You are on page 1of 66

GROUP 5 INFORMATION,

CONTROL, AND PRIVCY


DOLOR SIT AMET
INTRODUCTION TO RESOURCES

PHYSICAL RESOURCES CONCEPTUAL RESOURCES


They are tangible and can be • Conceptual resources are non
easily identified. Physical tangible and are considered
usually start from acquisition valuable for what they
and are then assemble to be represent rather than their
available for sure when needed physical makeup.
INFORMATION AS A RESOURCES

• Information can be simply defined as “facts about something or


someone that are provided or learned. ‘’ Facts are considered
relevant truths which have been validated and identified. Data are
considered facts; therefore, processed data are considered as
information as they are organized in such a way that they have
addition value beyond the value of the facts themselves. Unlike
other organization resources, information is considered;
EXPAND

• Information can be expanded without compromising its


integrity. In fact, by having additional information, much more
can be understood from it. An example is a person´s personal
information. While knowing his or her name, contact details and
current work may be useful, having the person´s full
curriculum vitae becomes more useful for those in, for example
the HR department.
COMPRESSIBLE

• Although expanded information can give a more detailed


explanation, it many not always be needed. An example of this
is in news sites. Instead of a barrage of details, news sites would
often give one-liner headlines that provide enough information
about the news. Another example is research abstracts. An
abstract is normally a half or a one page summary of the entire
research.
TRANSPORTABLE

• Information, especially • 1. send via email


digital information, is • 2. share via facebook
easily transportable,
• 3. copy onto a flash drive
information can be sent
• 4. upload on youtube
though any of the
following;
DIFFUSIVE
•Gossip or rumors tend to spread
easily. Unfortunately, the same
applies to any kind of information be
it true or not.
SHARABLE

• Since information can be easily spread, it is considered sharable as well.


Information can be kept calling it a secret. However, once a person decides
to tell it to someone, then he or she will no longer have control over it. In
some cases, certain parts of the secret can be kept. One such example is
the secret recipe of KFC. It is known that there are 11 secret herbs and
spices, but as to what these herbs and spices are, people can only guess
VALUABLE INFORMATION

• Let us say your professor assigns you to research on the different parts of a computer
system. You plan to look for information online through search engines such as Google.
How can you tell if the information you get is useful, or in this case valuable for your
research?
Information is said to be valuable if it has the following characteristic(Stail & Reynolds,
2016):
ACCURATE

• Accurate information is error-free. In some cases, inaccurate information is generated


because inaccurate data was processed. Analysts call this as “garbage-in-garbage-out’’.
By typing “”parts of a computer” in the search bar, Google gives you a list of several
websites which contain the information you are looking fore. However , how do you
determine which are accurate and which are inaccurate? Usually, it is better to trust sites
that are formal in nature rather than informal ones such as blogs or forums.
Formal Information Informal Information
It is official and authoritative. It is more casual, and less authoritative

It is meant to be taken seriously and is It is presented in a less formal manner.


presented in a formal manner

It is usually more carefully prepared and It is possibly less reliable


verified than information, and its
accuracy and reliability should also be
higher.
COMPLETE

• Complete information contains all the important facts. This is especially important in the
field of medicine. Missing information could spell disaster, or worse, lead to death. If the
information regarding allergies has been left out, doctors might inadvertently give wrong
medication that could cause serve allergic reactions to the patient.
ECONOMICAL

• Information should be relatively economical to produce. Decision – makers must always


balance the value of information with the cost of producing it. With the spread of the
internet, information dissemination has become easier, faster, and a lot cheaper.
RELIABLE

• Reliable information can be depended on. In many cases, the reliability of information
depends on the validity of the data collection method. In other cases, reliability depends
on the source of information, which brings us back to valuable information being
economical.
FLEXIBLE

• Flexible information can be used for different purposes. Depending on the situation,
personal information can be used for a variety of ways.
For example:
A school ID
RELEVANT

• Relevant information is important to the decision – maker.


