INFORMATION, CONTROL, AND PRIVACY Flashcards
the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials.
Resources
defined as “facts about something or someone that are provided or learned.”
Information
are considered relevant truths which have been validated and identified.
Facts
Information as a Resource:
Expandable
Compressible
Transportable
Diffusive
Sharable
Information can be expanded without compromising its integrity. In fact, by having additional information, much more can be understood from it. An example is a person’s personal information.
Expandable
Although expanded information can give a more detailed explanation, it may not always be needed. An example of this is in news sites. Instead of a barrage of details, news sites would often give one-liner headlines that provide enough information about the news.
Compressible
Information, especially digital information, is easily various transportable. With the use of the internet and technologies, information can be sent though any of the following:
*send via email
*share via Facebook
*copy onto a flash drive
*upload on YouTube
Transportable
Gossip or rumors tend to spread easily. Unfortunately, the same applies to any kind of information—be it true or not.
Diffusive
Information is not all different from other resources. Similar to how physical resources are managed, information is considered valuable and also has a life cycle. It begins with transforming raw materials into a finished product—processing data to come up with valuable information. Weather forecasting is one such example.
Sharable
Characteristics of Valuable Information:
Accurate
Complete
Economical
Reliable
Flexible
Relevant
Simple
Timely
Verifiable
Accessible
Secure
_____________ information is error-free.
Accurate
_____________ information contains all the important facts.
Complete
Information should be relatively ____________ to produce.
Economical
__________ information can be depended on.
Reliable
In some cases, inaccurate information is generated because inaccurate data was processed. Analysts call this as __________________.
“garbage-in-garbage out.”
Reliability is dependent on:
the validity of the data collection method
the source of information
_____________ information can be used for different purposes.
Flexible
_________ information is important to the decision-maker.
Relevant
Information should also be __________, not overly complex.
Simple
________ information is delivered when it is needed.
Timely
This means that information can be checked for correctness and authenticity.
Verifiable
Information should be easily ___________ by authorized users to be obtained in the right format at the right time to meet their needs.
Accessible
Information should be ________ from access by unauthorized users.
Secure
helps managers make good decisions which is why valuable or useful formation is called knowledge.
Valuable Information
Information, as a resource, has four characteristics, namely it
(1) has zero marginal cost;
(2) is non-rivalrous;
(3) is non-exclusive. and
(4) does not exhibit high degrees of transparency
The cost of producing the first copy of an information good may be substantial, but the cost of producing (or reproducing) additional copies is negligible.
Zero-marginal cost
Simultaneous consumption of information by consumers is possible. Movies nowadays are sold not only as DVD copies. There are also digital formats which anyone can watch online or download on their mobile devices, either as a rental or paid subscription.
Non-rivalrous
Exclusion is not a natural property of information goods, though it is possible to construct exclusion artificially However, the nature of information is that if it is known, it is difficult to exclude others from its use.
Non-exclusive
To evaluate the information, the information must be known, so one has to invest in learning how to evaluate it.
No transparency
describes the excess of information available to a person aiming to complete a task or make a decision.
Information Overload
Information overload impedes the ___________ process, resulting in a poor (or even no) decision being made.
decision-making
Information is now available so _________, ____________, and ______________.
quickly; ubiquitously; inexpensively
One zettabyte is equal to…
1,000,000,000 terabytes
or
one billion external drives
Information is produced at rapidly-increasing rates due to the following reasons:
*Easy duplication and transmission of information
*Increase in communication methods
*Growth archives of historical information
comes in the form of keeping secrets inside a business or selling IPR (Intellectual Property Rights) to those prepared to purchase it.
Information control
it is about allowing those who have appropriate authority access to and use of information on the basis of the authority that they hold.
Information control
the unauthorized copying or distribution of copyrighted software… can be done through copying downloading, sharing, selling or installing multiple copies of software onto personal or work computers.
Software piracy
Adam Thierer in 2011, identified four issues which further complicate the problem on information control:
(1) convergence,
(2) scale,
(3) volume, and
(4) unprecedented individual empowerment/user-generation of content.
it is now possible to disseminate, find, or consume the same content/ information via multiple devices or distribution networks.
Convergence
The internet has given everyone access to anything they would like to search, upload, and download anywhere in the world. Concerns regarding copyright have greatly increased because of this.
Scale
This development can be attributed to the increasing __________ of media content and communications activities happening across the world, greatly complicating government regulatory efforts to control information.
Volume
The popularity of social media such as Facebook, Twitter, and Instagram has made it possible for individuals to post anything they want. This also includes creation of blogs which have become mainstream media for individuals to showcase their talents, skills, and hobbies. This creates issues when it comes to content restriction as most people are doing this using their private accounts. Unless reported, the said content will be difficult to control.
Unprecedented individual empowerment
One solution they have come up with is identifying exclusive rights to information, as with any given physical asset. This has led to the identification of ________________.
intellectual property rights
refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. It includes musical, literary, and artistic works.
Intellectual Property
are the rights given to persons over their creations. They usually give the creator an exclusive right over the use of his or her creation for a certain period of time.
Intellectual property rights (IPR)
Republic Act No. 8293 s. 1998
Intellectual Property Code of the Philippines
provides protection for original expression which includes literary, artistic, scholarly, and scientific creations. It also extends to derivative works such as illustrations, maps, photographic works, advertisements, computer programs, etc.
Copyright
In the Philippines, all copyrighted materials are recorded and stored at the ___________ or _____________ (R.A. 10372, 2013).
National Library; Supreme Court Library
is the permission granted to individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communications network. It is particularly related to the protection and realization of existing rights in the context of new digital technologies, especially the internet.
Digital rights
used to describe the processes by which the author or publisher of a work exerts his or her rights to control what the purchaser of the work is entitled to do.
Digital rights management
This represents the control by which one can prevent a person or an organization from copying, printing, editing, or otherwise making the privileged information available to other people.
Digital rights management
The following are techniques designed to control access and reproduction of online information:
*Encryption
*Serial Keys
*Scrambling
*Tag Embedding
the process of converting data or information in such a way that only authorized parties can understand.
Encryption
Its primary purpose is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or other computer networks.
Encryption
Also known as a product key or a software key, it is a series of alphanumeric characters acting as a key to denote that the product or software is original.
Serial Keys
A ___________ is used to activate the operating system online.
product key
_____________ helps maintain software authenticity by making sure no one else has used the same product key.
Online activation
done to hide sensitive information from unauthorized users.
Data scrambling
accomplished by the addition of components to the original signal or the changing of some important component of the original signal in order to make the extraction of the original signal difficult.
Scrambling
Scrambling is often done with the aid of __________.
encryption
Similar to how pictures can include watermarks to denote information on the owner of the picture,_________________ does the same to information content.
tag embedding
a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for the public disclosure of an invention.
Patent
a distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers.
Trademark
Industries and companies need to have information control especially in dealing with sensitive industry secrets. To protect these industry secrets, also called trade secrets, companies usually require employees to sign contracts with _____________.
non-disclosure agreements (NDAs)
Industry secrets is also known as…
trade secrets
the term used for any method, formula, device, process, or any information that gives the business a unique competitive advantage over its competition. It includes company research and development information, software algorithms, inventions, designs, formulas, ingredients, and devices, among others.
Trade secret
the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
Information privacy
Information privacy is also known as…
Data privacy or Data protection
a law that seeks to protect all forms of information, be it private, personal, or sensitive. It is meant to cover both natural and juridical persons involved in the processing of personal information.
Data Privacy Act or RA 10173