This chapter provides an overview of information science, including its history, basic concepts, boundaries, and foundational disciplines. It discusses the information lifecycle and how information moves from creation through various stages until disposition. It also examines the spectrum of knowledge from data to information to knowledge. The key topics covered are defining information science, the information lifecycle management process, and differentiating the hierarchy from data to information to knowledge.
Automation and Integrated Library SystemsJulie Goldman
Simmons LIS 489: Technology Foundations for Information Science
Social and Professional Aspects Final Presentation: Automation and Integrated Library Systems. Focuses on two different automation systems used by libraries.
Outline:
Brief History Background of Subject Cataloging
Definitions of Terms
Types of Subject Headings
Principles of Subject Headings
Sears list of Subject Headings
Library of Congress Subject Headings
In the recent past, Resource sharing concept has become prime factor and playing vital role in
libraries because of innovative developments in Information, Communication and Technology
(ICT). ICT has made easy to establish networks among libraries and share their information
resources quickly and instantly. Resource sharing has become prime reason for establishing
cooperation between libraries without any geographical barriers. The various reasons for resource
sharing are might be cost benefits, non-availability of resources, insufficient library funds, lack of
skills etc. In this paper, the attempt has been made to understand the various aspects of resource
sharing in modern library technological environment.
Automation and Integrated Library SystemsJulie Goldman
Simmons LIS 489: Technology Foundations for Information Science
Social and Professional Aspects Final Presentation: Automation and Integrated Library Systems. Focuses on two different automation systems used by libraries.
Outline:
Brief History Background of Subject Cataloging
Definitions of Terms
Types of Subject Headings
Principles of Subject Headings
Sears list of Subject Headings
Library of Congress Subject Headings
In the recent past, Resource sharing concept has become prime factor and playing vital role in
libraries because of innovative developments in Information, Communication and Technology
(ICT). ICT has made easy to establish networks among libraries and share their information
resources quickly and instantly. Resource sharing has become prime reason for establishing
cooperation between libraries without any geographical barriers. The various reasons for resource
sharing are might be cost benefits, non-availability of resources, insufficient library funds, lack of
skills etc. In this paper, the attempt has been made to understand the various aspects of resource
sharing in modern library technological environment.
Anglo-American Cataloguing Rules AACR2 to acquire an international adaptability.Cataloging & Classification.AACR1 and AACR2.AACR1 Anglo-American Cataloging Rules. North American text. Chicago: American Library Association, 1967.
AACR1, Chap. 12 Anglo-American Cataloging Rules. North American text. Chapter 12. Chicago: American Library
Association,
1975.
AACR2 Anglo-American Cataloguing Rules. 2nd ed. Chicago: American Library Association, 1
Information repackaging is a process to repackage the analyzed, consolidate information in that form which is more suitable & usable for library users. Customization of information taking into account the needs and characteristics of the individual or user groups and matching them with the information to be provided so that diffusion of information occurs.
A presentation on historical development of digital libraries by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, India.
Introduction to Public Library
Origin and Growth :- World, India
Definition of PL
Forerunner of modern PLs
Growth of PL as Social Institution
Important features of a PL
PL’s commitment to the society
Agencies in promotion & development of PLs in India
State’s PL Act
Types of PL Act
NAPLIS
Model PL Bills/Acts in India
Structure of PL & Information system
The management of PLs
PL Standards
Challenges and problems for future PL system
National Library Week Celebration, Workshop on Koha.
Venue: Mahatma Gandhi University Library
Organised by
Kerala Library Association
Kottayam Region
&
Mahatma Gandhi University Library
Kottayam
Presented at the seminar Libraries and the Semantic Web: the role of International Standard Bibliographic Description (ISBD), National Library of Scotland, Edinburgh, 25 Feb 2011
Day 3: Introduction to Information LiteracyBuffy Hamilton
Objectives: 1. To explore and evaluate traditional and uthoritative database information sources. 2. To explore and utilize strategies to effectively use traditional and emerging search engines for information. 3. To explore and evaluate how emerging Web 2.0 tools can be used as sources of information. 4. To explore the merits and drawbacks to collaboratively created open sources of information such as Wikipedia.
Anglo-American Cataloguing Rules AACR2 to acquire an international adaptability.Cataloging & Classification.AACR1 and AACR2.AACR1 Anglo-American Cataloging Rules. North American text. Chicago: American Library Association, 1967.
AACR1, Chap. 12 Anglo-American Cataloging Rules. North American text. Chapter 12. Chicago: American Library
Association,
1975.
AACR2 Anglo-American Cataloguing Rules. 2nd ed. Chicago: American Library Association, 1
Information repackaging is a process to repackage the analyzed, consolidate information in that form which is more suitable & usable for library users. Customization of information taking into account the needs and characteristics of the individual or user groups and matching them with the information to be provided so that diffusion of information occurs.
A presentation on historical development of digital libraries by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, India.
Introduction to Public Library
Origin and Growth :- World, India
Definition of PL
Forerunner of modern PLs
Growth of PL as Social Institution
Important features of a PL
PL’s commitment to the society
Agencies in promotion & development of PLs in India
State’s PL Act
Types of PL Act
NAPLIS
Model PL Bills/Acts in India
Structure of PL & Information system
The management of PLs
PL Standards
Challenges and problems for future PL system
National Library Week Celebration, Workshop on Koha.
Venue: Mahatma Gandhi University Library
Organised by
Kerala Library Association
Kottayam Region
&
Mahatma Gandhi University Library
Kottayam
Presented at the seminar Libraries and the Semantic Web: the role of International Standard Bibliographic Description (ISBD), National Library of Scotland, Edinburgh, 25 Feb 2011
Day 3: Introduction to Information LiteracyBuffy Hamilton
Objectives: 1. To explore and evaluate traditional and uthoritative database information sources. 2. To explore and utilize strategies to effectively use traditional and emerging search engines for information. 3. To explore and evaluate how emerging Web 2.0 tools can be used as sources of information. 4. To explore the merits and drawbacks to collaboratively created open sources of information such as Wikipedia.
Understanding what is needed to turn data in to information, information into knowledge, and knowledge into wisdom is important for transmedia storytellers (and information designers in general). This short presentation is part of an in-class lecture by Peter von Stackelberg.
Legal Research and Information Processing Skills (LAW038) is one of the subjects that is mandatory for UiTM's Foundations in Law students throughout Semester 1.
All notes are packed in 19 pages only for easier yet effective revision.
Best efforts were made to ensure that everything you need to know to score your final exam is included in here (except for APA & MLA citation guide -- I provide other slides especially for those two topics, please look for them on my profile page). However, if there's any missing important information (apart from APA & MLA), do let me know in the comments section. Thank you and hope this helps you with your studies. Good luck!
Data is an increasingly common term used on the assumption that its meaning is commonly understood. This presentation seeks to drill down into the very specifics of what data is all about.
The Role of Libraries and Librarians in Information LiteracyPLAI STRLC
*Paper presented during the PLAI-STRLC Regional Conference on Promoting Information Literacy for Lifelong Learning, September 25, 2006 at Capuchin Retreat Center, Lipa City, Batangas
MLIS Course Code 5501-Information Retrieval and Dissemination- Workshop AIOU 2013, Information Management, Information Retrieval and Dissemination, Information Retrieval, Information Dissemination, Workshop, AIOU, Computer Science, Information science, Information technology, Hardware, Software, Computer basics,
Data Mining is the process of discovering new correlations, patterns, and trends by digging into (mining) large amounts of data stored in warehouses, using artificial intelligence, statistical and mathematical techniques. Data mining can also be defined as the process of extracting knowledge hidden from large volumes of raw data i.e. the nontrivial extraction of implicit, previously unknown, and potentially useful information from data. The alternative name of Data Mining is Knowledge discovery (mining) in databases (KDD), knowledge extraction, data/pattern analysis, etc.
University of Bath Research Data Management training for researchersJez Cope
Slides from a workshop on Research Data Management for research staff and students at the University of Bath.
Part of the Research360 project (http://blogs.bath.ac.uk/research360).
Authors: Cathy Pink and Jez Cope, University of Bath
Knowledge Management (KM) is a social activity. More and more organizations use social software as a tool to bridge the gap between technology- and human-oriented KM. In order to create interoperable, transferable solutions, it is necessary to utilize standards. In this paper, we analyze which standards can be applied and which gaps currently exist. We present the concept of knowledge bundles, capturing information on knowledge objects, activities and people as a prerequisite for social-focused KM. Based on our concept and examples, we derive the strong need for standardization in this domain. As a manifesto this paper tries to stimulate discussion and initiating a broad initiative working towards a common standard for the next generation of knowledge management systems. Our manifesto provides with eight recommendations how the KM community should act to address future challenges.
Presentation Title: Grand Challenges and Big Data: Implications for Public Participation in Scientific Research
Presenter: William Michener, Professor and PI/Director of DataONE, University Libraries, University of New Mexico
cONTENT
1.0 INTRODUCTION
1.1 OVERVIEW OF INFORMATION PROCESSING
2.0 MAJOR THEORIES ON INFORMATION PROCESSING
2.1. STAGE MODEL
2.2 LEVELS-OF-PROCESSING THEORY
2.3 PARALLEL DISTRIBUTED PROCESSING THEORY (PDP)
2.4 CONNECTIONISTIC MODELS
3.0 SENSORY INFORMATION PROCESSING
3.1 AUDITORY INFORMATION PROCESSING
3.2 VISUAL INFORMATION PROCESSING
4.0 ATTENTION
4.1 DIVIDED ATTENTION
4.2 AUTOMATICITY PROCESSING
5.0 HUMAN ERROR
5.1 WHY WE MAKE ERROR?
Presentation of the Defence of the PhD Dissertation "Towards a personalised virtual library: indications from navigational and personal information behaviour of e-learning students".
Advancing Knowledge Discovery and Data MiningRyota Eisaki
Abstract:
Knowledge discovery and data mining have become areas of growing significance because of the recent increasing demand for KDD techniques, including those used in machine learning, databases, statistics, knowledge acquisition, data visualization, and high performance computing. Knowledge discovery and data mining can be extremely beneficial for the field of Artificial Intelligence in many areas, such as industry, commerce, government, education and so on. The relation between Knowledge and Data Mining, and Knowledge Discovery in Database (KDD) process are presented in the paper. Data mining theory, Data mining tasks, Data Mining technology and Data Mining challenges are also proposed. This is an belief abstract for an invited talk at the workshop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
IMD102 Chapter 1
1. History and Basic Concepts
of Information Science
Chapter 1
CHAPTER OVERVIEW
1.0 History and basic concepts of information science
1.1 Evolution of information science
What is information science
1.2 The boundaries of information science
The basic structure of information science
Foundational disciplines of information science
Related field of study in information science
1.3 Information Lifecycle
Information lifecycle management
Explanation of the information lifecycle management
1.4 Spectrum of Knowledge
Is there a hierarchy of data, information and knowledge?
Knowledge and information
Comparison and differences between information and knowledge
Data and information
1
2. LEARNING OBJECTIVES
After completing this chapter, you should be able to:-
1. Define information science, information lifecycle
and information spectrum.
2. Explain the information lifecycle management.
3. Differentiate between data, information and
knowledge
4. Describe the knowledge spectrum.
WHAT IS INFORMATION SCIENCE?
Our perception of the concept of information science
all organisms
is based on the assumption that
are information systems.
The information system is an environment of person,
machines, and procedures that develop human
biology potential to acquire, process and
act upon data, thus improves our chances for
survival.
2
3. DEFINITIONS
Science
Any system of knowledge that is concerned with
the physical world and its phenomena
and that involve unbiased observations
and systematic experiment (research).
Information science
A discipline that deals with the processes of
storing and transferring of information.
Fundamentally it covers all theories, concepts and
methods in the collection, organization, storage,
retrieval and use of information.
THE BOUNDARIES OF INFORMATION SCIENCE
Basic structure of
information science
• Technology and Systems - the application of IT
• Impact of IT on society - problems of information
society, copyrights, personal privacy, plagiarism,
etc.
• Resources - the human resources needed to
sustain the activities of the science worldwide,
encouragement of R&D, training, etc.
3
4. THE BOUNDARIES OF INFORMATION SCIENCE
Foundational
Disciplines
Philosophy - provides infor. Sc. with the understanding
of inquiry system (state of the world) and the foundation
of the social sciences that are relevant to infor. system.
Mathematics (statistics). - the foundation of statistics
which is the tools used by infor. Scientist.
Linguistics - the study of language, which is important
to infor. Scientist as tool to represent events.
Behavioral science - include psychology and
sociology, important part for user study.
RELATED FIELD OF STUDY IN INFORMATION SCIENCE
Informatics – the study of automation and automated
technologies in document retrieving.
Information Engineering – refers to various aspects of
infor. System design.
Knowledge Engineering – artificial intelligence & expert
system.
Cybernetics – the science of control, include
communications & system theory.
Bionics – the understanding of the functions & characteristics
of living systems & biomechanical systems.
4
5. INFORMATION LIFECYCLE MANAGEMENT
Information life cycle management (ILM) is a comprehensive
approach to managing the flow of an information
system's data from creation and initial storage to the
time when it becomes obsolete and is deleted. ILM involves all
aspects of dealing with data, starting with user practices. ILM
enables more complex criteria for storage management than
data age and frequency of access.
5
6. INFORMATION LIFECYCLE MANAGEMENT
1. Collection
• Acquisition
• Research
• Analysis
2. Processing
• Validating
3. Recording
• Documentation
4. Storage
5. Retrieval
6. Dissemination
• Distribution
7. Use
• Reuse
8. Restoring
9. Revalidation
10. Reprocessing
11. Disposition
FIVE PHASE OF ILM IN BUSINESS RECORDS
Process of managing the
information once it has
been created or received.
Includes internal and
external distribution.
Record from the
organization itself. Create 2. Distribution
by member of the
organization or receipt of Takes place after
information from an information is distribute
external source. Examples:- internally, can generate
reports, drawings, computer business decisions,
input/output etc. document further actions or
serve other purpose.
1. Creation and Receipt 3. Use
Handling the information
that is less frequently Management of the
accessed; relocate to an information. Example filing,
inactive records facility. If retrieval and transfers.
no longer valuable will be
disposed.
5. Disposition 4. Maintenance
6
7. Case Study:-
Find one situation in your daily life or business
environment and discuss the process of information
lifecycle involved for that situation.
Definition of Information
The term information has a number of different
meanings and connotations when used in a number of
different contexts. It is generally recognized as
processed data, text, voice and/or
image and is synonymous with
knowledge or intelligence.
Many information scientists accept the standard
definition of information as:
“Data which is used in
decision making”
(Ralston, Anthony)
7
8. Definition (cont..)
Fritz Machlup (1983) carefully assessed the different
meanings associated with the information. Some
interpretations from these sources are as follows:
– Something one did not know before.
– A clue.
– Something that affects what one already knows.
– How data is interpreted.
– Something useful in some way to the person receiving
it.
– Something that reduces uncertainty.
– The meaning of words in sentences.
– Something that provides more than what is stated.
– Something that changes what a person who receives
believes or expects.
abs.UiTM Johor
The representation of information
Signals – a sign with an emphasis on some
consequential action.
Sign – a physical evidence of the immediate
physical of the thing or event present.
Symbols – special kind of sign. They represent
an object, idea or event and elicit the same
response as if things they refferred to were
immediately present.
Languange – the principal method of human
communication.
8
9. Information Explosion
The universe of recorded information and the number of
knowledgeable human beings are have expanded at
such a rate and in so short time a phenomenon knows as
information explosion will happen.
Information Overload
Occurs when the amount of information we receive
exceeds our ability to process it in a meaningful way.
9
10. Factors contribute to information overload
Personal factors
• Lack of time
• Poor self-organization
• Personal inefficiency
Organizational factors
• Poor communication
• Ineffective use of information technology
• An organizational culture not geared up to
handling information
Consequences of information overload
Personal
• Stress and ill health
• Less free time
• Less job satisfaction
• Poor decision-making
Organizational
• Loos of productivity
• Waste of resources
• Loos of competitive advantage
• Duplication and overlap of work
10
11. A model for managing information overload
Use
Store
Discard
Process
Filter Pass to
others
Incoming
Information Throw away
Function and Use
Information is a key resource and an important factor
in national progress and development. It used to be
regarded as playing only a supportive role in the
various national development programs like education,
economic planning, agriculture, medicine and the
transfer of science and technology.
Now, however its importance is being increasingly
recognized and its acquisition has emerged as a matter
of national policy.
11
12. Characteristics of Information
Expandable
– Facts are never all in, we are constantly aware of
information overload.
Compressible
– While the amount is expanding exponentially, it can be
concentrated, integrated, summarized, miniaturized for
easier handling.
Substitutable
– It can replace capital or physical materials, information is a
commodity and on the current scene that means power.
Transportable
– At the speed of lights, as quick as pushing a button.
Diffusive
– It tends to leak and in that regard cannot be possessed.
Shareable
– Sharing transactions.
Source of Information
•Personal •Commercial •Computer •Production of
INFORMATION SYSTEM
contact orgn based services litery work or
•Writings •Educational that provides written artistic
ORGANIZATION
•Governmental information works as form
of expression
LITERATURE
•Society and
or ideas.
PEOPLE
professional
organization •Novel, Books,
articles,
pamphlets etc
12
13. SPECTRUM OF KNOWLEDGE
The hierarchical transformation of data, information,
knowledge, wisdom and enlightenment
What are the elements that trigger the transformation?
Intrinsic: the influence within oneself that turns these
elements into other entities on several basis like our
experience, background, education, belief, lifestyles etc.
Extrinsic: the external influences that turn these entities
into other form. For example the information that we
have through reading materials might may turn
something that we are aware of to be something that
we really understand its concept.
25
IS THERE A HIERARCHY OF DATA, INFORMATION, AND KNOWLEDGE?
