SlideShare a Scribd company logo
1 of 6
Download to read offline
Information management
The term 'information management' is used ambiguously in the literatures of several fields: in
computer science and its applications it is used as a synonym for information technology
management or as identical to 'data management', where the emphasis is on the structures
underlying quantitative data and their relationship to the design of databases. In business or
management studies it has similar connotations to technology management, with an emphasis on
the relationship of information technology to business performance and competitiveness. In the
field of librarianship and information science it is identified with the 'emerging market' for
information workers (managers), whose perception of information embraces data, organizational
intelligence, competitive intelligence, external information resources of all kinds and the
associated technology (manual or machine) for handling these different sources. Compared with
the other areas, information management in this latter context is more widely concerned with the
meaning of information for the information user and with information retrieval issues.
Education for information management
The state of education for information management is as diverse as the basis for its definitions.
In the UK, the Departments and Schools of Librarianship and Information Science (LIS) have
introduced information management options and, in some cases, new degree programmes in the
field, and have made a strong bid within their institutions to be the lead departments in this new
area. However, there is competition from the business schools (where the focus still tends to be
on the strategic role of information technology and on the consequences of that role for the
management of IT) and from computer science departments, which, in the early 1990s, felt the
effect of declining demand for their courses and which, in consequence, have sought to broaden
the basis for attracting students by offering courses in business information systems and
information management.
Attempts to define the information management curriculum have been limited, but Wilson
(1989b) analysed the contents of key journals in the field and found the following categories:
While the attention given to each of these elements seems likely to differ, they do seem to
constitute the general core of information management and, indeed, those departments of library
and information studies in the UK that have created information management programmes have
produced different mixes of the elements depending upon the existing strengths of the teaching
staff. Since the first edition of this text, the situation has changed little: a study by Maceviçiute
and Wilson (2002) found:
The situation in the USA is similar and appears to have changed little since Lytle (1988) noted
that confusion existed over the educational base for information management and claimed that:
'The reason for the confusion is not curriculum overlap or battles in academia for the latest
degree programme. The primary problem is confusion concerning what qualities and skills are
required for IRM positions, whether these positions have IRM, MIS, or other titles.'
Information Security and assurance:
Information Assurance concerns itself with implementing measures focused at protection and
safeguarding of critical information and relevant information systems by assuring the integrity,
availability, authentication, confidentiality and non-repudiation. The measures also provides for
restoring information systems after an attack by putting in place proper protection, detection and
reaction abilities.
Information Security deals with protecting information and information systems from
illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the
objectives of data integrity, availability and confidentiality.
Information Assurance is more strategy focused which implies that the emphasis is more on
tactical deployment of security policies rather than building up of security infrastructures and
designing of protective applications. Information Security, on the other hand is tools and tactics
focused implying that the development of strategic security software and infrastructure is
stressed upon to bolster the overall protection of information system.
Information Assurance specifies the ways to manage and protect critical information more
effectively. Information Security, on the contrary deals with technology and operations to put
together an effective mechanism to better plug the loopholes in the system. The stress is on risk
management by adopting an adaptive and proactive approach in Information Assurance, whereas
Information Security bothers about mitigating the risks involved by technically evolving
architecture and systems to tackle system vulnerabilities.
Information Assurance is broad-based i.e. it is related to risk assessment and management on an
organizational level such as conducting security audits, ensuring compliance to security policies
etc. Information Security is concerned with strategic development and deployment of security
applications and infrastructures like anti-virus programs, encryption services, firewalls, VPNS,
Pen testing, vulnerability analysis etc.
The eventual aim of both the practices is to maintain the integrity of data i.e. guard against
unauthorized modification or destruction of information and ensure data authenticity and non-
repudiation. This will pave the way for timely and reliable access to data while maintaining its
confidentiality.
Strategies and planning element of information security:
The security strategies might be:
1) to increase monitoring of external connections. This will mitigate some risk associated with
increasing the connectivity.
2) to increase the security “hardening” of all customer facing systems.
3) to provide redundancy for critical production system components to improve availability of
services.
Information governance:
Information governance, or IG, is the set of multi-disciplinary structures, policies, procedures,
processes and controls implemented to manage information at an enterprise level, supporting an
organization's immediate and future regulatory, legal, risk, environmental and operational
requirements. Information governance should determine the balance point between two
potentially divergent organizational goals: extracting value from information and reducing the
potential risk of information. Information governance reduces organizational risk in the fields of
compliance, operational transparency, and reducing expenditures associated with e-discovery
and litigation response. An organization can establish a consistent and logical framework for
employees to handle data through their information governance policies and procedures. These
policies guide proper behavior regarding how organizations and their employees handle
electronically stored information .
Information governance encompasses more than traditional records management. It incorporates
information security and protection, compliance, data governance, electronic discovery, risk
management, privacy, data storage and archiving, knowledge management, business operations
and management, audit, analytics, IT management, master data management, enterprise
architecture, business intelligence, big data, data science, and finance.
characteristics of effective security governance. These include:
Solution
Information management
The term 'information management' is used ambiguously in the literatures of several fields: in
computer science and its applications it is used as a synonym for information technology
management or as identical to 'data management', where the emphasis is on the structures
underlying quantitative data and their relationship to the design of databases. In business or
management studies it has similar connotations to technology management, with an emphasis on
the relationship of information technology to business performance and competitiveness. In the
field of librarianship and information science it is identified with the 'emerging market' for
information workers (managers), whose perception of information embraces data, organizational
intelligence, competitive intelligence, external information resources of all kinds and the
associated technology (manual or machine) for handling these different sources. Compared with
the other areas, information management in this latter context is more widely concerned with the
meaning of information for the information user and with information retrieval issues.
Education for information management
The state of education for information management is as diverse as the basis for its definitions.
In the UK, the Departments and Schools of Librarianship and Information Science (LIS) have
introduced information management options and, in some cases, new degree programmes in the
field, and have made a strong bid within their institutions to be the lead departments in this new
area. However, there is competition from the business schools (where the focus still tends to be
on the strategic role of information technology and on the consequences of that role for the
management of IT) and from computer science departments, which, in the early 1990s, felt the
effect of declining demand for their courses and which, in consequence, have sought to broaden
the basis for attracting students by offering courses in business information systems and
information management.
Attempts to define the information management curriculum have been limited, but Wilson
(1989b) analysed the contents of key journals in the field and found the following categories:
While the attention given to each of these elements seems likely to differ, they do seem to
constitute the general core of information management and, indeed, those departments of library
and information studies in the UK that have created information management programmes have
produced different mixes of the elements depending upon the existing strengths of the teaching
staff. Since the first edition of this text, the situation has changed little: a study by Maceviçiute
and Wilson (2002) found:
The situation in the USA is similar and appears to have changed little since Lytle (1988) noted
that confusion existed over the educational base for information management and claimed that:
'The reason for the confusion is not curriculum overlap or battles in academia for the latest
degree programme. The primary problem is confusion concerning what qualities and skills are
required for IRM positions, whether these positions have IRM, MIS, or other titles.'
Information Security and assurance:
Information Assurance concerns itself with implementing measures focused at protection and
safeguarding of critical information and relevant information systems by assuring the integrity,
availability, authentication, confidentiality and non-repudiation. The measures also provides for
restoring information systems after an attack by putting in place proper protection, detection and
reaction abilities.
Information Security deals with protecting information and information systems from
illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the
objectives of data integrity, availability and confidentiality.
Information Assurance is more strategy focused which implies that the emphasis is more on
tactical deployment of security policies rather than building up of security infrastructures and
designing of protective applications. Information Security, on the other hand is tools and tactics
focused implying that the development of strategic security software and infrastructure is
stressed upon to bolster the overall protection of information system.
Information Assurance specifies the ways to manage and protect critical information more
effectively. Information Security, on the contrary deals with technology and operations to put
together an effective mechanism to better plug the loopholes in the system. The stress is on risk
management by adopting an adaptive and proactive approach in Information Assurance, whereas
Information Security bothers about mitigating the risks involved by technically evolving
architecture and systems to tackle system vulnerabilities.
Information Assurance is broad-based i.e. it is related to risk assessment and management on an
organizational level such as conducting security audits, ensuring compliance to security policies
etc. Information Security is concerned with strategic development and deployment of security
applications and infrastructures like anti-virus programs, encryption services, firewalls, VPNS,
Pen testing, vulnerability analysis etc.
The eventual aim of both the practices is to maintain the integrity of data i.e. guard against
unauthorized modification or destruction of information and ensure data authenticity and non-
repudiation. This will pave the way for timely and reliable access to data while maintaining its
confidentiality.
Strategies and planning element of information security:
The security strategies might be:
1) to increase monitoring of external connections. This will mitigate some risk associated with
increasing the connectivity.
2) to increase the security “hardening” of all customer facing systems.
3) to provide redundancy for critical production system components to improve availability of
services.
Information governance:
Information governance, or IG, is the set of multi-disciplinary structures, policies, procedures,
processes and controls implemented to manage information at an enterprise level, supporting an
organization's immediate and future regulatory, legal, risk, environmental and operational
requirements. Information governance should determine the balance point between two
potentially divergent organizational goals: extracting value from information and reducing the
potential risk of information. Information governance reduces organizational risk in the fields of
compliance, operational transparency, and reducing expenditures associated with e-discovery
and litigation response. An organization can establish a consistent and logical framework for
employees to handle data through their information governance policies and procedures. These
policies guide proper behavior regarding how organizations and their employees handle
electronically stored information .
Information governance encompasses more than traditional records management. It incorporates
information security and protection, compliance, data governance, electronic discovery, risk
management, privacy, data storage and archiving, knowledge management, business operations
and management, audit, analytics, IT management, master data management, enterprise
architecture, business intelligence, big data, data science, and finance.
characteristics of effective security governance. These include:

