SlideShare a Scribd company logo
1 of 15
Information & Communication Systems
FETAC MinorLevel 5 - AIS code:5N1952
Analyse of a computer-based information system used in the work environment
detailing inputs to the system, methods of processing, and information produced in
the form of report.
YasminaRayeh
8/5/2014
1589 words
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
1
Contents
I. Data and information............................................................................................................................2
II. Information flows .................................................................................................................................4
III. The functions of the Main Components of a computer Processing System.................................................6
IV. File Organization Structures...................................................................................................................6
V. File Organization Structures...................................................................................................................8
VI. Ergonomics & computer system design ..................................................................................................9
VII. Data Processing activities Map. ...........................................................................................................10
VIII. Research safely Internet using information communication technology (ICT) ..........................................11
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
2
I. Data and information
A ComputerBased Information System(CBIS) helpsprocessing data followingrequirementsand procedures
(strategies,rules,policies and methods)1
.Thisstudy underlinesvariousCBISaspectsproviding description on its
functionalitiesand utilities.
 Relationship between data and information
The difference between "data" and "information" lies in the way they are used. Data is qualified as "raw
material" such as numbers, words, symbols, that needs to be processed in useful hind sights.
Information involves the communication and reception of knowledge: Data are compiled/processed in
meaningful information for specific purposes that can be used in an organisation to allow planning, recording,
controlling, measuring and making specific decisions; hence the need for "data processing". Sound,
measurement, articles or pictures are information.
 Examples
Data Information
Messages converted into electrical or optical signals Content of a conversation
A set of namesand addresseswritten outon to formsready
for typing
A list of names and addresses
 Attributes of information
Accessible Accuracy Reliable Detailed Relevant
Easy to
access
Represents the
factual situation
Froma
verifiable
source
should be at a
level of detail that
allows readability
The required information
leads to improved decision
making
 Reports Identification steps - Operation processes.
1 http://www.slideshare.net/jandian/computer-based-information-system
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
3
 Flow chart
As described, each departmentneedsto report to the upper level of the hierarchy. Therefore gathering and
processing data is crucial. Processes, people and a CBIS are in place to facilitate reporting that includes all
identified steps and resources.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
4
II. Information flows
 How information differs across management levels
Communication flows at each stage of the organisation and might be different from one department to
another2
.
Each department(human resource,financial,marketing,operations…) needs to compile information in order
to manage efficiently and effectively their tasks and the whole business.
Examples:
Fromthe upperlevel (leadership),through themanagement, to thelowest level (workforce), and vice versa a
clear communication process needs to be defined in order to deliver the vision and value, enhance the
profitability of the business.
In this process, procedures and feedback allow verification and correction when necessary.
ECTDB follow a typical administration schema where several levels of hierarchy are involved, but the
communication flowbetween theleaders,managers, related Government bodies, and employees is complex
and ruled by strict protocols. However as training centre abides by laws, this heavy structure comply with all
prerogatives determined by the Irish regulations. This is an administration with a lot of written
communication running at all level of the hierarchy with plenty of reports done.
2 Private Limited Company (Ltd), Public Limited Company (PLC) or Voluntary Organization: seeCRO.ie
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
5
 Type of information3
:
Operational –routine tasks Tactical – non routine tasks Strategic – decision making
Management information
system (MIS)
Decision support system
(DSS)
Executiveinformation system
(EIS)
 Evaluation tool: comparison.
Evaluation and comparison tools help decision-making to prioritize decisions and vision4
when studying criteria
and evaluating data, report or project results.
CDETB has for instance chosen Do-IT Profilers that provides a two-way flow of information5
ensuring that the
tool is ‘fit for purpose'.
For the course,CDETB interview potentialusersto find outabout their experience and expectations. Meanwhile
CDETB refers to the Labour Market Trends in order to refine requirements and foresee courses in ad equation
with the demand.
 Motivation tool: feedback.
Feedbacks allow a better communication between all levels of the hierarchy as it clarifies, improves, informs on
how the organisation is or should be working.
The SMART tool is one of the tools used to set goals and performance objectives:
Specific - Objectives must be very specific so each person understands what is expected.
Measurable - quantitative or qualitative
Achievable - Employees must be able to reach the objectives.
Relevant - Objectives must be relevant to their wants, needs, and beliefs.
Timely - current feedback is more effective as deadlines measure tasks accomplishment.
 Management
is accountable for the well-being of the organisation and is in charge of “the process of dealing with or
controlling things or people” 6
, therefore needs to determine any issues (for which they are accountable too) is
possiblewith reporting on regularbasis;reporting factsdetermine new actions or corrections and allows further
hindsight that can be elevated to the upper hierarchical level, which decide further processes after analyses.
3 http://catalog.flatworldknowledge.com/bookhub/reader/7?e=collins-ch15_s03
4 Nancy R. Tague’s TheQuality Toolbox, Second Edition,ASQQuality Press, 2004.
5 http://www.doitprofiler.com/education/case-studies.aspx
6 http://www.oxforddictionaries.com/definition/english/management
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
6
III. The functions of the Main Components of a computer Processing System
IV. File Organization Structures
 The difference between static and dynamic data
Static data (i.e.in a list) stay the same whilst dynamic data (in a form) can be reassigned or altered.
