Information is being sold as goods which is what we call information goods.
information is unlimited in its nature, there is no marginal cost in producing these goods, which means
that the cost does not increase as you produce more of the same information.
Non-rivalrous, which means that there is no rivalry in consumption.

Organizations and businesses use various strategies:


1. Browsing previews is an example of this strategy in movie trailers.
2. Branding is a Big names sure as Microsoft and Apple have no issues when it comes
to launching new products as people have already established their trust
on these brands.
3. Reputation is when a movie is announced, people would often be skeptical if it would be good enough.

Information Overload
Information is produced at rapidly-increasing rates due to the following
reasons:
1. Easy duplication and transmission of information.
2. Increase in communication methods.
3. Growth archives of historical information (old files or information
were never deleted)

Mobile Social Media and Mobile Commerce


New scenarios in Communication:
• Mobile Social Media is accessing social networking sites using mobile devices, such as Facebook and
Snapchat, using a mobile device.
• Mobile Commerce / M-Commerce is the delivery of electronic commerce capabilities directly into the
consumer’s hand, anywhere, via wireless Technology.

Industries that are now embracing m-commerce include:


1. Financial Services- banks have introduced online banking a few years back. Some examples are
Gcash, PayMaya, PayPal, etc.
2. Mobile Ticketing- as payments can be done online, receipts of transactions can also be sent on mobile
devices.
3. Service/ Retail- as consumers are now able to place and pay for orders using their mobile devices. Ex.
Lazada and Shopee.
4. Information Services- these include the delivery of news, stocks quotes, sports figures,
emergency reports, device.

Lesson 2: Online Security, Privacy Threats and Practices


Information security is a broad term in the sense that it can encompass the protection of the information
from accidental or intentional misuse by persons inside or outside an organization.
Hackers are defined people who use Information Technology in unconventional or unusual way. As a
threat, hackers are labeled as bad people with bad intentions.
Types of hackers:
• Black-hat hackers break into other people’s computer systems and may just look around or may steal
and destroy information.
• Crackers have criminal intent when hacking.
• Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the
Internet as a weapon of mass destruction.
• Hacktivists have philosophical and political reasons for breaking into systems and will often deface the
website as a protest. They usually hack into government websites.
• Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into
systems to cause damage or spread viruses.
• White-hat hackers work at the request of the system owners to find system vulnerabilities and plug the
holes. Sometimes they are given other titles such as penetration testers and ethical hackers.

Malware and Virus


- One of the most common forms of computer vulnerabilities is a virus.
• Malware (malicious software) is a software that is intended to damage or disable computers and
computer systems.
• A virus is software written with malicious intent to cause annoyance or damage. Some hackers create
and leave viruses, causing massive computer damage.
• A worm spreads itself not only from file to file but also from computer to computer.
• Adware is not actually a virus, because it serves as an outlet for advertising, However, it allows
internet advertisers to annoyingly display ads without the consent of the user.
• Spyware programs collect specific data about the user, ranging from general demographics such as
name, address, and browsing habits, to credit card numbers, Social Security numbers, and usernames
and passwords.
• Ransomware is a form of malicious software that infects your computer and asks for money, hence, the
word “ransom”.
• Trojan horse are malicious programs that are built (usually without the manufacturer / programmer
knowing) into legitimate applications.

