Ge - 5 (Living in The It Era) Module 4: Information, Control, and Privacy
Ge - 5 (Living in The It Era) Module 4: Information, Control, and Privacy
KEY TERMS
BSBA- Business software Alliance
CSS- Content Scramble System
DRM- Digital rights management
DVD- Digital versatile disc
IPR- Intellectual property rights
NDA- Non-disclosure agreements
NFC- Near field communicatios
PM- Private message
Conceptual resources- are non-tangible and considered valuable for what they represent.
Copyright- is a set of exclusive rights granted by a state to the creator of an original work or his
or her assignee for a limited period of time in exchange for public disclosure of the work, and
includes the right to copy, distribute, and adapt the work.
Data scrambling- is done to hide sensitive information from unauthorized users.
Digital rights- pertain to the permission of individuals to legitimately perform actions involving
the use of a computer, any electronic device, or a communications device.
Digital rights management- is used to described the processes by which the author or
publisher of a work exerts his or her rights to control what the purchaser of his or her works is
entitled to do.
Facts- are considered relevants truths which have been validated and identified.
Information- refers to processed data.
Information control-is allowing those who have appropriate authority access to and use of
information on the basis of the authority that they hold.
Intellectual property- is a number of distinc types of intangible assets for which a set of
exclusives rights are recognized.
Knowledge- refers to useful information.
Metadata- is used to identify rhe owner’s name, author, and date of purchase, among other
pertinent pieces of information.
Mobile commerce (m-commerce)- is the delivery of electronic commerce capabilities directly
into the consumer’s hand, anywhere, via wireless technology.
Patent- is a set of exclusive rights granted by a state to an inventor fot a limited period of time in
exchange for the public disclosure of an invention.
Personal data breach- is a subset of an security breach that actually leads to accidental or
unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data
transmitted, stored or otherwise processed.
Physical resources- are tangible and can be easily identified.
Scrambling- is accomplished by the addition of components to the original signal or the
changing of some important components of the original signal in order to make extraction of the
original signal difficult.
Security incident- is an event or occurrence that affects or tends to affect data protection, or
may compromise availability, integrity, or confidentiality.
Software piracy- is the unauthorized copying or distribution of copyrighted software. It can be
done through copying, downloading, sharing, selling, or installing multiple copies of software
onto personal or work computers.
Trade secret- is the term used for any method, formula, device, process, or any information that
gives the business a unique competitive advantage over its competitors.
Trademark- is a distinctive sign used by an individual, business organization, or other legal
entity to identity products or business to consumers. The mark comes from a unique source,
and it distinguishes its product (trademark) or services (service mark) from the others.
INTRODUCTION TO RESOURCES
Organizations treat company assets, such as buildings, equipment, and their manpower
is important resources. Resources are the total means available to a company for increasing
production or profit, including land, labor, capital and raw materials.
Without resources, organizations would case to exist. Imagine a bank without money, a
manufacturing plant without forklifts, or a school without teachers. These resources are known
as physical resources.. They are tangible and can be easily identified. Physical resources
usually start from acquisition and are then assembled to be available for use when needed.
Very often, the assembly process entails converting an essentially raw material into a refined
form, such as wood, cement and steel for building construction. Once these resources have
been assembled, a manager strives to maximize their use; this includes allocating space for
office use and identifying keys areas in the building plans. Finally, the manager asks for
replacement or repairs and maintenance of these resources at critical time before they become
inefficient or obsolete.
The other type of resources is called conceptual resources. Conceptual resources are
non-tangible and are considered valuable for what they represent rather that their physical make
up. Money is considered a conceptual resource as each paper bill represents a specific
monetary value as opposed to the paper where it is printed. The same goes for human
resources. While everyone can be considered employees in the company, their skill, knowledge,
and job experience set them apart from one another, thus identifying the staff, managers,
executives, and laborers.
INFORMATION AS A RESOURCES
Information can be simply defined as “Facts about something or someone that are provided or
learned.
