Professional Documents
Culture Documents
AND PRIVACY
Introduction to Resources
Resources are the total means available to a
company for increasing production or profit,
including land, buildings, equipment, labor
(manpower), capital, and raw materials. Without
these resources, organizations would cease to
exist.
2 Types of Resources
1. Physical Resources
Buildings
- Tangible and can be easily identified.
• Expandable
• Information can be expanded without
compromising its integrity. In fact, by having
additional information, much more can be
understood from it. (ex: CV for job employment)
• Compressible
• Although expanded information
can give a more detailed
explanation, it may not always be
needed.
• Academic Grades
• By determining the students' weighted
average from first year to senior year,
the school can identify valedictorians
and salutatorians based on their
academic standing.
• Information can also be available in different
grades and types, and prices can be measured in
monetary equivalent.
• Ex: acquiring software applications –
trial version (limited) or full version
(depends on the upgrade)
Valuable Information
Characteristics of a valuable information
1. Accurate – error-free information
• However, how do you determine which are accurate and which are
inaccurate? Usually, it is better to trust sites that are formal in nature
rather than informal ones such as blogs or forums.
Characteristics of a valuable information
2. Complete –
contains all important facts. [ex. Field of medicine]
3. Economical –
information should be relatively economical/reasonable
to produce.
[Is it worth it?]
Characteristics of a valuable information
4. Reliable – Information that we can depend on.
6. Relevant –
Information must be important and related to what you need.
Characteristics of a valuable information
7. Simple –
Information should be simple and not overly complex.
Complex information may sometimes lead to confusion which
could result in inaccuracy of details.
9. Verifiable –
Information can be checked for correctness and
authenticity.
Ex. References, bibliographies, and citations.
Characteristics of a valuable information
10.Accessible –
Information should be easily accessible by authorized users
to be obtained in the right format at the right time to meet their
needs.
EX: Mobile pay systems such as Samsung Pay and Apple Pay use
biometric authentication, typically a fingerprint scan, before a
transaction is made. This ensures that only the owner of the
phone can use the app for payments.
Information
Economics
• Economics
- the study of how society uses its limited resources.
- social science that deals with the production,
distribution, and consumption of goods and services.
• Browsing previews
Ex: Movie Trailers (give viewers a glimpse of what the film is
all about)
5-10 seconds Music Preview
Information Strategies:
• Branding
Big names like Microsoft and Apple have no issues
when it comes to launching new products as people
have already established their trust on these brands
• Reputation
Movie: reputation of directors and casts of actors
and actresses
Music: reputation of the singer/s
Product: reputation of the endorser.
• Your Course
• Your School
• Your Place
• Philippines
• Movie
• Product
1. More than half of the world now uses the internet (up to 7%
year on year)
• Qatar and U.A.E top the internet penetration ranking with
99% of their total population using the internet
Where are these information coming from?
• 2. For 3 years in a row, Filipinos have been spending the greatest
amount of time on social media with an average of four hours a day.
• 3. More than 2/3 of the world’s population now has a mobile phone,
with most people now using smartphones.
• 4. More than half of the world’s web traffic now comes from mobile
Phones.
Where are these information coming from?
• 5. More than 60% of all mobile connections around the world are
now broadband.
The use of Mobile devices paved way for data to be transmitted and
received much faster, without compromising security and scalability.
Companies are now using digital platforms to market their products and
services.
Industries that are now embracing m-
commerce include:
• 1.Financial Services-
2. Mobile Ticketing-
• 4. Information Services
delivery of news,
stocks quotes, sports figures, mobile device
emergency reports, (apps: Waze, Google Maps)
weather and traffic updates
Quiz Next Meeting
INFORMATION CONTROL
With so much information
around, how do you make sure
they are safe from illegal
activities?
Information Control
• Information control is about allowing those who have
appropriate authority access to and use of information
on the basis of the authority that they hold.
Software Piracy
"the unauthorized copying or distribution of copyrighted
software... can be done through copying downloading,
sharing, selling or installing multiple copies of software
onto personal or work computers.“
Answer:
paying for the movie does not mean you are
buying the actual movie, but paying for the
license to watch it for personal use.
This typical scenario boils down to the fact
that information is difficult to control.
Four issues that complicate the problem on
information control [Adam Thierer]:
1. Convergence
• Convergence of devices and networks has created issues
of maintaining an effective information control policy.
Present
Past
Spotify
Itunes (Apple)
music are bought
physically in the
Social Media: song reviews and
form of CDs, DVDs
recommendations
• Another example: VideoFX (Google Play.)
• Description:
• "create amazing lip sync music videos with special effects and your
choice of music. Simply select a music track and start lip syncing!
Make videos that you'll be proud to share with your friends!"
• Most foreign films need subtitles. In the past, we just wait for the
subtitles to be available online. Now, technology such as Google
Translate has also helped make translation of these shows much
faster. Concerns regarding copyright have greatly increased because
of this.
Four issues that complicate the problem on
information control [Adam Thierer]:
3. Volume
1. Encryption
• the process of converting information in such a way that only authorized
parties can understand. [converting information to cryptographic encoding
that can’t be read without a key]
• Example:, websites that transmit credit card and bank account numbers
encrypt this information to prevent identity theft and fraud.
Techniques designed to control access and reproduction of online
information:
2. Serial Keys
• also known as a product key or a software key, it is a series
of alphanumeric characters acting as a key to denote that
the product or software is original.
• In some cases, product keys are used for product activation.
One such example is Microsoft Windows OS. A product key
is used to activate the operating system online. Online
activation helps maintain software authenticity by making
sure no one else has used the same product key.
Techniques designed to control access and reproduction of online
information:
3. Scrambling
Characters are reorganized in random order, replacing
the original content.
For example, an ID number such as 76498 in a
production database, could be replaced by 84967 in a
test database.
This method is very simple to implement, but can only be
applied to some types of data, and is less secure
Techniques designed to control access and reproduction of online
information:
4. Tag Embedding
• Similar to how pictures can include watermarks to denote
information on the owner of the picture, tag embedding does the
same to information content.
• Watermarks are not complete DRM mechanisms in their own right,
but are used as part of a system for copyright enforcement, such as
helping provide prosecution evidence for legal purposes, rather than
direct technological restriction.
Techniques designed to control access and reproduction of online
information:
4. Tag Embedding
• In terms of data embedded into the actual content, the
use of metadata is included to identify the owner's
name, author, and date of purchase, among other
pertinent information.
Techniques designed to control access and reproduction of online
information:
4. Tag Embedding
• Meta is a prefix that -- in most information technology usages --
means "an underlying definition or description."
• Metadata summarizes basic information about data, which can
make it easier to find, use and reuse particular instances of data.
• For example, author, date created, date modified and file size are
examples of very basic document file metadata. Having the
ability to search for a particular element (or elements) of that
metadata makes it much easier for someone to locate a specific
document.
Patent
• A patent is a set of exclusive rights granted by a state to an inventor
for a limited period of time in exchange for the public disclosure of an
invention.