Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
276 views
Lesson 4 IT Era
Uploaded by
Vince Paulo Valaquio
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Lesson-4-IT-Era For Later
Download
Save
Save Lesson-4-IT-Era For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
276 views
Lesson 4 IT Era
Uploaded by
Vince Paulo Valaquio
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Lesson-4-IT-Era For Later
Carousel Previous
Carousel Next
Save
Save Lesson-4-IT-Era For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 45
Search
Fullscreen
Information, Control, and Privacy At the end of this chapter, the students should be able to: 1. distinguish a physical resource from a conceptual resource; 2. identify the characteristics of information as a resource; 3. analyze the phenomenon of information overload brought by high internet penetration; 4. explain the major points of the revised Intellectual Property Code of the Philippines (Republic Act No. 10372); and 5. highlight the importance of information control and privacy by creating a video advertisement/awareness campaign.‘© Uving in the Information Technology Era ay (@) oPENING Activity ——— Reading Read the following paragraph excerpted from the “Letter to Isaac McPherson, August 13, 1813” in The Writings of Thomas Jefferson, Vol. XIU, edited by A. Lipscomb (1904): “If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself; but the moment it is divulged, it forces itself into the possession of everyone, and the receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possesses the less, because every other possesses the whole of it. He, who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me. That ideas should freely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without lessening their density at any point, and like the air in which we breathe, move, and have our physical being, incapable of confinement or exclusive ppropriation. Inventions then cannot, in nature, be a subject of property,” 1, What is your understanding of exclusive property? 2, How did Thomas Jefferson understand the principle of an “idea” as a non-exclusive property? 3. Is there a possibility of an “idea” becoming exclusive? 4. Do you agree with Thomas Jefferson's concept of an Sa) “idea”? ‘ feInformation, Control, and Privacy ® a A an (@ KEY TERMS BSA — Business Sofware Alliance CSS ~ Content Scramble System DRM - Digital rights management DVD ~ Digital versatile dise TPR - Intellectual property rights | NDA ~ Non-disclosure agreements NEC - Near field communications PM - Private message Conceptual resources - are non-tangible and considered valuable for what they represent. Copyright - is a set of exclusive rights granted by a state to the creator of an original work or his or her assignee for a limited period of time in exchange for public disclosure of the work, and includes the right to copy, distribute, and adapt the work. Data scrambling - is done to hide sensitive information from unauthorized users. Digital rights - pertain to the permission of individuals to legitimately perform actions involving the use of a computer, any | electronic device, or a communications network. Digital rights management — is used to describe the processes by which the author or publisher of a work exerts his or her rights to contro} what the purchaser of his or her work is entitled to do. Facts ~ are considered relevant truths which have been validated and identified, Information — refers to processed data, Information control - is allowing those who have appropriate authority access to and use of information on the basis of the authority that they hold, ?Intellectual property — is a number of distinct types of intangible assets for which a set of exclusive rights are recognized. Knowledge - refers to useful information. Metadata — is used to identify the owner’s name, author, and date of purchase, among other pertinent pieces of information. Mobile commerce (m-commerce) — is the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology. Patent — is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for the public disclosure of an invention. Personal data breach — is a subset of a security breach that actually leads to accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed. Physical resources — are tangible and can be easily identified. Scrambling — is accomplished by the addition of components to the original signal or the changing of some important components of the original signal in order to make extraction of the original signal difficult. Security incident — is an event or occurrence that affects or tends to affect data protection, or may compromise availability, integrity, or confidentiality, Software piracy - is the unauthorized copying or distribution of copyrighted software, It can be done through copying, downloading, sharing, selling, or installing multiple copies of software onto personal or work computers, Trade secret — is the term used for any method, formula, device, process, or any information that gives the business a unique competitive advantage over its competitors. Trademark — is a distinctive sign used by an individual, business organization, or other legal entity to identify products or servicesDAN Information, Control, and Privacy ~ an to consumers. The mark comes from a unique source, and it distinguishes its product (trademark) or services (service mark) from the others, Introduction to Resources Organizations treat company assets, such as buildings, equipment, and their manpower as important resources, Resources are the total means available to a company for increasing production or profit, including land, labor, capital, and raw materials, Without resources, organizations would cease to exist. Imagine a bank without money, a manufacturing plant without forklifts, or a school without teachers. These resources are known as physical resources. They are tangible and can be easily identified. Physical resources usually start from acquisition and are then assembled to be available for use when needed. Very often, the assembly process entails converting an essentially raw material into a refined form, such as wood, cement, and steel for building construction. Once these resources have been assembled, Figure 4.1 A building construction site ig g Aa manager — strives to maximize — their use; this includes allocating space for office use and identifying key areas in the building plans, Finally, the manager asks for replacement or repaits and maintenance of these resources at a critical time—before they become Figure 4.2 Philippine peso bills inefficient or obsolete. representing monetary values The other type of resource is called conceptual resources. Conceptual resources are non-tangible and are considered valuable for what they represent rather than their physical make- up. Money is considered a conceptual resource as each paper bill represents a specific monetary value as opposed to the paper where it is printed, The same goes for human resources. While everyone can be considered employees in a company, their skills, knowledge, and job experience set them apart from one another, thus identifying the staff, managers, executives, and laborers. Managers use conceptual resources to manage physical resources or vice versa. One such example is the use of computers in organizations. A computer unit, by itself, may cost thousands of pesos. However, once used, the content saved in those computer units become even more valuable resources, making the computer unit irreplaceable, The integrity of the saved files may be compromised, so security checks are often identified on the computer units—e.g,, firewalls, anti-virus, biometric access, etc.— to make sure they will not be lost, In this case, the saved computer files (conceptual resource) identify how the computer units (physical resource) will be managed, The same applies to personal assets such as smartphones, Losing a mobile phone is considered a tragedy, especially if it contains personal data, such pictures,Intormation, Control, and Privacy ©—~ \t \ a videos, and numerous contacts. The pictures, videos, and contact list saved in the phone are considered conceptual resources while the smartphone is the physical resource (managing the conceptual resources). In both instances, the conceptual resources identified are called information. Information as a Resource Information can be simply defined as “facts about something or someone that are provided or learned.” Facts are considered relevant truths which have been validated and identified. Data are considered facts; therefore, processed data are considered as information as they are organized in such a way that they have additional value beyond the value of the facts themselves. Unlike other organizational resources, information is considered: => Expandable Information can be expanded without compromising its integrity. In fact, by having additional information, much more can be understood from it. An example is a person’s personal information. While knowing his or her name, contact details and current work may be useful, having the person’s full curriculum vitae becomes more useful for those in, for example, the HR Department. => Compressible Although expanded information can give a more detailed explanation, it may not always be needed. An example of this is in news sites. Instead of a barrage of details, news sites would often give one-liner headlines that provide enough information about the news. Another example is research abstracts, An abstract is normally a half- or a one-page summary of the entire research. cy~~ Living in the Information Technology Era > Transportable Information, especially digital information, is easily transportable. With the use of the internet and various technologies, information can be sent though any of the following: 1. send via email 2. share via Facebook 3. copy onto a flash drive 4, upload on YouTube > Diffusive Gossip or rumors tend to spread easily. Unfortunately, the same applies to any kind of information—be it true or not. => Sharable Since information can be easily spread, it is considered sharable as well. Information can be kept calling it a secret. However, once a person decides to tell it to someone, then he or she will no longer have control over it. In some cases, certain parts of the secret can be