INFORMATION, CONTROL, AND PRIVACY Flashcards

1
Q

the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials.

A

Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

defined as “facts about something or someone that are provided or learned.”

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are considered relevant truths which have been validated and identified.

A

Facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information as a Resource:

A

Expandable
Compressible
Transportable
Diffusive
Sharable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information can be expanded without compromising its integrity. In fact, by having additional information, much more can be understood from it. An example is a person’s personal information.

A

Expandable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Although expanded information can give a more detailed explanation, it may not always be needed. An example of this is in news sites. Instead of a barrage of details, news sites would often give one-liner headlines that provide enough information about the news.

A

Compressible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information, especially digital information, is easily various transportable. With the use of the internet and technologies, information can be sent though any of the following:
*send via email
*share via Facebook
*copy onto a flash drive
*upload on YouTube

A

Transportable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gossip or rumors tend to spread easily. Unfortunately, the same applies to any kind of information—be it true or not.

A

Diffusive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information is not all different from other resources. Similar to how physical resources are managed, information is considered valuable and also has a life cycle. It begins with transforming raw materials into a finished product—processing data to come up with valuable information. Weather forecasting is one such example.

A

Sharable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Characteristics of Valuable Information:

A

Accurate
Complete
Economical
Reliable
Flexible
Relevant
Simple
Timely
Verifiable
Accessible
Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____________ information is error-free.

A

Accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____________ information contains all the important facts.

A

Complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information should be relatively ____________ to produce.

A

Economical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__________ information can be depended on.

A

Reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In some cases, inaccurate information is generated because inaccurate data was processed. Analysts call this as __________________.

A

“garbage-in-garbage out.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reliability is dependent on:

A

the validity of the data collection method
the source of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____________ information can be used for different purposes.

A

Flexible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_________ information is important to the decision-maker.

A

Relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Information should also be __________, not overly complex.

A

Simple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ information is delivered when it is needed.

A

Timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This means that information can be checked for correctness and authenticity.

A

Verifiable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information should be easily ___________ by authorized users to be obtained in the right format at the right time to meet their needs.

A

Accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Information should be ________ from access by unauthorized users.

A

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

helps managers make good decisions which is why valuable or useful formation is called knowledge.

A

Valuable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Information, as a resource, has four characteristics, namely it

A

(1) has zero marginal cost;
(2) is non-rivalrous;
(3) is non-exclusive. and
(4) does not exhibit high degrees of transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The cost of producing the first copy of an information good may be substantial, but the cost of producing (or reproducing) additional copies is negligible.

A

Zero-marginal cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Simultaneous consumption of information by consumers is possible. Movies nowadays are sold not only as DVD copies. There are also digital formats which anyone can watch online or download on their mobile devices, either as a rental or paid subscription.

A

Non-rivalrous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Exclusion is not a natural property of information goods, though it is possible to construct exclusion artificially However, the nature of information is that if it is known, it is difficult to exclude others from its use.

A

Non-exclusive

28
Q

To evaluate the information, the information must be known, so one has to invest in learning how to evaluate it.

A

No transparency

29
Q

describes the excess of information available to a person aiming to complete a task or make a decision.

A

Information Overload

30
Q

Information overload impedes the ___________ process, resulting in a poor (or even no) decision being made.

A

decision-making

31
Q

Information is now available so _________, ____________, and ______________.

A

quickly; ubiquitously; inexpensively

32
Q

One zettabyte is equal to…

A

1,000,000,000 terabytes
or
one billion external drives

33
Q

Information is produced at rapidly-increasing rates due to the following reasons:

A

*Easy duplication and transmission of information
*Increase in communication methods
*Growth archives of historical information

34
Q

comes in the form of keeping secrets inside a business or selling IPR (Intellectual Property Rights) to those prepared to purchase it.

A

Information control

35
Q

it is about allowing those who have appropriate authority access to and use of information on the basis of the authority that they hold.

A

Information control

36
Q

the unauthorized copying or distribution of copyrighted software… can be done through copying downloading, sharing, selling or installing multiple copies of software onto personal or work computers.

