Professional Documents
Culture Documents
• Let us say your professor assigns you to research on the different parts of a computer
system. You plan to look for information online through search engines such as Google.
How can you tell if the information you get is useful, or in this case valuable for your
research?
Information is said to be valuable if it has the following characteristic(Stail & Reynolds,
2016):
ACCURATE
• Complete information contains all the important facts. This is especially important in the
field of medicine. Missing information could spell disaster, or worse, lead to death. If the
information regarding allergies has been left out, doctors might inadvertently give wrong
medication that could cause serve allergic reactions to the patient.
ECONOMICAL
• Reliable information can be depended on. In many cases, the reliability of information
depends on the validity of the data collection method. In other cases, reliability depends
on the source of information, which brings us back to valuable information being
economical.
FLEXIBLE
• Flexible information can be used for different purposes. Depending on the situation,
personal information can be used for a variety of ways.
For example:
A school ID
RELEVANT
• Information should also be simple, not overly complex. Sophisticated and detailed
information may not be needed. Complex information may sometimes lead to confusion
which could result in inaccuracy of details.
TIMELY
• Timely information is delivered when it is needed. This is true in the case of weather
predictions, stock market forecasts, and traffic management.
VERIFIABLE
• This mean that information can be checked for correctness and authenticity. Most authors
include references, bibliography, or citations in their works to enable readers to verify the
content.
ACCESSIBLE
• Information should be secure from access by unauthorized users. Mobile pay systems
such as Samsung Pay and Apple Pay use biometric authentication , typically a
fingerprint scan, before a transaction is made. This ensures that only the owner of the
phone can use the app for payments.
VALUE OF INFORMATION
• Non – exclusive
Exclusion is not a natural property of information goods, though it is possible to
construct exclusion artificially.
• No transparency
To evaluate the information, the information must be know, so one has to invest in
learning how to evaluate it
INFORMATION ECONOMICS
• Value-based pricing naturally leads to differential pricing because people assign different
values to the same information. In the context of economics, a new product is considered
an experience good, and companies use strategies like free samples and promotional
pricing to help customers understand its value. However, information is distinct because
its value lies in the knowledge it provides, and organizations can't offer the full
experience upfront. To address this, they employ strategies like previews, branding, and
building a reputation to entice customers to purchase information while still offering
some insight into what they offer.
HERE ARE SOME STRATEGIES
• Browsing previews
An example of this strategy is movie trailers. Movie trailers that normally run
from 1 to 3 minutes give viewers a glimpse of what the film is all about.
• Branding
Big names such as Microsoft and Apple have no issues when it comes to launching
new products as people have already established their trust on these brands.
HERE ARE SOME STRATEGIES
• Reputation
When a movie is announced, people would often be skeptical if it would be good
enough. However, the reputation of directors and the cast of actors and actresses normally
remove this skepticism.
For example:
Michael Bay is known for successfully directing the transformers movie franchise this
reputation has made his movies blockbuster hits as people have made a connection that if it
is a Michael Bay film, then it must be good.
INFORMATION OVERLOAD
• More than half the world now uses the internet (up to 7 percent year-on-year).
• Qatar and United Arab Emirates top the internet penetration ranking with 99% of their total
population using the internet.
• For three years in a row, Filipinos have been spending the greatest amount of time on social media
with an average of four hours a day.
ELECTRONIC READINGS
• More than two-thirds of the world's population now has a mobile phone, with most
people now using smartphones.
• More than half of the world's web traffic now comes from mobile phones.
• More than 60% of all mobile connections around the World are now ‘broadband.'
• More than one in five of the world's population shopped online in the past 30 days.
