Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Debbie Blessed A.

Docosin
BSED ENGL 2

1. Research Mobile Commerce


M-Commerce or Mobile Commerce is the way of buying and selling of goods and
services through wireless handheld devices such as smartphones and tablets. As a
form of e-commerce, m-commerce enables users to access online shopping
platforms without needing to use a desktop computer. Although a large volume of
literature is available on mobile commerce (m-commerce), the topic is still under
development and offers potential opportunities for further research and applications.
Since the subject is at the stage of development, a review of the literature on m-
commerce with the objective of bringing to the fore the state-of-art in m-commerce
research and applications will initiate further research on the growth of m-commerce
technologies. https://www.bigcommerce.com/blog/mobile-commerce/

Mobile Social Media


Mobile Social media refers to websites and applications that are designed to allow
people to share content quickly, efficiently, and in real-time. Many people define social
media as apps on their smartphone or tablet, but the truth is, this communication tool
started with computers. This misconception stems from the fact that most social media
users access their tools via apps.
https://www.igi-global.com/dictionary/social-media-political-mobilization-and-citizen-
engagement/43789

2. Information Control
A common method of controlling information is to completely remove the person (or
even the group) from any outside sources of information. They cannot control the
media, so they remove themselves from it. Managing the media in controlling the
information that is presented to people controls what they perceive as being normal.
http://changingminds.org/techniques/conversion/information_control.htm
3. Software Piracy
Software piracy is the illegal copying, distribution, or use of software. It is such a
profitable "business" that it has caught the attention of organized crime groups in a
number of countries. Software piracy causes significant lost revenue for publishers,
which in turn results in higher prices for the consumer.
Software piracy applies mainly to full-function commercial software. The time-limited
or function-restricted versions of commercial software called shareware are less
likely to be pirated since they are freely available. Similarly, freeware , a type of
software that is copyrighted but freely distributed at no charge, also offers little
incentive for piracy. https://whatis.techtarget.com/definition/piracy

4-5. Examples of Software Piracy

Softlifting: Borrowing and installing a copy of a software application from a colleague.


Client-server overuse: Installing more copies of the software without having licenses.
Hard-disk loading: Installing and selling unauthorized copies of software on
refurbished or new computers.
Counterfeiting: Duplicating and selling copyrighted programs.
Online piracy: Typically involves downloading illegal software from peer-to-peer
network, Internet auction or blog. (In the past, the only place to download software was
from a bulletin board system and these were limited to local areas because of long
distance charges while online.)
https://whatis.techtarget.com/definition/piracy

6. Four issues of Information Control


*Convergence
Technological convergence is a term that describes the layers of abstraction that enable
different technologies to interoperate efficiently as a converged system. From a practical
standpoint, technological convergence encompasses two interdependent areas:
technical design and functionality. Technical design is occupied with engineering the
underlying infrastructure needed to transport digital content. Functionality refers to the
ease of use with which a user can access the same content on various devices. The
functional aspects spring from the efficiency of the technical engineering.
https://searchconvergedinfrastructure.techtarget.com/definition/convergence

*Scale
This issue is about the quantity measured with information that goes through equipment
failure. So it’s somewhat surprising that predictive maintenance has failed to take off as
broadly as expected. A recent Bain survey of more than 600 executives found that
industrial customers were less enthused about the potential of predictive maintenance
in 2018 than they were two years earlier. Predictive maintenance is just one of many
cases that customers have had difficulty integrating into their existing operational
technology and IT systems.
https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Scaling-the-industrial-
internet-of-things

*Volume
Volume of a data is a field that treats ways to analyze, systematically extract information
from, or otherwise deal with data sets that are too large or complex to be dealt with by
traditional data-processing application software. Data with many cases (rows) offer
greater statistical power, while data with higher complexity (more attributes or columns)
may lead to a higher false discovery rate. Big data challenges include capturing data,
data storage, data analysis, search, sharing, transfer, visualization, querying, updating,
information privacy and data source. https://en.wikipedia.org/wiki/Big_data

*Unprecedented Individual Empowerment


Personal empowerment involves developing the confidence and strength to set realistic
goals and fulfill your potential. Everyone has strengths and weaknesses and a range of
skills that are used in everyday situations, but all too often people remain unaware of, or
undervalue, their true abilities causing to face problems in terms of information control.
The society’s justice is based on one’s rank in the societal class. Whenever their works
such as articles, journals, books, songs and etc. is stolen one has the right to claim their
work but money manipulates everything that even the government’s law could be
played by it. Those who have the power and money abuses the authority they have just
to get what they want.
https://www.skillsyouneed.com/ps/personal-empowerment.html

