section 1 Flashcards
(1.1) what are categories of information
government
individuals
businesses
health care organisations
charities and community organisations
(1.6, 1.7, 1.8) name some information formats and it’s characteristics
web pages
blogs
podcasts
streamed audio and video
social media channels
document stores
RSS feeds
accessibility
advantages and disadvantages of information formats
advantages for individuals - communication have been revolutionised and speed of information access has been increased between individuals. researches are much easier to carry out, as the availability to data has been increased.
advantages for organisations - they have the opportunity to transfer information across the world at a high speed
disadvantages for individuals - cost of accessing the internet can be a problem as, there is a high amount of individuals accessing the internet. it can hold distractions, for example students spend too much time on social media platforms, which would lead to them performing poorly in school.
disadvantages for organisations - time consuming and also costing.
(2.1) information styles
text, graphic, video
audio, animated graphics, graphs and charts
numerical, braille text, tactile images
Boolean, subtitles, tables and spreadsheets
advantages and disadvantages of text
advantages - easy format to read information.
disadvantages - different character sets are used in different part of the world, which means that not everyone can read it.
advantages and disadvantages of graphic
advantages - can be easily read and provide knowledge much easier . they are multilingual and everyone can understand it. they are also very engaging and can attract peoples attention
disadvantages - can take long to load over a restricted network
advantages and disadvantages of video
+ it is very engaging and and interesting
- can take large amounts of storage and take a long time to create
advantages and disadvantages of audio
+ visually impaired users can listen and know of the information
- voices may be misheard and misunderstandings can be made
advantages and disadvantages of animated graphics
+ can be understood by all ages and languages spoken
+ can be used to show a process
- takes a long time to create
advantages and disadvantages of numerical
+ statistical data is easier to understand and manage
+ can be exported into spreadsheets and present it as a graph to visualize the data
- telephone number can’t be put in, because it is formatted
advantages and disadvantages of tactile images
+ visually impaired users can feel the object
+ can be used as a prototype on a target audience to feel and comment on
- requires specialist equipment
- difficult to share
advantages and disadvantages of braille text
+ a braille printer can print braille pages
+ allows visually impaired individuals to interact with a computer system, using a braille terminal
- can only displayed a limited amount of information
- it is not used by many people
advantages and disadvantages of Boolean
only have to give two specific values, which are true or false
advantages and disadvantages of subtitles
+ hearing impaired users can access audio information
+ can be used in noisy environments
- auto generated subtitles are incorrect
- take a long time to type up
advantages and disadvantages of tables and spreadsheets
+ records can be locked in so that only one person can make edits at any one time
+ data would be kept up to date and accurate
- takes lots of time to set up
(3.2, 3.3) categories of information
communication, education and training, entertaining
planning, financial, research, location dependent
categories of information benefits and limitations
+ students can track their progress, using grade cards. they can decide whether continuing with their coursers or change if their
- the raw list of grades may hide the amount of effort that has gone into improving one area, even if that is not reflected by showing a top grade
(5.1) information sources
internal sources - information comes from within the organisation
external sources - information comes from outside an organization
primary data - data collected by yourself or another employee within an organization
secondary data - data collected by someone outside the organization
qualitative data - descriptive data, that can be observed but not measured.
quantitate data - measured data put in numbers, percentages or statistics.
(2.3) information characteristics
valid
biased
reliable
relevant
accurate
information quality
good quality can lead to significant impact on processes and decisions. good quality information that is accurate and valid, can lead to better strategic decisions and innovative ideas.
negative effects of poor quality information
e.g. inaccurate stock information, could lead to inaccurate delivery time and too much or too little stock
(4.1) legislations and regulations
Data protection act
computer misuse act
freedom of information act
regulations of investigator powers act
copyright, designs and patents act
information commissioners office
protection of freedoms act
privacy and electronic communications regulations
equality act
data protection act and its principles
Fair and lawful: data must be processed fairly and lawfully
Purpose: data can only be used by a clearly stated purpose
Adequacy: the amount of data collected should not be more than is required.
Accuracy: the data collected must be accurate
Retention: the data must not be kept longer than is necessary.
Rights: the individual has the rights to access the data their data and see all that is stored on them; however, the company has the right to a reasonable amount of time to gather this data, and the right to charge an admin fee to cover the cost of the data
Security: data should be kept safe. Protected from unlawful access orb theft. Only authorised individuals should have access to the data, and this is also managed by tiered levels of access
Transfer: data can only be transferred out of the UK, if the data recipient country’s data protection laws meet or exceed that of the DPA. NB America has no dedicated Data Protection Act
(6.1) security principles
confidentiality - information should be accessed by individuals or groups authorised to do so.
integrity - information should be maintained and up-to-date
availability - information should be available to those authorised.
(6.2) risks
unauthorised access to data.
accidental loss of data.
intentional destruction of data.
intentional tampering with data.
unauthorised access to data
data should only be viewed by individuals with the authorisation to do so. if a company has poor information management and data is insecurely stored, then it’s likely to be viewed by unauthorised people
accidental loss of data
most common reason for accidental loss is equipment failure or a technical error, that could lead to data corruption. Human error is also reason for accidental loss of data, an example is that employees could accidentally delete the file, and lose it completely.
intentional destruction of data
purposely damaging or deleting a file. an example of this could be viruses that corrupt data, so that it can’t be no longer used. This risk could lead to loss of reputation for a business, as customers wouldn’t want their data to be at risk of being deleted or inaccessible.
intentional tampering of data
This is when the data is changed and no longer accurate. hacking is the main cause of this happening. an example of this is when web pages are being hacked, the information within the page is inaccurate.
6.3 impacts
loss of intellectual property
loss of service access
breach of confidential information
loss of third party data
loss of reputation
identity theft
threat to national security
protection measures
staff responsibilities - staff members are assigned specific roles, that they must follow. If data is to be sensitive and too much staff have access to it, there is a high risk of the data being lost or tampered.
protection measures
disaster and recovery plans - all possible risks should be analysed and preventive measures occur. staff should trained and ready for any disaster.
during the disaster staff should follow their training and make sure the data is protected and measures are in place.
after the disaster recovery measures should take place. replacement of hardware, software should be reinstalled.
protection measures
assessment and effectiveness - information security risk assessments should take place and most effective methods of protection.
physical protection
locks
biometrics
security staff
back up
shredding
RFID tokens