DIGITAL AROUND THE WORLD IN 2018
• In 2018, there was a significant surge in digital information compared to 2017, fueled by
the rapid expansion of the internet and advancements in mobile technology. Key metrics
like internet users, social media users, mobile users, and mobile social media users are
highlighted in the infographic, emphasizing the dominance of Facebook with over 2
billion users worldwide. Despite having one of the slowest fixed internet connections
globally (4.2 Mbps), the Philippines boasts one of the fastest mobile connection speeds
(13.9 Mbps), which encourages Filipinos to spend a substantial four hours daily on social
media platforms like Facebook and YouTube, leading the world in social media usage.
This data explosion has led to information overload for both content creators and
consumers.
MOBILE SOCIAL AND MOBILE COMMERCE
• The abundance of mobile devices has greatly changed the way people manage their day-
to-day activities.
• However, with the introduction of the internet, market shifted from a brick-and-mortar
set-up to an online operation more commonly known as e- commerce.
• They have their smartphones, tablets, and other mobile devices connected to the network
to send and received information wherever they want to. This connectivity has paved the
way to 2 new scenarios in communication:
• Mobile social media
Mobile social media refers to the use of mobile devices, such as smartphones and
tablets, to access social media platforms like Facebook and Snapchat. A 2016 study by
ComScore highlighted the significant impact of social media on internet users, with
approximately 80% of individuals using their mobile phones to browse through their
social media accounts. This trend indicates a decline in desktop usage for accessing
websites. In fact, mobile devices have become the dominant digital platform,
accounting for 62% of digital media time, with apps being the primary means of
accessing digital content, representing 54% of digital media time (Lella & Lipsman,
2016).
• M-commerce
M-commerce, a term coined by Kevin Duffey in 1997 at the Global Mobile
Commerce Forum, involves delivering electronic commerce capabilities directly to
consumers via wireless technology, accessible anywhere. Mobile devices enable
faster data transmission without sacrificing security and scalability. This global trend of
using mobile devices for socializing and conducting commercial transactions is on the rise,
with companies increasingly utilizing digital platforms for marketing their products and
services.
INDUSTRIES THAT ARE NOW EMBRACING M-COMMERCE
INCLUDE:
• Financial services – Banks have introduced online banking a few years back. However,
nowadays, majority of bank transactions such as money transfer, bills payment, and even
stock portfolios and stock transactions can now be done using the bank’s mobile app.
• Mobile ticketing – As payments can be done online, receipts of transactions can also be
sent on mobile devices. (example: Booking ticket online)
• Serve/retail – As consumers are now able to place and pay for orders using their mobile
devices, the e-commerce trend has shifted from desktop computers to mobile devices
INDUSTRIES THAT ARE NOW EMBRACING M-COMMERCE
INCLUDE:
• Information services – These include the delivery of news, stock quotes, sports figures,
emergency reports, and weather and traffic updates to a single mobile device.
INFORMATION CONTROL
• Information control is about allowing those who have appropriate authority access to and
use to and use of information on the basis of the authority that they hold.
• A large requirement for information control comes from commerce, industry, and
copyright owners in general. Information control comes in the form of keeping secrets
inside a business or selling IPR (Intellectual Property Rights) to those prepared to
purchase it.
SOFTWARE PIRACY
• Convergence
Technological advancements and social media have transformed the distribution of
media content like music and movies, moving away from traditional platforms like
CDs and DVDs. Platforms like Spotify enable users to access and consume content
across various devices and networks. Social media's influence on recommendations and
reviews has further changed consumption patterns. However, this convergence of
devices and networks has raised concerns about information control policies, as
discussed by Thierer (2011).
ISSUES WHICH COMPLICATE PROBLEM ON
INFORMATION CONTROL (ADAM THIERER)
• Scale
Technological advancements and fast internet connectivity have revolutionized the
availability of English subtitles for Japanese anime and Korean dramas. Previously,
fans had to wait for days or even weeks for fan-subtitled versions, but now, subtitles are
often ready within hours of the show airing in its home country. This rapid translation
is facilitated by technology like Google Translate. However, this accessibility has also
raised concerns about copyright, and while some countries attempt to restrict online
content, the vast scale of digital speech and content dissemination makes
comprehensive control challenging, as noted by Thierer (2011).
