Chapter 5: Information, Control, and Privacy Flashcards
Resources that are tangible and can be easily identified. Usually starts from acquisition and are then assembled to be available for use when needed.
Physical Resources
Resources that are non-tangible and are considered valuable for what they represent rather than their physical make-up.
Conceptual Resources
Pictures, videos, and contact list are what type of resources?
Conceptual Resources
Smartphone is what type of resources?
Physical Resources
Conceptual resources identified are called _______.
Information
Conceptual resources: While everyone can be considered employees in a company, their skills, knowledge, and job experience set them apart from one another, thus, identifying the staff, managers, executives, and laborers.
Human Resources
Facts about something or someone that are provided or learned
Information
____ are considered relevant truths which have been validated and identified.
Facts
_______ are considered as _______ once it is proven, or once there is a proof or evidences of the said data or scenario.
Processed data, information
Information as a resource (ECTDSS)
Expandable, Compressible, Transportable, Diffusive, Sharable, Secret
Information as a resource - Knowing someone’s name
Expandable
Information as a resource - news’ one-liner headlines either on TV, news sites, or newspaper
Compressible
Information as a resource - Information such as digital information are easy to be transported
Transportable
Information as a resource - Gossip or rumors tend to spread easily, whether it’s true or not
Diffusive
Information as a resource - Spreading information are considered ____
Sharable
Information as a resource - There are information that can still be considered _____ thought it was shared
Secret
Valuable Information (F, R, S, C)
Flexible, Relevant, Simple, Complex
Valuable Information - information can be used for different purpose
Flexible
Valuable information - information is important to a decision maker
Relevant
Valuable information - information must not be overly complex and/or such detailed information
Simple
Valuable Information - may sometimes lead to confusion which could result to inaccuracy of details
Complex
Valuable Information ( A, C, E, R, T, V, A, S)
Accurate, Complete, Economical, Reliable, Timely, Verifiable, Accessible, and Secure
Valuable information helps managers make good decisions which is why valuable or useful information is called _________.
Knowledge
Information as a resource has 4 characteristics:
1) Zero-marginal cost
2) Non-rivalrous
3) Non-exclusive
4) Does not exhibit high-degrees of transparency
Information Economics (BP, B, R)
Browsing Previews, Branding, Reputation
Information Economics - Movie trailers, 1-3 minutes of glimpse. Music downloaded with 15 seconds preview.
Browsing previews
Information Economics - Big names such as APPLE and MICROSOFT have no issues when it comes to product launching
Branding
Information Economics - Directors’ such as Michael Bay for Transformer; Steven Spielberg for Titanic, Jurassic Park, etc.
Reputation
Number of internet users in 2018; social media users, and mobile phone users
- 021 billion (7%); 3.196 billion (13%); 5.135 billion (4%)
- More than half the world now uses the internet (up to 7% year-on-year)
- For 3 years in a row, Filipinos have been spending the greatest amount of time on social media with an average of 4 hours a day.
- More than 2/3s of the world’s population now has a mobile phone, with most people now using smartphones.
- More than half of the world’s web traffic now comes from mobile phones.
- More than one in five of the world’s population shopped online in the past 30 days.
Information Overload: Digital 2018
Internet Users in the World (greatest to least)
Asia, Europe, Africa, Latin America, North America, Middle East, and Australia/ Oceania
The accessing of social media sites, using a mobile device
Mobile social media
It has grown so fast that it’s now the leading digital platform
Mobile
Financial services, mobile ticketing, service/retail, and information services
Mobile commerce
Information Control (S,I,I,D)
Software Piracy, Information Control Issues, Intellectual Property Right, Digital Rights Management
Pirated DVD and torrent downloaded files
Software Piracy
Convergence, Scale, Volume, Unprecedented Individual Empowerment
Information Control Issues
Refers to number of distinct types of intangible assests for which a set of exclusive rights are recognized such as trademarks, copyrights, designs, etc
Intellectual Property Right
Used to describe the processes by which the author or publisher of a work exerts his or her rights to control what the purchaser of the work is entitled to do
Digital Rights Management
Intellectual property (C,P,T)
Copyright, patent, trademark
Techniques designed to control access and reproduction of online information
Digital Rights Management
The process of converting data or information in such a way that only authorized parties can understand
Encryption
Also known as product key, a series of alphanumeric characters acting as a key to denote that the product or software is original
Serial keys
Done to hide sensitive information from unathorized users
Scrambling
Similar to how pictures can include watermarks to denote information on the owner of the picture, it does the same to information content
Tag Embedding
A set of exclusive rights granted by a state to an investor for a limited period of time in exchange for the public disclosure of an invention
Patent
A distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers
Trademark
Such as trade secrets, companies require employees to sign contracts with NDA to protect these industry secrets
Protection of Undisclosed Information
An act prescribing the intellectual property code and establishing the intellectual property office, providing for its powers and functions, and for other purposes
RA No. 8293 Intellectual Property Code of the Philippines (June 6, 1997)
Knowing a person’s ___________ can help identify that person’s physical location anywhere in the world
IP Address
A small file that is stored in computer’s directory, often a temporary folder
Cookie
Contains addresses of websites visited, login credentials, and even credit card information
Cookie cont….
Yahoo is considered as one, that will never compromise their privacy
Trusted Website
Law defining the ff as sensitive personal information:
- individual’s race
- ethnic origin
- marital status,
- age
- color
-religious, philosophical, and political affiliations - issued by gov’t that are unique to an individual ( SSS #, passport #, etc)
- health
- education
- genetic or sexual life of a person
- any proceeding, any offense committed or alleged to have committed
- classified by an EO or an act of Congress
- help officers and agencies of executive branch managed by government
Data Privacy Act of 10173 (2012) Benigno Aquino III (Aug. 15, 2012)
It is the policy of the State to protect fundamental human _______ while ensuring _________ to promote innovation and growth.
right of privacy of communication, free flow of information