4.0 - Information, Control and PrivacyREPORT
4.0 - Information, Control and PrivacyREPORT
Encryption: Secure messaging apps like Signal and The possession of Information security is the quality or
state of having ownership or control of some object or
WhatsApp use encryption to protect users'
item.
conversations from unauthorized access.
Information Security and Privacy as Contemporary online ethics, cyberbullying, digital inclusion, cultural
Issue differences, and trust are intertwined with information
security and privacy concerns, necessitating a holistic
Cybercrime - The use of a computer network, especially
approach that addresses both technical and social
the internet, for crime.
dimensions of cybersecurity.
Examples are Cyberbullying, Cyberterrorism, Computer
Virus and Identity Theft.
Piracy and Copyright
Information and Access - is the freedom or ability to Piracy refers to the unauthorized copying, distribution,
identify, obtain and make use of database or or use of copyrighted material without the permission
information effectively and it is a contemporary issue of the rights holder. Copyright is a legal concept that
because of the complexities involved in managing, grants creators and author exclusive rights to their original
securing, and providing equitable access to vast works. Copyright is not a form of piracy.
amounts of information in an ethical and legal manner,
while leveraging emerging technologies to enhance the Due to the proliferation of digital distribution platforms,
user experience. cybercrime risks, technological advancements,
globalization challenges, privacy implications, and the
Data Breaches- high-profile data breaches, where impact on creative industries. Addressing these issues
hackers gain unauthorized access to sensitive data, have requires a multifaceted approach that balances copyright
become increasingly common. These breaches expose enforcement efforts with respect for privacy rights and
individuals' personal information, such as usernames, promotes innovative business models for content
passwords, credit card numbers, and social security distribution.
numbers, leading to identity theft, fraud, and
reputational damage for affected organizations.