More Related Content

Similar to Information managementThe term information management is used .pdf

Knowledge management strategies in higher
Knowledge management strategies in higherKnowledge management strategies in higher
Knowledge management strategies in higheriaemedu
 
Knowledge management strategies in higher education
Knowledge management strategies in higher educationKnowledge management strategies in higher education
Knowledge management strategies in higher educationIAEME Publication
 
Knowledge management strategies in higher education
Knowledge management strategies in higher educationKnowledge management strategies in higher education
Knowledge management strategies in higher educationiaemedu
 
Knowledge management strategies in higher
Knowledge management strategies in higherKnowledge management strategies in higher
Knowledge management strategies in higheriaemedu
 
MSF Paper Final Draft_MIrvin_Oct14
MSF Paper Final Draft_MIrvin_Oct14MSF Paper Final Draft_MIrvin_Oct14
MSF Paper Final Draft_MIrvin_Oct14Melissa Irvin, Ed.D.
 
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...ulfa333
 
DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO IJDKP
 
informationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxinformationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxMarlonMagtibay2
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...ijcsit
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...AIRCC Publishing Corporation
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Alexander Decker
 
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIO
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOFRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIO
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOijcsit
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...ijistjournal
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...ijistjournal
 
Knowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspectiveKnowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspectiveAlexander Decker
 
Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Anastasija Nikiforova
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...eSAT Publishing House
 
SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...
SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...
SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...IJITE
 

Similar to Information managementThe term information management is used .pdf (20)

Knowledge management strategies in higher
Knowledge management strategies in higherKnowledge management strategies in higher
Knowledge management strategies in higher
 
Knowledge management strategies in higher education
Knowledge management strategies in higher educationKnowledge management strategies in higher education
Knowledge management strategies in higher education
 
Knowledge management strategies in higher education
Knowledge management strategies in higher educationKnowledge management strategies in higher education
Knowledge management strategies in higher education
 
Knowledge management strategies in higher
Knowledge management strategies in higherKnowledge management strategies in higher
Knowledge management strategies in higher
 
MSF Paper Final Draft_MIrvin_Oct14
MSF Paper Final Draft_MIrvin_Oct14MSF Paper Final Draft_MIrvin_Oct14
MSF Paper Final Draft_MIrvin_Oct14
 
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
Artikel MIS, Hapzi Ali, Ulfa Nurhaliza, Dwi Alfianty Restu Fauzi, Rilnawati P...
 
DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO DATA SCIENCE CURRICULUM: CURRENT SCENARIO
DATA SCIENCE CURRICULUM: CURRENT SCENARIO
 
informationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxinformationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptx
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIO
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOFRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIO
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIO
 
Management Gradients Vis-à-Vis Information Science: Towards Potential Informa...
Management Gradients Vis-à-Vis Information Science: Towards Potential Informa...Management Gradients Vis-à-Vis Information Science: Towards Potential Informa...
Management Gradients Vis-à-Vis Information Science: Towards Potential Informa...
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
 
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
Assessing The Tangible And Intangible Impacts Of The Convergence Of E-Learnin...
 
Knowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspectiveKnowledge management in universities in uganda a social perspective
Knowledge management in universities in uganda a social perspective
 
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
 
Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...
 
SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...
SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...
SCHOOL MANAGEMENT INFORMATION SYSTEMS: CHALLENGES TO EDUCATIONAL DECISION- MA...
 

More from Ankitchhabra28

frequency tableSolution frequency table.pdf
 frequency tableSolution frequency table.pdf frequency tableSolution frequency table.pdf
frequency tableSolution frequency table.pdfAnkitchhabra28
 
ublic class Elevator { private static final String DOWN = down.pdf
  ublic class Elevator {     private static final String DOWN = down.pdf  ublic class Elevator {     private static final String DOWN = down.pdf
ublic class Elevator { private static final String DOWN = down.pdfAnkitchhabra28
 
[Al+] [OH-]^3 = Ksp0.2 [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdf
[Al+]  [OH-]^3 = Ksp0.2  [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdf[Al+]  [OH-]^3 = Ksp0.2  [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdf
[Al+] [OH-]^3 = Ksp0.2 [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdfAnkitchhabra28
 
As a CFO environment of internal control needs to put in place t.pdf
    As a CFO environment of internal control needs to put in   place t.pdf    As a CFO environment of internal control needs to put in   place t.pdf
As a CFO environment of internal control needs to put in place t.pdfAnkitchhabra28
 
What are the financial markets and what purposes do they serveA f.pdf
What are the financial markets and what purposes do they serveA f.pdfWhat are the financial markets and what purposes do they serveA f.pdf
What are the financial markets and what purposes do they serveA f.pdfAnkitchhabra28
 
VI) Instruction set Architecture-      Instruction set is a colle.pdf
VI) Instruction set Architecture-      Instruction set is a colle.pdfVI) Instruction set Architecture-      Instruction set is a colle.pdf
VI) Instruction set Architecture-      Instruction set is a colle.pdfAnkitchhabra28
 
The OSI(Open System Interconnection) contains 7 layers.1.Physica.pdf
The OSI(Open System Interconnection) contains 7 layers.1.Physica.pdfThe OSI(Open System Interconnection) contains 7 layers.1.Physica.pdf
The OSI(Open System Interconnection) contains 7 layers.1.Physica.pdfAnkitchhabra28
 
the following statements are true Ubiquinone is a small, hydrophob.pdf
the following statements are true Ubiquinone is a small, hydrophob.pdfthe following statements are true Ubiquinone is a small, hydrophob.pdf
the following statements are true Ubiquinone is a small, hydrophob.pdfAnkitchhabra28
 
The evolution of one species is driven by the evolution of the other.pdf
The evolution of one species is driven by the evolution of the other.pdfThe evolution of one species is driven by the evolution of the other.pdf
The evolution of one species is driven by the evolution of the other.pdfAnkitchhabra28
 
Student choosed wrong subject. Question was not showning.Solutio.pdf
Student choosed wrong subject. Question was not showning.Solutio.pdfStudent choosed wrong subject. Question was not showning.Solutio.pdf
Student choosed wrong subject. Question was not showning.Solutio.pdfAnkitchhabra28
 
S(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdf
S(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdfS(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdf
S(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdfAnkitchhabra28
 
Question not visible..please post the imageSolutionQuestion no.pdf
Question not visible..please post the imageSolutionQuestion no.pdfQuestion not visible..please post the imageSolutionQuestion no.pdf
Question not visible..please post the imageSolutionQuestion no.pdfAnkitchhabra28
 