kept. One such example is the secret recipe of KFC, It is known that there are 11 secret herbs and spices, but as to what these herbs and spices are, people can only guess, Information is not all different from other resources. Similar to how physical resources are managed, information is considered valuable and also has a life cycle, It begins with transforming raw materials into a finished product—processing data to come up with valuable information. Weather forecasting is one such example. Scientists use statistical data from previous days to predict possible weather conditions the next day. Another example is the academic grades of students in a university. By determining the students’ weighted average from first year to senior year,Vas Information, Control, and Privacy A \ the school can identify valedictorians and salutatorians based on their academic standing. Information can also be available in different grades and types, and prices can be measured in monetary equivalent. There are two options in acquiring software applications online: a free or trial version or a full version. Free versions have limitations in functionality. To maximize the full range of functions of a certain application, one should pay a certain amount depending on the type of upgrade needed. A certain software can have personal editions and enterprise editions, among others which cost more as the functions become broader in scope. Depending on how it is used, information can be substituted and its consumption can be either expanded or capitalized. An individual can search for a person’s contact number through a telephone book. The same information may also be found by directly calling the phone company and asking the operator for the needed details. But nowadays, you can also search for the contact details of people through the internet, specifically through social media such as Facebook and Twitter. Thus, contact details are no longer restricted to just phone numbers. A person’s contact details can now also include email addresses, mobile phone numbers, and even Twitter handles. And just like physical resources, the cost of information can be controlled through various accounting techniques. An example is the price difference of DVD movies in different countries like the Philippines and the U.S. DVD prices are controlled based on the region codes set by each country. Basically, a DVD can only play on a DVD player with the same region code setting (Hedden, 2017). This is to prevent people from say, the U.S., buying DVDs online from an e-commerce site in China, DVDs in countries like China are much cheaper than those in the U.S, due to “production costs.” However, bear in mind that the “production costs” mentioned here are not the costs in making the movie, but rather the costs in mass-producing the DVD.OP ting in the Information Teelhnology fra Just like physical resources, managing Information is just as important ax managing any other resource in the organization, such as people, money, and equipment, Information, information. related activities, technologies, and personnel are also important oranizational resources, Valuable Information Let us say your professor assigns you to research on the different parts of a computer system, You plan to look for information online through search engines such as Google, How can you tell if the information you get is useful, or in this case, valuable for your research? Information is said to be valuable if it has the following characteristics (Stair & Reynolds, 2016): + Accurate Accurate information is error-free. In some cases, inaccurate information is generated because inaccurate data was processed, Analysts call this as “garbage-in-garbage- out.” By typing “parts of a computer” in the search bar, Google gives you a list of several websites which contain the information you are looking for. However, how do you determine which are accurate and which are inaccurate? Usually, it is better to trust sites that are formal in nature rather than informal ones such as blogs or forums. Table 4,1 Formal Information vs. Informal Information Formal Information» ©) | sInformal Information It is official and authoritative, It Is more casual, and less authoritative. It is meant to be taken seriously and Is | It is presented in a less presented in a formal manner. formal manner, It Is usually more carefully prepared It Is possibly less reliable. and verified than Informal Information, and Its accuracy and rellability should also be higher,° 1) Xo Information, Control, and Privacy —~” 1! Formal information for your research work could come from technical websites as well as academic websites. Pieces of informal information can still be considered accurate as long as they provide enough reference and the data can later be verified from the said reference. Bits of informal information include those from blogs, wikis, social sites, and public forums. Nowadays, the use of wikis has become a norm when it comes to information research, The most popular wiki today is Wikipedia.org. The question, however, is; How accurate is the content in Wikipedia.org? Complete Complete information contains all the important facts. This is especially important in the field of medicine. Missing information could spell disaster, or worse, lead to death. If the information regarding allergies has been left out, doctors might inadvertently give wrong medication that could cause severe allergic reactions to the patient. Economical Information should be relatively economical to produce. Decision-makers must always balance the value of information with the cost of producing it. With the spread of the internet, information dissemination has become easier, faster, and a lot cheaper. However, is the price worth it for the integrity of the information? Reliable Reliable information can be depended on. In many cases, the reliability of information depends on the validity of the data collection method, In other cases, reliability depends on the source of information, which brings us back to valuable information being economical. Torrent sites offer pirated software, music, and movies for free. However, the resolution *, of the movie downloaded, for example, might not be clear and ? oLiving in the Information Technology Era might even contain malware and virus that could infect the computer system. Flexible Flexible information can be used for different purposes, Depending on the situation, personal information can be used for a variety of ways. A school ID can be used to enter the school premises. The same ID can be used to transact business with the registrar's office during enrolment. It can be used to open a bank account or to apply for a student driver’s permit. Relevant Relevant information is important to the decision-maker. For example, your assignment calls for searching “parts of a computer” online. You do not visit sites that tackle “parts of the human body” because they are irrelevant to your research topic. Simple Information should also be simple, not overly complex. Sophisticated and detailed information may not be needed. Complex information may sometimes lead to confusion which could result in inaccuracy of details. Timely Timely information is delivered when it is needed. This is true in the case of weather predictions, stock market forecasts, and traffic management. Verifiable This means that information can be checked for correctness and authenticity. Most authors include references, bibliography, or citations in their works to enable readers to verify the content,Information, Control, and Privacy => Accessible Information should be easily accessible by authorized users to be obtained in the right format at the right time to meet their needs, In Korea, the U.S., the U.K., and China, a mobile phone can be used to pay for day-to-day transactions. A mobile pay app can be downloaded on the smartphone in which the user’s credit card or debit card is enrolled. Samsung Pay, Apple Pay, and Google Pay all use near-field communications (NFC) technology so instead of swiping the physical card for payment, the mobile phone is simply tapped on the card reader or terminal and payment is immediately recorded (Savwvides, 2017). = Secure Information should be secure from access by unauthorized users. Mobile pay systems such as Samsung Pay and Apple Pay use biometric authentication, typically a fingerprint scan, before a transaction is made. This ensures that only the owner of the phone can use the app for payments. Value of Information Information is considered valuable mainly for business purposes as businesses depend on it to produce quality products and services. This helps organizations become globally competitive and be up to date with the latest trends and technology. With businesses gearing towards IT automation, the strategy now is to come up with business activities that shorten time frames while increasing productivity, All of this is possible if companies have access to valuable information, Valuable information helps managers make good decisions which is why valuable or useful information is called knowledge. Some pieces of information have entertainment value, and some have business value, but regardless of the source of value, People are willing to pay for information. Many strategies for Purveyors of information are based on the fact that consumers 5 Lay ad ~differ greatly on how they value particular information goods, Some information is given away for free. Examples are weather forecasts, stock index, and personal information. However, as valuable as it may be, a phone number cannot be sold, But some information is costly such as cable TV subscriptions—the more channels, the more expensive the monthly cable bill. So how much will valuable information cost you? Information, as a resource, has four characteristics, namely it (1) has zero marginal cost; (2) is non-rivalrous; (3) is non-exclusive; and (4) does not exhibit high degrees of transparency (Leickly, 2004). > Zero-marginal cost The cost of producing the first copy of an information good may be substantial, but the cost of producing (or reproducing) additional copies is negligible. Avengers: Age of Ultron released in 2015 is one of the most expensive Hollywood movies ever made with an estimated budget of US$250,000,000. However, buying a DVD copy