COMPRESSIBLE. Although expanded information can give a more detailed explanation, it may
not always be needed.
DIFFUSIVE. Gossip or rumors tend to spread easily. Unfortunately, the same applies to any
kind of information- be it true or not.
SHARABLE. Since information can be easily spread, it is considered sharable as well.
Information can be kept calling it a secret.
VALUABLE INFORMATION
Information is said to be valuable if it has the following characteristics (Stair & Reynolds, 2016)
RELIABLE. Reliable information can be depended on. In many cases, the reliability of
information depends on the validity of the data collection method. In other cases, reliability
depends on the source of information, which brings us back to valuable information being
economical.
FLEXIBLE. Flexible information can be used different purposes. Depending on the situation,
personal information can be used for variety of ways.
SIMPLE. Information should also be simple, not overly complex. Sophisticated and detailed
information may not be needed. Complex information may sometimes lead to confusion which
could result in inaccuracy of details.
TIMELY. Timely information is delivered when it is needed. This is the true in the case of
weather predictions, stock market forecast, and traffic management.
VERIFIABLE. This means that information can be checked for correctness and authenticity.
Most author include references, bibliography, or citations in their works to enable readers to
verify the content.
Information, as a source, has four characteristics, namely it (1) has zero marginal cost; (2) is
non-rivalrous (3) is non-exclusive; and (4) does not exhibit high degrees of transparency
(Leickly,2004)
NON-RIVALROUS
Simultaneous consumption of information by consumers is possible. Movies nowadays are sold
not only as DVD copies. There are also digital formats which anyone can be watch online or
download on their mobile devices, either as a rental or paid subscription.
NON-EXCLUSIVE
Exclusion is not a natural property of information good, though it is possible to construct
exclusion artificially. However, the nature of information is that if it is known, it is difficult to
exclude others from its use. Through emails and SMS, one can be identify only intended
recipients of the message through specific email address or a phone number. However, emails
and SMS have the capability of forwarding the exact information to other recipients, without the
original sender knowing it. This is much more evident in social media such as Facebook. In
which a “share” automatically means sending to everyone else.
NO TRANSPARENCY
To evaluate the information, the information must be known, so one has to invest in learning
how to evaluate it. A programmer undergoing boot camp training to learn a new programming
language needs to invest time, money, and effort. The more complicated the training, the more
expensive the cost and the longer the time needed to learn it.
INFORMATION OVERLOAD
INFORMATION CONTROL
It is about allowing those who have appropriate authority access to and use of information on
the basis of the authority that they hold.
Software Policy
According to The Software Alliance (www.bsa.org) (2018), software policy is “the unauthorized
copying or distribution of copyrighted software… can be done through copying, downloading,
sharing, selling, or installing multiple copies of software onto personal or work computers.”
This typical scenario boils down to the fact that information is difficult to control. While measures
are in place, such as DVD region codes and such, Adam Thierer in 2011, identified four issues
which further complicate the problem on information control: (1) convergence, (2) scale, (3)
volume, and (4) unprecedented individual empowerment/ user-generation of content.
About an individual’s race, ethnic origin, marital status, age, color, and religion,
philosophical, or political affiliations;
About an individual’s health, education, genetic or sexual life of a person, or to any
proceeding or any offense committed or alleged to have committed;
Issued by government agencies “peculiar” (unique) to an individual, such as social
security number; and
Marked as classified by an Executive Order or an act of Congress.
All processing of sensitive and personal information is prohibited except in circumstances. The
exception are:
A. ESSAY. How do you protect your personal information online? What is the importance of information
control and privacy?
B. Identify a game you are familiar with and have played frequently online or on your mobile phone.
Explain briefly the mechanics of the game and the reasons why you like playing this game. List the game
items that players often buy to eiher improve their gaming skills or upgrade their avatars. Identify the
items that need virtual money and those that require real money. Give the advantages and disadvantages
of having your experience goods.
Items that require virtual money Items that require real money
Advantages Disadvantages