Program 1 public class QueueUsingArray { private static final i.pdf
Program 1 public class QueueUsingArray { private static final i.pdfProgram 1 public class QueueUsingArray { private static final i.pdf
Program 1 public class QueueUsingArray { private static final i.pdfAnkitchhabra28
 
PrimeRange.java import java.util.Scanner;public class PrimeRan.pdf
PrimeRange.java import java.util.Scanner;public class PrimeRan.pdfPrimeRange.java import java.util.Scanner;public class PrimeRan.pdf
PrimeRange.java import java.util.Scanner;public class PrimeRan.pdfAnkitchhabra28
 
opps no format is there...Solutionopps no format is there....pdf
opps no format is there...Solutionopps no format is there....pdfopps no format is there...Solutionopps no format is there....pdf
opps no format is there...Solutionopps no format is there....pdfAnkitchhabra28
 
Note             Given Code modified as required and required met.pdf
Note             Given Code modified as required and required met.pdfNote             Given Code modified as required and required met.pdf
Note             Given Code modified as required and required met.pdfAnkitchhabra28
 
No, weight is not the measure of quantity of matter.Quantity of ma.pdf
No, weight is not the measure of quantity of matter.Quantity of ma.pdfNo, weight is not the measure of quantity of matter.Quantity of ma.pdf
No, weight is not the measure of quantity of matter.Quantity of ma.pdfAnkitchhabra28
 
Two. The pyruvate with carbons 4-6 will go throu.pdf
                     Two.  The pyruvate with carbons 4-6 will go throu.pdf                     Two.  The pyruvate with carbons 4-6 will go throu.pdf
Two. The pyruvate with carbons 4-6 will go throu.pdfAnkitchhabra28
 
Listing.javaimport java.util.Scanner;public class Listing {   .pdf
Listing.javaimport java.util.Scanner;public class Listing {   .pdfListing.javaimport java.util.Scanner;public class Listing {   .pdf
Listing.javaimport java.util.Scanner;public class Listing {   .pdfAnkitchhabra28
 

More from Ankitchhabra28 (20)

frequency tableSolution frequency table.pdf
 frequency tableSolution frequency table.pdf frequency tableSolution frequency table.pdf
frequency tableSolution frequency table.pdf
 
ublic class Elevator { private static final String DOWN = down.pdf
  ublic class Elevator {     private static final String DOWN = down.pdf  ublic class Elevator {     private static final String DOWN = down.pdf
ublic class Elevator { private static final String DOWN = down.pdf
 
[Al+] [OH-]^3 = Ksp0.2 [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdf
[Al+]  [OH-]^3 = Ksp0.2  [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdf[Al+]  [OH-]^3 = Ksp0.2  [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdf
[Al+] [OH-]^3 = Ksp0.2 [OH-]^3 = 210^-32[OH-] = 4.64210^-1.pdf
 
As a CFO environment of internal control needs to put in place t.pdf
    As a CFO environment of internal control needs to put in   place t.pdf    As a CFO environment of internal control needs to put in   place t.pdf
As a CFO environment of internal control needs to put in place t.pdf
 
What are the financial markets and what purposes do they serveA f.pdf
What are the financial markets and what purposes do they serveA f.pdfWhat are the financial markets and what purposes do they serveA f.pdf
What are the financial markets and what purposes do they serveA f.pdf
 
VI) Instruction set Architecture-      Instruction set is a colle.pdf
VI) Instruction set Architecture-      Instruction set is a colle.pdfVI) Instruction set Architecture-      Instruction set is a colle.pdf
VI) Instruction set Architecture-      Instruction set is a colle.pdf
 
waitSolutionwait.pdf
waitSolutionwait.pdfwaitSolutionwait.pdf
waitSolutionwait.pdf
 
The OSI(Open System Interconnection) contains 7 layers.1.Physica.pdf
The OSI(Open System Interconnection) contains 7 layers.1.Physica.pdfThe OSI(Open System Interconnection) contains 7 layers.1.Physica.pdf
The OSI(Open System Interconnection) contains 7 layers.1.Physica.pdf
 
the following statements are true Ubiquinone is a small, hydrophob.pdf
the following statements are true Ubiquinone is a small, hydrophob.pdfthe following statements are true Ubiquinone is a small, hydrophob.pdf
the following statements are true Ubiquinone is a small, hydrophob.pdf
 