 The main data collection methods are7
:
 Registration: full enumeration.
 Questionnaires: completed by respondents.
 Interviews: completed with the respondent.
 Direct observations: direct measurements.
 Reporting: analyse activities.
 Data verification and validation is used “to evaluate whether data has been generated according to
specifications, satisfies acceptance criteria, and are appropriate and consistent with their intended use”8
.
Data verification is the systematic process for evaluating performance and compliance of a set of data and
checking if data conforms to specification standards (complete, correct, and consistent).
Data validation (datavetting, data cleaning) uses specifications to ascertain the usability of the data in light of
its measurement quality objectives and to ensure that results obtained are scientifically defensible.
7 http://www.fao.org/docrep/003/x2465e/x2465e09.htm
8 http://www.epa.gov/QUALITY/vandv.html
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
7
 The difference between single- and multi-user environments
A single-useroperating systemisa system in which only oneuser can access the computer system at a time (e.g.
MicrosoftWindows) whilea multi-user environment design is more complex allowing a multi-connection access
to a computer at the same or different time.
 Data security means the protection of data.
Security involves protecting data and software from being lost / destroyed / corrupted / modified or disclosed
(unauthorised access)
Data integrity means accuracy and completeness
Preserving data: Archives and back-up system are commonly used to prevent breach of security. A backup file
allows a safe copy of the original one.
Other safeguards include:
Password to individual files
Dataencryption:useof secret keysto codeand decodedata so thatit is unreadableby anyone elsewho doesnot
have the ‘key’.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
8
V. File Organization Structures
Copyright under Intellectual property (IP) rights 9
jurisdiction confers an automatic protection on an original
literary, scientific, artistic work or commercial creation of mind.
Protected by national and International laws, IP rights cover financial aspects with royalties, but also a
recognition status for the creator10
.
Software copyright is the extension of copyright law to machine-readable software and is used by proprietary
software companies to prevent piracy (unauthorized copying) that induce a loss of incomes11
.
PRIVATE database creates a proprietary link in a specific schema of the local database while Public creates a
database-wide link. The authorisation accesses to the corresponding remote database are different: in private
database, only the private database’s owner who has access to the conceptual schema (logical design model)
can accessdatabaseobjects;whilein publicdatabaseall usersin the physicaldatabasehaveauthorisation to use
the link to access database objects 12
.
Data Protection Acts 1988 and the Data Protection (Amendment) Act set employers and businesses obligations
on how to deal with data access and transmission related to personal data of staff and customers13
.
The European Union directive was adopted in 1995, and implemented in 200314
, regulates the processing of
personal data within the European Union. The Data Protection Directive is an important component of EU
privacy and human rights law.
9 IP covers Copyright,Patents,Trademarks, IndustrialDesigns, GeographicalIndications (wipo.com)
10 http://www.wipo.int/about-ip/en/
11 http://www.answers.com/topic/software-copyright
12 https://community.oracle.com/thread/686026?tstart=0
13 http://www.lawyer.ie/labour-law-1/data-protection#sthash.4Ym5eJ1f.dpuf
14 officially Directive95/46/EC on the protection ofindividuals withregardto theprocessing ofpersonal data andon thefree movement ofsuchdata)
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
9
 Describe EU directive on privacy
On 25 January 2012, the European Commission unveiled a draft European General Data Protection Regulation
that will supersede the Data Protection Directive15
This major reform of the EU legal framework on the
protection of personal data will strengthen individual rights and tackle the challenges of globalisation and new
technologies notably through:
 The right to be forgotten
 Access to personal data
 Information about data breaches that could adversely affect customers
 Data protection safeguards built-in into products/services as default setting.
VI. Ergonomics & computer system design
Ergonomics is the study of how a workplace, the equipment used and the work environment itself can best be
designed for comfort, efficiency, safety and productivity.
Below illustrates three potential postures and related problems16
:
Too high, too low or in the lap, a laptop can affect the body17
.
Keyboard and computermonitorshould bedirectly in frontof the user atthe appropriateheight and adjusted to
match his/her specific physical requirements.
15 http://en.wikipedia.org/wiki/Data_Protection_Directive
16 Griffin, Timothy,"The AdaptiveLaptop". October,2001. Timothy Griffin, IndustrialDesign Program, The University ofCalgary.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
10
VII. Data Processing activities Map.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
11
VIII. Research safely Internet using information communication technology (ICT)
ICTs include computers, the Internet, broadcasting and integrated technologies (instant presence information,
video, and telephony -VOIP) to create, store, communicate and manage information.
CDETB website ismade /secured by: http://www.biznetiis.com18
18 http://www.biznetiis.com/Who-We-Are/Quality-Standards.aspx
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
12
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
13
Along with the ISO standards, some protective measures to secure CDETB website and data are implemented
within the network and on each location:
Anti-virus
Common security threats are Malicious code (worms, Trojan, viruses, spyware), denial of service attack
(overwhelming a networkwithmassivecommunication),spoofing(phishing,scam,man-in–the-middle) and Anti-
virus, anti-spyware and anti-adware can stop them.
Other specific tools:
- Built-in firewalls: create Inbound/outbound rules to HTTP conversation to identify and block attacks.
- OS Update
- Network isolation (Subnetting) avoids internal data access.
- Data encryption using symmetric and asymmetric keys.
- Securing authentication with Smartcards, biometrics controls and digital print.
For studentsfollowingcourses,verifying information from the Internet is crucial, therefore Search needs to be
made in order to find out if:
 The author qualified to write on the given topic
 The purpose is dealt by experts
 The information is objective, impartial?
 The information is accurate, factual, up-to-date and clearly sourced, which means also that the
Reliability/Credibility/ Legitimacy should be verified outside of the Internet.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
14