For example:
Your assignment calls for searching “parts of computer” online. You do not visit
sites that tackle “parts of the human body” because they are irrelevant to your research
topic.
SIMPLE

• Information should also be simple, not overly complex. Sophisticated and detailed
information may not be needed. Complex information may sometimes lead to confusion
which could result in inaccuracy of details.
TIMELY

• Timely information is delivered when it is needed. This is true in the case of weather
predictions, stock market forecasts, and traffic management.
VERIFIABLE

• This mean that information can be checked for correctness and authenticity. Most authors
include references, bibliography, or citations in their works to enable readers to verify the
content.
ACCESSIBLE

• Information should be easily accessible by authorized users to be obtained in the right


format at the right time to meet their needs. In Korea, U.S., the U.K., and China, a mobile
phone can be used to pay for day-to-day transactions.
• Mobile pay app can be downloaded on the smartphone in which the user’s credit card or
debit card is enrolled. Samsung Pay, Apple Pay, and Google Pay all use near-field
communication (NFC) technology so instead of swiping the physical card for payment,
the mobile phone is simply tapped on the card reader or terminal and payment is
immediately recorded (Savvides, 2017).
SECURE

• Information should be secure from access by unauthorized users. Mobile pay systems
such as Samsung Pay and Apple Pay use biometric authentication , typically a
fingerprint scan, before a transaction is made. This ensures that only the owner of the
phone can use the app for payments.
VALUE OF INFORMATION

• Information is considered valuable mainly for business purposes as business depend on it


to products and services. This helps organizations become globally competitive and be up
to date with the latest trends and technology.
Valuable information helps managers make good decisions which is why valuable or useful
information is called Knowledge.
• Some pieces of information have entertainment value, and some have business value, but
regardless of the source of value, people are willing to pay for information.
INFORMATION, AS RESOURCE, HAS 4
CHARACTERISTICS

• Zero – marginal cost


The cost of producing the first copy of an information good may be substantial, but
the cost of producing additional copies is negligible.
• Non-rivalrous
Simultaneous consumption of information by consumers is possible. Movies
nowadays are sold not only as DVD copies.
t.
n
Co

INFORMATION, AS RESOURCE, HAS 4


CHARACTERISTICS

• Non – exclusive
Exclusion is not a natural property of information goods, though it is possible to
construct exclusion artificially.
• No transparency
To evaluate the information, the information must be know, so one has to invest in
learning how to evaluate it
INFORMATION ECONOMICS

• Value-based pricing naturally leads to differential pricing because people assign different
values to the same information. In the context of economics, a new product is considered
an experience good, and companies use strategies like free samples and promotional
pricing to help customers understand its value. However, information is distinct because
its value lies in the knowledge it provides, and organizations can't offer the full
experience upfront. To address this, they employ strategies like previews, branding, and
building a reputation to entice customers to purchase information while still offering
some insight into what they offer.
HERE ARE SOME STRATEGIES

• Browsing previews
An example of this strategy is movie trailers. Movie trailers that normally run
from 1 to 3 minutes give viewers a glimpse of what the film is all about.
• Branding
Big names such as Microsoft and Apple have no issues when it comes to launching
new products as people have already established their trust on these brands.
HERE ARE SOME STRATEGIES

• Reputation
When a movie is announced, people would often be skeptical if it would be good
enough. However, the reputation of directors and the cast of actors and actresses normally
remove this skepticism.
For example:
Michael Bay is known for successfully directing the transformers movie franchise this
reputation has made his movies blockbuster hits as people have made a connection that if it
is a Michael Bay film, then it must be good.
INFORMATION OVERLOAD

• Information is now available so quickly, ubiquitously, and inexpensively. Last March


2016, Cisco conducted a study that by the end of 2016, global internet traffic will have
reached 1.1 zettabytes per year, and by 2019, global traffic is expected to hit 2 zettabytes
per year.
INFORMATION IS PRODUCED AT RAPIDLY-INCREASING
RATES DUE TO THE FOLLOWING REASONS:

• Easy duplication and transmission of information


A picture posted on Facebook which is also posted on Instagram and twitter means
that the same picture has been posted 3 times on 3 different sites.
• Increase in communication methods
What used to be mobile phones for SMS and computers for emails are
smartphones that can do both.
INFORMATION IS PRODUCED AT RAPIDLY-INCREASING
RATES DUE TO THE FOLLOWING REASONS:

• Growth achieves of historical information


Print of hard copies are now being replaced by digital ones. These digital copies
are stored on cloud servers that offer maximum storage capacity for end users
ELECTRONIC READINGS

ACCORDING TO THE 2018 GLOBAL DIGITAL SUITE OF REPORTS


FROM WE ARE SOCIAL AND HOOTSUITE:

• More than half the world now uses the internet (up to 7 percent year-on-year).
• Qatar and United Arab Emirates top the internet penetration ranking with 99% of their total
population using the internet.
• For three years in a row, Filipinos have been spending the greatest amount of time on social media
with an average of four hours a day.
ELECTRONIC READINGS

ACCORDING TO THE 2018 GLOBAL DIGITAL SUITE OF REPORTS


FROM WE ARE SOCIAL AND HOOTSUITE:

• More than two-thirds of the world's population now has a mobile phone, with most
people now using smartphones.

• More than half of the world's web traffic now comes from mobile phones.

• More than 60% of all mobile connections around the World are now ‘broadband.'

• More than one in five of the world's population shopped online in the past 30 days.
DIGITAL AROUND THE WORLD IN 2018

• In 2018, there was a significant surge in digital information compared to 2017, fueled by
the rapid expansion of the internet and advancements in mobile technology. Key metrics
like internet users, social media users, mobile users, and mobile social media users are
highlighted in the infographic, emphasizing the dominance of Facebook with over 2
billion users worldwide. Despite having one of the slowest fixed internet connections
globally (4.2 Mbps), the Philippines boasts one of the fastest mobile connection speeds
(13.9 Mbps), which encourages Filipinos to spend a substantial four hours daily on social
media platforms like Facebook and YouTube, leading the world in social media usage.
This data explosion has led to information overload for both content creators and
consumers.
MOBILE SOCIAL AND MOBILE COMMERCE

• The abundance of mobile devices has greatly changed the way people manage their day-
to-day activities.
• However, with the introduction of the internet, market shifted from a brick-and-mortar
set-up to an online operation more commonly known as e- commerce.
• They have their smartphones, tablets, and other mobile devices connected to the network
to send and received information wherever they want to. This connectivity has paved the
way to 2 new scenarios in communication:
• Mobile social media
Mobile social media refers to the use of mobile devices, such as smartphones and
tablets, to access social media platforms like Facebook and Snapchat. A 2016 study by
ComScore highlighted the significant impact of social media on internet users, with
approximately 80% of individuals using their mobile phones to browse through their
social media accounts. This trend indicates a decline in desktop usage for accessing
websites. In fact, mobile devices have become the dominant digital platform,
accounting for 62% of digital media time, with apps being the primary means of
accessing digital content, representing 54% of digital media time (Lella & Lipsman,
2016).
• M-commerce
M-commerce, a term coined by Kevin Duffey in 1997 at the Global Mobile
Commerce Forum, involves delivering electronic commerce capabilities directly to
consumers via wireless technology, accessible anywhere. Mobile devices enable
faster data transmission without sacrificing security and scalability. This global trend of
using mobile devices for socializing and conducting commercial transactions is on the rise,
with companies increasingly utilizing digital platforms for marketing their products and
services.
INDUSTRIES THAT ARE NOW EMBRACING M-COMMERCE
INCLUDE:

• Financial services – Banks have introduced online banking a few years back. However,
nowadays, majority of bank transactions such as money transfer, bills payment, and even
stock portfolios and stock transactions can now be done using the bank’s mobile app.
• Mobile ticketing – As payments can be done online, receipts of transactions can also be
sent on mobile devices. (example: Booking ticket online)
• Serve/retail – As consumers are now able to place and pay for orders using their mobile
devices, the e-commerce trend has shifted from desktop computers to mobile devices
INDUSTRIES THAT ARE NOW EMBRACING M-COMMERCE
INCLUDE:

• Information services – These include the delivery of news, stock quotes, sports figures,
emergency reports, and weather and traffic updates to a single mobile device.
INFORMATION CONTROL

