You are on page 1of 77

INFORMATION, CONTROL

AND PRIVACY
Introduction to Resources
Resources are the total means available to a
company for increasing production or profit,
including land, buildings, equipment, labor
(manpower), capital, and raw materials. Without
these resources, organizations would cease to
exist.
2 Types of Resources

1. Physical Resources
Buildings
- Tangible and can be easily identified.

Warehouse Machines and factories


2. Conceptual Resources
- non-tangible
- Considered valuable for
what they represent
rather than their physical
makeup.
- Ex. Money
Human Resources
(differs in their skills,
knowledge, and job
experience)
Physical Resources: Conceptual Resources:

Computer Units Saved Files


Important documents
Pictures
Cellphones
Videos

*These are identified as


INFORMATION
INFORMATION
Information as a Resource
• Information can be simply defined as “facts about
something or someone that are provided or learned.”
Facts are considered relevant truths which have been
validated and identified.

Therefore, processed data are considered as information


as they are organized in such a way that they have
additional value of the facts themselves.
Information can be:

• Expandable
• Information can be expanded without
compromising its integrity. In fact, by having
additional information, much more can be
understood from it. (ex: CV for job employment)
• Compressible
• Although expanded information
can give a more detailed
explanation, it may not always be
needed.

An example of this is in news sites.


(exs: One-liner headlines ,
Research Abstract)
• Transportable
• Information, especially digital information, is easily
transportable. With the use of the internet and various
technologies, information can be sent through any of the
following:

1. Send via email


2. Attach files via cloud (gdrive etc)
3. Share via Facebook
4. Copy onto a flash drive
5. Upload on YouTube
• Diffusive
Gossip or rumors tend to
spread easily. Unfortunately, the
same applies to any kind of
information- be it true or not.
• Shareable

Since information can be easily spread, it is considered


shareable as well. Information can be kept calling it a
secret, however, once a person decides to tell it to
someone, then he or she will no longer have control over it.
In some cases, certain parts of the secret can be kept.

(Ex. A KFC recipe has 11 secret herbs and spices, but as to


what are these herbs and spices are, people can only guess.
Information is not all different from other
resources. Similar to how physical resources are
managed, information is considered valuable and
also has a life cycle.

It begins with transforming raw materials into


finished product--- processing data to come up
with valuable information.
Examples:
• Weather forecasting
• Statistical data from previous days are
used to predict possible weather
conditions on the next day

• Academic Grades
• By determining the students' weighted
average from first year to senior year,
the school can identify valedictorians
and salutatorians based on their
academic standing.
• Information can also be available in different
grades and types, and prices can be measured in
monetary equivalent.
• Ex: acquiring software applications –
trial version (limited) or full version
(depends on the upgrade)
Valuable Information
Characteristics of a valuable information
1. Accurate – error-free information
• However, how do you determine which are accurate and which are
inaccurate? Usually, it is better to trust sites that are formal in nature
rather than informal ones such as blogs or forums.
Characteristics of a valuable information
2. Complete –
contains all important facts. [ex. Field of medicine]

3. Economical –
information should be relatively economical/reasonable
to produce.
[Is it worth it?]
Characteristics of a valuable information
4. Reliable – Information that we can depend on.

• Research / Academe - reliability of information depends on the validity of


the data collection method.

• Other cases, reliability depends on the source of information.


Ex: Torrent sites offer pirated software, music, and movies for free.
However, the resolution of the movie downloaded, for example,
might not be clear and might even contain malware and virus that
could infect the computer system
Characteristics of a valuable information
5. Flexible –
Information can be used for different purposes.

Ex: Valid ID – can be used to apply for Credit Cards, Bank


Accounts,
Student ID – Can be used for SP (fare or driver’s permit), open
bank account

6. Relevant –
Information must be important and related to what you need.
Characteristics of a valuable information

7. Simple –
Information should be simple and not overly complex.
Complex information may sometimes lead to confusion which
could result in inaccuracy of details.

8. Timely – delivered when it is needed.


Ex. Weather predictions, stock market forecasts, traffic
management
Characteristics of a valuable information

9. Verifiable –
Information can be checked for correctness and
authenticity.
Ex. References, bibliographies, and citations.
Characteristics of a valuable information
10.Accessible –
Information should be easily accessible by authorized users
to be obtained in the right format at the right time to meet their
needs.