More Related Content

What's hot

Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31Alexis Chua
 
Types of Information Systems
Types of Information SystemsTypes of Information Systems
Types of Information Systemsjencai302
 
13099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part213099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part2Ngaire Taylor
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1Ashish Desai
 
Managing International Information Systems
Managing International Information Systems Managing International Information Systems
Managing International Information Systems Mostafa Ewees
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemAndino Maseleno
 
Master of business administration m.i.s
Master of business administration  m.i.sMaster of business administration  m.i.s
Master of business administration m.i.smusheer1234
 
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMMis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMpankaj pandey
 
Lecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information SystemLecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information Systemvasanthimuniasamy
 
Computer Based Information System
Computer Based Information SystemComputer Based Information System
Computer Based Information SystemNaqashTareen
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components iiAshish Desai
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systemskhairulanuarhasan
 

What's hot (20)

IT class IV - ICAB PS-KL
IT class IV - ICAB PS-KLIT class IV - ICAB PS-KL
IT class IV - ICAB PS-KL
 
Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31
 
Types of Information Systems
Types of Information SystemsTypes of Information Systems
Types of Information Systems
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
Mangement Information Systems
Mangement Information SystemsMangement Information Systems
Mangement Information Systems
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
13099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part213099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part2
 
Cbis
CbisCbis
Cbis
 
Mis model
Mis modelMis model
Mis model
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1
 
Managing International Information Systems
Managing International Information Systems Managing International Information Systems
Managing International Information Systems
 
Bis Chapter6
Bis Chapter6Bis Chapter6
Bis Chapter6
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Master of business administration m.i.s
Master of business administration  m.i.sMaster of business administration  m.i.s
Master of business administration m.i.s
 
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMMis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
 
Lecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information SystemLecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information System
 
Computer Based Information System
Computer Based Information SystemComputer Based Information System
Computer Based Information System
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components ii
 
Mis notes unit 4
Mis notes unit 4Mis notes unit 4
Mis notes unit 4
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systems
 

Similar to Information and communication systems

information system and computers
information system and computersinformation system and computers
information system and computers9535814851
 
Information Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessInformation Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessDiane Allen
 
System Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxSystem Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxAmdework Belay
 
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...User default
 
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSTUDY2BCA
 
Effect of management_information
Effect of management_informationEffect of management_information
Effect of management_informationHope Efekpogua
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation Joel Okomoli
 
Chapter One.pdf
Chapter One.pdfChapter One.pdf
Chapter One.pdfsoresa1
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology Usman Tariq
 
CHP-3ERP and Related Technologies(1).ppt
CHP-3ERP and Related Technologies(1).pptCHP-3ERP and Related Technologies(1).ppt
CHP-3ERP and Related Technologies(1).pptTusharChahar3
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge ManagementMeenakshi Paul
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2sparkeyrob
 
Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02Sanya Sharma
 
CHP-3ERP and Related Technologies.ppt
CHP-3ERP and Related Technologies.pptCHP-3ERP and Related Technologies.ppt
CHP-3ERP and Related Technologies.pptCandidClassesNowgamS
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptkhawlamuseabd
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information SystemsRam Dutt Shukla
 

Similar to Information and communication systems (20)

information system and computers
information system and computersinformation system and computers
information system and computers
 
M is details (1)
M is details (1)M is details (1)
M is details (1)
 
Information Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessInformation Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its Usefulness
 
System Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxSystem Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docx
 
BIS-bit (1).pdf
BIS-bit (1).pdfBIS-bit (1).pdf
BIS-bit (1).pdf
 
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
 
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
 
Effect of management_information
Effect of management_informationEffect of management_information
Effect of management_information
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation
 
Chapter One.pdf
Chapter One.pdfChapter One.pdf
Chapter One.pdf
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
 
CHP-3ERP and Related Technologies(1).ppt
CHP-3ERP and Related Technologies(1).pptCHP-3ERP and Related Technologies(1).ppt
CHP-3ERP and Related Technologies(1).ppt
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
 
Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02
 
CHP-3ERP and Related Technologies.ppt
CHP-3ERP and Related Technologies.pptCHP-3ERP and Related Technologies.ppt
CHP-3ERP and Related Technologies.ppt
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).ppt
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information Systems
 
Mis
MisMis
Mis
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2
 

More from Yasmina Rayeh

Roles and objectives in performance management - Supervisory Skills -Yasmina ...
Roles and objectives in performance management - Supervisory Skills -Yasmina ...Roles and objectives in performance management - Supervisory Skills -Yasmina ...
Roles and objectives in performance management - Supervisory Skills -Yasmina ...Yasmina Rayeh
 
AIS Code: 6N3325 Training Needs Identification and Design Training Needs A...
AIS Code: 6N3325  Training Needs  Identification and Design  Training Needs A...AIS Code: 6N3325  Training Needs  Identification and Design  Training Needs A...
AIS Code: 6N3325 Training Needs Identification and Design Training Needs A...Yasmina Rayeh
 
Business environment | case study: Company Type in Ireland - Yasmina Rayeh
Business environment |  case study: Company Type in Ireland - Yasmina RayehBusiness environment |  case study: Company Type in Ireland - Yasmina Rayeh
Business environment | case study: Company Type in Ireland - Yasmina RayehYasmina Rayeh
 
Change management - HRM - Conflict resolution - Case Study: Renault
Change management  - HRM - Conflict resolution - Case Study: RenaultChange management  - HRM - Conflict resolution - Case Study: Renault
Change management - HRM - Conflict resolution - Case Study: RenaultYasmina Rayeh
 
Louis vuitton MARKETING MANAGEMENT PROCESS
Louis vuitton MARKETING MANAGEMENT PROCESSLouis vuitton MARKETING MANAGEMENT PROCESS
Louis vuitton MARKETING MANAGEMENT PROCESSYasmina Rayeh
 
Business management 1 A
Business management 1 A Business management 1 A
Business management 1 A Yasmina Rayeh
 
Business management - Yasmina Rayeh
Business management - Yasmina RayehBusiness management - Yasmina Rayeh
Business management - Yasmina RayehYasmina Rayeh
 
BUSINESS MANAGEMENT 6N4310 - 2 - 2014
BUSINESS MANAGEMENT 6N4310 - 2 - 2014BUSINESS MANAGEMENT 6N4310 - 2 - 2014
BUSINESS MANAGEMENT 6N4310 - 2 - 2014Yasmina Rayeh
 
Louis vuitton - strategic process management
Louis vuitton - strategic process managementLouis vuitton - strategic process management
Louis vuitton - strategic process managementYasmina Rayeh
 

More from Yasmina Rayeh (10)

Roles and objectives in performance management - Supervisory Skills -Yasmina ...
Roles and objectives in performance management - Supervisory Skills -Yasmina ...Roles and objectives in performance management - Supervisory Skills -Yasmina ...
Roles and objectives in performance management - Supervisory Skills -Yasmina ...
 
Supervisory skills
Supervisory skillsSupervisory skills
Supervisory skills
 
AIS Code: 6N3325 Training Needs Identification and Design Training Needs A...
AIS Code: 6N3325  Training Needs  Identification and Design  Training Needs A...AIS Code: 6N3325  Training Needs  Identification and Design  Training Needs A...
AIS Code: 6N3325 Training Needs Identification and Design Training Needs A...
 
Business environment | case study: Company Type in Ireland - Yasmina Rayeh
Business environment |  case study: Company Type in Ireland - Yasmina RayehBusiness environment |  case study: Company Type in Ireland - Yasmina Rayeh
Business environment | case study: Company Type in Ireland - Yasmina Rayeh
 
Change management - HRM - Conflict resolution - Case Study: Renault
Change management  - HRM - Conflict resolution - Case Study: RenaultChange management  - HRM - Conflict resolution - Case Study: Renault
Change management - HRM - Conflict resolution - Case Study: Renault
 
Louis vuitton MARKETING MANAGEMENT PROCESS
Louis vuitton MARKETING MANAGEMENT PROCESSLouis vuitton MARKETING MANAGEMENT PROCESS
Louis vuitton MARKETING MANAGEMENT PROCESS
 
Business management 1 A
Business management 1 A Business management 1 A
Business management 1 A
 
Business management - Yasmina Rayeh
Business management - Yasmina RayehBusiness management - Yasmina Rayeh
Business management - Yasmina Rayeh
 
BUSINESS MANAGEMENT 6N4310 - 2 - 2014
BUSINESS MANAGEMENT 6N4310 - 2 - 2014BUSINESS MANAGEMENT 6N4310 - 2 - 2014
BUSINESS MANAGEMENT 6N4310 - 2 - 2014
 
Louis vuitton - strategic process management
Louis vuitton - strategic process managementLouis vuitton - strategic process management
Louis vuitton - strategic process management
 

Recently uploaded

Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 

Recently uploaded (20)

Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 

Information and communication systems

  • 1. Information & Communication Systems FETAC MinorLevel 5 - AIS code:5N1952 Analyse of a computer-based information system used in the work environment detailing inputs to the system, methods of processing, and information produced in the form of report. YasminaRayeh 8/5/2014 1589 words
  • 2. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 1 Contents I. Data and information............................................................................................................................2 II. Information flows .................................................................................................................................4 III. The functions of the Main Components of a computer Processing System.................................................6 IV. File Organization Structures...................................................................................................................6 V. File Organization Structures...................................................................................................................8 VI. Ergonomics & computer system design ..................................................................................................9 VII. Data Processing activities Map. ...........................................................................................................10 VIII. Research safely Internet using information communication technology (ICT) ..........................................11
  • 3. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 2 I. Data and information A ComputerBased Information System(CBIS) helpsprocessing data followingrequirementsand procedures (strategies,rules,policies and methods)1 .Thisstudy underlinesvariousCBISaspectsproviding description on its functionalitiesand utilities.  Relationship between data and information The difference between "data" and "information" lies in the way they are used. Data is qualified as "raw material" such as numbers, words, symbols, that needs to be processed in useful hind sights. Information involves the communication and reception of knowledge: Data are compiled/processed in meaningful information for specific purposes that can be used in an organisation to allow planning, recording, controlling, measuring and making specific decisions; hence the need for "data processing". Sound, measurement, articles or pictures are information.  Examples Data Information Messages converted into electrical or optical signals Content of a conversation A set of namesand addresseswritten outon to formsready for typing A list of names and addresses  Attributes of information Accessible Accuracy Reliable Detailed Relevant Easy to access Represents the factual situation Froma verifiable source should be at a level of detail that allows readability The required information leads to improved decision making  Reports Identification steps - Operation processes. 1 http://www.slideshare.net/jandian/computer-based-information-system
  • 4. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 3  Flow chart As described, each departmentneedsto report to the upper level of the hierarchy. Therefore gathering and processing data is crucial. Processes, people and a CBIS are in place to facilitate reporting that includes all identified steps and resources.
  • 5. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 4 II. Information flows  How information differs across management levels Communication flows at each stage of the organisation and might be different from one department to another2 . Each department(human resource,financial,marketing,operations…) needs to compile information in order to manage efficiently and effectively their tasks and the whole business. Examples: Fromthe upperlevel (leadership),through themanagement, to thelowest level (workforce), and vice versa a clear communication process needs to be defined in order to deliver the vision and value, enhance the profitability of the business. In this process, procedures and feedback allow verification and correction when necessary. ECTDB follow a typical administration schema where several levels of hierarchy are involved, but the communication flowbetween theleaders,managers, related Government bodies, and employees is complex and ruled by strict protocols. However as training centre abides by laws, this heavy structure comply with all prerogatives determined by the Irish regulations. This is an administration with a lot of written communication running at all level of the hierarchy with plenty of reports done. 2 Private Limited Company (Ltd), Public Limited Company (PLC) or Voluntary Organization: seeCRO.ie
  • 6. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 5  Type of information3 : Operational –routine tasks Tactical – non routine tasks Strategic – decision making Management information system (MIS) Decision support system (DSS) Executiveinformation system (EIS)  Evaluation tool: comparison. Evaluation and comparison tools help decision-making to prioritize decisions and vision4 when studying criteria and evaluating data, report or project results. CDETB has for instance chosen Do-IT Profilers that provides a two-way flow of information5 ensuring that the tool is ‘fit for purpose'. For the course,CDETB interview potentialusersto find outabout their experience and expectations. Meanwhile CDETB refers to the Labour Market Trends in order to refine requirements and foresee courses in ad equation with the demand.  Motivation tool: feedback. Feedbacks allow a better communication between all levels of the hierarchy as it clarifies, improves, informs on how the organisation is or should be working. The SMART tool is one of the tools used to set goals and performance objectives: Specific - Objectives must be very specific so each person understands what is expected. Measurable - quantitative or qualitative Achievable - Employees must be able to reach the objectives. Relevant - Objectives must be relevant to their wants, needs, and beliefs. Timely - current feedback is more effective as deadlines measure tasks accomplishment.  Management is accountable for the well-being of the organisation and is in charge of “the process of dealing with or controlling things or people” 6 , therefore needs to determine any issues (for which they are accountable too) is possiblewith reporting on regularbasis;reporting factsdetermine new actions or corrections and allows further hindsight that can be elevated to the upper hierarchical level, which decide further processes after analyses. 3 http://catalog.flatworldknowledge.com/bookhub/reader/7?e=collins-ch15_s03 4 Nancy R. Tague’s TheQuality Toolbox, Second Edition,ASQQuality Press, 2004. 5 http://www.doitprofiler.com/education/case-studies.aspx 6 http://www.oxforddictionaries.com/definition/english/management