• Information control is about allowing those who have appropriate authority access to and
use to and use of information on the basis of the authority that they hold.
• A large requirement for information control comes from commerce, industry, and
copyright owners in general. Information control comes in the form of keeping secrets
inside a business or selling IPR (Intellectual Property Rights) to those prepared to
purchase it.
SOFTWARE PIRACY

• According to The Software Alliance (www.bsa.org) (2018), software piracy is "the


unauthorized copying or distribution of copyrighted software... can be done through
copying, downloading, sharing, selling or installing multiple copies of software onto
personal or work computers." Most software has licenses, such as activation keys, that
are normally identified with just one computer.
EXAMPLE OF SOFTWARE PIRACY AS IDENTIFIED
BY THE SOFTWARE ALLIANCE (2018) INCLUDE:
• Disturbing software or mobile apps from the internet in a manner that violates the license
terms.
• Buying a single copy of a software program and installing it on multiple devices without
authorization
• Making and/or sharing copies of installations CDs
• Sharing the login credentials (without authorization) used to access a web-based software
application (“software as a Service”)
ISSUES WHICH COMPLICATE PROBLEM ON INFORMATION
CONTROL (ADAM THIERER)

• Convergence
Technological advancements and social media have transformed the distribution of
media content like music and movies, moving away from traditional platforms like
CDs and DVDs. Platforms like Spotify enable users to access and consume content
across various devices and networks. Social media's influence on recommendations and
reviews has further changed consumption patterns. However, this convergence of
devices and networks has raised concerns about information control policies, as
discussed by Thierer (2011).
ISSUES WHICH COMPLICATE PROBLEM ON
INFORMATION CONTROL (ADAM THIERER)

• Scale
Technological advancements and fast internet connectivity have revolutionized the
availability of English subtitles for Japanese anime and Korean dramas. Previously,
fans had to wait for days or even weeks for fan-subtitled versions, but now, subtitles are
often ready within hours of the show airing in its home country. This rapid translation
is facilitated by technology like Google Translate. However, this accessibility has also
raised concerns about copyright, and while some countries attempt to restrict online
content, the vast scale of digital speech and content dissemination makes
comprehensive control challenging, as noted by Thierer (2011).
ISSUES WHICH COMPLICATE PROBLEM ON
INFORMATION CONTROL (ADAM THIERER)

• Volume
In today's digital age, news and media outlets like Manila Bulletin and The Philippine
Star offer both print and online versions of their content through websites like
mb.com.ph and www.philstar.com. Broadcasting giants such as ABS-CBN and GMA7
extend their reach through television, radio broadcasts, TV radios, and news websites.
This proliferation of media platforms is a response to the surging volume of global
media and communication activities, making it increasingly challenging for
government regulators to control information flow.
ISSUES WHICH COMPLICATE PROBLEM ON
INFORMATION CONTROL (ADAM THIERER)
• Unprecedented individual empowerment
The rise of social media platforms like Facebook, Twitter, and Instagram has
empowered individuals to freely share their content, including blogs showcasing their
talents and hobbies. However, this poses challenges for content control, especially on
private accounts, making regulation difficult unless reported. To address this,
organizations like The Software Alliance, along with software industry leaders such as
Microsoft and IBM, and governments worldwide are collaborating to combat software
piracy. They are exploring solutions like recognizing exclusive rights to information,
leading to the development of intellectual property rights as a means of controlling
information dissemination.
INTELLECTUAL PROPERTY (IP)

• Intellectual property (IP) refers to a number of distinct types of intangible assets for
which a set of exclusive rights are recognized.
• IP includes musical, literary, and artistic works such as those popular artist like Taylor
Swift, however IP is not just limited to this item. It can also include words, phrases,
symbols, and even designs.
POPULAR LOGOS
• IP is any creation or product of the human mind and may be expressed in the form of
original ideas, expressions, and processes.
• Intellectual property rights (IPR) are the rights given to persons over their creations.
IPR CONSIST OF THE FOLLOWING

