Mobile Social Media and Mobile Commerce PDF

Document Details

OverjoyedBlueLaceAgate9845

Uploaded by OverjoyedBlueLaceAgate9845

South East Asian Institute of Technology, Inc.

Tags

mobile commerce e-commerce social media technology

Summary

The document discusses mobile social media and mobile commerce, explaining how mobile devices have changed daily activities and communication. It includes examples of financial services, mobile ticketing, service/retail, and information services, as well as a brief overview on information control and software piracy within the context of mobile technology.

Full Transcript

**Mobile Social Media and Mobile Commerce** The abundance of mobile devices has greatly changed the way people manage their day-to-day activities. In business, for example, having a shop where customers can easily go to use to be enough. However, with the introduction of the internet, market shifte...

**Mobile Social Media and Mobile Commerce** The abundance of mobile devices has greatly changed the way people manage their day-to-day activities. In business, for example, having a shop where customers can easily go to use to be enough. However, with the introduction of the internet, market shifted from a brick-and-mortar set-up to an online operation more commonly known as **e-commerce.** And now with mobile computers. They have their smartphones, tablets, and other mobile devices connected to the network to send and receive information wherever they are and whenever they want to. This connectivity has paved the way to two new scenarios in communication: **Mobile social media** Mobile social media is the accessing of social media sites, such as Facebook and Snapchat, using a mobile device. The device may have an app installed to open Instagram, for example, or it can use a browser installed in the mobile device to open Twitter. A study conducted by ComScore in 2016 reveals the impact of social media on internet users. The same study also shows that nearly 80% of individual browse through their social media accounts using their mobile phones. **M- Commerce** M---commerce or mobile commerce was a term used during the 1997 Global Mobile Commerce Forum by Kevin Duffey. He described it as the delivery of electronic commerce capabilities directly into the consumer's hand, anywhere, via wireless technology. The use of mobile devices has paved the way for data to be transmitted and recieved much faster, without compromising security and scalability. The global trend in using mobile devices for socializing and doing commercial transactions is increasing. Companies are now using digital platforms to market their products and services. 1. **Financial services-** Banks have inroduced online banking a few years back. However, nowadays, majority of bank transactions such as money transfers, bills payment, and even stock portfolis and stock transactions can now be done using the bank's mobile. 2. **Mobile ticketing-** As payments can be done online, receipts of transactions canalso be sent on mobile devices. Airline companies encourage their customers to book their flights online, after which, their booking reservation is sent via email or through their mobile app. The booking ticket can be shown at the airport and is accepted even as an electronic copy. 3. **Service/retail-** As consumers are now able to place and pay for orders using their mobile devices, the e-commerce trend has shifted from desktop computers to mobile devices. And it does not just include retail items. It also includes content purchasing such as music, movies, and images, among others. Another trend seen is the in-application purchases made by mobile phone users. This is prevalent in gaming applications in which users buy virtual goods for power boost or upgrade to the next game level. 4. **Information services-** these include the delivery of news, stock qoutes, sports figurs, emergency reports, and weather and traffic updates to a single mobile delivers customized traffic information which is based on a user's actual travel patterns. It uses **geo-location** technology to pinpoint the whereabouts of the user while on the move. Another example of an application that uses location-based services is Google Maps. **Information Control** With so much information around, how do you make sure they are safe from illegal activities? A large requirement for information control comes from commerce, industry, and **copyright** owners in general. Information controls comes in the form of keeping secrets inside a business or **selling IPR (Intellectual Property Rights)** to those prepared to purchase it. Information control is about allowing those who have appropriate authority access to and use of information on the basis of the authority that hold. But why is there a need for control in the first place? Earlier in this chapter, the concept of information being non-rivalrous and non-exclusive has been discussed. An example is movies being sold in different formats- DVDs, MP\$, etc. if that is the case, how can you make sure thatr the said move will not be distributed illegally? **Software Piracy** Let's say you wanted to watch the latest movie showing in the cinemas. However, you decided to save the money instead, so you bought a **pirated** DVD copy of the film in one of the market places you passed by on your way home. Upon watching it, you noticed the film was taken by a video camera inside the cinema and you can hear the audience laughing, and see shadows walking back and forth, which obviously were not part of the film. In the end, you decided to download a **torrent** file of the film, hoping for a better quality, only to discover that it was the same pirated video you saw in the pirated DVD. According to the Software Alliance ([www.bsa.org](http://www.bsa.org)) (2018), software piracy is "the unauthorized copying or distribution of copyrighted software... can