The evolution of one species is driven by the evolution of the other.pdf
The evolution of one species is driven by the evolution of the other.pdfThe evolution of one species is driven by the evolution of the other.pdf
The evolution of one species is driven by the evolution of the other.pdf
 
Student choosed wrong subject. Question was not showning.Solutio.pdf
Student choosed wrong subject. Question was not showning.Solutio.pdfStudent choosed wrong subject. Question was not showning.Solutio.pdf
Student choosed wrong subject. Question was not showning.Solutio.pdf
 
S(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdf
S(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdfS(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdf
S(sulfur) atom Glucose molecule and compound Oxygen atom DN.pdf
 
Question not visible..please post the imageSolutionQuestion no.pdf
Question not visible..please post the imageSolutionQuestion no.pdfQuestion not visible..please post the imageSolutionQuestion no.pdf
Question not visible..please post the imageSolutionQuestion no.pdf
 
Program 1 public class QueueUsingArray { private static final i.pdf
Program 1 public class QueueUsingArray { private static final i.pdfProgram 1 public class QueueUsingArray { private static final i.pdf
Program 1 public class QueueUsingArray { private static final i.pdf
 
PrimeRange.java import java.util.Scanner;public class PrimeRan.pdf
PrimeRange.java import java.util.Scanner;public class PrimeRan.pdfPrimeRange.java import java.util.Scanner;public class PrimeRan.pdf
PrimeRange.java import java.util.Scanner;public class PrimeRan.pdf
 
opps no format is there...Solutionopps no format is there....pdf
opps no format is there...Solutionopps no format is there....pdfopps no format is there...Solutionopps no format is there....pdf
opps no format is there...Solutionopps no format is there....pdf
 
Note             Given Code modified as required and required met.pdf
Note             Given Code modified as required and required met.pdfNote             Given Code modified as required and required met.pdf
Note             Given Code modified as required and required met.pdf
 
No, weight is not the measure of quantity of matter.Quantity of ma.pdf
No, weight is not the measure of quantity of matter.Quantity of ma.pdfNo, weight is not the measure of quantity of matter.Quantity of ma.pdf
No, weight is not the measure of quantity of matter.Quantity of ma.pdf
 
Two. The pyruvate with carbons 4-6 will go throu.pdf
                     Two.  The pyruvate with carbons 4-6 will go throu.pdf                     Two.  The pyruvate with carbons 4-6 will go throu.pdf
Two. The pyruvate with carbons 4-6 will go throu.pdf
 
Listing.javaimport java.util.Scanner;public class Listing {   .pdf
Listing.javaimport java.util.Scanner;public class Listing {   .pdfListing.javaimport java.util.Scanner;public class Listing {   .pdf
Listing.javaimport java.util.Scanner;public class Listing {   .pdf
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Information managementThe term information management is used .pdf

