SlideShare a Scribd company logo
1 of 5
• Data is the raw material entered into
an information system.
• If the data collected is meaningless,
then the information will have no use
either. [Garbage in = garbage out
(GIGO)]
• Organisations need to ensure that
appropriate data is available at the
time of processing.
• Data will be appropriate if it is:
    • relevant – useful to the purpose of the
     information system
     • accurate – collected from a dependable
     source and entered without errors
     • timely – current, and kept up-to-date
     • secure – protected from deliberate and
     accidental damage or loss
• When data is entered into an
information system it is organised into
different data types.
• Data types include:
    • images
    • audio
    • video
    • text
    • numbers

• Information is an important factor in
an organisation’s success.
• Information will be valuable if it is:
    • relevant
    • accurate
    • timely
    • organised
    • cost-effective

More Related Content

What's hot

computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolsN.Jagadish Kumar
 
Pre-Processing and Data Preparation
Pre-Processing and Data PreparationPre-Processing and Data Preparation
Pre-Processing and Data PreparationUmair Shafique
 
12 Principles Of Knowledge Management By Enamul Haque
12 Principles Of Knowledge Management By Enamul Haque12 Principles Of Knowledge Management By Enamul Haque
12 Principles Of Knowledge Management By Enamul HaqueEnamul Haque
 
Etl - Extract Transform Load
Etl - Extract Transform LoadEtl - Extract Transform Load
Etl - Extract Transform LoadABDUL KHALIQ
 
Sad lecture 1
Sad lecture 1Sad lecture 1
Sad lecture 1Amin Omi
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemPraveen Minz
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
AI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionAI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionDatabricks
 
Artificial Intelligence Approaches
Artificial Intelligence  ApproachesArtificial Intelligence  Approaches
Artificial Intelligence ApproachesJincy Nelson
 
Supervised Machine Learning
Supervised Machine LearningSupervised Machine Learning
Supervised Machine LearningAnkit Rai
 
Supervised learning and Unsupervised learning
Supervised learning and Unsupervised learning Supervised learning and Unsupervised learning
Supervised learning and Unsupervised learning Usama Fayyaz
 
Process Mining Intro (Eng)
Process Mining Intro (Eng)Process Mining Intro (Eng)
Process Mining Intro (Eng)Dafna Levy
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersGianmario Spacagna
 
Introduction to data pre-processing and cleaning
Introduction to data pre-processing and cleaning Introduction to data pre-processing and cleaning
Introduction to data pre-processing and cleaning Matteo Manca
 
Machine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural NetworksMachine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural NetworksFrancesco Collova'
 
Deep neural networks
Deep neural networksDeep neural networks
Deep neural networksSi Haem
 
Artificial Neural Network seminar presentation using ppt.
Artificial Neural Network seminar presentation using ppt.Artificial Neural Network seminar presentation using ppt.
Artificial Neural Network seminar presentation using ppt.Mohd Faiz
 

What's hot (20)

computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Pre-Processing and Data Preparation
Pre-Processing and Data PreparationPre-Processing and Data Preparation
Pre-Processing and Data Preparation
 
Reports vs analysis
Reports vs analysisReports vs analysis
Reports vs analysis
 
12 Principles Of Knowledge Management By Enamul Haque
12 Principles Of Knowledge Management By Enamul Haque12 Principles Of Knowledge Management By Enamul Haque
12 Principles Of Knowledge Management By Enamul Haque
 
Etl - Extract Transform Load
Etl - Extract Transform LoadEtl - Extract Transform Load
Etl - Extract Transform Load
 
Sad lecture 1
Sad lecture 1Sad lecture 1
Sad lecture 1
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
AI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat DetectionAI on Spark for Malware Analysis and Anomalous Threat Detection
AI on Spark for Malware Analysis and Anomalous Threat Detection
 
Artificial Intelligence Approaches
Artificial Intelligence  ApproachesArtificial Intelligence  Approaches
Artificial Intelligence Approaches
 
Supervised Machine Learning
Supervised Machine LearningSupervised Machine Learning
Supervised Machine Learning
 
Supervised learning and Unsupervised learning
Supervised learning and Unsupervised learning Supervised learning and Unsupervised learning
Supervised learning and Unsupervised learning
 
Process Mining Intro (Eng)
Process Mining Intro (Eng)Process Mining Intro (Eng)
Process Mining Intro (Eng)
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-Encoders
 
Introduction to data pre-processing and cleaning
Introduction to data pre-processing and cleaning Introduction to data pre-processing and cleaning
Introduction to data pre-processing and cleaning
 
Big data
Big dataBig data
Big data
 
Machine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural NetworksMachine Learning: Introduction to Neural Networks
Machine Learning: Introduction to Neural Networks
 
Deep neural networks
Deep neural networksDeep neural networks
Deep neural networks
 
Artificial Neural Network seminar presentation using ppt.
Artificial Neural Network seminar presentation using ppt.Artificial Neural Network seminar presentation using ppt.
Artificial Neural Network seminar presentation using ppt.
 

