L.I.T.E. Chapter 4 Information Control and Privacy

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 108

Chapter 4: Information, Control,

and Privacy
Living in the I.T. Era / MST 101d*
Engr. Michael R. Balagtas
INTRODUCTION
TO RESOURCES
A resource is a source of supply or support that
can be used when needed.

It is also anything that can be described and


referenced.
- can replenish itself at the rate it is used.
- have limited supply.
- are the tangible resources that a business needs to maintain.
- materials that have been conceived and created digitally.
- holds between a set of concepts and a group of people.
INFORMATION
AS RESOURCES
EXPANDABLE COMPRESSIBLE TRANSPORTABLE DIFFUSIVE SHAREABLE
INFORMATION INFORMATION INFORMATION INFORMATION INFORMATION
EXPANDABLE
All resources available to an
institution
EXPANDABLE
INFORMATION
• Difficult to destroy, easy to
expand
• Can be spread easily through
different mediums
• Size can be large or small
COMPRESSIBLE
All resources that are being
processed and can be
throttled
COMPRESSIBLE
INFORMATION
• Can be compressed into
smaller data in order to be
sent faster
• Useful for sending large files
TRANSPORTABLE
All resources that can be
transported with a given set
of policies
TRANSPORTABLE
INFORMATION
• Can be transferred through
different mediums
• Can send information through
the internet or a hard drive
DIFFUSIVE
This involves the mingling of
substances by the natural
movement of their particles
DIFFUSIVE
INFORMATION
• Spread of information among
interconnected nodes or
entities in a network
SHAREABLE
Shared resources that can
easily be accessed from a
remote computer
SHAREABLE
INFORMATION
• Exchange of data
• Can be shared everywhere
• Can be send through different
mediums
INFORMATION
ECONOMICS
➢ a means of selecting IT projects with highest
possibility of generating added value for the
company.

INFORMATION ➢ incorporates the technique of scoring


methodologies.
ECONOMICS
➢ Scoring methodology is used to identify all the
performance issues and assign a weight to each
one.

Note: This approach can incorporate both tangible and intangible benefits.
RETURN ON INVESTMENT (ROI)
➢ A performance measure used to evaluate the
efficiency of an investment or to compare
the efficiency of a number of different
investments

The ROI formula:


BUSINESS DOMAIN

Assesses the degree to which


the proposed project responds
to established corporate and
business strategies and goals.

STRATEGIC MATCH
BUSINESS DOMAIN

Evaluates the degree to which


the proposed project provides
an advantage in the
marketplace.

COMPETITIVE
ADVANTAGE (CA)
BUSINESS DOMAIN

Assesses the project’s


contribution to management’s
need for information on core
activities.

INFORMATION
MANAGEMENT (MI)
BUSINESS DOMAIN

Evaluates the degree of


business risk associated with
not undertaking the project

COMPETITIVE
RESPONSE (CR)
BUSINESS DOMAIN
Assessment of the degree to
which an information systems
project depends on new or
untested IT or business skills,
management capabilities, or
experience.

ORGANIZATIONAL
RISK (OR)
IT DOMAIN

Assesses the degree to which


the proposed project fits into
the overall information systems
direction.

STRATEGIC IT
ARCHITECTURE (SA)
IT DOMAIN

Assesses the specificity of the


user’s or business’ objectives
that are communicated to that
IT project personnel.

DEFINITIONAL
UNCERTAINTY (DU)
IT DOMAIN
Assesses a project’s
dependence on new or untried
technologies which may
involve a single technology or a
combination of new technical
skills sets, hardware, or
software tools.

TECHNOLOGY
UNCERTAINTY (TU)
IT DOMAIN

An environment assessment,
involving such factors as data
administration,
communications, distributed
systems, etc.

INFRASTRUCTURE
RISK (IR)
SECURED

● The value of information could be lost due to issues


such as unauthorized user access or intentionally
damaging its existence.
● It is important to make steps to protect valuable data
and information, like use of passwords to protect data
and information.
STRATEGIES OF
INFORMATION
ECONOMICS
WHAT IS INFORMATION
STRATEGY?
• Information Strategy refers to a long-term plan designed to achieve the
organization’s objectives in the management of knowledge, information, or data.

• It is usually a formalized document that contains a description of the


strategic objective’s information and data management, and a timetable for
their implementation.