  • 1. Information management The term 'information management' is used ambiguously in the literatures of several fields: in computer science and its applications it is used as a synonym for information technology management or as identical to 'data management', where the emphasis is on the structures underlying quantitative data and their relationship to the design of databases. In business or management studies it has similar connotations to technology management, with an emphasis on the relationship of information technology to business performance and competitiveness. In the field of librarianship and information science it is identified with the 'emerging market' for information workers (managers), whose perception of information embraces data, organizational intelligence, competitive intelligence, external information resources of all kinds and the associated technology (manual or machine) for handling these different sources. Compared with the other areas, information management in this latter context is more widely concerned with the meaning of information for the information user and with information retrieval issues. Education for information management The state of education for information management is as diverse as the basis for its definitions. In the UK, the Departments and Schools of Librarianship and Information Science (LIS) have introduced information management options and, in some cases, new degree programmes in the field, and have made a strong bid within their institutions to be the lead departments in this new area. However, there is competition from the business schools (where the focus still tends to be on the strategic role of information technology and on the consequences of that role for the management of IT) and from computer science departments, which, in the early 1990s, felt the effect of declining demand for their courses and which, in consequence, have sought to broaden the basis for attracting students by offering courses in business information systems and information management. Attempts to define the information management curriculum have been limited, but Wilson (1989b) analysed the contents of key journals in the field and found the following categories: While the attention given to each of these elements seems likely to differ, they do seem to constitute the general core of information management and, indeed, those departments of library and information studies in the UK that have created information management programmes have produced different mixes of the elements depending upon the existing strengths of the teaching staff. Since the first edition of this text, the situation has changed little: a study by Maceviçiute and Wilson (2002) found: The situation in the USA is similar and appears to have changed little since Lytle (1988) noted that confusion existed over the educational base for information management and claimed that: 'The reason for the confusion is not curriculum overlap or battles in academia for the latest
  • 2. degree programme. The primary problem is confusion concerning what qualities and skills are required for IRM positions, whether these positions have IRM, MIS, or other titles.' Information Security and assurance: Information Assurance concerns itself with implementing measures focused at protection and safeguarding of critical information and relevant information systems by assuring the integrity, availability, authentication, confidentiality and non-repudiation. The measures also provides for restoring information systems after an attack by putting in place proper protection, detection and reaction abilities. Information Security deals with protecting information and information systems from illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the objectives of data integrity, availability and confidentiality. Information Assurance is more strategy focused which implies that the emphasis is more on tactical deployment of security policies rather than building up of security infrastructures and designing of protective applications. Information Security, on the other hand is tools and tactics focused implying that the development of strategic security software and infrastructure is stressed upon to bolster the overall protection of information system. Information Assurance specifies the ways to manage and protect critical information more effectively. Information Security, on the contrary deals with technology and operations to put together an effective mechanism to better plug the loopholes in the system. The stress is on risk management by adopting an adaptive and proactive approach in Information Assurance, whereas Information Security bothers about mitigating the risks involved by technically evolving architecture and systems to tackle system vulnerabilities. Information Assurance is broad-based i.e. it is related to risk assessment and management on an organizational level such as conducting security audits, ensuring compliance to security policies etc. Information Security is concerned with strategic development and deployment of security applications and infrastructures like anti-virus programs, encryption services, firewalls, VPNS, Pen testing, vulnerability analysis etc. The eventual aim of both the practices is to maintain the integrity of data i.e. guard against unauthorized modification or destruction of information and ensure data authenticity and non- repudiation. This will pave the way for timely and reliable access to data while maintaining its confidentiality. Strategies and planning element of information security: The security strategies might be: 1) to increase monitoring of external connections. This will mitigate some risk associated with increasing the connectivity. 2) to increase the security “hardening” of all customer facing systems.
  • 3. 3) to provide redundancy for critical production system components to improve availability of services. Information governance: Information governance, or IG, is the set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental and operational requirements. Information governance should determine the balance point between two potentially divergent organizational goals: extracting value from information and reducing the potential risk of information. Information governance reduces organizational risk in the fields of compliance, operational transparency, and reducing expenditures associated with e-discovery and litigation response. An organization can establish a consistent and logical framework for employees to handle data through their information governance policies and procedures. These policies guide proper behavior regarding how organizations and their employees handle electronically stored information . Information governance encompasses more than traditional records management. It incorporates information security and protection, compliance, data governance, electronic discovery, risk management, privacy, data storage and archiving, knowledge management, business operations and management, audit, analytics, IT management, master data management, enterprise architecture, business intelligence, big data, data science, and finance. characteristics of effective security governance. These include: Solution Information