A

Software piracy

37
Q

Adam Thierer in 2011, identified four issues which further complicate the problem on information control:

A

(1) convergence,
(2) scale,
(3) volume, and
(4) unprecedented individual empowerment/user-generation of content.

38
Q

it is now possible to disseminate, find, or consume the same content/ information via multiple devices or distribution networks.

A

Convergence

39
Q

The internet has given everyone access to anything they would like to search, upload, and download anywhere in the world. Concerns regarding copyright have greatly increased because of this.

A

Scale

40
Q

This development can be attributed to the increasing __________ of media content and communications activities happening across the world, greatly complicating government regulatory efforts to control information.

A

Volume

41
Q

The popularity of social media such as Facebook, Twitter, and Instagram has made it possible for individuals to post anything they want. This also includes creation of blogs which have become mainstream media for individuals to showcase their talents, skills, and hobbies. This creates issues when it comes to content restriction as most people are doing this using their private accounts. Unless reported, the said content will be difficult to control.

A

Unprecedented individual empowerment

42
Q

One solution they have come up with is identifying exclusive rights to information, as with any given physical asset. This has led to the identification of ________________.

A

intellectual property rights

43
Q

refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. It includes musical, literary, and artistic works.

A

Intellectual Property

44
Q

are the rights given to persons over their creations. They usually give the creator an exclusive right over the use of his or her creation for a certain period of time.

A

Intellectual property rights (IPR)

45
Q

Republic Act No. 8293 s. 1998

A

Intellectual Property Code of the Philippines

46
Q

provides protection for original expression which includes literary, artistic, scholarly, and scientific creations. It also extends to derivative works such as illustrations, maps, photographic works, advertisements, computer programs, etc.

A

Copyright

47
Q

In the Philippines, all copyrighted materials are recorded and stored at the ___________ or _____________ (R.A. 10372, 2013).

A

National Library; Supreme Court Library

48
Q

is the permission granted to individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communications network. It is particularly related to the protection and realization of existing rights in the context of new digital technologies, especially the internet.

A

Digital rights

49
Q

used to describe the processes by which the author or publisher of a work exerts his or her rights to control what the purchaser of the work is entitled to do.

A

Digital rights management

50
Q

This represents the control by which one can prevent a person or an organization from copying, printing, editing, or otherwise making the privileged information available to other people.

A

Digital rights management

51
Q

The following are techniques designed to control access and reproduction of online information:

A

*Encryption
*Serial Keys
*Scrambling
*Tag Embedding

52
Q

the process of converting data or information in such a way that only authorized parties can understand.

A

Encryption

53
Q

Its primary purpose is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or other computer networks.

A

Encryption

54
Q

Also known as a product key or a software key, it is a series of alphanumeric characters acting as a key to denote that the product or software is original.

A

Serial Keys

55
Q

A ___________ is used to activate the operating system online.

A

product key

56
Q

_____________ helps maintain software authenticity by making sure no one else has used the same product key.

A

Online activation

57
Q

done to hide sensitive information from unauthorized users.

A

Data scrambling

58
Q

accomplished by the addition of components to the original signal or the changing of some important component of the original signal in order to make the extraction of the original signal difficult.

A

Scrambling

59
Q

Scrambling is often done with the aid of __________.

A

encryption

60
Q

Similar to how pictures can include watermarks to denote information on the owner of the picture,_________________ does the same to information content.

A

tag embedding

61
Q

a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for the public disclosure of an invention.

A

Patent

62
Q

a distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers.

A

Trademark

63
Q

Industries and companies need to have information control especially in dealing with sensitive industry secrets. To protect these industry secrets, also called trade secrets, companies usually require employees to sign contracts with _____________.

A

non-disclosure agreements (NDAs)

64
Q

Industry secrets is also known as…

A

trade secrets

65
Q

the term used for any method, formula, device, process, or any information that gives the business a unique competitive advantage over its competition. It includes company research and development information, software algorithms, inventions, designs, formulas, ingredients, and devices, among others.

A

Trade secret

66
Q

the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

A

Information privacy

67
Q

Information privacy is also known as…

A

Data privacy or Data protection

68
Q

a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.

A

Data Privacy Act or RA 10173