• Ex. A mobile pay app can be downloaded on the smartphone in


which the user's credit card or debit card is enrolled. Samsung Pay, Apple
Pay, and Google Pay all use near-field communications (NFC) technology
so instead of swiping the physical card for payment, the mobile phone is
simply tapped on the card reader or terminal and payment is immediately
recorded
Characteristics of a valuable information
11. Secure –
Information should be secure from access by
unauthorized users.

EX: Mobile pay systems such as Samsung Pay and Apple Pay use
biometric authentication, typically a fingerprint scan, before a
transaction is made. This ensures that only the owner of the
phone can use the app for payments.
Information
Economics
• Economics
- the study of how society uses its limited resources.
- social science that deals with the production,
distribution, and consumption of goods and services.

*Since people have widely different values for a


particular piece of information, value based pricing leads
naturally to differential pricing.
Information Economics
• In Economics, a “good” is considered to be an
experience good if consumers must experience it to
value it.

• Ex: Free taste, promotional pricing, testimonials.


Information Strategies:
Organizations use various strategies to get wary customers to
overcome their reluctance to purchase information before they
know what they are.

• Browsing previews
Ex: Movie Trailers (give viewers a glimpse of what the film is
all about)
5-10 seconds Music Preview
Information Strategies:

• Branding
Big names like Microsoft and Apple have no issues
when it comes to launching new products as people
have already established their trust on these brands
• Reputation
Movie: reputation of directors and casts of actors
and actresses
Music: reputation of the singer/s
Product: reputation of the endorser.

*Pre-determined information = lessen the difficulty in


decision making
Activity: By Group
• Make a poster and a video trailer (2-3minutes) promoting one of
the following:

• Your Course
• Your School
• Your Place
• Philippines
• Movie
• Product

Due: Before Semifinal Examination


Information Overload
In this computer age, information is produced at rapidly-
increasing rates. This is due to the following reasons:

1. Easy duplication and transmission of information


-movie trailers / music Video trailers: posted on
Youtube, FB, Twitter
Information Overload
2. Increase in communication methods
Past Present
Mobile phone for SMS Smartphone can do
Computers for Emails both

SMS via Telco Mobile apps


Providers only Vibers, Messenger
Information Overload
3. Growth archives of historical information

• Printed copies are now being replaced by digital ones.


These digital copies are stored on cloud servers.

• Libraries have computers and other mobile devices to


access e-books, e-journals etc.
Where are these information coming from?
• According to 2020 Global Digital Suite of reports from We Are
Social and Hootsuite:

1. More than half of the world now uses the internet (up to 7%
year on year)
• Qatar and U.A.E top the internet penetration ranking with
99% of their total population using the internet
Where are these information coming from?
• 2. For 3 years in a row, Filipinos have been spending the greatest
amount of time on social media with an average of four hours a day.

• 3. More than 2/3 of the world’s population now has a mobile phone,
with most people now using smartphones.

• 4. More than half of the world’s web traffic now comes from mobile
Phones.
Where are these information coming from?
• 5. More than 60% of all mobile connections around the world are
now broadband.

• 6. More than one in five of the world’s population shopped


online in the past 30 days.
Mobile Social Media and Mobile Commerce
• The abundance of mobile devices has greatly changed the way
people manage their day-to-day activities.

Ex: Physical store Online Store


ATM Mobile Money Transfer
Physical Payment Mobile Apps
New scenarios in Communication
• 1. Mobile Social Media

- the accessing of social media sites, using mobile device,


such as Facebook and Snapchat, using a mobile device.
2. Mobile Commerce / M-Commerce
- term used during the 1997 Global Mobile Commerce Forum by
Kevin Duffey.
- the delivery of electronic commerce capabilities directly into the
consumer’s hand, anywhere, via wireless technology.

The use of Mobile devices paved way for data to be transmitted and
received much faster, without compromising security and scalability.

Companies are now using digital platforms to market their products and
services.
Industries that are now embracing m-
commerce include:
• 1.Financial Services-

banks bank’s mobile app

2. Mobile Ticketing-

airlines online booking,


booking reservations are then sent via
email
3. Service/ Retail

desktop computers mobile devices

• 4. Information Services

delivery of news,
stocks quotes, sports figures, mobile device
emergency reports, (apps: Waze, Google Maps)
weather and traffic updates
Quiz Next Meeting
INFORMATION CONTROL
With so much information
around, how do you make sure
they are safe from illegal
activities?
Information Control
• Information control is about allowing those who have
appropriate authority access to and use of information
on the basis of the authority that they hold.
Software Piracy
"the unauthorized copying or distribution of copyrighted
software... can be done through copying downloading,
sharing, selling or installing multiple copies of software
onto personal or work computers.“

- The Software Alliance


Examples of software piracy as identified by
The Software Alliance (2018):
• Distributing software or mobile apps from the internet in a
manner that violates the license terms

• Buying a single copy of a software program and installing it on


multiple devices without authorization

• Making and/or sharing copies of installation CDs

• Sharing the login credentials (without authorization) used to


access a web-based software application ("Software as a Service")
Some might ask,

"I paid for the software already, shouldn't that be


mine to use and distribute wherever and
whenever I want to?“

Answer:
paying for the movie does not mean you are
buying the actual movie, but paying for the
license to watch it for personal use.
This typical scenario boils down to the fact
that information is difficult to control.
Four issues that complicate the problem on
information control [Adam Thierer]:
1. Convergence
• Convergence of devices and networks has created issues
of maintaining an effective information control policy.
Present
Past
Spotify
Itunes (Apple)
music are bought
physically in the
Social Media: song reviews and
form of CDs, DVDs
recommendations
• Another example: VideoFX (Google Play.)
• Description:
• "create amazing lip sync music videos with special effects and your
choice of music. Simply select a music track and start lip syncing!
Make videos that you'll be proud to share with your friends!"

• You can send or post it to a social media platform such Facebook or


Twitter. The issue here is, what if the music used is copyrighted?
Four issues that complicate the problem on
information control [Adam Thierer]:
2. Scale
• "the scale of modern digital speech and content dissemination [still]
greatly complicates government efforts to control information flows. “

• Most foreign films need subtitles. In the past, we just wait for the
subtitles to be available online. Now, technology such as Google
Translate has also helped make translation of these shows much
faster. Concerns regarding copyright have greatly increased because
of this.
Four issues that complicate the problem on
information control [Adam Thierer]:
3. Volume

• increasing volume of media content and


communications activities happening across the world,
greatly complicating government regulatory efforts to
control information.
Four issues that complicate the problem on
information control [Adam Thierer]:
4. Unprecedented individual empowerment [Influencers]
The popularity of social media such as Facebook, Twitter, and Instagram
has made it possible for individuals to post anything they want.

This also includes creation of blogs which have become mainstream


media for individuals to showcase their talents, skills, and hobbies.

This creates issues when it comes to content restriction as most people


are doing this using their private accounts. Unless reported, the said
content will be difficult to control.
Q: How do we control information
dissemination?

Ans: One solution they have come up


with is identifying exclusive rights to
information
INTELLECTUAL PROPERTY RIGHTS
• refers to a number of distinct types of intangible assets
for which a set of exclusive rights are recognized.
• any creation or product of the human mind and may be
expressed in the form of original ideas, expressions, and
processes.
• the rights given to persons over their creations. They
usually give the creator an exclusive right over the use
of his or her creation for a certain period of time.
Intellectual Property Code of the Philippines
(Republic Act No. 8293 s. 1998)
a. Copyright and related rights
b. Trademarks and service marks
c. Geographic indications
d. Industrial design
e. Patents
f. Layout designs (topographies) of Integrated Circuits (ICs)
g. Protection of undisclosed information
The Intellectual Property Office of the Philippines (IP Philippines) is the government agency in
charge of the implementation of the law protecting intellectual property rights in the Philippines as provided for
under R.A. 8293, or the Intellectual Property Code of the Philippines, and the revised Intellectual Property Code
of the Philippines known as R.A. 10372.
Copyright
Copyright is a set of exclusive rights granted by a
state to the creator of an original work or their
assignee for a limited period of time in exchange for
public disclosure of the work, and includes the right
to copy, distribute, and adapt the work.

Copyright owners can license or permanently


transfer or assign their exclusive rights to others.
• Copyright provides protection for original expression
which includes literary, artistic, scholarly, and scientific
creations such as books, articles, newspapers, lectures,
letters, musical compositions, and paintings.

• It also extends to derivative works such as illustrations,


maps, photographic works, advertisements, computer
programs, etc.
• In the Philippines, all copyrighted materials are recorded
and stored at the National Library or the Supreme Court
Library (R.A. 10372, 2013).
Digital rights
• Digital rights is the permission granted to individuals to
legitimately perform actions involving the use of a
computer, any electronic device, or a communications
network.

• It is particularly related to the protection and realization


of existing rights in the context of new digital
technologies, especially the internet
Digital Rights Management
Digital rights management (DRM) is used to describe the
processes by which the author or publisher of a work
exerts his or her rights to control what the purchaser of
the work is entitled to do.

