SlideShare a Scribd company logo
 Chapter-7: Information, Knowledge, Business Intelligence  ,[object Object]
 The word information is used commonly in our day to day working. The information has a value in decision making while data does not have.
 Information brings clarity and creates an intelligent human response in the mind.
 Data is like a raw materials while the information is equivalent to the finished goods produced after processing the raw material.,[object Object]
 Improve representation of an entity.
 Updates the level of knowledge.
 Has a surprise value
 Reduces uncertainty.
 Aids in decision-making.
 Here is a sales report which shown in table will highlight the point that the quality of information could be called good or bad depending on the mix of these characteristics.,[object Object],[object Object]
[object Object]
 The sales data progressively becomes an information when processed with other data such as the budget and the new product sales.
Davis and Olson defines “information as a data that has been processed into a form that is meaningful to the recipient and is of real or perceived value in the current or the prospective actions or decisions of the recipient”.,[object Object]
Conceptual model of communication,[object Object]
 The poor quality of an information due to various factors would create confusion and misunderstanding, which is equivalent to a ‘Noise’ and ‘Distortion’ in the communication model.
  A good MIS communicates the information without a noise and distortion to the user.,[object Object]
 Presentation of the information is an art.
 The data may be collected in the best possible manner and processed analytically, bringing lot of value in the information.
 If it is not presented properly it may fail to communicate anything of value to the receiver.
 The degree of communication is affected by the method of transmission, the manner of information handling and the limitations and constrains of a receiver as the information processor, and the organization as the information user.,[object Object]
The information can be summarized in a number of ways which shown in Table.,[object Object],[object Object]
 The summarization contains the noise and the distortion.
 Another method of improving the degree of communication is through message routing. The principle here is to distribute information to all those who are accountable for the subsequent actions or decisions in any manner.,[object Object]
 The principle of the message routing achieves the spread of information to the appropriate quarters.
 Knowledge is a power and an intelligent person in the organization can misuse this power to achieve personal goals undermining the functional and organizational goals.
 In order to control the misuse of information, a control is exercised on the content of information and its distribution. The methods shown in table.,[object Object]

More Related Content

What's hot

Nature scope of business communication ppt
Nature scope of business communication pptNature scope of business communication ppt
Nature scope of business communication ppt
Salman Jailani
 
Information systems and it's types
Information systems and it's typesInformation systems and it's types
Information systems and it's types
Jaipal Dhobale
 
Importance of business communication
Importance of business communicationImportance of business communication
Importance of business communication
Md. Rasadul Islam
 
Bc ppt
Bc pptBc ppt
Using Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationUsing Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer Segmentation
IJERA Editor
 

What's hot (6)

Nature scope of business communication ppt
Nature scope of business communication pptNature scope of business communication ppt
Nature scope of business communication ppt
 
Information systems and it's types
Information systems and it's typesInformation systems and it's types
Information systems and it's types
 
Importance of business communication
Importance of business communicationImportance of business communication
Importance of business communication
 
Bc ppt
Bc pptBc ppt
Bc ppt
 
Using Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationUsing Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer Segmentation
 
Libr230week3
Libr230week3Libr230week3
Libr230week3
 

Similar to Book 2 chapter-7

Master of Computer Application (MCA) – Semester 4 MC0076
Master of Computer Application (MCA) – Semester 4  MC0076Master of Computer Application (MCA) – Semester 4  MC0076
Master of Computer Application (MCA) – Semester 4 MC0076
Aravind NC
 
Content Analytics & Risk Management
Content Analytics & Risk ManagementContent Analytics & Risk Management
Content Analytics & Risk Management
Orlando F. Delgado
 
Managing knowledge, communication and information
Managing knowledge, communication and informationManaging knowledge, communication and information
Managing knowledge, communication and information
Richard Docc
 
22830802 management-information-system
22830802 management-information-system22830802 management-information-system
22830802 management-information-systemarunakankshadixit
 
1.1.The words ‘data’ and ‘information’ are often used as though they.pdf
1.1.The words ‘data’ and ‘information’ are often used as though they.pdf1.1.The words ‘data’ and ‘information’ are often used as though they.pdf
1.1.The words ‘data’ and ‘information’ are often used as though they.pdf
aquadreammail
 
Book 1 chapter-1
Book 1 chapter-1Book 1 chapter-1
Book 1 chapter-1
GTU
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
aciijournal
 
