Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

GEC 9: LIVING IN

THE IT ERA

CHAPTER 4:
INFORMATION, CONTROL,
AND PRIVACY
CHAPTER CONTENTS
01 Introduction to Resources
Physical Resources, Conceptual Resources

02 Information as a Resource
Expandable, Compressible, Transportable, Diffusive, Sharable

03 Information Economics
Browsing Previews, Branding, Reputation

04 Information Overload
Mobile Social Media, Mobile Commerce
CHAPTER CONTENTS
05 Information Control
Software Piracy, Intellectual Property, Copyright, DRM, Patent, Trademark

06 Information Privacy
Data Privacy Act 10173

Tasks
IndividualActivity, Group Activity
INTRODUCTION INTRODUCTION
TO RESOURCES TO RESOURCES
CONCEPTUAL
PHYSICAL
RESOURCES
RESOURCES
These are non-tangible and
Without resources, are considered valuable for
organizations would what they represent rather
cease to exist. Imagine a than their physical make-up.
bank w/o money, a
manufacturing plant w/o Human resources – while
forklifts, or a school w/o everyone can be considered
teachers. employees in a company,
their skills, knowledge, and
They are tangible and job experience set them
apart from one another, thus,
can be easily identified. It
identifying the staff,
usually start from
managers, executives, and
acquisition and are then laborers.
assembled to be
available for use when Money – for its monetary
needed. value
INTRODUCTION TO RESOURCES

CONCEPTUAL AND PHYSICAL RESOURCES


The pictures, videos, and contact list saved in the phone are considered conceptual
resources while the smartphone is the physical resource (managing the conceptual
resources).

The conceptual resources identified are called information.

Information can be simply defined as “facts about something or someone that are
provided or learned.”

Facts are considered relevant truths which have been validated and identified.
INFORMATION AS A RESOURCE
Information, Control and Privacy

EXPANDABLE COMPRESSIBLE TRANSPORTABLE

Knowing someone’s News’ one-liner headlines Information such as


name. either on TV, news sites, digital information are
or newspaper. easy to be transported.

DIFFUSIVE SHARABLE SECRET

Gossip or rumors tend to Spreading information There are information


spread easily, whether it’s are considered sharable. that can still be
true or not. considered secret though
it was shared.
VALUABLE INFORMATION
Information as a Resource

FLEXIBLE information can


be used for different
purposes.

RELEVANT information is
important to a decision-
maker.
ACCURATE COMPLETE ECONOMICAL RELIABLE

SIMPLE information must


not be overly complex
and/or such detailed
information.

COMPLEX information may


sometimes lead to
confusion w/c could result TIMELY VERIFIABLE ACCESSIBLE SECURE
to inaccuracy of details.
VALUE OF
INFORMATION
Valuable information helps managers make
good decisions which is why valuable or
useful information is called knowledge.

Information, as a resource, has four


characteristics, namely (1) has zero-
marginal cost; (2) is non-rivalrous; (3) is
non-exclusive; and (4) does not exhibit high
degrees of transparency.
INFORMATION ECONOMICS
Information, Control, and Privacy

BROWSING BRANDING REPUTATION


PREVIEWS Big names such as Directors’ such as
Movie trailers, 1-3 APPLE and Michael Bay for
minutes of glimpse. MICROSOFT have no Transformer; Steven
Music downloaded w/ issues when it comes to Spielberg for Titanic,
15 seconds preview. product launching. Jurassic Park, etc.
INFORMATION OVERLOAD
Information, Control, and Privacy

2018 GLOBAL DIGITAL SUITE of reports from We Are Social


and Hootsuite:
Easy duplication
and transition of 1. More than half the world now uses the internet (up to 7% year-
information on-year)
2. For 3 years in a row, Filipinos have been spending the greatest
amount of time on social media with an average of 4 hours a
Increase in
day.
communication 3. More than 2/3s of the world’s population now has a mobile
methods phone, with most people now using smartphones.
4. More than half of the world’s web traffic now comes from
mobile phones.
Growth archives 5. More than one in five of the world’s population shopped online
of historical in the past 30 days.
information
MOBILE SOCIAL MEDIA AND MOBILE COMMERCE

Mobile social media


is the accessing of
social media sites,
using a mobile device.

Mobile has grown so


fast that it’s now the
leading digital platform.

Mobile commerce
such as financial
services, mobile
ticketing, service/retail,
and information
services.
INFORMATION CONTROL
Information, Control, and Privacy

SOFTWARE PIRACY
01 Pirated DVD and Torrent downloaded file(s)

INFORMATION CONTROL ISSUES


-40 02 Convergence, Scale, Volume, Unprecedented Individual
Empowerment

INTELLECTUAL PROPERTY RIGHT


Refers to a number of distinct types of intangible assets
03 for w/c a set of exclusive rights are recognized such as
trademarks, copyright, designs, etc.

DIGITAL RIGHTS MANAGEMENT


04 Is used to describe the processes by which the author or
publisher of a work exerts his or her rights to control what
the purchaser of the work is entitled to do.
DIGITAL RIGHTS MANAGEMENT
Techniques designed to control access and reproduction of online information

ENCRYPTION is the process of converting


data or information in such a way that only
authorized parties can understand.

SERIAL KEYS SCRAMBLING TAG EMBEDDING


Known also as product key, Is done to hide sensitive Similar to how pictures can
a series of alphanumeric information from include watermarks to
characters acting as a key unauthorized users. denote information on the
to denote that the product or owner of the picture, it does
software is original. the same to information
content.
INFORMATION CONTROL
Information, Control, and Privacy

Another example on how information


will be controlled.

PROTECTION OF
UNDISCLOSED
INFORMATION
TRADEMARK Such as trade secrets,
companies require employees
A distinctive sign used by an
to sign contracts with non-
individual, business
disclosure agreements (NDAs)
organization, or other legal
PATENT entity to identify the products or
to protect these industry
A set of exclusive rights granted secrets.
services to consumers.
by a state to an inventor for a
limited period of time in exchange IPR terms of protection and
for the public disclosure of an penalties as stated in R.A.
invention. 8293 (see book page 139).
INFORMATION PRIVACY
Information, Control, and Privacy

IP ADDRESS COOKIE COOKIE cont… TRUSTED WEBSITE


Knowing a person’s IP A small file that is It contains addresses of Yahoo is considered as
address can help stored in computer’s websites visited, login one, that will never
identify that person’s directory, often a credentials, and even compromise their
physical location temporary folder. credit card information. privacy.
anywhere in the world.
DATA PRIVACY ACT 10173
Was also known as Data Privacy Act 2012 signed by Pres. Benigno Aquino III last August 15, 2012.
The law defines the following as sensitive personal information.

About an individual’s Issued by government


race, ethnic origin, agencies unique to an
marital status, age, individual, such as SSS
color, and religious, number, passport
philosophical, or number, etc.
political affiliations.

About an individual’s Marked as classified by


health, education, an Executive Order or
genetic or sexual life of an act of Congress.
a person, or to any
proceeding or any Help officers and
offense committed or agencies of the
alleged to have executive branch
committed. managed by
government.
THANK YOU
CHAPTER 4: Information, Control, and Privacy

You might also like