of the said movie today would cost about $20 in Amazon.com, + Non-rivalrous Simultaneous consumption of information by consumers is possible. Movies nowadays are sold not only as DVD copies. There are also digital formats which anyone can watch online or download on their mobile devices, either as a rental or paid subscription. + Non-exclusive Exclusion is not a natural property of information goods, though it is possible to construct exclusion artificially. However, the nature of information is that if it is known, it is difficult to exclude others from its use. Through emails and SMS, one can identify only intended recipients of the message through a specific email address or a phone number. However, emails and SMS have the capability of forwarding the exactInformation, Control, and Privacy information to other recipients, without the original sender knowing it. This is much more evident in social media such as Facebook, in which a “share” automatically means sending to everyone else. > No transparency To evaluate the information, the information must be known, so one has to invest in learning how to evaluate it. A programmer undergoing boot camp training to learn a new programming language needs to invest time, money, and effort. The more complicated the training, the more expensive the cost and the longer the time needed to learn it. Information Economics Since people have widely different values for a particular piece of information, value-based pricing leads naturally to differential pricing. In economics,a good is considered to be an experience good if consumers must experience it to value it. Virtually any new product is an experience good, and marketers have developed strategies such as free samples, promotional pricing, and testimonials to help consumers learn about new goods. Information, on the other hand, may be treated differently, since it is not the asset that provides value in today’s economy: what provides value is the information about the asset. When buying a shirt, customers are given the opportunity to try it on prior to deciding if they want to buy it or not. Food catering companies offer free taste tests of their complete menu so their customers get to experience the food they offer prior to reserving for an event. With information, organizations cannot give the full experience to customers as this could mean lost interest afterwards. Imagine you are in a movie theater and you are choosing from two movies to watch, If the movies are to be treated the same way as the shirt and the food, that would mean you need to watch both movies in their entirety before you decide which one is good to watch. The decision would make no sense anymore UD a ay a a.Sy as you were able to watch both movies anyway. To avoid this situation, organizations use various strategies to get wary customers to overcome their reluctance to purchase information before they know what they are getting. The tension between giving away your information—to let people know what you have to offer— and charging them for it to recover your costs, is a fundamental problem in the information economy. These strategies include browsing previews, branding, and reputation, > Browsing previews An example of this strategy is movie trailers. Movie trailers that normally run from 1 to 3 minutes give viewers a glimpse of what the film is all about. Trailers normally include highlights from the film which can leave the audience excited to watch the entire film later on. Another example is music downloaded from iTunes. A 5- to 15-second preview of the song can be listened to prior to buying it. This gives the user an idea of the song he or she wants to download if it is worth the amount to be paid, > Branding Big names such as Microsoft and Apple have no issues when it comes to launching new products as people have already established their trust on these brands, According to American telecommunications (telco) company, Sprint, when Apple introduced iPhone 7 in September 2016, pre-order sales shot up by 375% compared to the launch of iPhone 6. ~» Reputation When a movie is announced, people would often be skeptical if it would be good enough. However, the reputation of directors and the cast of actors and actresses normally remove this skepticism. For example, Michael Bay is known for successfully directing the Transformers movie franchise. This reputation has made his movies blockbuster hits as people have made a connection that if it isa Michael Bay film,VW nr Information, Control, and Privacy © it must be good. This is the reason why his films would often include an introduction as a “Michael Bay film” instead of just the movie introducing itself. In the digital world, an experience good may not necessarily translate into a good which is physical or directly used by consumers. With mobile games becoming more popular, users feel the need to excel in them, in which the need for more equipment, higher experience levels, and better gaming results becorne more of a necessity. For this reason, game apps offer virtual goods such character gears, equipment, and even level-up boosts in exchange for virtual money. However, there are cases in which some would pay real money, usually in U.S. dollars, in exchange for a virtual item. In general, people value an organization’s ability to make their lives easier and better by using information about their products and operations. This includes providing pre-determined information to lessen the decision-making of individuals. Think of it as providing additional information regarding the information itself. Google.com is an example. Whenever you try to search for something in Google Search, it gives you a list of websites that pertain to the keywords you have typed in, This means that Google has provided you with a list of information regarding the information you are looking for. Another example is buying online via Amazon.com. When you browse through different items, Amazon would also suggest at the bottom of the screen other items related to what you are looking for, or inform you about what other items people who bought the item you are looking at also bought. Information Overload Information is now available so quickly, ubiquitously, and inexpensively, Last March 2016, Cisco conducted a study that by the end of 2016, global internet traffic will have reached 1.1 zettabytes per year, and by 2019, global traffic is expected to hit 2 zettabytes per year. Just how big is 1 zettabyte? A typical external 4799 — \\ as oy, f oOa § Living in the Information Technology Era we drive is 1 terabyte in size. One zettabyte is equal to 1,000,000,000 terabytes or one billion external drives. This is because information is produced at rapidly-increasing rates due to the following reasons: +> Easy duplication and transmission of information A picture posted on Facebook which is also posted on Instagram and Twitter means that the same picture has been posted three times on three different sites. + Increase in communication methods What used to be mobile phones for SMS and computers for emails are smartphones that can do both. Also, a simple text message is no longer restricted to SMS via telco providers. Through mobile apps such as Viber and Messenger, people can now send private messages (PM) or direct messages (DM). Connect. Freely.” Figure 4.3 Messaging apps: Messenger and Viber ~ Growth archives of historical information Print or hard copies are now being replaced by digital ones, These digital copies are stored on cloud servers that offer maximum storage capacity for end users, One such example is libraries which contain not only physical books but also computers and other mobile devices to access e-books, ejournals, electronic readings, and other online resources.LP ox Information, Control, and Privacy a? \l } Figure 4.4 Electronic readings So where does all this information come from? Who and where are these producers and consumers of information? According to the 2018 Global Digital Suite of reports from We Are Social and Hootsuite: * More than half the world now uses the internet (up to 7 percent year-on-year). * Qatar and United Arab Emirates top the internet penetration ranking with 99% of their total population using the internet. + For three years in a row, Filipinos have been spending the greatest amount of time on social media with an average of four hours a day, * More than two-thirds of the world’s population now has a mobile phone, with most people now using smartphones. * More than half of the world’s web traffic now comes from mobile phones, * More than 60% of all mobile connections around the world are now ‘broadband,’ * More than one in five of the world’s population shopped online in the past 30 days. oS aa imE 7 i y ” Hootsuite Figure 4.5 Digital around the world In 2018 Compared to the year 2017, 2018 has seen exponential growth in terms of digital information. This could be attributed to the fast growing internet as well as to the latest technological advancements, especially in mobile devices. The infographic above shows the number of internet users, active social media users, unique mobile users, and active mobile social users. The study also highlights how social media has created a big impact on internet usage with Facebook dominating the global social landscape, reaching more than 2 billion users at the start of 2018. This report reveals that while the Philippines has one of the slowest fixed internet connections in the world - 4.2 Mbps compared to the global average of 6.3 Mbps, the country has one of the fastest mobile connection speed, averaging at 13.9 Mbps. This is probably the reason why more Filipinos like to spend their time online through different social media sites such as Facebook and YouTube. This report further reveals that the Philippines topped the ranking for time spent on social media among other countries, with Filipinos spending almost four hours a day on social media compared to people in other countries (Kemp, 2018).UMS > Information, Control, and Privacy — Ne With the overwhelming “amounts” of data brought about x by the exponential growth of internet users—both producers and consumers of information—information overload, as in dealing with too much information for one to absorb, happens. Mobile Social Media and Mobile Commerce The abundance of mobile