management The term 'information management' is used ambiguously in the literatures of several fields: in computer science and its applications it is used as a synonym for information technology management or as identical to 'data management', where the emphasis is on the structures underlying quantitative data and their relationship to the design of databases. In business or management studies it has similar connotations to technology management, with an emphasis on the relationship of information technology to business performance and competitiveness. In the field of librarianship and information science it is identified with the 'emerging market' for information workers (managers), whose perception of information embraces data, organizational intelligence, competitive intelligence, external information resources of all kinds and the associated technology (manual or machine) for handling these different sources. Compared with the other areas, information management in this latter context is more widely concerned with the meaning of information for the information user and with information retrieval issues.
  • 4. Education for information management The state of education for information management is as diverse as the basis for its definitions. In the UK, the Departments and Schools of Librarianship and Information Science (LIS) have introduced information management options and, in some cases, new degree programmes in the field, and have made a strong bid within their institutions to be the lead departments in this new area. However, there is competition from the business schools (where the focus still tends to be on the strategic role of information technology and on the consequences of that role for the management of IT) and from computer science departments, which, in the early 1990s, felt the effect of declining demand for their courses and which, in consequence, have sought to broaden the basis for attracting students by offering courses in business information systems and information management. Attempts to define the information management curriculum have been limited, but Wilson (1989b) analysed the contents of key journals in the field and found the following categories: While the attention given to each of these elements seems likely to differ, they do seem to constitute the general core of information management and, indeed, those departments of library and information studies in the UK that have created information management programmes have produced different mixes of the elements depending upon the existing strengths of the teaching staff. Since the first edition of this text, the situation has changed little: a study by Maceviçiute and Wilson (2002) found: The situation in the USA is similar and appears to have changed little since Lytle (1988) noted that confusion existed over the educational base for information management and claimed that: 'The reason for the confusion is not curriculum overlap or battles in academia for the latest degree programme. The primary problem is confusion concerning what qualities and skills are required for IRM positions, whether these positions have IRM, MIS, or other titles.' Information Security and assurance: Information Assurance concerns itself with implementing measures focused at protection and safeguarding of critical information and relevant information systems by assuring the integrity, availability, authentication, confidentiality and non-repudiation. The measures also provides for restoring information systems after an attack by putting in place proper protection, detection and reaction abilities. Information Security deals with protecting information and information systems from illegitimate access, usage, revelation, alteration, disruption and destruction to achieve the objectives of data integrity, availability and confidentiality. Information Assurance is more strategy focused which implies that the emphasis is more on tactical deployment of security policies rather than building up of security infrastructures and designing of protective applications. Information Security, on the other hand is tools and tactics
  • 5. focused implying that the development of strategic security software and infrastructure is stressed upon to bolster the overall protection of information system. Information Assurance specifies the ways to manage and protect critical information more effectively. Information Security, on the contrary deals with technology and operations to put together an effective mechanism to better plug the loopholes in the system. The stress is on risk management by adopting an adaptive and proactive approach in Information Assurance, whereas Information Security bothers about mitigating the risks involved by technically evolving architecture and systems to tackle system vulnerabilities. Information Assurance is broad-based i.e. it is related to risk assessment and management on an organizational level such as conducting security audits, ensuring compliance to security policies etc. Information Security is concerned with strategic development and deployment of security applications and infrastructures like anti-virus programs, encryption services, firewalls, VPNS, Pen testing, vulnerability analysis etc. The eventual aim of both the practices is to maintain the integrity of data i.e. guard against unauthorized modification or destruction of information and ensure data authenticity and non- repudiation. This will pave the way for timely and reliable access to data while maintaining its confidentiality. Strategies and planning element of information security: The security strategies might be: 1) to increase monitoring of external connections. This will mitigate some risk associated with increasing the connectivity. 2) to increase the security “hardening” of all customer facing systems. 3) to provide redundancy for critical production system components to improve availability of services. Information governance: Information governance, or IG, is the set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental and operational requirements. Information governance should determine the balance point between two potentially divergent organizational goals: extracting value from information and reducing the potential risk of information. Information governance reduces organizational risk in the fields of compliance, operational transparency, and reducing expenditures associated with e-discovery and litigation response. An organization can establish a consistent and logical framework for employees to handle data through their information governance policies and procedures. These policies guide proper behavior regarding how organizations and their employees handle electronically stored information .
  • 6. Information governance encompasses more than traditional records management. It incorporates information security and protection, compliance, data governance, electronic discovery, risk management, privacy, data storage and archiving, knowledge management, business operations and management, audit, analytics, IT management, master data management, enterprise architecture, business intelligence, big data, data science, and finance. characteristics of effective security governance. These include: