Information Flashcards

(90 cards)

0
Q

Define data

A

Facts, observation, data points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Data is information without —

A

Meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define information

A

Data with context or meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define knowledge

A

Information with meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define wisdom

A

Knowledge with insight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

From the top down, what are the four layers of the information pyramid?

A

Wisdom
Knowledge
Information
Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List as many instances of information you can think of

A
Documents
Speech
Graphics
Presentations
Recordings
Output reports
Magnetic tapes
Removable disks
Test data
Blank headed paper
Charts
Policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List three characteristic features of knowledge

A

It is intangible
It is not depleted when used
It grows when it is shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five steps of the knowledge management path?

A
Identify
Create
Collect/codify
Knowledge repository
Diffuse/use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the knowledge management path, how should knowledge be identified?

A

By establishing a database of where knowledge is held within the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Of what aspects of knowledge assets does compiling an inventory of them give us a picture?

A

Their value to the organisation
The opportunity potential of the information
The potential risks to the organisation in holding such information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four different ways in which knowledge is created?

A

Tacit to tacit: where we learn from others
Tacit to explicit: where we articulate knowledge into tangible form through dialogue
Explicit to explicit: where we combine different forms of explicit knowledge, e.g., documents
Explicit to tacit: where we learn from documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the knowledge management path, list some methods of collecting information

A

Interviewing
Observing
Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List four typical knowledge repositories

A

Data warehouse, to store customer data
Document libraries, to ensure standard house styles
Help centres, to store system information enabling more rapid help
Enterprise resource systems, to hold a wide range of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Once data repositories have been set up, what are the two principal ways in which they can be used?

A

Use of information to generate or extrapolate new information
Use of information for sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List four ways in which information can be shared

A

Shared between workers
Shared across the organisation
Shared with trading partners
Shared with the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four forms in which information is most likely to be shared?

A

Intranet
Internet
Call centres
Brochures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List four pieces of LEGISLATION having an impact on the proper safeguarding, retention and storage of documents

A

Data Protection Act 1998
Human Rights Act 1998
Freedom of Information Act 2000
Companies Act 2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The data protection act 1998 applies exclusive to records relating to people, not companies. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What determines whether a record, no matter how filed, comes within the scope of the data protection act 1998?

A

Whether the record can be used to identify the individual the record refers to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the eight principles of the data protection act 1998?

A
  1. Personal data shall be processed fairly and lawfully and shall not be processed unless certain conditions are met
  2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner compatible with that purpose or those purposes
  3. Personal data shall be adequate, relevant, and not excessive in relation to the purpose or purposes for which they are processed
  4. Personal data shall be accurate and kept up to date where necessary
  5. Personal data processed for any purpose shall not be kept longer than is necessary for that purpose
  6. Personal data shall be processed in accordance with the rights of data subjects under this Act
  7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data
  8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the seven individual’s rights listed in the data protection act 1998?

A

Right of access
Right to prevent processing likely to cause damage or distress
Right to prevent processing for direct marketing
Right in relation to automated decision making
Right to compensation
Rectification, blocking, erasure and destruction
Requests for assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

According to the right of access in the data protection act 1998, for a minimum fee of – the data subject is entitled to a copy of the data relating to them

A

£10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

According to the right of access in the data protection act 1998, data controllers are required to what?