be done through copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers." Most software has **licenses**, such as activation keys, that are normally identified with just one computer. Example of software piracy as identified by The Software Alliance (2018) include: - Distributing software or mobile apps from the internet in a manner that violates the license terms. - Buying a single copy of a software program and installing it on multiple devices without authorization - Making and/or sharing copies of installation CDs - Sharing the login credentials (without authorization) used to access a web-based software application ("Software as a Service") Some might say, "I paid for the software already, shouldn't that be mine to use and distribute wherever and whenever I want to?" As with the discussion earlier this chapter regarding information having **zero-marginal cost,** buying a DVDcopy of a movie costing 10 dollars, does not mean buying the actual movie, but paying for the license to watch it for **personal** use. So just because a person bought an original DVD of the movie does not mean that he or she can create copies and distribute it or share it online. This typical scenario boils down to the fact that information is difficult to control. While measures are in place, such as DVD region codes and such, Adam Thierer in 2011, identified four issues which further complicate the problem on information control: (1) convergence, (2) scale, (3) volume, (4) and unprecedented individual empowerment/user- generation of content. 1. **Convergence** Technological advancement and social media have paved the way for media content such as music and movies to be distributed from their "traditional " distributionplatforms. What consumers used to buy in the form of CDs or DVDs, media content can now be searched, accessed, and consumed using multiple devices and even through different distribution networks. One such example is Spotify. Consumers before would buy physical albums in the form of CDs, then later transitioned to digital copies typically bought via iTunes Store for Apple. Another such example is an application called Video FX whichis available in Google play. According to the app discription, you can "create amazing lip sync music videos withb spewcial effects and your choice of music. 2. **Scale** 3. **Volume** Nowadays, news and media outlets abound in print and online. *News* agencies such asc *Manila Bulletin* or *The Philippine Star* have not only print copies of their news (i.e., newspaper) but also digital copies which can be accessed through their websites mb.com.ph and [www.philstar.com](http://www.philstar.com), respectively. Broadcasting companies such as ABS-CBN and GMA7also have television broadcasts, radio broadcastd, TV radios, and news websites, most of which have the same content. This development can be attributed to the increasing volume of media content and communications activities happening across the world, greatly complicating government regulatory efforts to control information. 4. **Unprecedented individual empowerment** **Intellectual Property (IP)** Intellectual property (IP) refers to a number of distinct types of intangible assets for which a set of exclusive rights are recognized. IP includes musical, literary, and artistic works such as Taylor Swift's new album, J.K. Rowling's new book, and the latest iPhone. However, IP is not just limited to these items. It can also include words, phrases, symbols, and even designs. Are you familiar with the following logos found in Figure 4.6? C:\\Users\\Administrator\\Downloads\\it60.png **Figure 4.6** Popular logos IP is any creation or product of the human mind and may be expressed in the form of original ideas, expressions, and processes. **Intellectual property rights (IPR)** are the rights given to persons over their creations. They usually give the creator an exclusive right over the use of his or her creation for a certain period of time. According to the Intellectual Property Code of the Philippines (Republic Act No. 8293s. 1998), IPR consists of the following: 1. Cpyright and related rights 2. Trademarks and service marks 3. Geographic indications 4. Industrial design 5. Patents 6. Layout designs (topographies) of Integrated Circuits (Ics) 7. Protection of undisclosed information The **Intellectual Property Office of the Philippines (IP Philippines)** is the government agency in charge of the implementation of the law protecting intellectual property rights in the Philippines as provide for under R.A. 8293, or the Intellectual Property Code of the Philippines, and the revised Intellectual Property Code of the Philippines known as T.A. 10372. **Copyright and Related Rights** **Copyrights** is a set of exclusive rights granted by a state to the creator of an original work or their assignee for limited period of time in exchange for public disclosure of the work, and includes the right to copy, distribute, and adapt the work. Copyright owners can license or permanently transfer or assign their exclusive rights to others. **Digital rights,** on the other hand, is the permission granted to individuals to legitimately perform actions involving network. It is particularly related to the protection and realization of existing rights in the context of new digital technologies, especially the internet. Copyright provides protection of original expression which includes literary, artistic, scholarly, and scientific creations such as books, articles, newspapers, lectures, letters, musical compositions, and paintings. It also extend to derivative works such as illustrations, maps, photographic works, advertisements, computer programs, etc. In the Philippines, all copyrighted materials are recorded and stored at the National Library or the Supreme Court Library (A.A. 10372, 2013). **Digital Rights Management** Digital rights management (DRM) is used to describe the processed by which the author or publisher of a work exerts his or her rights to control what the purchaser of the work is entitled to do. This represents the control by which one can prevent a person or an organization from copying, printing, editing, or otherwise making the privileged information available to other people. Which the introduction of te3chnology and the internet, the print age is slowly becoming obsolete with publishers shifting to the digital age. Before, a person needed a copy or re-print a physical book for additional copies. With digital technologies, copies are made at zero cost with minimal detection. And it is not just books. Movies, music, software applications, etc. can now be copied and shared faster, with less cost. With this set-up, the prevalence of the peer-to-peer (P2P) and torrent sites have made informational control much harder. While information gets to be disseminated faster to consumers, control as to how it is shared becomes an issue. Downloading pirated music online does not help the music artists as they are deprived of the music for free does not mean being safe from malicious software and hacking attacks. Thus, companies and organizations have come up with possible solutions to this digital dilemma. The following are techniques designed to control access and reproduction of online information: 1. **Encryption** Encryption is the process of convering data or information insuch a way that only authorized parties can understand. Its primary purpose is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or othert computer networks. Encryption occurs every time someone uses an ATM or buys something online with a samrtphone, makes va mobile phone call, or presses a key fob to unlock a car. This is done so that information being sent is kept safe and secure. DRM systems for multimedia often encrypt material in such a way that only a particular device can play or retrieve it, enforcing constraints on how it is used. DVDs use an encryption scheme to prevent users from viewing discs on unauthorized players. This is the concept of the region coding discussed earlier. Region coding prevents discs sold in one part of the world from being used on players sold in another. 2. **Serial keys** Also known as a **product key** or **software key,** it is a series of aplhanumeric characters acting as a key to denote that the product or software is originl. In some cases, product keys are used for product **action.** One such example is Microsoft Windows OS. A product key is used to activate the operating system online. **Online activation** helps maintain software authenticityby making sure no one else has the same product key. 3. **Scrambling** While region coding identifies which players can only play certain DVDs, computer with DVD drives become another option for would-be pirates. Thus, the content scramble system (CSS) was introduce to restrict access to content only for licensed applications. Meaning, even if the DVD was recognized by the DVD player in the video might not allow it. 4. **Tag embedding** A patent is a set of exclusive rights granted by a state to an inventor for a limited period of time in exchange for the public disclosure of an invention. The exclusive right granted to a patentee in most countries is the right to prevent others from making, using, selling, or disturbing the patented invention without permission. One example of a patented design is that of Apple's iPod. ![C:\\Users\\Administrator\\Downloads\\it61.jfif](media/image2.jpeg) **Figure 4.7** Apple's iPod **Trademark** A **trademark** is a distinctive sign used by an individual, business organization, or other legal entity to identify the products or services to consumers. The mark comes from a unique source, and it distinguishes its product (trademark) or services through registration made validity in accordance with the provisions of the IP code. For marks with geographical indications, a notice stating that a given product originates in a given geographical area must be identified. This is relatively new in the Philippine IP regime as marks are identified based on the territory, region, or locality attributed. In the Philippines, one of the most popular trademarks based on locality is the Pampanga's Best delicacies logo. **Protection of Undisclosed Information** Industries and companies need to have information control especially in dealing with sensitive industry secrets. To protect these industries secretes, also called **trade secrets,** companies usually require employees to sign contracts with **non-disclosure agreement (NDAs).** Trade secret is the term used for any method, formula, device, process, or any information that gives the business a unique competitive advantage over its competition. It includes company research and development information, software algorithms, inventions, designs, formulas, ingredients, and devices, among others. Example of popular trade secrets are the formulation of Coca-Cola and Listerine, and the recipe of Kentucky Fried Chicken (KFC). **Table 4.2** IPR terms of protection and penalties as stated in R.A. 8293 +-----------------------+-----------------------+-----------------------+ | | **Terms of | **Penalty** | | | Protection** | | +=======================+=======================+=======================+ | **Copyright** | Generally, throughout | 1st offense: ₱50,000 | | | the life of the | to ₱150,000 and/or | | | author plus 50 years | 1-3 years | | | after his or her | imprisonment 2nd | | | death | offense:₱500,000 | | | | and/or 3-6 years | | | | imprisonment | | | | | | | | 3rd and subsiquent | | | | offense: ₱500,000 to | | | | ₱1.5 M and/or 6-9 | | | | years imprisonment | +-----------------------+-----------------------+-----------------------+ | **Patent** | 20 years | Not less than | | | | ₱100,000 to not more | | | (time-bound) | than ₱300,000 and/or | | | | not