  • 7. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 6 III. The functions of the Main Components of a computer Processing System IV. File Organization Structures  The difference between static and dynamic data Static data (i.e.in a list) stay the same whilst dynamic data (in a form) can be reassigned or altered.  The main data collection methods are7 :  Registration: full enumeration.  Questionnaires: completed by respondents.  Interviews: completed with the respondent.  Direct observations: direct measurements.  Reporting: analyse activities.  Data verification and validation is used “to evaluate whether data has been generated according to specifications, satisfies acceptance criteria, and are appropriate and consistent with their intended use”8 . Data verification is the systematic process for evaluating performance and compliance of a set of data and checking if data conforms to specification standards (complete, correct, and consistent). Data validation (datavetting, data cleaning) uses specifications to ascertain the usability of the data in light of its measurement quality objectives and to ensure that results obtained are scientifically defensible. 7 http://www.fao.org/docrep/003/x2465e/x2465e09.htm 8 http://www.epa.gov/QUALITY/vandv.html
  • 8. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 7  The difference between single- and multi-user environments A single-useroperating systemisa system in which only oneuser can access the computer system at a time (e.g. MicrosoftWindows) whilea multi-user environment design is more complex allowing a multi-connection access to a computer at the same or different time.  Data security means the protection of data. Security involves protecting data and software from being lost / destroyed / corrupted / modified or disclosed (unauthorised access) Data integrity means accuracy and completeness Preserving data: Archives and back-up system are commonly used to prevent breach of security. A backup file allows a safe copy of the original one. Other safeguards include: Password to individual files Dataencryption:useof secret keysto codeand decodedata so thatit is unreadableby anyone elsewho doesnot have the ‘key’.
  • 9. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 8 V. File Organization Structures Copyright under Intellectual property (IP) rights 9 jurisdiction confers an automatic protection on an original literary, scientific, artistic work or commercial creation of mind. Protected by national and International laws, IP rights cover financial aspects with royalties, but also a recognition status for the creator10 . Software copyright is the extension of copyright law to machine-readable software and is used by proprietary software companies to prevent piracy (unauthorized copying) that induce a loss of incomes11 . PRIVATE database creates a proprietary link in a specific schema of the local database while Public creates a database-wide link. The authorisation accesses to the corresponding remote database are different: in private database, only the private database’s owner who has access to the conceptual schema (logical design model) can accessdatabaseobjects;whilein publicdatabaseall usersin the physicaldatabasehaveauthorisation to use the link to access database objects 12 . Data Protection Acts 1988 and the Data Protection (Amendment) Act set employers and businesses obligations on how to deal with data access and transmission related to personal data of staff and customers13 . The European Union directive was adopted in 1995, and implemented in 200314 , regulates the processing of personal data within the European Union. The Data Protection Directive is an important component of EU privacy and human rights law. 9 IP covers Copyright,Patents,Trademarks, IndustrialDesigns, GeographicalIndications (wipo.com) 10 http://www.wipo.int/about-ip/en/ 11 http://www.answers.com/topic/software-copyright 12 https://community.oracle.com/thread/686026?tstart=0 13 http://www.lawyer.ie/labour-law-1/data-protection#sthash.4Ym5eJ1f.dpuf 14 officially Directive95/46/EC on the protection ofindividuals withregardto theprocessing ofpersonal data andon thefree movement ofsuchdata)
  • 10. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 9  Describe EU directive on privacy On 25 January 2012, the European Commission unveiled a draft European General Data Protection Regulation that will supersede the Data Protection Directive15 This major reform of the EU legal framework on the protection of personal data will strengthen individual rights and tackle the challenges of globalisation and new technologies notably through:  The right to be forgotten  Access to personal data  Information about data breaches that could adversely affect customers  Data protection safeguards built-in into products/services as default setting. VI. Ergonomics & computer system design Ergonomics is the study of how a workplace, the equipment used and the work environment itself can best be designed for comfort, efficiency, safety and productivity. Below illustrates three potential postures and related problems16 : Too high, too low or in the lap, a laptop can affect the body17 . Keyboard and computermonitorshould bedirectly in frontof the user atthe appropriateheight and adjusted to match his/her specific physical requirements. 15 http://en.wikipedia.org/wiki/Data_Protection_Directive 16 Griffin, Timothy,"The AdaptiveLaptop". October,2001. Timothy Griffin, IndustrialDesign Program, The University ofCalgary.
  • 11. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 10 VII. Data Processing activities Map.
  • 12. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 11 VIII. Research safely Internet using information communication technology (ICT) ICTs include computers, the Internet, broadcasting and integrated technologies (instant presence information, video, and telephony -VOIP) to create, store, communicate and manage information. CDETB website ismade /secured by: http://www.biznetiis.com18 18 http://www.biznetiis.com/Who-We-Are/Quality-Standards.aspx
  • 13. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 12
  • 14. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 13 Along with the ISO standards, some protective measures to secure CDETB website and data are implemented within the network and on each location: Anti-virus Common security threats are Malicious code (worms, Trojan, viruses, spyware), denial of service attack (overwhelming a networkwithmassivecommunication),spoofing(phishing,scam,man-in–the-middle) and Anti- virus, anti-spyware and anti-adware can stop them. Other specific tools: - Built-in firewalls: create Inbound/outbound rules to HTTP conversation to identify and block attacks. - OS Update - Network isolation (Subnetting) avoids internal data access. - Data encryption using symmetric and asymmetric keys. - Securing authentication with Smartcards, biometrics controls and digital print. For studentsfollowingcourses,verifying information from the Internet is crucial, therefore Search needs to be made in order to find out if:  The author qualified to write on the given topic  The purpose is dealt by experts  The information is objective, impartial?  The information is accurate, factual, up-to-date and clearly sourced, which means also that the Reliability/Credibility/ Legitimacy should be verified outside of the Internet.
  • 15. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 14