devices has greatly changed the way people manage their day-to-day activities. In business, for example, having a shop where customers can easily go to used to be enough. However, with the introduction of the internet, market shifted from a brick-and-mortar set-up to an online operation more commonly known as e-commerce. And now with mobile internet, people can access internet services without the need for computers. They have their smartphones, tablets, and other mobile devices connected to the network to send and receive information wherever they are and whenever they want to. This connectivity has paved the way to two new scenarios in communication: =» Mobile social media Mobile social media is the accessing of social media sites, such as Facebook and Snapchat, using a mobile device. The device may have an app installed to open Instagram, for example, or it can use a browser installed in the mobile device to open Twitter. A study conducted by ComScore in 2016 reveals the impact of social media on internet users. The same study also shows that nearly 80% of individuals browse through their social media accounts using their mobile phones. Noticeably, people are using their desktops less and less in accessing websites, Mobile has grown so fast that it’s now the leading digital platform, with a total activity on smartphones and tablets accounting for 62% of digital media time spent, and apps alone now representing the majority of digital media time at 54% (Lella & Lipsman, 2016). eo,- Yo > M-commerce M-commerce or mobile commerce was a term used during the 1997 Global Mobile Commerce Forum by Kevin Duffey. He described it as the delivery of electronic commerce capabilities directly into the consumer's hand, anywhere, via wireless technology. The use of mobile devices has paved the way for data to be transmitted and received much faster, without compromising security and scalability. The global trend in using mobile devices for socializing and doing commercial transactions is increasing. Companies are now using digital platforms to market their products and services. Industries that are now embracing m-commerce include: 1. Financial services — Banks have introduced online banking a few years back. However, nowadays, majority of bank transactions such as money transfers, bills payment, and even stock portfolios and stock transactions can now be done using the bank’s mobile app. 2. Mobile ticketing — As payments can be done online, receipts of transactions can also be sent on mobile devices. Airline companies encourage their customers to book their flights online, after which, their booking reservation is sent via email or through their mobile app. The booking ticket can be shown at the airport and is accepted even as an electronic copy. 3, Service/retail - As consumers are now able to place and pay for orders using their mobile devices, the e-commerce trend has shifted from desktop computers to mobile devices, And it does not just include retail items, It also includes content purchasing such as music, movies, and images, among others. Another trend seen is the in-application purchases ° made by mobile phone users, This is prevalent in gaming applications in which users buy virtual goods for power boost or upgrade to the next game level.Information, Control, and Privacy oN 4. Information services — These include the delivery of news, stock quotes, sports figures, emergency reports, and weather and traffic updates to a single mobile device, Waze is an example of an application that delivers customized traffic information which is based on a user’s actual travel patterns, It uses geo-location technology to pinpoint the whereabouts of the user while on the move. Another example of an application that uses location-based services is Google Maps. Information Control With so much information around, how do you make sure they are safe from illegal activities? A large requirement for information control comes from commerce, industry, and Copyright owners in general. Information control comes in the form of keeping secrets inside a business or selling IPR (intellectual Property Rights) to those prepared to purchase it. Information control is about allowing those who have appropriate authority access to and use of information on the basis of the authority that they hold. But why is there a need for control in the first place? Earlier in this chapter, the concept of information being non-rivalrous and non-exclusive has been discussed. An example is movies being sold in different formats— DVDs, MP4, etc. If that is the case, how can you make sure that the said movie will not be distributed illegally? Software Piracy Let's say you wanted to watch the latest movie showing in the cinemas. However, you decided to save the money instead, so you bought a pirated DVD copy of the film in one of the market places you passed by on your way home. Upon watching it, you noticed the film was taken by a video camera inside the cinema and you can hear the audience laughing, and see shadows walking back and forth, which obviously were not part of the film. 49790 G o© Uving In the Inforrnation Technology Era In the end, you decided to download a torrent file of the film, hoping for a better quality, only to discover that it was the same pirated video you saw in the pirated DVD. According to The Software Alliance (www.bsa.org) (2018), software piracy is “the unauthorized copying or distribution of copyrighted software... can be done through copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers.” Most software has licenses, such as activation keys, that are normally identified with just one computer. Having a pirated software means trying to use the same key for several computers. Some people upload software onto a website so others can download it, as is the case of using torrent to upload/download a movie. Examples of software piracy as identified by The Software Alliance (2018) include: + Distributing software or mobile apps from the internet in a manner that violates the license terms + Buying a single copy of a software program and installing it on multiple devices without authorization * Making and/or sharing copies of installation CDs * Sharing the login credentials (without authorization) used to access a web-based software application (“Software as a Service”) Some might say, “I paid for the software already, shouldn’t that be mine to use and distribute wherever and whenever I want to?” As with the discussion earlier this chapter regarding information having zero-marginal cost, buying a DVD copy of a movie costing 10 dollars, does not mean buying the movie itself. Thus, paying for the movie does not mean you are buying the actual movie, but paying for the license to watch it for personal use, So just because a person bought an original DVD of the movie does not mean that he or she can create copies and distribute it or share it online.Information, Contro!, and Privacy ®—“ This typical scenario boils down to the fact that information \ is difficult to control, While measures are in place, such as DVD region codes and such, Adam Thierer in 2011, identified four issues which further complicate the problem on information control; (1) convergence, (2) scale, (3) volume, and (4) unprecedented individual empowerment/user-generation of content, 1, Convergence Technological advancements and social media have paved the way for media content such as music and movies to be distributed from their “traditional” distribution platforms. What consumers used to buy in the form of CDs or DVDs, media content can now be searched, accessed, and consumed using multiple devices and even through different distribution networks, One such example is Spotify. Consumers before would buy physical albums in the form of CDs, then later transitioned to digital copies typically bought via iTunes Store for Apple. However, with social media having a big effect on song reviews and recommendations, a mobile app such as Spotify is able to create playlists which can be listened to, and if wanted, downloaded for a fee. As a result, it is now possible to disseminate, find, or consume the same content/ information via multiple devices or distribution networks. This convergence of devices and networks, according to Thierer (2011), has created issues instead of maintaining an effective information control policy. Another such example is an application called VideoFX which is available in Google Play, According to the app description, you can “create amazing lip sync music videos with special effects and your choice of music. Simply select a music track and start lip syncing! Make videos that you'll be proud to share with your friends!” In one mobile device, you can take a video, select a saved aeF 2, L Living in the Information Technology Era nN music file, and send it to a social media platform such as Facebook or Twitter. The issue here is, what if the music used is copyrighted? . Scale For those who like to watch Japanese animé and Korean dramas, English subtitles are a must. Before, fans would wait days or weeks before the subtitles become available for viewing. This is because the subtitles are actually translated, edited, and embedded by fans of the show, most of whom are not professionals. Majority of them are students and young adults who simply like watching the series. With technology and fast internet connectivity, viewers no longer need to wait days to watch the foreign shows with English subtitles. Oftentimes, the subtitles are ready within a few hours after the show has been aired in its local country. This is because the internet has given everyone access to anything they would like to search, upload, and download anywhere in the world. Technology such as Google Translate has also helped make translation of these shows much faster. Concerns regarding copyright have greatly increased because of this. But while some countries such as China and North Korea impose certain restrictions on what their citizens can and cannot access online, Thierer (2011) mentions that “the scale of modern digital speech and content dissemination [still] greatly complicates government efforts to control information flows.” . Volume Nowadays, news and media outlets abound in print and online. News agencies such as Manila Bulletin or The Philippine Star have not only print copies of their news (i.