*Intellectual Property
Intellectual property is defined as any work that is creative and includes inventions,
literary works, images, and symbols. With the introduction of the Internet, laws
surrounding intellectual properties have changed significantly. The three types of laws
that protect intellectual property are copyrights, trademarks, and patents. The right to
intellectual property motivates innovation and creativity. Intellectual property assets can
sometimes be worth more money than physical assets, which means they are worth
protecting just like physical assets. Unlike conventional property, like physical objects or
land, intellectual property is often intangible because it concerns creations of the mind.
But the arguments for the validity of intellectual property rights are the similar to those
for private property.
https://en.wikibooks.org/wiki/Information_Technology_and_Ethics/Intellectual_Property

7. Copyright unrelated rights


A copyright is a legal device that gives the creator of a literary, artistic, musical, or other
creative work the sole right to publish and sell that work. Copyright owners have the
right to control the reproduction of their work, including the right to receive payment for
that reproduction. An author may grant or sell those rights to others, including publishers
or recording companies. Violation of a copyright is called infringement. As the media on
which artistic and intellectual works are recorded have changed with time, copyright
protection has been extended from the printing of text to many other means of recording
original expressions. Originality is the most important quality needed by a work in order
for it to receive copyright protection.
https://legal-dictionary.thefreedictionary.com/Copyrights+and+related+rights

8. Digital Rights Management


Digital rights management (DRM) is a systematic approach to copyright protection for
digital media. The purpose of DRM is to prevent unauthorized redistribution of digital
media and restrict the ways consumers can copy content they've purchased. Typically
DRM is implemented by embedding code that prevents copying, specifies a time period
in which the content can be accessed or limits the number of devices the media can be
installed on.
Although digital content is protected by copyright laws, policing the Web and catching
law-breakers is very difficult. DRM technology focuses on making it impossible to steal
content in the first place, a more efficient approach to the problem than the hit-and-miss
strategies aimed at apprehending online poachers after the fact.
https://searchcio.techtarget.com/definition/digital-rights-management

9. Patent
A patent is a government-awarded license that grants the inventor of a product or
process exclusive right to its manufacture, use or sale for a specified time period.
However, although it is possible for others to examine the details of the patent, it is
illegal to copy the product or process described. Exclusivity, in this context, means that
any unauthorized party that uses a patented process, or manufactures or sells a
patented product can be sued for infringement.
Applications for patents must be able to demonstrate that what the patent is intended to
protect is something completely new -- at least in part -- and sufficiently inventive that
the idea behind it would not naturally occur to many people.
https://whatis.techtarget.com/definition/patent

10. Trademark
A trademark is a logo, image, symbol, word(s), letter(s) or color(s) that is used and
sometimes legally registered as a representation of a company. Trademarks are often
noted by way of ™, or ® if registered. Trademarks are used to keep a company’s
distinctly identifying intellectual property secure.
Use affords protection against use by other companies internationally, in accordance
with trade agreements. https://whatis.techtarget.com/definition/trademark

11. Protection of undisclosed information


Not all innovative techniques and accompanying know-how can always be protected by
patent law. Broadly speaking, any confidential business information which provides an
enterprise a competitive edge and is kept secret may be protected as a trade secret.
The unauthorized acquisition, use or disclosure of such secret information in a manner
contrary to honest commercial practices by others is regarded as an unfair practice and
a violation of the trade secret protection.
https://www.wipo.int/patents/en/topics/trade_secrets.html

12. Information Privacy


Data privacy, also called information privacy, is the aspect of information technology (IT)
that deals with the ability an organization or individual has to determine what data in a
computer system can be shared with third parties. The need to maintain information
privacy is applicable to collected personal information, such as medical records,
financial data, criminal records, political records, business related information or website
data.
https://searchcio.techtarget.com/definition/data-privacy-information-privacy

13. Data Privacy Act 10173


Republic Act No. 10173, otherwise known as the Data Privacy Act is a law that seeks to
protect all forms of information, be it private, personal, or sensitive. It is meant to cover
both natural and juridical persons involved in the processing of personal information.
The Data Privacy Act applies to any natural or juridical persons involved in the
processing of personal information. It aims to protect the fundamental human right of
privacy, of communication while ensuring free flow of information to promote innovation
and growth.” (Republic Act. No. 10173, Ch. 1, Sec. 2).
https://privacy.com.ph/learn-data-privacy-compliance/data-privacy-faqs/

You might also like