Hacker Weapons: Types of Online Security Threats


1. Phishing. This method is a trick used by criminals to deceive you into revealing personal information,
passwords, and other credentials.
2. Pharming. It is a method that cybercriminals might use to improve their odds of tricking online users
with phishing websites. Pharming doesn’t rely so much on fake messages.
3. Application Vulnerabilities are usually bugs/glitch and errors found in the code of a specific program
which can be taken advantage of by cybercriminals or hackers to access and steal user data.
4. Scams have been preying on people before the Internet was a thing.
Methods of scam
• Ponzi schemes • Pyramid schemes • Catfishing (Fake Profiles)
5. Man-in-the-Middle Attack (MITM) attacks involve a cybercriminal intercepting or altering
communications between two parties.
6. Spamming can be defined as the mass distribution of unsolicited messages on the
Internet.
7. WiFi Eavesdropping normally takes place on unsecured WiFi networks (usually the free ones you see
in public), and it involves cybercriminals taking advantage of the lack of encryption to spy on your online
connections and communications.
8. Social Engineering is a Hackers don’t only resort to exploiting computers. They also exploit social trust.
Dumpster diving, or looking through people’s trash, is another way for hackers to obtain information.
Pretexting is a form of social engineering in which one individual lies to obtain confidential data about
another individual.

What does online security involve?


A method called authentication and authorization is required. Authentication determines whether users
are who they claim to be, and authorization determines what users can do and access. Authentication
and authorization techniques fall into three categories; the most secure procedures combine all three:
1. Something the user knows, such as a user ID and password.
2. Something the user has, such as a smart card or token.
3. Something that is part of the user, such as a fingerprint or voice signature.

Single-factor authentication is the traditional process which requires a username and password.
Two-factor authentication requires the user to provide two means of authentication.
Multifactor authentication or MFA requires more than two means of authentication such as what the user
knows (password), what the user has (security token), and what the user is (biometric verification).

You Can Do to Boost Your Online Security:


Use a strong password. Kevin Mitnick, a convicted hacker.
▪ Passphrase usage instead of a standard password ▪ Contains upper and lowercase letters
▪ Contains numbers and symbols ▪ Contains spaces\
Lesson 3: Intellectual Property Code of the Philippines and Data Privacy Act of 2012
Intellectual Property (IP) refers to a number of distinct types of intangible assets for which a set of
exclusive rights are recognized.

Intellectual Property Rights (IPR) are the rights given to persons over their creations. The creator is
usually given an exclusive right over the use of his or her creation for a certain period of time.

Intellectual Property Code of the Philippines (R.A. No. 8293 s. 1998), IPR consists of the ff.:
1. Copyright and related rights 5. Patents
2. Trademarks and service marks 6. Layout designs (topographies) of
3. Geographic indications Integrated Circuits (ICs)
4. Industrial design 7. Protection of undisclosed information

Copyright is a set of exclusive rights granted by a state to the creator of an original work or their
assignee for a limited period of time in exchange for public disclosure of the work,

Digital rights are the permission granted to individuals to legitimately perform actions involving the use of
a computer.

In the National Library or the Supreme Court Library (R.A. 10372, 2013) are those who record or store
the copyright materials.

Digital Rights Management (DRM) is the process by which the author or publisher of a work exerts his
or her rights to control what the purchaser of the work is entitled to do.

Techniques designed to control access and reproduction of online information:


1. Encryption
➢ The process of converting data or information in such a way that only authorized parties can
understand.
2. Scrambling
➢ This is done to hide sensitive information from unauthorized users during storage and transmission.
3. Serial Keys
➢ The product key or software key, a series of alphanumeric characters as a key to denote that the
product or software is original.
4. Tag embedding
➢ Metadata is included to identify the owner’s name, author, and date of purchase, among other pertinent
information.
5. Patent
➢ Patent is a set of exclusive rights granted by a state to an inventor for a limited period of time in
exchange for the public disclosure of an invention.
6. Trademark
➢ This is logo, emblem, tagline, etc.
7. Protection of Undisclosed Information
➢ Industry secret or trade secrets are kept by requiring employees to sign contracts with non-disclosure
agreements (NDAs). Trade secret is a method, formula, device, process, or any information that gives
the business a unique competitive advantage over its competition. The “secret sauce” of the business.
Information Privacy
It collects information from your devices... This information includes device specific identifiers and
information such as IP address, cookie information, mobile device and advertising identifiers, browser
version, operating system type version.