¢., newspapers) but also digital copies which can be accessed through their websites mb.com.ph and www.philstar.com, respectively, Broadcasting companiesBOUTIGUOT, VOU, SU Ny IN such as ABS-CBN and GMA7 also have television broadcasts, radio broadcasts, TV radios, and news websites, most of which have the same content. This development can be attributed to the increasing volume of media content and communications activities happening across the world, greatly complicating government regulatory efforts to control information. 4, Unprecedented individual empowerment The popularity of social media such as Facebook, Twitter, and Instagram has made it possible for individuals to post anything they want. This also includes creation of blogs which have become mainstream media for individuals to showcase their talents, skills, and hobbies. This creates issues when it comes to content restriction as most people are doing this using their private accounts. Unless reported, the said content will be difficult to control. So how do we control information dissemination? Organizations, such as The Software Alliance, software industries such as Microsoft and IBM, as well as government entities in countries across the globe, are working hand in hand to solve the issue of software piracy. One solution they have come up with is identifying exclusive rights to information, as with any given physical asset, This has led to the identification of intellectual property rights, Intellectual Property (IP) Intellectual property (IP) refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. IP includes musical, literary, and artistic works such as Taylor Swift’s new album, J. K. Rowling’s new book, and the latest iPhone. However, IP is not just limited to these items. It can o—~ also include words, phrases, symbols, and even designs. Are you familiar with the following logos found in Figure 4.67 of ¢oY te Figure 4.6 Popular logos IP is any creation or product of the human mind and may be expressed in the form of original ideas, expressions, and processes. Intellectual property rights (IPR) are the rights given to persons over their creations. They usually give the creator an exclusive right over the use of his or her creation for a certain period of time. According to the Intelectual Property Code of the Philippines (Republic Act No. 8293 s. 1998), IPR consists of the following: 1. Copyright and related rights 2. Trademarks and service marks 3. Geographic indications 4. Industrial design 5. Patents 6. Layout designs (topographies) of Integrated Circuits (ICs) 7. Protection of undisclosed information The Intellectual Property Office of the Philippines (IP Philippines) is the government agency in charge of the implementation of the law protecting intellectual property rights in the Philippines as provided for under R.A. 8293, or the Intellectual Property Code of the Philippines, and the revised Intellectual Property Code of the Philippines known as R.A. 10372. Copyright and Related Rights Copyright is a set of exclusive rights granted by a state to the creator of an original work or their assignee for a limited period of time in exchange for public disclosure of the work, and includesY Information, Control, and Privacy 7 a the right to copy, distribute, and adapt the work. Copyright owners can license or permanently transfer or assign their exclusive rights to others. Digital rights, on the other hand, is the permission granted to individuals to legitimately perform actions involving the use of a computer, any electronic device, or a communications network. It is particularly related to the protection and realization of existing rights in the context of new digital technologies, especially the internet. Copyright provides protection for original expression which includes literary, artistic, scholarly, and scientific creations such as books, articles, newspapers, lectures, letters, musical compositions, and paintings. It also extends to derivative works such as illustrations, maps, photographic works, advertisements, computer programs, etc. In the Philippines, all copyrighted materials are recorded and stored at the National Library or the Supreme Court Library (RA. 10372, 2013). Digital Rights Management Digital rights management (DRM) is used to describe the processes by which the author or publisher of a work exerts his or her rights to control what the purchaser of the work is entitled to do. This represents the control by which one can prevent a person or an organization from copying, printing, editing, or otherwise making the privileged information available to other people. With the introduction of technology and the internet, the print age is slowly becoming obsolete with publishers shifting to the digital age. Before, a person needed to copy or re-print a physical book for additional copies. With digital technologies, copies are made at zero cost with minimal detection, And it is not just books, Movies, music, software applications, etc, can now be copied and shared faster, with less cost. With this set-up, the prevalence of peer-to-peer (P2P) and torrent sites have made information control much harder. ai > Uwing in the Information Technology Era While information gets to be disseminated faster to consurners, control as to how it is shared becomes an issue. Downloading pirated music online does not help the music artists as they are deprived of the royalties they are entitled to, At the same tirne, getting the music for free does not mean being safe from malicious software and hacking attacks. Thus, companies and organizations have come up with possible solutions to this digital dilemma. The following are techniques designed to control access and reproduction of online information: 1. Encryption Encryption is the process of converting data or information in such a way that only authorized parties can understand. Its primary purpose is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or other computer networks. Encryption occurs every time someone uses an ATM or buys something online with a smartphone, makes a mobile phone call, or presses a key fob to unlock a car. This is done so that information being sent is kept safe and secure. DRM systems for multimedia often encrypt material in such a way that only a particular device can play or retrieve it, enforcing constraints on how it is used. DVDs use an encryption scheme to prevent users from viewing discs on unauthorized players. This is the concept of region coding discussed earlier, Region coding prevents discs sold in one part of the world from being used on players sold in another. 2, Serial keys Also known as a product key or a software key, it is a series of alphanumeric characters acting as a key to denote that the product or software is original. In some cases,Information, Control, and Privacy © product keys are used for product activation. One such example is Microsoft Windows OS. A product key is used to activate the operating system online. Online activation helps maintain software authenticity by making sure no one else has used the same product key. . Scrambling Data scrambling is done to hide sensitive information from unauthorized users. Scrambling is accomplished by the addition of components to the original signal or the changing of some important component of the original signal in order to make the extraction of the original signal difficult. It is often done with the aid of encryption. While region coding identifies which players can only play certain DVDs, computers with DVD drives become another option for would-be pirates. Thus, the content scramble system (CSS) was introduced to restrict access to content only for licensed applications. Meaning, even if the DVD was recognized by the DVD player in a computer, certain applications or programs needed to play the video might not allow it. . Tag embedding Similar to how pictures can include watermarks to denote information on the owner of the picture, tag embedding does the same to information content. Watermarks are not complete DRM mechanisms in their own right, but are used as part of a system for copyright enforcement, such as helping provide prosecution evidence for legal purposes, rather than direct technological restriction. In terms of data embedded into the actual content, the use of metadata is included to identify the owner's name, author, and date of purchase, among other pertinent information. U ANof Living in the Information Technology Era Patent A patent is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for the public disclosure of an invention. The exclusive right granted to a patentee in most countries is the right to prevent others from making, using, selling, or distributing the patented invention without permission. One example of a patented design is that of Apple's iPod. ZA Figure 4.7 Apple's iPod Trademark A trademark is a distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers, The mark comes from a unique source, and it distinguishes its product (trademark) or services (service mark) from the others, Rights in a mark shall be acquired through registration made validly in accordance with the provisions of the IP code, For marks with geographical indications, a notice stating that a given product originates in a given geographical area must be identified. This is relatively new in the Philippine IP regime as marks are identified based on the territory, region, or locality attributed. In the Philippines, one of the most popular trademarks based on locality is the Pampanga's Best delicacies logo.YY Information, Control, and Privacy —_ aN Protection of Undisclosed Information Industries and companies need to have information control especially in dealing with sensitive industry secrets. To protect these industry secrets, also called trade secrets, companies usually require employees to sign contracts with non-disclosure agreements (NDAs). Trade secret is the term used for any method, formula, device, process, or any information that gives the business a unique competitive advantage over its competition. It includes company research and development information, software algorithms, inventions, designs, formulas, ingredients, and devices, among others. Examples of popular trade secrets are the formulation of Coca-Cola and Listerine, and the recipe of Kentucky Fried Chicken (KFC). Table 4.2 IPR terms of protection and penalties as stated in R.A. 8293 Copyright Generally, 1st offense: P50,000 to 150,000 throughout the life | and/or 1-3 years imprisonment ofthe author plus | 2nd offense: 150,000 to 50 years after his or | 500,000 and/or 3-6 years her death imprisonment 3rd and subsequent offenses: 500,000 to P1.5M and/or 6-9 years imprisonment 20 years Not less than ®100,000 to not (time-bound) more than P300,000 and/or not less than 6 months to not more than 3 years imprisonment Trademark 10 years from the 50,000 to P200,000 and date of filing ofthe | 2 to 5 years imprisonment application 139Information Privacy The natural state of data is to be copied, logged, transmitted, stored, and stored again. This is why it takes constant fighting and vigilance to prevent that breach. So what is information privacy and how private is private? With Facebook and Twitter often being used as a means of venting out in public, others may say, “It’s my choice in telling everyone on Twitter what I want to say!” Some might even reveal too much information which can be regarded or termed as inappropriate. However, again, it is their choice to tell everyone what is supposed to be private information. If that is the case, then, what is data privacy? To understand the concept of data privacy, look at Yahoo’s privacy policy (now under a single privacy policy with Oath) when registering for an email address on Figure 4.8. To highlight a portion of the Yahoo privacy policy, Oath (2018) and its affiliates, including Yahoo, “collect information from your devices....This information includes device specific identifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and software data.” (Information Collection and Use-General) Knowing a person’s IP address can help identify that person’s physical location anywhere in the world. A cookie is a small file that is stored in the computer's directory, often a temporary folder. The cookie contains addresses of websites visited, login credentials, and even credit card account numbers. This is done so that the next time the person visits the website, the computer system will no longer reload the same content or data, saving time and processing power for the computer, Obviously, however, this is dangerous, especially when using public computers, such as those in internet shops, as the next user will be able to access the previous user's account without the latter’s knowing it.oO Welcome to the Oath Privacy Center In.June 2017, we announced thet Yahoo and ACK. had pind ta tacaema Oath a deft and mote media company and part of Verizon Ware naw bringing Cath ard (iron under a single privacy policy. Some things haven! changed tha tha: dt [Provide fo help you manage your experience withius I yous herve an AOL account. you wil need to agree to thes Privacy Policy Ht yorshem his Privacy Policy. the legacy Yatio Privacy Policy oF legacy Ont J AOL) sti apply to your account For Oath products or services that are accecced without signing Into an account, this Privacy Policy apples to those pronturcts ard Services starting May 26,2018 Wyouare creating aren acceurt the terms balou apply starting today Lastupdated Api 2018 Our Privacy Pledge ‘Our commitmentis to put users first. We strive to be traneparert abras how we client ‘and.use your information, to keep your information secure and ta pronica ss (choices. This Privacy Policy Is meant tohelp yauunderstand what information Oath ts affiates and its house of global braniéa ( Oath," us" “our” or“ we") Collect, why we collect it and what we do with it. This policy applies to Cath brands, websites, apps, advertising services, products, services or technologies twe'l collectively refer to these as Services’). Additional privacy practices for cartain Services can be found in Details for Specific Products and Services. Your Controls ‘We believe you should have tools to control your information. You can find contrais % manage or review your account information, marketing preferences, location cata arc ‘search history at Privacy Controls. Some of our Services provide additional cortrais and privacy practices. (See, Details for Specific Products and Services} Information Collection and Use - General We may collect and combine information when youinteract with Oath Services including: + Information You Provide to Us. We may collect the information that you provide tous, suchas: + When youcreate an account with an Oath Service or brand (Please nots, when you use our Services, we may recognize you or your devices even if youarenot signed in to our Services) Oath may use device IDs, cockies, and other signals, including information obtained trom thurd partes, 10 associate accounts and/or devices with you Figure 4.8 Oath’s privacy policy This policy regarding the computer’s IP address and cookie information is mostly common to other services including Google Mail, Facebook, etc. Yahoo is considered a trusted website. Most people believe an organization such as Yahoo will never compromise their privacy. How about other websites such as Facebook? Facebook has had several revisions on its privacy policies. According to a BBC news article in 2015, Facebook claims that protecting the privacy of people and their information on Facebook is one of its highest priorities. However, it is not Facebook that has come under fire. It is the Facebook quizzes Ay a,Nee ay Living in the Information Technology Era made available to everyone offering answers to trivial questions such as “who will be your soulmate,” “who is your celebrity look-a-like,” ete, The quiz highlighted in the article was the Word Cloud Facebook quiz or the “most used words” Facebook quiz, Apparently, by taking the Word Cloud quiz, you have given the game developers access to everything in your Facebook profile including your name, profile picture, age, sex, birthday, entire friends list, everything you have posted on your timeline, all of your photos, home town, education, employment history, and everything you have ever liked. It starts with the game asking you to login to your Facebook account. Declining means you will not be able to see the results of the quiz. Interactive content firm Vonvon produced the “most used words” quiz reaching an audience of more than 50 million. Since the printing of the article, Vonvon has adjusted the scope of data request to the minimum requirement so that users who take the quiz will now have the opportunity to edit the data they provide to Vonvon, such as their timeline data and not their friends lists (Wakefield, 2015). This is the reason why it is important to transact only with trusted sites and to avoid doing private transactions, such as online payments, on public computers. It is also important to always logout of your online accounts, such as emails, after using them, be it on a private computer or otherwise. Also, avoid unknown sites and applications which require you to enter personal credentials like Facebook accounts or passwords. This could be a means for acquiring your personal information for marketing use, or worse, identity phishing. Data Privacy Act 10173 With all of these pieces of information made available online and the possible problems such situation may create, countries have come up with ways to protect their data from malicious individuals who might use them for illegal purposes. The Philippines, with its booming IT industry, is no exception. Total ITspending reached $4.4 billion in 2016, and the sector is expected to more than double by 2020. Filipinos are heavy social media users with 6.7 million Facebook users, (We are Social and Hootsuite, 2018). The country is also in the process of enabling free public Wi-Fi in major cities nationwide. To protect the privacy of Filipino citizens, Republic Act No, 10173, also known as the Data Privacy Act of 2012, was signed and approved by then President Benigno Aquino III on August 15, 2012. The law defines sensitive personal information as being: * about an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical, or political affiliations; + about an individual’s health, education, genetic or sexual life of a person, or to any proceeding or any offense committed or alleged to have committed; + issued by government agencies “peculiar” (unique) to an individual, such as social security number; and + marked as classified by an Executive Order or an act of Congress. All processing of sensitive and, personal information is prohibited except in certain circumstances. The exceptions are: * consent of the data subject; * pursuant to law that does not require consent; * necessity to protect the life and health of a person; * necessity for medical treatment; and * necessity to protect the lawful rights of data subjects in court proceedings, legal proceedings, or regulation. It has also defined the concept of a security incident versus that of a personal data breach. A “security incident”is an event or occurrence that affects or tends to affect data protection, or may compromise availability, od integrity or confidentiality. This definition includes incidents that is o0 Jp 8 ‘6 Living in the Information Technology Era would result in a personal breach, if not for safeguards that have been put in place. A “personal data breach,” on the other hand, is a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed, Digital data in the Philippines seem to be free-flowing. And the challenges of data privacy and security also keep on coming so it is important for any organization to invest in good data security measures. On March 27, 2016, the Commission on Elections (Comelec) website was hacked with message postings regarding tighter security for the then upcoming May 2016 nationwide elections. The same day, another group of hackers posted a link to what was Claimed to be the Comelec’s entire database. The file was 340 gigabytes and was said to contain voters’ and candidates’ information. According to security researchers at Trend Micro, the hack contains a huge amount of very sensitive personal data, such as full names, email addresses, names of spouses, addresses, parents’ names, and government ID numbers. It also included fingerprints of 15.8 million voters and passport numbers of 1.3 million overseas Filipino workers, That makes this hack potentially