ISSUES WHICH COMPLICATE PROBLEM ON
INFORMATION CONTROL (ADAM THIERER)
• Volume
In today's digital age, news and media outlets like Manila Bulletin and The Philippine
Star offer both print and online versions of their content through websites like
mb.com.ph and www.philstar.com. Broadcasting giants such as ABS-CBN and GMA7
extend their reach through television, radio broadcasts, TV radios, and news websites.
This proliferation of media platforms is a response to the surging volume of global
media and communication activities, making it increasingly challenging for
government regulators to control information flow.
ISSUES WHICH COMPLICATE PROBLEM ON
INFORMATION CONTROL (ADAM THIERER)
• Unprecedented individual empowerment
The rise of social media platforms like Facebook, Twitter, and Instagram has
empowered individuals to freely share their content, including blogs showcasing their
talents and hobbies. However, this poses challenges for content control, especially on
private accounts, making regulation difficult unless reported. To address this,
organizations like The Software Alliance, along with software industry leaders such as
Microsoft and IBM, and governments worldwide are collaborating to combat software
piracy. They are exploring solutions like recognizing exclusive rights to information,
leading to the development of intellectual property rights as a means of controlling
information dissemination.
INTELLECTUAL PROPERTY (IP)
• Intellectual property (IP) refers to a number of distinct types of intangible assets for
which a set of exclusive rights are recognized.
• IP includes musical, literary, and artistic works such as those popular artist like Taylor
Swift, however IP is not just limited to this item. It can also include words, phrases,
symbols, and even designs.
POPULAR LOGOS
• IP is any creation or product of the human mind and may be expressed in the form of
original ideas, expressions, and processes.
• Intellectual property rights (IPR) are the rights given to persons over their creations.
IPR CONSIST OF THE FOLLOWING
• Copyright
Is a set of exclusive rights granted by a state to the creator of an original work or
their assignee for a limited period of time in exchange for public disclosure of the work, and
includes the right to copy, distribute, and adapt the work.
• Digital rights
The permission granted to individuals o legitimately perform actions involving the
use of a computer, any electronic device, or a communications network.
DIGITAL RIGHTS MANAGEMENT
• Is used to describe the processes by which the author or publisher of a work exerts his or
her rights to control what the purchaser of the work is entitled to do.
CONTROL ACCESS AND REPRODUCTION OF ONLINE
INFORMATION TECHNIQUES:
• Encryption
The process of converting data or information is such a way that only authorized
parties can understand. Its primary purpose is to protect the confidentiality of digital
data stored on computer systems or transmitted via the internet or other computer
networks.
• Serial keys
Also known as product key or a software key, it is a series of alphanumeric characters
acting as a key to denote that the product or software is original.
CONTROL ACCESS AND REPRODUCTION OF
ONLINE INFORMATION TECHNIQUES:
• Scrambling
Date scrambling is done to hide sensitive information from unauthorized users.
Scrambling is accomplished by the addition of components to the original signal or the
changing of some important component of the original signal in order to make the
extraction of the original signal difficult.
• Tag embedding
Similar to how pictures can include watermarks to denote information on the owner of
the picture, tag embedding does the same to information content.
Metadata is include to identify the owner’s name, author, and date of purchase, among
other pertinent information.
PATENT
• Is a set of exclusive rights granted by a state to an inventor for a limited period of time in
exchange for the public disclosure of an invention.
one example of a patented designed is that of Apple’s iPod.
Trademark
is a distinctive sign used by an individual, business organization, or other legal entity to
identity the products or services to consumers.
PROTECTION OF UNDISCLOSED INFORMATION
• Industries and companies need to have information control especially in dealing with
sensitive industry secrets to protect this industry secrets also called trade secrets
companies usually require employees to sign contracts with non-disclosure agreement
(NDAs).