Similar to 1.4) The nature of data and information

Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaSee You Rise Holdings
 
data management and ICT.pptx
data management and ICT.pptxdata management and ICT.pptx
data management and ICT.pptxAnthonyWaithaka1
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functionsmrcox
 
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahdLecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahdAhmedLakhwera
 
Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptxAyeCS11
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingPrecisely
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
Benefits of a Document Management System for the BPO Industry
Benefits of a Document Management System for the BPO IndustryBenefits of a Document Management System for the BPO Industry
Benefits of a Document Management System for the BPO IndustryPaperless Trail Inc.
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 

Similar to 1.4) The nature of data and information (20)

Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
CYBER SECURITY.pdf
CYBER SECURITY.pdfCYBER SECURITY.pdf
CYBER SECURITY.pdf
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
Information system
Information systemInformation system
Information system
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
data management and ICT.pptx
data management and ICT.pptxdata management and ICT.pptx
data management and ICT.pptx
 
Big data
Big dataBig data
Big data
 
Presentation1.ppt
Presentation1.pptPresentation1.ppt
Presentation1.ppt
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functions
 
Andrew Waugh presentation
Andrew Waugh   presentationAndrew Waugh   presentation
Andrew Waugh presentation
 
INFORMATION SYSTEM.pptx
INFORMATION SYSTEM.pptxINFORMATION SYSTEM.pptx
INFORMATION SYSTEM.pptx
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahdLecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
 
Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptx
 
E content-dbms
E content-dbmsE content-dbms
E content-dbms
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 
Information system
Information systemInformation system
Information system
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
Benefits of a Document Management System for the BPO Industry
Benefits of a Document Management System for the BPO IndustryBenefits of a Document Management System for the BPO Industry
Benefits of a Document Management System for the BPO Industry
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 

More from ctedds

11 ipt 3.1) Project planning, design & implementation
11 ipt 3.1) Project planning, design & implementation11 ipt 3.1) Project planning, design & implementation
11 ipt 3.1) Project planning, design & implementationctedds
 
12 ipt 0305 Communication Issues
12 ipt 0305   Communication Issues12 ipt 0305   Communication Issues
12 ipt 0305 Communication Issuesctedds
 
12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication Systemctedds
 
IPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing SolutionsIPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing Solutionsctedds
 
12 ipt 0501 transaction processing systems 01
12 ipt 0501   transaction processing systems 0112 ipt 0501   transaction processing systems 01
12 ipt 0501 transaction processing systems 01ctedds
 
12 IPT0302 Examples of Communication Systems
12 IPT0302   Examples of Communication Systems12 IPT0302   Examples of Communication Systems
12 IPT0302 Examples of Communication Systemsctedds
 
12 IPT 0304 - Other Processes
12 IPT 0304 - Other Processes12 IPT 0304 - Other Processes
12 IPT 0304 - Other Processesctedds
 
12 ipt 0301 Characteristics of a communication system
12 ipt 0301   Characteristics of a communication system12 ipt 0301   Characteristics of a communication system
12 ipt 0301 Characteristics of a communication systemctedds
 
12 ipt 0203 Storage and Retrieval
12 ipt 0203   Storage and Retrieval12 ipt 0203   Storage and Retrieval
12 ipt 0203 Storage and Retrievalctedds
 
12 IPT - 1.4) Making Decisions
12 IPT - 1.4)   Making Decisions12 IPT - 1.4)   Making Decisions
12 IPT - 1.4) Making Decisionsctedds
 
The memory of graphics
The memory of graphicsThe memory of graphics
The memory of graphicsctedds
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receivingctedds
 
12 ipt 0202 Organisation methods
12 ipt 0202   Organisation methods12 ipt 0202   Organisation methods
12 ipt 0202 Organisation methodsctedds
 
Photographic composition
Photographic compositionPhotographic composition
Photographic compositionctedds
 
1.3) Information processes
1.3) Information processes1.3) Information processes
1.3) Information processesctedds
 