the “biggest government-related data breach in history” according to Trend Micro Incorporated (2016) “surpassing the Office of Personnel Management (OPM) hack last 2015 that leaked PII, including fingerprints and social security numbers (SSN) of 20 million US citizens” (para, 2). A January 2017 article from CNN Philippines has reported that then Comelec Chairman Andres Bautista will face criminal charges regarding the data breach that has occurred last March 2016. Comelec and Bautista are said to have violated the Data Privacy Act of 2012, The National Privacy Commission said that the organization failed as a personal information controller. NPC also underscored the fact that data protection is more than just the implementation of security measures. According to the law,Information, Control, and Privacy @ 7 | o. the violation of the Data Privacy Act due to negligence is punishable by three to six months’ imprisonment, and a fine of P500,000 to P4 million, If a government official is proven guilty of this crime, he or she will be disqualified from public office. (@J CHAPTER KEY POINTS ep * Physical, conceptual, and information resources are three types of resources that an organization needs in order to operate. * Information resources, unlike other resources, are expandable, compressible, transportable, diffusive, and shareable. * Information, as a resource, has four characteristics, namely it has zero-marginal cost; is non-rivalrous; is non-exclusive; and does not exhibit high degrees of transparency. ¢ Information is produced at rapidly increasing rates due to easy duplication and transmission of information, increase in communication methods, and growth archives of historical information. * The abundance of mobile devices resulted in mobile social media and m-commerce (mobile commerce). * Information control is about allowing those who have appropriate authority access to and use of information on the basis of the authority that they hold, * Intellectual property refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. To protect intellectual properties, copyright and digital rights are granted to individuals. oo,6 A Uving in the Information Technology Era (@ cHeckpornt Multiple Choice: Circle the letter that corresponds to you answer. ws Unlike other organizational resources, information can be described as follows, except: a. transportable c. diffusive b. compressible d, expandable When compared to other resources, information is similar to them in terms of the following except: a. its cost can be controlled with the help of accounting techniques b. can be substituted c. isavailable in a standard type, grade, and price d. has a life cycle Mr. Puti recently found out his email was hacked and said that the hacker has been sending spam emails to all his contacts. Which of the following regulations needs to be enforced in this issue? a. content control ©. privacy control b. defamation control d. copyright control . Ms. Dilaw has a blog which she updates with photos and videos of her day-to-day activities, She recently received a personal message demanding that the pictures of certain images she took in an art museum be removed from her site. Which of the following regulations did she not follow? a. content control ¢. privacy control b. defamation control d. copyright control . MP3 files fall under the category of: a. digital rights ¢, copyrights b. patent rights d, trademarksInformation, Control, and Privacy 6. Ms. Berde recently subscribed to a cable TV provider and bought a smart TV along with it. Her smart TV gives her the capability to record shows she might miss every now and then. Which control issue could be found in this case? convergence scale volume aes p unprecedented individual empowerment 7. Ms. Bughaw is an active Facebook user. She recently posted a picture of herself with her friends getting drunk during a party. Her boss saw it on her profile and said it was very unprofessional and asked her to take it down. She did, but, her friends uploaded the same picture and tagged her, making her picture still appear on her profile. Which control issue is shown in this case? a. convergence b. scale c. volume d. unprecedented individual empowerment 8. These are also called conceptual resources. a. tangible resources c. complex resources b. non-tangible resources d, simple resources 9. Information that is important and useful when it is needed is considered a. reliable c, relevant b. accessible d, complete 10. A movie being sold in different formats and mediums such as in DVDs, Google Play, iTunes, etc. means that the movie is considered as: a. non-rivalrous b. non-exclusive c. not exhibiting high degrees of transparency d. having zero-marginal cost DAY R© Uwting i the Sefigrenation tactiiogy tra ‘Qasks A. Individual Activity Identify 2 game you are familiar with and have playes frequently online or on your mobile phone, Explain briefly the mechanics of the game and the reasons why you like playing this game. List the game items that players often buy to either improve their gaming skills or upgrade their avatars, Identity the items that need virtual money and those that require rez) money. Prepare 2 short presentation in class on the advantages and Gszdvantages of having your “experience goods,” B. Group Activity Create 2 short video advertisement highlighting the importance on information control in the Philippines. You cen benchmark on the advertisements shown in cinemas expizining why movie piracy is considered a crime. The goal is to make the Filipino viewers understand the need for information control in the country. Other groups may work on a video campaign raising the zuaeness on information privacy especially among vulnerable populations such as children, teenagers, and young adults, The guiddines ate 2s follows: i, Ux your own script and theme. 2. The video must not exceed 3 minutes, 3, The vetting/situation rust be in the Philippines or related to Filipino culture, 4. Follow the rules on intellectual property in creating your video,Information, Control, and Privacy ©—7— \ REFERENCES Cisco. (2017, June 7). The zettabyte era: Trends and analysis. Retrieved from https://www.cisco.com/c/en/us/solutions/ collateral/service-provider/visual-networking-index-vni/vni- hyperconnectivity-wp.html Hedden, T. (2017). DVD region codes and video encoding standards, and how to overcome them. Retrieved from http://ice. he.net/~hedden/DVD_video_standards.html Intellectual Property Office of the Philippines. (1998). R.A. 8293 — An act prescribing the Intellectual Property Code and establishing the Intellectual Property office, providing for its powers and functions, and for other purposes. Philippine Center for Investigative Journalism. Retrieved from http://pceij.org/blog/wp-docs/ RA8293.pdf Intellectual Property Office of the Philippines. (2013). R. A. 10372 — An act amending certain provisions of Republic Act No. 8293, otherwise known as the Intellectual Property Code of the Philippines and for other purposes. Retrieved from http://www.ipophil.gov. ph/images/IPResources/RA_10372c.pdf Kemp, S. (2018, January 30). Digital in 2018 world’s internet users pass the 4 billion mark, Retrieved from https://wearesocial. com/blog/2018/01/global-digital-report-2018 Laudon, J, & Laudon, K. C, (2006), Management information systems; Managing the digital firm (9th ed.). Upper Saddle River, NJ: Prentice Hall (Original work published 1996), Leickly, B. L. (2004). Chapter 2, Information and uncertainty: A conceptual framework, Retrieved from http://www.extrafancy. net/bethany/chapter2.php Lella, A., & Lipsman, A. (2016, March 30). 20/6 U.S. cross-platform future in focus, Retrieved from http://www.comscore.com/ Insights/Presentations-and-Whitepapers/2016/2016-US- Y Cross-Platform-Future-in-Focus <WG, Living in the Information Technology Era “v— 7 Linsker, A. (2013, March 22). Mobile commerce: State of the industry, ‘ Retrieved http://www. instantshift.com/2013/03/22/mobile- commerce-state-of-the-industry McLeod Jr., R., & Schell, G. (2001). Management information systems. Retrieved from https://www.scribd.com/document/ 356568890/chap13DSS-pdf Morris, C. (1997, November 20). Proceedings from inaugural plenary conference: Global mobile commerce forum. Retrieved from https://cryptome.org/jya/glomob.htm Oath. (2018). Oath privacy center. Oath. Retrieved from https:// policies.oath.com/us/en/oath/privacy/index.html Oz, E., & Soussa, K. J. (2009). Management information systems (9th ed.). Boston, MA: Thomson. Sawvides, L. (2017, June 27). Samsung pay: What you need to know (FAQ). Retrieved from https://www.cnet.com/news/samsung- pay-what-you-need-to-know-faq Shemenski, J. (2016, July 13). The future of social media is mobile. Are you ready?. Retrieved from https://simplymeasured.com/blog/ the-future-of-social-media-is-mobile-are-you-ready/#sm.00018 5jiiw713em5tz91it68wxgot Stair, R., & Reynolds, G. (2016). Principles of information systems (13th ed.). Boston, MA: Cengage Learning. Tan, L. (2017, January 5), Chairman Andres Bautista criminally liable for COMELEC data breach - National Privacy Commission, CNN Philippines. Retrieved from http:// cnnphilippines,com/news/2017/01/05/Comelec-data-breach- hack-investigation-Andres-Bautista.html The Software Alliance (BSA). (2017, August 2). Internet software piracy, Retrieved from _ http://internet.bsa.org/what-is- software-piracy2 — ° Information, Control, and Privacy 7 \ \ o Thierer, A. (2011, January 28). Digital sensors, darknets, hyper- transparency & the future of privacy. Retrieved from https:// techliberation.com/2011/01/28/digital-sensors-darknets- hyper-transparency-the-future-of-privacy Trend Micro Incorporated. (2016, April 6). Data protection mishap leaves 55M Philippine voters at risk, Retrieved from http:// | blog.trendmicro.com/trendlabs-security-intelligence/55m- registered-voters-risk-philippine-commission-elections-hacked Turban, E., & Volonino, L. (2010). Information technology for management: Transforming organizations in the digital economy. Hoboken, NJ: Wiley. Wakefield, J. (2015, November 26). Facebook quizzes: What happens to your data? Retrieved from http://www.bbc.com/ news/technology-34922029 We Are Social & Hootsuite. “Digital 2018 global overview.” Available at https://www.slideshare.net/wearesocial/digital- in-2018-global-overview-86860338 =a?