Example of popular trade secrets are the formulation of Coca-cola and Listerine and the
recipe of KFC(Kentucky Fried Chicken)
IPR TERMS OF PROTECTION AND PENALTIES AS STATE IN R.A.
8293
Terms of Protection Penalty
Copyright Generally, throughout the life of 1st offense: ₱ 50, 000 to ₱ 150, 000 and/or 1-3 years imprisonment
the author plus 50 years after 2nd offense: ₱ 150, 000 to ₱ 500, 000 and/or 3-6 yrs imprisonment
his/her death 3rd and subsequent offense: ₱ 500, 000 - ₱ 1.5M and/or 6-9 yrs
imprisonment
Patent 20 years (time-bound) Not less than ₱100,000 to not more then ₱300,000 and/or not less that
6 months to no more than 3 years imprisonment
Trademark 10 years from the date of filing of ₱50,000 to ₱200,000 and 2-5 years imprisonment
the application
INFORMATION PRIVACY
about an individual's race, ethnic origin, marital status, age, color, and religious,
philosophical, or political affiliations;
about an individual's health, education, genetic or sexual life of a person, or to any
proceeding or any offense committed or alleged to have committed;
issued by government agencies "peculiar" (unique) to an individual, such as social
security number; and
marked as classified by an Executive Order or an act of Congress.
ALL PROCESSING OF SENSITIVE AND PERSONAL
INFORMATION IS PROHIBITED EXCEPT IN CERTAIN
CIRCUMSTANCES.
THE EXCEPTIONS ARE:
consent of the data subject;
pursuant to law that does not require consent;
necessity to protect the life and health of a person;
necessity for medical treatment; and
necessity to protect the lawful rights of data subjects in court proceedings, legal
proceedings, or regulation.
The text discusses the distinction between a "security incident" and a
"personal data breach" in the context of data protection in the Philippines. A
security incident is defined as an event that can affect data protection or
compromise data availability, integrity, or confidentiality, including incidents
that could result in a personal data breach without safeguards. On the other
hand, a personal data breach specifically involves the accidental or unlawful
destruction, loss, alteration, unauthorized disclosure, or access to personal data.
The text emphasizes the importance of robust data security measures in the face
of ongoing challenges in data privacy and security. It also provides an example
of a significant data breach that occurred in the Philippines in 2016, involving
the hacking of the Commission on Elections website, resulting in the exposure
of sensitive personal data of millions of citizens and overseas workers, making
it one of the largest government-related data breaches in history.
In January 2017, an article from CNN Philippines reported that
the former Comelec Chairman, Andres Bautista, was facing criminal
charges related to a data breach that occurred in March 2016. Both
Comelec and Bautista were accused of violating the Data Privacy Act of
2012, with the National Privacy Commission (NPC) stating that the
organization failed in its role as a personal information controller. The
NPC emphasized that data protection goes beyond security measures
and highlighted that negligence in data privacy is punishable by three to
six months' imprisonment and fines ranging from ₱500,000 to ₱4
million, potentially leading to disqualification from public office for
government officials found guilty of such violations.
CHAPTER KEY POINTS
Physical, conceptual, and information resources are three types of resources that an organization
needs in order to operate.
Information resources, unlike other resources, are expandable, compressible, transportable,
diffusive, and shareable.
Information, as a resource, has four characteristics, namely it has zero-marginal cost; is non-
rivalrous; is non-exclusive; and does not exhibit high degrees of transparency.
Information is produced at rapidly increasing rates due to easy duplication and transmission of
information, increase in communication methods, and growth archives of historical information.
The abundance of mobile devices resulted in mobile social media and m-commerce (mobile
commerce).
Information control is about allowing those who have appropriate authority access to and use of
information on the basis of the authority that they hold. °
Intellectual property refers to a number of distinct types of intangible assets for which a set of
exclusive rights are #ecognized. To protect intellectual properties, copyright and digital rights are
granted to individual.