This represents the control by which one can prevent a


person or an organization from copying, printing, editing,
or otherwise making the privileged information available
to other people.
Information gets to be disseminated faster to
consumers control as to how it is shared becomes
an issue.

Thus, companies and organizations have come up


with possible solutions to this digital dilemma.
Techniques designed to control access and reproduction of online
information:

1. Encryption
• the process of converting information in such a way that only authorized
parties can understand. [converting information to cryptographic encoding
that can’t be read without a key]

• Encryption is an important way for individuals and companies to protect


sensitive information from hacking.

• Example:, websites that transmit credit card and bank account numbers
encrypt this information to prevent identity theft and fraud.
Techniques designed to control access and reproduction of online
information:

2. Serial Keys
• also known as a product key or a software key, it is a series
of alphanumeric characters acting as a key to denote that
the product or software is original.
• In some cases, product keys are used for product activation.
One such example is Microsoft Windows OS. A product key
is used to activate the operating system online. Online
activation helps maintain software authenticity by making
sure no one else has used the same product key.
Techniques designed to control access and reproduction of online
information:

3. Scrambling
Characters are reorganized in random order, replacing
the original content.
For example, an ID number such as 76498 in a
production database, could be replaced by 84967 in a
test database.
This method is very simple to implement, but can only be
applied to some types of data, and is less secure
Techniques designed to control access and reproduction of online
information:

4. Tag Embedding
• Similar to how pictures can include watermarks to denote
information on the owner of the picture, tag embedding does the
same to information content.
• Watermarks are not complete DRM mechanisms in their own right,
but are used as part of a system for copyright enforcement, such as
helping provide prosecution evidence for legal purposes, rather than
direct technological restriction.
Techniques designed to control access and reproduction of online
information:

4. Tag Embedding
• In terms of data embedded into the actual content, the
use of metadata is included to identify the owner's
name, author, and date of purchase, among other
pertinent information.
Techniques designed to control access and reproduction of online
information:

4. Tag Embedding
• Meta is a prefix that -- in most information technology usages --
means "an underlying definition or description."
• Metadata summarizes basic information about data, which can
make it easier to find, use and reuse particular instances of data.
• For example, author, date created, date modified and file size are
examples of very basic document file metadata. Having the
ability to search for a particular element (or elements) of that
metadata makes it much easier for someone to locate a specific
document.
Patent
• A patent is a set of exclusive rights granted by a state to an inventor
for a limited period of time in exchange for the public disclosure of an
invention.

• The exclusive right granted to a patentee in most countries is the right


to prevent others from making, using, selling, or distributing the
patented invention without permission.

• One example of a patented design is that of Apple's iPod.


Trademark
• is a distinctive sign used by an individual, business organization, or
other legal entity to identify the products or services to consumers.

• The mark comes from a unique source, and it distinguishes its


product (trademark) or services (service mark) from the others.

• Rights in a mark shall be acquired through registration made validly


in accordance with the provisions of the IP code. For marks with
geographical indications, a notice stating that a given product
originates in a given geographical area must be identified.
Protection of Undisclosed Information
• Industries and companies need to have information control
especially in dealing with sensitive industry secrets.

• To protect these industry secrets, also called trade secrets,


companies usually require employees to sign contracts with non-
disclosure agreements (NDAs).
Information
Privacy
Data Privacy Act 10173 (2012)
• signed and approved by former President Benigno Aquino Ill on August 15, 2012.

• The law defines sensitive personal information as being:


• about an individual's race, ethnic origin, marital status, age, color, and
religious, philosophical, or political affiliations;
• about an individual's health, education, genetic or sexual life of a
person, or to any proceeding or any offense committed or alleged to
have committed;
• issued by government agencies "peculiar" (unique) to an individual,
such as social securitynumber; and
• marked as classified by an Executive Order or an act of Congress
All processing of sensitive and personal information is prohibited
except in certain circumstances. The
exceptions are:

• consent of the data subject;


• pursuant to law that does not require consent;
• necessity to protect the life and health of a person;
• necessity for medical treatment; and
• necessity to protect the lawful rights of data subjects in
court proceedings, legal proceedings, or regulation.
• A "security incident"is an event or occurrence that
affects or tends to affect data protection, or may
compromise availability, integrity or confidentiality. This
definition includes incidents that would result in a
personal breach, if not for safeguards that have been
put in place.

• A "personal data breach," on the other hand, is a subset


of a security breach that actually leads to "accidental or
unlawful destruction, loss, alteration, unauthorized
disclosure of, or access to personal data transmitted,
stored, or otherwise processed.

You might also like