IT class I - ICAB PS-KL
IT class I - ICAB PS-KL IT class I - ICAB PS-KL
IT class I - ICAB PS-KL
Sazzad Hossain, ITP, MBA, CSCA™
 
Trust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A SurveyTrust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A Survey
aciijournal
 
Accounting Information Systems 13Th Chapter 1
Accounting Information Systems 13Th Chapter 1Accounting Information Systems 13Th Chapter 1
Accounting Information Systems 13Th Chapter 1
Don Dooley
 
Denver Event - 2013 - Floodlight and Data Engine User Survey
Denver Event - 2013 - Floodlight and Data Engine User SurveyDenver Event - 2013 - Floodlight and Data Engine User Survey
Denver Event - 2013 - Floodlight and Data Engine User SurveyKDMC
 
data science course with placement in hyderabad
data science course with placement in hyderabaddata science course with placement in hyderabad
data science course with placement in hyderabad
maneesha2312
 
Beginners_s_Guide_Data_Analytics_1661051664.pdf
Beginners_s_Guide_Data_Analytics_1661051664.pdfBeginners_s_Guide_Data_Analytics_1661051664.pdf
Beginners_s_Guide_Data_Analytics_1661051664.pdf
KashifJ1
 
what is ..how to process types and methods involved in data analysis
what is ..how to process types and methods involved in data analysiswhat is ..how to process types and methods involved in data analysis
what is ..how to process types and methods involved in data analysis
Data analysis ireland
 
Business decision making assignment help
Business decision making assignment helpBusiness decision making assignment help
Business decision making assignment help
Locus Assignements
 
Making sense of BI
Making sense of BIMaking sense of BI
Making sense of BI
Ralph Martino
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About Individuals
Christy Hunt
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
Carmen Martin
 

Similar to Book 2 chapter-7 (20)

Master of Computer Application (MCA) – Semester 4 MC0076
Master of Computer Application (MCA) – Semester 4  MC0076Master of Computer Application (MCA) – Semester 4  MC0076
Master of Computer Application (MCA) – Semester 4 MC0076
 
Content Analytics & Risk Management
Content Analytics & Risk ManagementContent Analytics & Risk Management
Content Analytics & Risk Management
 
Managing knowledge, communication and information
Managing knowledge, communication and informationManaging knowledge, communication and information
Managing knowledge, communication and information
 
22830802 management-information-system
22830802 management-information-system22830802 management-information-system
22830802 management-information-system
 
1.1.The words ‘data’ and ‘information’ are often used as though they.pdf
1.1.The words ‘data’ and ‘information’ are often used as though they.pdf1.1.The words ‘data’ and ‘information’ are often used as though they.pdf
1.1.The words ‘data’ and ‘information’ are often used as though they.pdf
 
Book 1 chapter-1
Book 1 chapter-1Book 1 chapter-1
Book 1 chapter-1
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
 
IT class I - ICAB PS-KL
IT class I - ICAB PS-KL IT class I - ICAB PS-KL
IT class I - ICAB PS-KL
 
Trust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A SurveyTrust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A Survey
 
Accounting Information Systems 13Th Chapter 1
Accounting Information Systems 13Th Chapter 1Accounting Information Systems 13Th Chapter 1
Accounting Information Systems 13Th Chapter 1
 
Denver Event - 2013 - Floodlight and Data Engine User Survey
Denver Event - 2013 - Floodlight and Data Engine User SurveyDenver Event - 2013 - Floodlight and Data Engine User Survey
Denver Event - 2013 - Floodlight and Data Engine User Survey
 
Mis (1)
Mis (1)Mis (1)
Mis (1)
 
data science course with placement in hyderabad
data science course with placement in hyderabaddata science course with placement in hyderabad
data science course with placement in hyderabad
 
Beginners_s_Guide_Data_Analytics_1661051664.pdf
Beginners_s_Guide_Data_Analytics_1661051664.pdfBeginners_s_Guide_Data_Analytics_1661051664.pdf
Beginners_s_Guide_Data_Analytics_1661051664.pdf
 
IM Introduction.ppt
IM Introduction.pptIM Introduction.ppt
IM Introduction.ppt
 
what is ..how to process types and methods involved in data analysis
what is ..how to process types and methods involved in data analysiswhat is ..how to process types and methods involved in data analysis
what is ..how to process types and methods involved in data analysis
 
Business decision making assignment help
Business decision making assignment helpBusiness decision making assignment help
Business decision making assignment help
 
Making sense of BI
Making sense of BIMaking sense of BI
Making sense of BI
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About Individuals
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
 

More from GTU

Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
GTU
 
Chap 14
Chap 14Chap 14
Chap 14
GTU
 
Book 2 chapter-14 dss
Book 2 chapter-14 dssBook 2 chapter-14 dss
Book 2 chapter-14 dss
GTU
 
Book 2 chapter-13
Book 2 chapter-13Book 2 chapter-13
Book 2 chapter-13
GTU
 
Book 2 chapter-12 manu & non-manufacturing
Book 2 chapter-12 manu & non-manufacturingBook 2 chapter-12 manu & non-manufacturing
Book 2 chapter-12 manu & non-manufacturing
GTU
 
Book 2 chapter-8
Book 2 chapter-8Book 2 chapter-8
Book 2 chapter-8
GTU
 
Book 2 chapter-6
Book 2 chapter-6Book 2 chapter-6
Book 2 chapter-6
GTU
 
Chap 8
Chap 8Chap 8
Chap 8
GTU
 
Book 1 chapter-2
Book 1 chapter-2Book 1 chapter-2
Book 1 chapter-2
GTU
 

More from GTU (9)

Book 3 chap-8
Book 3 chap-8Book 3 chap-8
Book 3 chap-8
 
Chap 14
Chap 14Chap 14
Chap 14
 
Book 2 chapter-14 dss
Book 2 chapter-14 dssBook 2 chapter-14 dss
Book 2 chapter-14 dss
 
Book 2 chapter-13
Book 2 chapter-13Book 2 chapter-13
Book 2 chapter-13
 
Book 2 chapter-12 manu & non-manufacturing
Book 2 chapter-12 manu & non-manufacturingBook 2 chapter-12 manu & non-manufacturing
Book 2 chapter-12 manu & non-manufacturing
 
Book 2 chapter-8
Book 2 chapter-8Book 2 chapter-8
Book 2 chapter-8
 
Book 2 chapter-6
Book 2 chapter-6Book 2 chapter-6
Book 2 chapter-6
 
Chap 8
Chap 8Chap 8
Chap 8
 
Book 1 chapter-2
Book 1 chapter-2Book 1 chapter-2
Book 1 chapter-2
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Book 2 chapter-7

  • 1.
  • 2. The word information is used commonly in our day to day working. The information has a value in decision making while data does not have.
  • 3. Information brings clarity and creates an intelligent human response in the mind.
  • 4.
  • 6. Updates the level of knowledge.
  • 7. Has a surprise value
  • 9. Aids in decision-making.
  • 10.
  • 11.
  • 12. The sales data progressively becomes an information when processed with other data such as the budget and the new product sales.
  • 13.
  • 14.
  • 15. The poor quality of an information due to various factors would create confusion and misunderstanding, which is equivalent to a ‘Noise’ and ‘Distortion’ in the communication model.
  • 16.
  • 17. Presentation of the information is an art.
  • 18. The data may be collected in the best possible manner and processed analytically, bringing lot of value in the information.
  • 19. If it is not presented properly it may fail to communicate anything of value to the receiver.
  • 20.
  • 21.
  • 22. The summarization contains the noise and the distortion.
  • 23.
  • 24. The principle of the message routing achieves the spread of information to the appropriate quarters.
  • 25. Knowledge is a power and an intelligent person in the organization can misuse this power to achieve personal goals undermining the functional and organizational goals.
  • 26.
  • 27.
  • 28.
  • 29. While choosing the appropriate method of communicating information, a care has to be taken to see that it is not biased.
  • 30. For example, while using the techniques of classification or filtering the information, it should not happen that certain information is to be avoided.
  • 31. This bias enters because people try to block a sensitive information which affect them.
  • 32.
  • 33. In this case one who draws inferences may have a bias in the process of collection, processing and presentation of data and information.
  • 34. Organizations have departments like corporate planning, Market Research, R and D, HRD and so on, which collect the data and analyze for the company and communicate the inferences.
  • 35.
  • 36. If the information is presented with a criteria of exception, the choice of exception and deviation from the exception creates a bias by design itself.
  • 37.
  • 38.
  • 39.
  • 40. Redundancy is considered as an essential feature to ensure that the information is received and digested.
  • 41.