Data Privacy
the Congress of the Philippines passed Republic Act No. 10173, also known as the Data Privacy Act
(DPA) of 2012. The DPA’s Implementing Rules and Regulations was put in effect on September 9, 2016,
thus mandating all companies to comply. In 2014, it was estimated that 2.5 quintillion — or 2.5 billion —
bytes of data were created every day.

RA 10173, or the Data Privacy Act, protects individuals from unauthorized processing of personal
information that is (1) private, not publicly available; and (2) identifiable, where the identity of the
individual is apparent either through direct attribution or when put together with other available
information.

The Republic Act No. 10844 is the Department of Information and Communications Technology,
commonly known as DICT. The DICT is committed to providing every Filipino access to vital ICT
infrastructures and services, while also ensuring the sustainable growth of ICT-enabled industries that can
lead to the creation of more jobs.

The Republic act no. 10175 is the Cybercrime Prevention Act of 2012 that focuses on the pre-emption,
prevention, and prosecution of cybercrimes such as offenses against the privacy, confidentiality, integrity,
and availability of computer data and systems, computer-related offenses, and content-related offenses.
MODULE IV : THE INFLUENCE OF INFORMATION TECHNOLOGY ON CULTURE AND SOCIETY

Lesson 1: Netiquette
Netiquette is a combination of the words network and etiquette and is defined as a set of rules for
acceptable online behavior.

What does good web etiquette look like?


1. Recognizing that the internet is an extension of society. The internet isn’t a new world in which anything
goes, but rather, a new dimension of the world around us.
2. Applying the same standards online as we do in public. In simple terms, this means that the values
society has in place against hate speech, and etc. Observe how you behave online just as you observe
how you behave in the real world.
3. Refusing to empower abuse and harassment while online. Accepting that the laws which are currently
in place to protect the rights and dignity of citizens apply online and that where needed, laws are updated
to reflect these rights in the extended environment.
4. Acknowledging cultural differences. Even when national boundaries no longer apply, cultural respect
and tolerance should remain.
5. Obey Copyright Laws. Never copy someone else’s work and post it as your own. It is against copyright
law because it is considered stealing.
6. Help Others. If someone appears to be new to the internet, offer your assistance.
7. Proper Self Identification. Showing your proper identity, which means having accurate information
about yourself, will make you look more trustworthy online.
8. Introduce Yourself First. when you message someone for the first time, take time to introduce
yourself first.
9. Do not Spam Messages. Do not use specific group discussion channels in promoting unrelated topics.

For Students:
1. Use proper language. This means no emoticons, text message language, or swear words.
2. Run a spelling and grammar check before posting anything to the discussion board. Use Grammarly or
other grammar correction platforms.
3. Read through your comments at least twice before hitting submit.
4. Don’t type in ALL CAPS! If you do, it will look like you are screaming.
5. Recognize and respect diversity. It’s ok to ask questions to clarify things you don’t understand.
6. Avoid sarcasm and dark humor. Take your posts seriously.
7. Before asking a question, check the instructor’s FAQs (Frequently Asked Questions) or search your
Learning Management System resources and/or the internet to see if the answer is obvious or easy to
find.

Lesson 2: Social Media Practices

Social media is any digital tool that allows users to quickly create and share content with the public.

Types of Social Media


1. Social Networks specialize in connecting and exchanging thoughts, ideas, and content with other
users—often with users who share tastes and interests. Ex. Facebook and twitter
2. Media Networks is opposed to social networks, which specialize in letting users share and exchange
raw thoughts and ideas, media networks specialize in distributing content like photographs and videos.
Ex. Instagram and Youtube.
3. Discussion Networks like Reddit are the ideal outlet for posts that can spark in-depth discussion among
users.
4. Review Networks like Yelp and TripAdvisor add social media aspects to user reviews of products and
services.
5. Social Shopping Networks is an e-commerce methodology in which the shopping experience is shared
with a social network of friends and contacts. Ex. Shopee, and lazada

Understanding the Pros and Cons of Social Media


- social networking sites whose primary objective is to facilitate such diverse forms of
communication and interaction (Adi Farhud, 2016).