1.2) Information systems in context
1.2) Information systems in context1.2) Information systems in context
1.2) Information systems in contextctedds
 
12 ipt 0201 information systems
12 ipt 0201   information systems12 ipt 0201   information systems
12 ipt 0201 information systemsctedds
 
12 ipt 0104 making decisions
12 ipt 0104   making decisions12 ipt 0104   making decisions
12 ipt 0104 making decisionsctedds
 
12 ipt 0103 understanding the problem
12 ipt 0103   understanding the problem12 ipt 0103   understanding the problem
12 ipt 0103 understanding the problemctedds
 
12 ipt 0106/7 Project Implementation & Testing
12 ipt 0106/7   Project Implementation & Testing12 ipt 0106/7   Project Implementation & Testing
12 ipt 0106/7 Project Implementation & Testingctedds
 

More from ctedds (20)

11 ipt 3.1) Project planning, design & implementation
11 ipt 3.1) Project planning, design & implementation11 ipt 3.1) Project planning, design & implementation
11 ipt 3.1) Project planning, design & implementation
 
12 ipt 0305 Communication Issues
12 ipt 0305   Communication Issues12 ipt 0305   Communication Issues
12 ipt 0305 Communication Issues
 
12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System12 ipt 0301: Characteristics of a Communication System
12 ipt 0301: Characteristics of a Communication System
 
IPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing SolutionsIPT HSC 1.5) Designing Solutions
IPT HSC 1.5) Designing Solutions
 
12 ipt 0501 transaction processing systems 01
12 ipt 0501   transaction processing systems 0112 ipt 0501   transaction processing systems 01
12 ipt 0501 transaction processing systems 01
 
12 IPT0302 Examples of Communication Systems
12 IPT0302   Examples of Communication Systems12 IPT0302   Examples of Communication Systems
12 IPT0302 Examples of Communication Systems
 
12 IPT 0304 - Other Processes
12 IPT 0304 - Other Processes12 IPT 0304 - Other Processes
12 IPT 0304 - Other Processes
 
12 ipt 0301 Characteristics of a communication system
12 ipt 0301   Characteristics of a communication system12 ipt 0301   Characteristics of a communication system
12 ipt 0301 Characteristics of a communication system
 
12 ipt 0203 Storage and Retrieval
12 ipt 0203   Storage and Retrieval12 ipt 0203   Storage and Retrieval
12 ipt 0203 Storage and Retrieval
 
12 IPT - 1.4) Making Decisions
12 IPT - 1.4)   Making Decisions12 IPT - 1.4)   Making Decisions
12 IPT - 1.4) Making Decisions
 
The memory of graphics
The memory of graphicsThe memory of graphics
The memory of graphics
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
 
12 ipt 0202 Organisation methods
12 ipt 0202   Organisation methods12 ipt 0202   Organisation methods
12 ipt 0202 Organisation methods
 
Photographic composition
Photographic compositionPhotographic composition
Photographic composition
 
1.3) Information processes
1.3) Information processes1.3) Information processes
1.3) Information processes
 
1.2) Information systems in context
1.2) Information systems in context1.2) Information systems in context
1.2) Information systems in context
 
12 ipt 0201 information systems
12 ipt 0201   information systems12 ipt 0201   information systems
12 ipt 0201 information systems
 
12 ipt 0104 making decisions
12 ipt 0104   making decisions12 ipt 0104   making decisions
12 ipt 0104 making decisions
 
12 ipt 0103 understanding the problem
12 ipt 0103   understanding the problem12 ipt 0103   understanding the problem
12 ipt 0103 understanding the problem
 
12 ipt 0106/7 Project Implementation & Testing
12 ipt 0106/7   Project Implementation & Testing12 ipt 0106/7   Project Implementation & Testing
12 ipt 0106/7 Project Implementation & Testing
 

1.4) The nature of data and information

  • 1.
  • 2. • Data is the raw material entered into an information system. • If the data collected is meaningless, then the information will have no use either. [Garbage in = garbage out (GIGO)] • Organisations need to ensure that appropriate data is available at the time of processing.
  • 3. • Data will be appropriate if it is: • relevant – useful to the purpose of the information system • accurate – collected from a dependable source and entered without errors • timely – current, and kept up-to-date • secure – protected from deliberate and accidental damage or loss • When data is entered into an information system it is organised into different data types.
  • 4. • Data types include: • images • audio • video • text • numbers • Information is an important factor in an organisation’s success.
  • 5. • Information will be valuable if it is: • relevant • accurate • timely • organised • cost-effective