You might also like
Module 2 Principles of High Quality Assessment
PDF
No ratings yet
Module 2 Principles of High Quality Assessment
11 pages
Living in The Era - Reaction Paper
PDF
No ratings yet
Living in The Era - Reaction Paper
1 page
Chapter 6 Selecting A Topic and Delivering A Speech
PDF
No ratings yet
Chapter 6 Selecting A Topic and Delivering A Speech
9 pages
Module 7-Imaging and Design For Social Impact
PDF
No ratings yet
Module 7-Imaging and Design For Social Impact
20 pages
Chapter 3 Lessons 1 4
PDF
No ratings yet
Chapter 3 Lessons 1 4
12 pages
Assessment of Learning I
PDF
No ratings yet
Assessment of Learning I
189 pages
Basa, et al. (1)
PDF
No ratings yet
Basa, et al. (1)
44 pages
Bsed Englishi C2module6group2tca
PDF
100% (1)
Bsed Englishi C2module6group2tca
7 pages
Soc Sci Chapter 3 Report
PDF
No ratings yet
Soc Sci Chapter 3 Report
15 pages
Chapter 5 Purposive Communication
PDF
No ratings yet
Chapter 5 Purposive Communication
11 pages
Module 3 TTL 1 Msword A
PDF
No ratings yet
Module 3 TTL 1 Msword A
15 pages
On Assessment Tools and Techniques
PDF
No ratings yet
On Assessment Tools and Techniques
15 pages
EDUC 5 20 ICT-related Terms
PDF
No ratings yet
EDUC 5 20 ICT-related Terms
10 pages
Module in TTL 2
PDF
No ratings yet
Module in TTL 2
31 pages
Chapter 2: Introduction To Child Development and Early Intervention
PDF
No ratings yet
Chapter 2: Introduction To Child Development and Early Intervention
10 pages
Panitikan: An Essay On Philippine Literature: Translation by B. Lumbera (Lumbera and Lumbera: 1982)
PDF
100% (1)
Panitikan: An Essay On Philippine Literature: Translation by B. Lumbera (Lumbera and Lumbera: 1982)
41 pages
Module 3 lesson 5 Digital literacy skills in the 21st century
PDF
No ratings yet
Module 3 lesson 5 Digital literacy skills in the 21st century
23 pages
TTL 1 L3 Module
PDF
No ratings yet
TTL 1 L3 Module
6 pages
Chapter 2 Communication Aids and Strategies Using Tools of Technology
PDF
No ratings yet
Chapter 2 Communication Aids and Strategies Using Tools of Technology
2 pages
Module 1-WPS Office
PDF
No ratings yet
Module 1-WPS Office
6 pages
Internationalization in The Philippine Heis Focusing On Readiness of Private Colleges in South Cotabato
PDF
No ratings yet
Internationalization in The Philippine Heis Focusing On Readiness of Private Colleges in South Cotabato
10 pages
Chapter 8
PDF
No ratings yet
Chapter 8
9 pages
Lesson 1 Introduction To Science, Technology and Society
PDF
No ratings yet
Lesson 1 Introduction To Science, Technology and Society
14 pages
Indian Civilization
PDF
No ratings yet
Indian Civilization
19 pages
Educ 204 Midterm Reviewer
PDF
No ratings yet
Educ 204 Midterm Reviewer
15 pages
Assessment in The Affective Domain
PDF
No ratings yet
Assessment in The Affective Domain
11 pages
UNIT 7 GE Elect7 Gender Society
PDF
No ratings yet
UNIT 7 GE Elect7 Gender Society
20 pages
Peertutoring-Ppt Lynn Batino
PDF
No ratings yet
Peertutoring-Ppt Lynn Batino
37 pages
Living in The It Era-Module 3
PDF
No ratings yet
Living in The It Era-Module 3
17 pages
Reflection Paper
PDF
No ratings yet
Reflection Paper
12 pages
MKT 121 Syllabus
PDF
No ratings yet
MKT 121 Syllabus
3 pages
Module 6 Purposive Communication
PDF
No ratings yet
Module 6 Purposive Communication
6 pages
Ilk Lesson
PDF
No ratings yet
Ilk Lesson
10 pages
Assessment Resources and Assessment Packages and Instruments 5
PDF
No ratings yet
Assessment Resources and Assessment Packages and Instruments 5
6 pages
Lesson 5 Technology As A Way of Revealing
PDF
No ratings yet
Lesson 5 Technology As A Way of Revealing
37 pages
PrEd 129n & 152c - Technology For Teaching and Learning
PDF
No ratings yet
PrEd 129n & 152c - Technology For Teaching and Learning
6 pages
Vergara
PDF
No ratings yet
Vergara
6 pages
The Code of Ethics For Professional Teacher: Relationship With The Internal Stakeholders
PDF
No ratings yet
The Code of Ethics For Professional Teacher: Relationship With The Internal Stakeholders
36 pages
Educ2.Module1. Lesson 3
PDF
No ratings yet
Educ2.Module1. Lesson 3
17 pages
CHAPTER 3 Perspective and Approaches in The Study of Haman Development
PDF
No ratings yet
CHAPTER 3 Perspective and Approaches in The Study of Haman Development
28 pages
Module 3 Week 5 6 Facilitating Learner Centered Teaching
PDF
No ratings yet
Module 3 Week 5 6 Facilitating Learner Centered Teaching
4 pages
R.A. No. 7686 - Dual Training System Act of 1994
PDF
No ratings yet
R.A. No. 7686 - Dual Training System Act of 1994
7 pages
Chapter 3lesson 4 Art Appreciation
PDF
No ratings yet
Chapter 3lesson 4 Art Appreciation
4 pages
Lev Vygotsky's Socio-Cultural Theory
PDF
No ratings yet
Lev Vygotsky's Socio-Cultural Theory
25 pages
MODULE 3 The Good Life
PDF
No ratings yet
MODULE 3 The Good Life
6 pages
Pur Comm Module 3
PDF
No ratings yet
Pur Comm Module 3
9 pages
Sas #23 - Edu 536
PDF
No ratings yet
Sas #23 - Edu 536
6 pages
Purposive Communication Overview
PDF
No ratings yet
Purposive Communication Overview
4 pages
Technology As A Collaboration Tool, Skype, Wiki
PDF
No ratings yet
Technology As A Collaboration Tool, Skype, Wiki
2 pages
Speeches According To Methods of Delivery
PDF
No ratings yet
Speeches According To Methods of Delivery
8 pages
Critical Literacy
PDF
No ratings yet
Critical Literacy
22 pages
Ege 311 - Gender and Society: Real Geeta Phogat
PDF
No ratings yet
Ege 311 - Gender and Society: Real Geeta Phogat
4 pages
Module
PDF
No ratings yet
Module
7 pages
Pck3: Technology For Teaching and Learning 1 TTH 7:00 - 8:30Pm Mr. Edwin Fuego
PDF
No ratings yet
Pck3: Technology For Teaching and Learning 1 TTH 7:00 - 8:30Pm Mr. Edwin Fuego
8 pages
PURCOM-Parts of A Research Proposal
PDF
No ratings yet
PURCOM-Parts of A Research Proposal
1 page
Unit 1 Prof Ed 321 2
PDF
No ratings yet
Unit 1 Prof Ed 321 2
11 pages
Microsoft Word Shortcut Keys
PDF
No ratings yet
Microsoft Word Shortcut Keys
3 pages
It Era Chapter 4
PDF
No ratings yet
It Era Chapter 4
39 pages
Ge - 5 (Living in The It Era) Module 4: Information, Control, and Privacy
PDF
100% (2)
Ge - 5 (Living in The It Era) Module 4: Information, Control, and Privacy
8 pages
Week 10 INFORMATION CONTROL AND PRIVACY
PDF
No ratings yet
Week 10 INFORMATION CONTROL AND PRIVACY
7 pages