Negative effects of Social Media


1. Depression and Anxiety
2. Cyberbullying
3. FOMO (Fear of Missing Out) is a phenomenon that was born around the same time as the rise of social
media.
4. Unrealistic Expectations
5. Negative Body Image
6. Unhealthy Sleep Patterns
7. General Addiction - Social media can be more addictive than cigarettes and alcohol.

Positive Effects Social Media

1. Enhancing Communication and Social connection


2. Social Media Makes the World Seem Smaller
3. Social Media Makes It Easier to Make Friends
4. Social Media Helps You Find Common Ground
5. Increased learning outcomes

Lesson 3: The Internet of Things

Information and Communications Technology (ICT) controls our daily behaviors. It becomes a main part
of our life critical infrastructure bringing interconnection of various devices in different aspects.
This opens a new future direction in the society of ICT: The Internet of Things (IoT). Nowadays, the IoT,
early defined as Machine-to-Machine (M2M) communications, has become a key concern of the ICT
world and research communities.

How big is IoT (Internet of Things)?


According to Gartner report, by 2020 connected devices across all technologies will reach 20.6 billion.
YEAR NUMBER OF CONNECTED DEVICES
1990 0.3 million
1999 90 million
2010 5 billion
2013 9 billion
2025 1 trillion

Components of IoT (Internet of Things)


1. Sensors/Devices - collecting every minute data from the surrounding environment.
2. Connectivity is the sensors that can be connected to the cloud through various mediums of
communication and transports such as cellular networks, satellite networks, Wi- Fi, Bluetooth, wide-area
networks (WAN), low power wide area network and many more.
3. Data Processing once the data is collected and it gets to the cloud, the software performs processing
on the acquired data.
4. User Interface is the information made available to the end-user in some way. This can be achieved by
triggering alarms on their phones or notifying them through texts or emails.

Applications of Internet of Things


1. Smart Home has become the revolutionary ladder of success in the residential spaces and it is
predicted Smart homes will become as common as smartphones.
2. Wearables have experienced an explosive demand in markets all over the world. Companies like
Google, Samsung have invested heavily in building such devices. Wearable devices are installed with
sensors and softwares which collect data and information about the users.
3. Connected Cars is a vehicle which is able to optimize its own operation, maintenance as well as
comfort of passengers using onboard sensors and internet connectivity, examples of those features like
car play, GPS locator, and many more.
4. Industrial Internet
Industrial Internet is the new buzz in the industrial sector, also termed as Industrial Internet of Things
(IoT). It is empowering industrial engineering with sensors, software and big data analytics to create
brilliant machines.
5. Smart Cities are another powerful application of IoT generating curiosity among the world's population.
Smart surveillance, automated transportation, and environmental monitoring all are examples of internet
of things applications for smart cities.
6. IoT on Agriculture world
With the continuous increase in population, demand for food supply is extremely high. Governments are
helping farmers to use advanced techniques and research to increase food production.
7. Smart Retail
The potential of IoT in the retail sector is enormous. IoT provides an opportunity to retailers to connect
with the customers to enhance the in-store experience.
8. Energy Engagement
Power grids of the future will not only be smart enough but also highly reliable. Smart grid concept is
becoming very popular all over the world.
9. IoT in Healthcare
Connected healthcare yet remains the sleeping giant of the Internet of Things applications.
10. IoT in Poultry and Farming
Livestock monitoring is about animal husbandry and cost saving.

Challenges Major Challenges faced by IoT (Internet of Things)


1. TECHNOLOGY This part is covering all the technologies needed to make IoT systems function
smoothly as a standalone solution or part of existing systems.
2. SECURITY IoT has already turned into a serious security concern that has drawn the attention of
prominent tech firms and government agencies across the World.
3. CONNECTIVITY Connecting so many devices will be one of the biggest challenges of the future of
IoT, and it will defy the structure of current communication models and the underlying technologies.

You might also like