• Information Strategy is used to determine what information is crucial for the


functioning and decision making in the organization and how to build it and
maintain it.
Browsing Previews
• The web browsing history is the list of
web pages a user has visited recently, as
well as associated data such as page
title and time of visit, which is recorded
by web browser software as standard
for a certain period.
Branding
• the process of creating a relationship or
a connection between a company's
product and emotional perception of
the customer for the purpose of
generating segregation among
competition and building loyalty among
customers.
Reputation
• Your reputation is the general
belief or opinion that other
people have about you. If you are
considered trustworthy and kind,
you have a good reputation.
INFORMATION
OVERLOAD
WHAT IS INFORMATION OVERLOAD?
❑Information overload describes the
excess of information available to a
person aiming to complete a task or
make a decision. This impedes the
decision-making process, resulting in a
poor (or even no) decision being
made.
❑The term “information overload” was
coined by Bertram Gross, a Professor
of Political Science at Hunter College.
“Information overload occurs when the amount of
input to a system exceeds its processing capacity.
Decision makers have fairly limited cognitive
processing capacity. Consequently, when
information overload occurs, it is likely that a
reduction in decision quality will occur.”

-Bertram Gross
INFORMATION OVERLOAD TODAY

❑The dawn of the information age and access to


powerful and low-cost data collection on automated
basis has brought us more information today than any
other point in history.
❑Managing various information in daily life is a problem
that everyone faces. A lot of data is spilled into our
lives every minute through social media, e-mails,
webpages, mobile apps, etc.
RISKS OF INFORMATION OVERLOAD
❑The information that we consume in a daily basis
affects us in many different ways:
o Information overload leads to cognitive overload
(and brain fog).
o Decision-making becomes a real challenge.
o Your willpower reservoir gets depleted.
o Information overdose may trigger anxiety.
o Overload of information makes it harder to focus.
o Critical thinking skills become impaired.
Information overload
leads to cognitive
overload (and brain
fog).
o The human brain could
only process a certain
amount of information at a
time.
Decision-making
becomes a real
challenge.
o Making various decisions
is an energy-consuming
process.
Your willpower
reservoir gets
depleted.
o it is hard to stay motivated
and productive.
Information overdose
may trigger anxiety.
o It can cause stress that may
lead to aggravate the
anxiety that one is already
feeling.
Overload of
information makes it
harder to focus.
o Information overload
takes toll on concentration
and focus
Critical thinking skills
become impaired.
o As we continue to
consume a lot of
information, distinguishing
high-quality and poor-
quality content becomes
harder.
o Huge volumes of new information
being constantly created
o Pressure to create and compete in
information provision – leading to a
quantity over quality effect in many
CAUSES OF industries
INFORMATION o The simplicity of creating, duplicating
OVERLOAD and sharing of information online
TODAY o The exponential increase in channels to
receive information by; radio,
television, print media, websites, e-
mail, mobile telephony, RSS feeds, etc.
o The increasing weight of historical data
available to us
o High volumes of conflicting,
contradictory and plain old inaccurate
CAUSES OF information
INFORMATION o No simple methodologies for quickly
processing, comparing and evaluating
OVERLOAD information sources
TODAY
o A lack of clear structure in groups of
information and poor clues as to the
relationships between those groups
o Unplug
o Manage your
HOW TO AVOID information
INFORMATION o Keep it simple
OVERLOAD o Clear your mind
o Set limits
o Prepare for the next
day
UNPLUG
o Take time each day away
from screen time.
MANAGE YOUR
INFORMATION
o Be selective and prioritize
the information you
consume.
KEEP IT SIMPLE
o Keep the information less
and avoid duplication.
CLEAR YOUR MIND
o Have a regular “brain
dump” and put your
thoughts on paper.
SET LIMITS
o Know what is important and
create boundaries.
PREPARE FOR THE
NEXT DAY
o Collect your thoughts and
plan ahead.
INFORMATION
CONTROL
Information Control could be a
instrument where the control
actions are of implicit, indirect
nature and the data that's
given to the controlled object
has the frame of instructive
picture.
Purposes of Information Control

As a tool to help managers control


other organizational activities.
As an organizational area that
managers need to control.
Information and Managing the
Isolation
Education education System

Spies and Redefinition of


Informants Truth
INFORMATION
PRIVACY
What does Information
Privacy mean?
• The privacy of personal information

• Relates to personal data stored on computer systems

• Considered an important aspect of information sharing

• Need to maintain information privacy is applicable to collected personal


information, such as medical records, financial data, criminal records,
political records, business related information or website data.
DATA TYPES

INTERNET PRIVACY
(Online Privacy)

• Displaying of information pertaining to oneself via


Internet

• This can include both personally-identifying information


(PII) and non-personally-identifying information, such
as your behavior on a website.

• Most websites publish a privacy policy that details the


website’s intended use of collected online and/or
offline collected data.
EXAMPLES
FINANCIAL PRIVACY

• Financial information is particularly sensitive, as it may


easily used to commit online and/or offline fraud.