• Copyright and related rights


• Trademarks and service marks
• Geographic indications
• Industrial design
• Patents
• Layout designs (topographies) of Integrated Circuits (ICs)
• Protection of undisclosed information
The Intellectual Property Office of the Philippines (IP Philippines) is the government
agency in charge of the implementation of the law protecting intellectual property rights in
the Philippines as provided for under R.A. 8293, or the Intellectual Property Code of the
Philippines, and the revised Intellectual property Code of the Philippines known as R.A
10372.
COPYRIGHT AND RELATED RIGHTS

• Copyright
Is a set of exclusive rights granted by a state to the creator of an original work or
their assignee for a limited period of time in exchange for public disclosure of the work, and
includes the right to copy, distribute, and adapt the work.
• Digital rights
The permission granted to individuals o legitimately perform actions involving the
use of a computer, any electronic device, or a communications network.
DIGITAL RIGHTS MANAGEMENT

• Is used to describe the processes by which the author or publisher of a work exerts his or
her rights to control what the purchaser of the work is entitled to do.
CONTROL ACCESS AND REPRODUCTION OF ONLINE
INFORMATION TECHNIQUES:

• Encryption
The process of converting data or information is such a way that only authorized
parties can understand. Its primary purpose is to protect the confidentiality of digital
data stored on computer systems or transmitted via the internet or other computer
networks.
• Serial keys
Also known as product key or a software key, it is a series of alphanumeric characters
acting as a key to denote that the product or software is original.
CONTROL ACCESS AND REPRODUCTION OF
ONLINE INFORMATION TECHNIQUES:
• Scrambling
Date scrambling is done to hide sensitive information from unauthorized users.
Scrambling is accomplished by the addition of components to the original signal or the
changing of some important component of the original signal in order to make the
extraction of the original signal difficult.
• Tag embedding
Similar to how pictures can include watermarks to denote information on the owner of
the picture, tag embedding does the same to information content.
Metadata is include to identify the owner’s name, author, and date of purchase, among
other pertinent information.
PATENT

• Is a set of exclusive rights granted by a state to an inventor for a limited period of time in
exchange for the public disclosure of an invention.
one example of a patented designed is that of Apple’s iPod.
Trademark
is a distinctive sign used by an individual, business organization, or other legal entity to
identity the products or services to consumers.
PROTECTION OF UNDISCLOSED INFORMATION

• Industries and companies need to have information control especially in dealing with
sensitive industry secrets to protect this industry secrets also called trade secrets
companies usually require employees to sign contracts with non-disclosure agreement
(NDAs).
Example of popular trade secrets are the formulation of Coca-cola and Listerine and the
recipe of KFC(Kentucky Fried Chicken)
IPR TERMS OF PROTECTION AND PENALTIES AS STATE IN R.A.
8293
Terms of Protection Penalty
Copyright Generally, throughout the life of 1st offense: ₱ 50, 000 to ₱ 150, 000 and/or 1-3 years imprisonment
the author plus 50 years after 2nd offense: ₱ 150, 000 to ₱ 500, 000 and/or 3-6 yrs imprisonment
his/her death 3rd and subsequent offense: ₱ 500, 000 - ₱ 1.5M and/or 6-9 yrs
imprisonment

Patent 20 years (time-bound) Not less than ₱100,000 to not more then ₱300,000 and/or not less that
6 months to no more than 3 years imprisonment

Trademark 10 years from the date of filing of ₱50,000 to ₱200,000 and 2-5 years imprisonment
the application
INFORMATION PRIVACY