To determine whether the transformation is hierarchical
we need to
• understand the concept of information, knowledge,
wisdom and enlightenment in details.
• be able to understand the differences between these
entities.
Knowledge and Information
A close and firm link between information and
knowledge has always existed .
Distinctions between information and knowledge
have been proposed chiefly on the followings:
Information is fragmented, particular, whereas
knowledge is structured (well-thought of), coherent
(logical), and often universal.
Information is timely, transitory, whereas knowledge is
26 of enduring significance.
.
13
14. Continue…
Information is a flow of messages, whereas
knowledge is a stock, largely resulting from the flow,
in the sense that the "input" of information may
affect the stock of knowledge by adding to it,
restructuring it, or changing it in any way
Information in the sense of telling and being told is
always different from knowledge in the sense of
knowing: The former is a process, the latter a state.
Data are the things given to the analyst, investigator,
or problem-solver; they may be numbers, words,
sentences, records, assumptions - just anything
given, no matter in what form and of what origin.
Information...is essentially raw data. Knowledge is
interpreted data.
27
Comparison And Differences Between Information &
Knowledge
Knowledge may be considered as storage of
information by way the information makes changes
to the structure of the knowledge.
Information is acquired by being told, whereas
knowledge can be acquired by thinking. Thus, new
knowledge can be acquired without new
information being received.
Neither knowledge nor information needs to be
useful or valuable to merit its designation. People
speak of "useless information" and "useless
knowledge"
28
14
15. Continue..
Nor is it a requirement of normal language use that
information is correct and knowledge is true.
When a new discovery or a new theory is
announced in newspapers and news broadcasts,
this will be information to most recipients but new
knowledge to specialists.
Data and Information
There is no need to establish either a hierarchy or a
temporal sequence in discussing data and
information.
For example, consider the following three outputs:
29
Continue..
a printout that gives us exactly what has been
fed into the memory of the computer
a new arrangement of the data, after sorting
(chronological or alphabetical ordering, or
selecting on the basis of detailed instructions)
an output different from the stored data as a
result of an analysis made by the computer using
a highly sophisticated piece of software.
Should all three printouts still be called data or
should they be referred to as information?
30
15
16. Continue..
For some definers, information, to be information, has to
have value.
Sometime it is proposed that information must reduce
uncertainty on the part of those getting informed.
Information may in the ordinary sense is received by
people without any effect on their uncertainty; and some
news items may even raise uncertainty in several aspects.
FORMS OF INFORMATION
Information touches all human activity. It comes in a
multitude of different shapes –
speech, pictures, video,
office work, software,
great art and kitsch,
invoices, music, stock prices, tax returns,
31
Characteristics of Information
Information has several characteristics that make
information very different than other commodities:
1. It is reproducible.
2. The cost of reproduction is low.
3. It can be transported easily.
4. Its lifetime can be brief.
5. Its value is not additive.
32
16
17. Value of Information
One suggestion is that information has economic value
to people only if it can lead then to the acquisition of
tangible goods. Therefore, value of information is a
matter of form, not of amount.
Also, value of information often depends on the
preexisting form of the receiver as on the message itself.
Similarly, information has intangible value if it can enable
them to satisfy less tangible human desires.
An encyclopedia publisher, for instance, will find a
mailing list of prospective buyers useful because it might
increase sales.
Watching a soap opera has value for those people who
want to experience heartrending emotions.
33
Continue…
Watching a soap opera has value for those
people who want to experience heartrending
emotions.
Because information leads to goods only
indirectly, it seems reasonable to value it as a
fraction of the worth of the tangible goods to
which it leads.
Therefore the economic value of all sprawling
computer-and-network complexes may be
estimated as a fraction of the tangible goods to
which they will lead.
Value of US computer hardware and software,
including the work needed to run computer
systems within organizations, at almost a tenth of
its GNP - roughly about $500 billion.
34
17
18. Continue…
Yet because some 60 percent of the work forces
have jobs that involve information, the value of
computerized information handling may well grow to
an even larger fraction of the global economy.
In spite of its importance, information is secondary to
people's principal needs - food, shelter, health and
human relationships
35
18
Editor's Notes
Creation and Receipt : Record from the organization itself. Create by member of the organization or receipt of information from an external source. Examples:- reports, drawings, computer input/output etc. Distribution : Process of managing the information once it has been created or received. Includes internal and external distribution. Use ; Takes place after information is distribute internally, can generate business decisions, document further actions or serve other purpose. Maintenance : Management of the information. Example filing, retrieval and transfers. Disposition : Handling the information that is less frequently accessed; relocate to an inactive records facility. If no longer valuable will be disposed.