le3ss than 6 | | | | months to not more | | | | than 3 years | | | | imprisonment | +-----------------------+-----------------------+-----------------------+ | **Trademark** | 10 years from the | ₱50,000 to₱200,000 | | | date of filing of the | and 2to 5 years | | | application | imprisonment | +-----------------------+-----------------------+-----------------------+ **Information Privacy** The natural state of data is to be copied, logged, transmitted, stored, and stored again. This is why it takes constant fighting and vigilance to privent that breach. So what is information privacy and how private is private? To understand the concept of data privacy, look at Yahoo's privacy policy (now under a single privacy policy with Oath) when registering for an email address on Figure 4.8. To highlight a portion of the Yahoo privacy policy, Oath (2018) and its affiliates, including Yahoo, "collect information from you devices\...This information includes device specific indentifiers and information such as IP address, cookie information, mobile device and advertising identifiers, browser version, operating system type and version, mobile network information, device settings, and sofware data." (Information Collection and Use-General) Knowing a person's IP address can help identify that person's physical location anywhare in the world. A **cookie** is a small file that is stored in the computer's directory, often a temporary folder. The cookie contains address of websites visited, login credentials, and even credit card account numbers. This is done so that the next time the person visits the website, the computer system will no longer reload the same content or data, sasving time and processing power for the computer. Obviously, however, this is dangerous, especially when using public computers, such as those in internet shops, as the next user will be able to access the previous user's account without the latter's knowing it. C:\\Users\\Administrator\\Downloads\\it70.png **Figure 4.8** Oath's privacy policy This policy regarding the computer's IP address and cookie information is mostly common to othyer services including Google Mail, Facebook, etc. Yahoo is considered a **trusted website.** Most people believe in organization such as Yahoo will never compromise their privacy. How about other website such as Facebook? Facebook has had seberal revisions on its privacy policies. According to a BBC news article 2015, Facebook claims that protecting the privacy of people and their information on Facebook is one of its highest priorities. However, it is not Facebook that has come under fire. It is Facebook quizzes made available to everyone offering answers to trivial questions such as "who will be your soulmate," who is your celebrity look-a-like," etc. The quiz highlighted in the article was the Word Cloud Facebook quiz or the "most used words" Facebook quiz. Apprently, by takin the Word Cloud quiz, you have given the game developer access to everything in your Facebook profile including your name, profile picture, age, sex, birthday, entire friends list, everything you have posted on your timelibe, all of your photos, home town, education, employment history, and everything you have ever liked. It starts with the game asking you to loggin to you Facebook account. Declining means you will not be able to see the results of the quiz. Interactive content firm Vonvon produced the 'most" used words" quiz reaching an audience of more than 50 million. Since the printing of the article, Vonvon has adjusted the scope of data request the minimum requirement so that users who take the quiz will now have the opportunity to edit the data they provide to Vonvon, such as their timeline data and not their friends lists (Wakefield, 2015). **Data Privacy Act 10173** With all of these pieces of information made available online and the possible problems such sitwation may create, countries have come up with ways to protect their data from malicious individuals who might use them for illegal purposes. The Philippines, with its booming IT industry, is no exception. Total IT sprending reached \$4.4 bilion in 2016, and the sector is expected to more than double by 2020. Filipinos are heavy social media users with 6.7 million Facebook users, (We are Social and media users 2018). The country is also in the process of enabling free public Wi-Fi in major cities nationwide. To protect the privacy of Filipino citizens, Republic Act No. 10173, also known as the Data Privacy Act of 2012, was signed and approved by then President Benigno Aquino III on August 15, 2012. The law defienes sensitive personal information as being: - About an individual's race, ethic origin, marital status, age, color, and religious, philosophical, or political affiliations; - About an individual's health, education, genetic or sexual life of a person, or to any proceeding or any offense committed or alleged to have committed; - Issued by government agencies "peculiar" (unique) to an individual, such as social security number; and - Marked as classified by an Executive Order or an act of Congress. - Consent of the data subjecy; - Necessity to protect the life and health of a person; - Necessity for medical treatment;and - Necessity to protect the lawful rights of data subjects in court proceedings, legal proceedings, or regulation. It has also defined the concept of a security incident versus that of a personal data breach. A "security incident" is an event or occurrence that affects or tends to affect data protection, or may compromise availability, integrity or confidentiality. This definition includes that would result in a personal breach, if not for safeguards that have been put in place. A "personal data breach," on the other hand, is a subset of a security breach that actually leads to "accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.

Use Quizgecko on...
Browser
Browser