• Data's natural state involves copying, logging, transmitting, and storing,


making data privacy a constant challenge. Information privacy questions
how private information truly is, even when shared on platforms like
Facebook and Twitter. People may choose to share personal details publicly,
but this raises concerns about data privacy. Yahoo's privacy policy is an
example, revealing the collection of device-specific information like IP
addresses and cookies. These details can reveal a person's location and
sensitive information, posing risks when using public computers
OATH’S PRIVACY POLICY
In the realm of online privacy, it's essential to recognize that policies
governing the collection of computer IP addresses and cookie data are prevalent across
various services, including trusted platforms like Yahoo, Google Mail, and Facebook.
While many users place trust in organizations like Yahoo, assuming their privacy
remains intact, recent history reminds us that even giants like Facebook have faced
scrutiny over their privacy practices. Facebook, despite claiming to prioritize user data
protection, faced controversy due to third-party quizzes that surreptitiously accessed
extensive user information, from personal details to friend lists. The case of the "most
used words" quiz, produced by Vonvon, exemplifies how seemingly innocent
interactions online can lead to data exposure. This underscores the importance of
engaging only with trusted websites, refraining from sensitive transactions on public
computers, regularly logging out of online accounts, and exercising caution when
sharing personal information to prevent potential privacy breaches and identity theft.
DATA PRIVACY ACT 10173
In response to the increasing availability of personal data online and the potential risks it
poses, countries, including the Philippines, have taken steps to safeguard their citizens' data.
The Philippines, with a thriving IT industry and a significant social media user base, has seen
substantial IT spending and a rapid growth in technology adoption. To protect the privacy of
its citizens, the Data Privacy Act of 2012 (Republic Act No. 10173) was enacted, signifying
the country's commitment to data protection and security it was signed and approved by then
President Benigno Aquino III on August 15, 2012.This legislation aims to regulate the
handling of personal data and ensure the responsible use of information in an era of
increasing digital connectivity and data sharing.
THE LAW DEFINES SENSITIVE PERSONAL INFORMATION
AS BEING:

 about an individual's race, ethnic origin, marital status, age, color, and religious,
philosophical, or political affiliations;
 about an individual's health, education, genetic or sexual life of a person, or to any
proceeding or any offense committed or alleged to have committed;
 issued by government agencies "peculiar" (unique) to an individual, such as social
security number; and
 marked as classified by an Executive Order or an act of Congress.
ALL PROCESSING OF SENSITIVE AND PERSONAL
INFORMATION IS PROHIBITED EXCEPT IN CERTAIN
CIRCUMSTANCES.
THE EXCEPTIONS ARE:
 consent of the data subject;
 pursuant to law that does not require consent;
 necessity to protect the life and health of a person;
 necessity for medical treatment; and
 necessity to protect the lawful rights of data subjects in court proceedings, legal
proceedings, or regulation.
The text discusses the distinction between a "security incident" and a
"personal data breach" in the context of data protection in the Philippines. A
security incident is defined as an event that can affect data protection or
compromise data availability, integrity, or confidentiality, including incidents
that could result in a personal data breach without safeguards. On the other
hand, a personal data breach specifically involves the accidental or unlawful
destruction, loss, alteration, unauthorized disclosure, or access to personal data.
The text emphasizes the importance of robust data security measures in the face
of ongoing challenges in data privacy and security. It also provides an example
of a significant data breach that occurred in the Philippines in 2016, involving
the hacking of the Commission on Elections website, resulting in the exposure
of sensitive personal data of millions of citizens and overseas workers, making
it one of the largest government-related data breaches in history.
In January 2017, an article from CNN Philippines reported that
the former Comelec Chairman, Andres Bautista, was facing criminal
charges related to a data breach that occurred in March 2016. Both
Comelec and Bautista were accused of violating the Data Privacy Act of
2012, with the National Privacy Commission (NPC) stating that the
organization failed in its role as a personal information controller. The
NPC emphasized that data protection goes beyond security measures
and highlighted that negligence in data privacy is punishable by three to
six months' imprisonment and fines ranging from ₱500,000 to ₱4
million, potentially leading to disqualification from public office for
government officials found guilty of such violations.
CHAPTER KEY POINTS

 Physical, conceptual, and information resources are three types of resources that an organization
needs in order to operate.
 Information resources, unlike other resources, are expandable, compressible, transportable,
diffusive, and shareable.
 Information, as a resource, has four characteristics, namely it has zero-marginal cost; is non-
rivalrous; is non-exclusive; and does not exhibit high degrees of transparency.
 Information is produced at rapidly increasing rates due to easy duplication and transmission of
information, increase in communication methods, and growth archives of historical information.
 The abundance of mobile devices resulted in mobile social media and m-commerce (mobile
commerce).
 Information control is about allowing those who have appropriate authority access to and use of
information on the basis of the authority that they hold. °
 Intellectual property refers to a number of distinct types of intangible assets for which a set of
exclusive rights are #ecognized. To protect intellectual properties, copyright and digital rights are
granted to individual.

You might also like