A

Reveal any information they hold, including details relating to the source of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
According to the 'right to prevent processing likely to cause damage or distress' in the data protection act 1998, an individual can serve written notice prohibiting what?
Data controllers from processing data that can cause substantial damage or distress
25
According to the 'right to prevent processing for direct marketing' in the data protection act 1998, individuals have the right to require data controllers to ensure what?
That data will not be used for the purpose of sending them advertising or direct marketing material
26
According to the 'right in relation to automated decision making' in the data protection act 1998, an individual can give written notice preventing the data controller from what?
Taking decisions based solely on scorecards or processing by other automatic means
27
According to the 'right to compensation' in the data protection act 1998, an individual suffering damage or distress as a result of a contravention of the Act is entitled to...
Compensation | Unless the data controller can demonstrate they took reasonable steps to comply with the Act
28
What does Schedule 1, Article 8 of the human rights act 1998 state?
'Everyone has the right to respect for his private and family life, his home and his correspondence.'
29
What are the two main features of the Freedom of Information Act 2000?
1. A general right of access to recorded information held by a wide range of bodies across the public sector, subject to certain conditions and exemptions 2. In relation to most exempt information, the information must nevertheless be disclosed unless the public interest in maintaining the exemption outweighs the public interest in disclosure
30
Since the risks to the organisation are increased when it takes a haphazard approach to managing information, what can it do at a high level to meet this risk?
Develop a strategic framework which can be used to control information management
31
With respect to information management, the strategic framework should comprise what five aspects relating to information?
``` Creation Classification Transmission Retention Destruction ```
32
Document management. With respect to CREATION of information, what effect of the aggregation of individual information items should be considered?
Whether as an aggregated whole, the information is highly classified
33
With respect to the creation of information, what are the classic three security aspects that need to be controlled?
Confidentiality Integrity Availability
34
With respect to document management, an information --- system should be used to define an appropriate set of protection levels and communicate to all authorised users the need for appropriate handling measures
Classification
35
--- - classification can lead to an unnecessary additional business expense
Over classification
36
When deciding what kind of information classification system to use, overly --- schemes should be avoided
Complex
37
With whom should the responsibility lie for determining the classification of a particular item?
The originator or nominated owner of the information
38
Once the classification value of information has been determined, the appropriate s--- m--- needs to be applied
Security marking
39
At a high level, classification of information should be controlled through --- and ---
Policies and procedures
40
For each level of information classification, --- procedures should be defined to cover all types of information processing activity
Handling
41
List three standard levels of classification, describing the sensitivity considerations for each
High. Information that, if released, could prejudice the existence of the organisation Medium. Personal information or information that, if released, could harm the organisation's interests Low. All other information
42
How can information be accidentally transmitted?
By leaving it in places where passers by can see it, such as on a desk or computer screen
43
What two policies can prevent static information being accidentally transmitted?
Clear desk policy | Clear screen policy
44
What forms of transport of information are particularly vulnerable to unauthorised access, misuse or corruption?
Those forms where the sender cannot guarantee the identity of the recipient, such as post, fax, email and various voice formats
45
Where there is exchange of information and software between organisations, there should be --- in place to control the information flow
Agreements
46
What ten things might agreements on transmission conditions need to consider?
Management responsibilities for controlling and notifying transmission, despatch and receipt Procedures for notifying sender, transmission, despatch and receipt Minimum standards for packaging and transmission Courier identification standards Responsibilities and liabilities in the event of loss of data Use of an agreed labelling system for sensitive or critical information, ensuring that the meaning of the labels is clear Information ownership and responsibilities for data protection Technical standards for recording and reading information Any special controls required to protect security information in transit Splitting consignment into more than one delivery and/or des patching by different routes
47
Organisational p--- should provide guidance on the security of information in transit
Policies
48
To ensure information on a publicly available system complies with laws, rules and regulations, there should be a formal --- --- before information is made publicly available
Authorisation process
49
A data retention policy may take one of what two forms?
Maximum - minimum rule | Exceptions to the maximum rule
50
In data retention, what does the maximum - minimum rule mean?
The retention periods listed in the policy are both minimum and maximum retention periods and mean certain types of information must be kept as long as the retention period listed, but no longer
51
What does 'exceptions to the maximum rule' mean in data retention?
There may be exceptions to the maximum retention period rule for records that are involved in litigation, criminal or civil investigation, audit, or continuing administrative use. But under no circumstances should data be retained less than the period indicated
52
Data retention policies should define not just the retention period, but the retention m---
Methodology
53
Long term storage of information is often --- to specialist agencies
Outsourced
54
When --- of information, care should be taken that appropriate measures are in place to protect its security up to the point of death
Disposing
55
