Unit 2: Global Information Flashcards
What are the categories of information holders
Individuals
Business and organisations
Government
Charities
Different locations of holders of information
Developing and Developed countries
Urban and Rural
What are the different types of information formats
Web pages, Blogs, Podcasts, Streamed Audio and Video, Social Media channels, Document Stores and RSS feeds
Different types of information styles
Text, Graphic, Video, Animated Graphic, Audio, Numerical, Braille Text, Tactile Images, Subtitles, Boolean, Tables and Spreadsheets, and Charts and Graphs
(+)positives and (-)negatives of Text
+Provides detailed explanations
+The format can be changed to suit the purpose
+Can be written in different languages
-Large amounts can be less engaging and time consuming
-May have spelling errors or be factually incorrect
(+)positives and (-)negatives of Graphics
+Multilingual=can be understood by anyone regardless of their language
+Can present an idea or message
+More engaging
-Images may take longer to load
(+)positives and (-)negatives of Video
+More engaging and easier to follow than reading large amounts of text
+Used to convey a message in a short space of time
+Audio and music can be added for narration
-Take up large amounts of storage space
-Time to upload/download/transfer
-Long time to create
(+)positives and (-)negatives of Animated Graphics
+Can be used to show a process and make it easy to understand
+Understood by all ages and language speakers
-Takes time to create
(+)positives and (-)negatives of Numerical
+Statistical data is easier to understand and manage
+Can be exported into spreadsheets and presented in different ways
-Long numbers can be entered incorrectly by humans
-Formatted data like telephone numbers cant be numerical as it cant start with a 0 and also doesn’t allow a space
(+)positives and (-)negatives of Audio
+Can listen when doing something else
+Visually impaired users can still use and interact with voice recognition software
+Some users prefer listening
-May not be suitable in situations E.G. Noisy areas
-Words may be misheard
(+)positives and (-)negatives of Tactile Images
+Easier to understand
+Visually impaired users can still feel the object
+Used as a prototype
-Difficult to share
-Requires specialist equipment
(+)positives and (-)negatives of Subtitles
+Hearing impaired users can access the information in a video
+Can be used in a noisy environment
+Translated speech
-Auto generated subtitles are often incorrect
-Takes time to type up and sync with the audio
(+)positives and (-)negatives of Braille
+Visually impaired users can interact with a computer system
+Braille printer
-Only display a limited amount of information
-Not used by many people
(+)positives and (-)negatives of Charts and Graphs
+Easier to visualise and understand
+Summarise information
+Easily identify trends and make comparisons between them
-Charts can be misleading or can display incorrect information if the numerical data is wrong
Categories of information for individuals
Communication, Education and Planning, Entertainment, Planning, Financial, Research, and Location Dependent
Categories of information for organisations
Knowledge management & Creation, Management Information Systems(MIS), Financial analysis & Modelling, Contact management, Decision making, Internal and External communication, and Big data
What does it mean by Internal Source
Information that comes within an organisation, such as financial reports, data analysis or employee surveys
What does it mean by External Source
Information that comes from outside an organisation, such as government reports, financial data of competitors or price lists from suppliers
Information Characteristics
Valid, Biased, Reliable, Relevant and Accurate
What is good quality information
Information that is accurate, valid or reliable. This will lead to better strategic decisions, meeting deadlines and innovation
What is the Data Protection Act (2018) / GDPR
This act protects the data of individuals that is stored on computers and processed by organisations. Under the DPA, individuals have a right of access to any information that is stored about them by public bodies.
What are the eight principles of the Data Protection Act (2018)
- Data must be collected lawfully and processed fairly
- Collected data must only be used for the reasons specified
- Data must be relevant and excessive
- Data must be accurate and up to date
- Data must not be stored for longer than necessary
- Individuals must have the right to access their data
- Data should be kept safe stopping unauthorised access and protecting it from unlawful access or theft
- Data can only be transferred out of the UK if the recipient countries data protection laws meet or exceed ours
What is the Computer Misuse Act (1990) and what does it do?
The act attempts to stop and punish those who use computers inappropriately. If the act is broken then it may result in fines or a jail sentence.
What are the three main principles of the Computer Misuse Act (1990)?
- No unauthorized access to data
- No unauthorized access to data that could be used for further illegal activities
- No unauthorized modification of data
What is the Freedom Of Information Act (2000)?
This act is a law which allows people to request public authorities to release information
What is the Regulation Of Investigatory Powers Act (2000)?
This act (RIPA) was introduced in response to the increase in both criminal and terrorist activities on the internet, it is used to monitor and access online communication of suspected criminals
What is the Copyright, Designs and Patents Act (1988)?
This act makes it a criminal offence to copy work that is not your own without permission of the creator or the copyright holder. This can refer to text, images, music, videos or software.
What is the difference between Copyright and Plagiarism?
Copyright is when you use someone’s work without permission, whereas Plagiarism is when you claim someone else’s work as your own
Give 6 examples of different physical protection measures?
RFID, Locks, Biometrics, Shredding, Backups, Security Staff
Give 6 examples of different logical protection measures?
Usernames & Passwords, Anti-malware, Firewall, Encryption, Tiered Levels Of Access, Obfuscation