WEEK 10-11 Flashcards

(40 cards)

1
Q
  • Information is now available so quickly,
    ubiquitously, and inexpensively
A

Information Overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1 zettabytes = ?

A

1,000,000,000 terabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A picture posted on Facebook which is also
posted on Instagram and Twitter means that the same picture has been posted on 3 different sites

A

Easy duplication and transmission of info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Smartphones can do what mobile phone for
    SMS and computers for emails can also do.
    Through Mobile apps such as Viber and
    Messenger, people can now send private
    messages (PM) or direct messages (DM)
A

Increase in communication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Print or hardcopies are now being replaced by digital ones. The digital copies are stored on
    cloud servers that offer maximum storage
    capacity to end users.
A

Growth archives of historical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Is accessing social media sites, such as Facebook and Snapchat, using mobile device.
A

Mobile social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Industries that are now embraceing m-commerce include:

A
  • Financial Services
  • Mobile Ticketing
  • Service/Retail
  • Information Services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • A.K.A Mobile Commerce
  • Companies are now using digital platforms to
    market their products and services
A

M-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Term used during _______ Global Mobile Commerce Forum by Kebin Duffey

A

1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

He described it as the delivery of e-commerce
capabilities directly into the consumer’s hand,
anywhere, via wireless technology.

A

Kebin Duffey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is about allowing those who have appropriate
authority access to and use of information on
the basis of the authority that they hold.

A

Information Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a set of exclusive rights granted by the state to the creator of an original work.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPR MEANS

A

Intellectual Property Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to the legal rights given to the inventor or creator to protect his invention or creation for a certain period of time

A

Intellectual Property Rights (IPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the unauthorized copying and distribution of
copyrighted software… can be done through
copying, downloading, sharing, selling, or
installing multiple copies of software onto
personal or work computers. (The Software
Alliance, 2018)

A

Software Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • BEFORE: Subtitles from the movies and TV
    Series are translated in over days and weeks.
    These are going to be translated, edited, and
    embedded by the fans.
  • TODAY: With the use of technology, viewers will no longer wait for a long time. Often, subtitles are now available within an hour of the Movie or the TV Series being aired because the internet has given everyone access to anything.
A

Scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The popularity of social media has made it
possible for individuals to post anything they
want. This also includes the creation of blogs
which have become the mainstream media for
individuals to showcase their talents, skills, and
hobbies. This creates issues when it comes to
content restrictions as most people are doing
this using their private accounts. Unless
reported, the said content will be difficult to
control.

A

Unprecedented individual empowerment

18
Q
  • refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized.
A

Intellectual Property

19
Q

Intellectual Property Rights (IPR) consists of the
following:

A
  • Copyright and related rights
  • Trademarks and service marks
  • Geographic indications
  • Industrial design
  • Patents
  • Layouts designs (topography) of Integrated
    Circuits (ICs)
  • Protection of undisclosed information
20
Q

Is a set of exclusive rights granted by the state to the creator of an original work.

21
Q

is the permission granted to individuals to
legitimately perform actions involving the use of a computer, any electronic device, or
communication network.

A

Digital Right

22
Q
  • is the process of converting data or
    incformationin such a way that only authorized
    parties can understand.
  • Its primary purpose is to protect the
    confidentiality of digital data stored in a
    computer system or transmitted via internet or
    other computer networks.
23
Q

is used to describe the process by which the
author or publisher of a work exerts his or her
rights to control what the purchaser of the work is entitled to do.

A

Digital Rights Management (DRM)

24
Q

DRM MEANS

A

Digital Rights Management

25
- Similar to how pictures can include watermarks to denote the information on the owner of the picture, tag embedding does the same to the information content - Metadate is included to identify the owner’s name, author, and date of purchase, among other pertinent information.
Tag embedding
26
- A.K.A. Product Key or Software key. - It is a series of alphanumeric characters acting as a key to denote that the product or software is original.
Serial Keys
27
____________ is accomplished by the additional components to the original signal or changing of some important components of the original signal to make the extraction of the original signal difficult.
Scrambling
28
______________ is done to hide sensitive information from unauthorized users.
Data Scrambling
29
Is a distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers.
Trademark
30
is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for public disclosure of an invention.
Patent
31
is the term used for any methods, formula, device, process, or any information that gives business a unique competitive advantage over its competition.
Trade Secrets
32
Contract to be signed by a company’s employees.
Non-Disclosure Agreement (NDA)
33
is a small file that is stored in the computer’s directory, often a temporary folder. * this contains addresses of websites visited, login credentials, and even credit card numbers.
Cookie
34
The Law defines sensitive personal information as being: * about an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical, or political affiliations * individual’s health, education, genetic or sexual life, or to any proceeding or any offense committed or alleged to have committed. * issued by government agencies “peculiar” (unique) to an individual, such as social security number * marked as classified by an Executive Order or an act of Congress
Data Privacy Act 10173
35
* Security Incident - is an event or occurrence that affects or tends to affect data protection, or may compromise availability, integrity, or confidentiality. This definition includes incidents that would result in a data breach, if not for safeguards that have been put in place. * Personal Data Breach - is a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.”
Data Privacy Act 10173
36
All proceedings of sensitive and personal information is prohibited except in the circumstances. The exceptions are: * consent of the data subject * pursuant to law that does not require consent * necessity to protect the life and health of a person * necessity for medical treatment * necessity to protect the lawful rights of data subjects in court proceedings, legal proceedings, or regulation
Data Privacy Act 10173
37
is an event or occurrence that affects or tends to affect data protection, or may compromise availability, integrity, or confidentiality. This definition includes incidents that would result in a data breach, if not for safeguards that have been put in place.
Security Incident
38
is a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.”
Personal Data Breach
39
NEVER BACK DOWN NEVER WHAT!!!!!!!!!!????????????????
NEVER GIVE UPPPP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
40