What are the best forms of destroying computer-based information?
Exposing media to strong magnetic current | Crushing media to dust
56
--- are applications that store data
Databases
57
A --- --- --- is a complex suite of software programs that control the organisation, storage, management and retrieval of data in a database.
Database management system (DBMS)
58
Database management systems are categorised according to what five data structures or types?
``` Hierarchical Networked database systems Relational Object oriented Hybrid ```
59
A database management system provides what two views of the database data?
A physical view | A logical view
60
In a database management system, what does a physical view of the data entail?
The actual, physical arrangement and location of data in the database. May be used by database specialist to make efficient use of storage and processing resources
61
In a database management systems, what does a logical view of the data entail?
Representation of data in a format that is meaningful to a user and to the software programs that process the data
62
Who is usually responsIble for monitoring the integrity of the database and its views?
The Database Administrator (DBA)
63
What is the main disadvantage of a hierarchical database management system (HDMS)?
It is relatively slow in reading or updating complicated records
64
Describe the networked database management system (NDMS)
Identical in layout to the hierarchical model, but uses fast paths between regularly used fields to speed things up
65
What is the most common variety of database management system in use?
Relational database management system (RDMS)
66
A relational database management system uses a series of linked --- --- to manage data
Data tables
67
An --- --- database is a derivation of the relational database, where the background processing includes the ability to define not only the data type of a data structure, but also the types of operations that can be applied to the data structure
Object oriented
68
A data --- is a specialised database that provides integrated, relevant and consistent information about the business.
Warehouse
69
The database warehouse relies on a framework called...
Business information infrastructure
70
The business information infrastructure (BII) consists of what six stages?
Modelling data for the data warehouse Extracting data from source databases Cleansing data Transforming data into warehouse model Integrating data with data from other sources Loading the data into the data warehouse database
71
What are the five key elements of any Workflow System?
``` It matches people and tasks Provides information resources for those tasks Offers process design Implements process management techniques Manages the scope of the project ```
72
Describe workflow management
It consists of the automation of business procedures during which documents, information or tasks are passed from one participant to another in a way that is governed by rules or procedures
73
How do workflow management systems tend to improve customer service?
They facilitate more predictable levels of response to customers
74
All workflow products have what five basic characteristics that should be evaluated independently?
How is information assembled? How is work routed? How transparent is application integration? What level of workflow is offered and to whom? What level of customisation is required?
75
In workflow management, what is information assembly?
The function of making the necessary documents, notes and data available to each user in a workflow process, and to the workflow software
76
In workflow management, what is work routing?
The routing of work to users, which can follow a sequential path, a series of manual selections by each user, or dynamic rule-based routing calculated at runtime.
77
In workflow management, what is application integration?
Since many different applications may be involved in a workflow process, workflow software may actively integrate these applications into an overall process, allowing them to function in a coordinated manner
78
In workflow management, what are the main workflow capabilities?
``` Functions of... Tracking Reporting Modification Administration ```
79
In what two ways may workflow software be packaged?
As a set of tools and services for application developers | As a customisable turnkey solution for end users
80
What are the three main benefits of workflow automation to information technology.
Increasing the speed of implementing new applications Easing the integration of existing and future technologies into enterprise-wide business processes Decreasing support costs through improved response time to business requirements
81
What are the benefits of workflow automation to business line management?
Increasing profitability through improved work productivity by automating and managing business processes Improved understanding of the current process and user efficiencies through real-time reports Improving the accuracy, timeliness and completeness of work accomplished through tighter controls for modification of work in process
82
What are the main types of workflow system known as?
Enterprise resource planning (ERP)
83
Briefly describe enterprise resource planning systems...
They integrate all the different departments such as finance, human resources and manufacturing into a single software program running off a single database
84
List four major reasons why organisations undertake ERP...
To integrate financial information To integrate customer order information To standardise and speed up manufacturing processes To reduce stock
85
What is the most common reason companies walk away from ERP?
The software does not support one of their important business processes
86
List some key risks involved with setting up ERP
Assumptions made concerning financial savings are wrong Lack of alignment between strategy, structure and processes and the ERP software Loss of control of the project team Scope and complexity of the project Lack of in house skills Failure to properly plan transition of data and services Inadequate training and therefore inadequate UAT
87
What is a document management system (DMS?)
A computer system designed to track and store electronic documents
88
What standard specifies what is required in order to implement and operate an electronic information management system?
BS 10008:2008, Evidential weight and legal admissibility of electronic information specification
89
--- --- --- involves acquiring, managing and using information generated about customers through accounting, marketing, sales, etc, to forge productive business relationships
Customer relationship management CRM