• It is to be kept away from the third party with no


authorization from the party that has power over the
information.
MEDICAL PRIVACY
• The practice of maintaining the security and
confidential of patient records.

• All medical records are subject


to stringent laws that address user access privileges.

• Health Insurance Portability and Accountability Act


(HIPAAH)
CHARACTERISTICS OF
VALUABLE
INFORMATION
ACCURATE
● Accurate information is error free. Errors could be occurred
due to different reasons.
● If there is some problem in the knowledge required for the
process, output (information) may have errors.
● At the same time, if input (data) contains some errors, the
output will not be accurate. This is known as garbage in
garbage out (GIGO). Inaccurate information is not error free.
COMPLETE

Complete information contains


all the important
facts to make clear decisions.
ECONOMICAL
● Information should also be relatively
economical.
● Decision makers must always balance
the value of information with the cost
of producing it.
FLEXIBLE
● Flexible information can be used for a variety of purposes.
For example, Information on how much inventory is on
hand for a particular part can be for:
● a sales representative to determine the sales plan
● a production manager to identify possible constraints for
the production
● a financial executive to calculate the current assets figures
of inventory
RELIABLE
● Reliability of information describes the
correctness of the information.
● If there are any problems with respect
to correctness of data, it will definitely
affect the reliability of information.
RELEVANT

● The relevance of information is


determined based on the usefulness of
information with respect to the decision
making process.
SIMPLE
● Simplicity in the representation of information is also
a very useful feature utilized to improve the usability
of information in the decision-making process.
● Too many information could affect the simplicity in
the presentation.
● Providing too many information is known as
information overloading.
TIMELY

● Decisions should be made at the right time


to achieve effectiveness.
● Timely information refers to providing
information at the right time.
VERIFIABLE
● If it is possible to confirm the reliability of
the information about its correctness, it
becomes verifiable Information.
If you are not sure about a particular
information heard from a radio channel, you
can search about it using internet.
ACCESSIBLE

● Accurate information plays a major roll in the


decision making process of any organization.
● Therefore it is essential to be able to access
the correct/relevant information by
authorized personnel at the right time to
meet their needs.
Information Control &
Software Piracy
HOW DID THEY DIFFER FROM EACH OTHER?
INFORMATION CONTROL SOFTWARE PIRACY
-is literally the right to have a -is an illegal act of copying,
control over your personal distribution and use of
information or works. software.
Types of
Software Piracy
SOFT LIFTING
CLIENT-SERVER OVERUSE
HARD-DISK LOADING
COUNTERFEITING
Republic Act No. 10372
Intellectual Property (IP) :
refers to one's ideas and works of the mind. It
includes inventions, literary works, designs, symbols,
names and logos used for commerce.

Types of Intellectual Property:


Copyright - the rights that creators have Digital Rights Management (DRM)- is a way to
protect copyrights for digital media. This
over their literary and artistic works. It approach includes the use of technologies that
includes copyright from books, music, limit the copying and use of copyrighted works
paintings, films, computer programs or and proprietary software.
even advertisements.
Patent - is an exclusive right granted for an
Related Rights - are the rights which is invention.
mainly related to copyright. Trademark - is a sign capable of distinguishing
According to the Copyright and Related the goods or services of one enterprise from
Rights Act they include: those of other enterprises.
Right of performers, right of producers
of phonograms, right of film producers, Protection of Undisclosed Information (Trade
right of broadcasting organizations, right Secrets) - are IP rights on confidential
of publishers in their editions, and right information which may be sold or licensed.
of producers of databases.
Republic Act No. 10372

Republic Act No. 10372

The Republic Act No. 10372, entitled 'An Act


Amending Certain Provisions of Republic Act No. 8293,
otherwise known as the "Intellectual Property Code of
the Philippines", and for other purposes' was signed
into law on February 28, 2013, and entered into force
on March 22, 2013.

Among the amendments to the Intellectual


Property Code are the following:

Establishment of the Bureau of Implementation of technological


Grant of specific enforcement
Copyright and Other Related protection measures and rights
functions to the Director
Rights within the Intellectual management information for
General of IPOPHL and his
Property Office of the copyrighted works disseminated
deputies.
Philippines (IPOPHL). through Internet.
DOES ANYONE
HAVE ANY
QUESTIONS?

THANK
Thank you for being here today.
We really appreciate that you
took the time to be here and

YOU!
listen to our presentation.

CREDITS: This presentation template


was created by Slidesgo, including
icons by Flaticon, and infographics &
images by Freepik
THANK YOU FOR ATTENDING
THE CLASS…

Engr. MICHAEL R. BALAGTAS

You might also like