SlideShare a Scribd company logo
Information & Communication Systems
FETAC MinorLevel 5 - AIS code:5N1952
Analyse of a computer-based information system used in the work environment
detailing inputs to the system, methods of processing, and information produced in
the form of report.
YasminaRayeh
8/5/2014
1589 words
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
1
Contents
I. Data and information............................................................................................................................2
II. Information flows .................................................................................................................................4
III. The functions of the Main Components of a computer Processing System.................................................6
IV. File Organization Structures...................................................................................................................6
V. File Organization Structures...................................................................................................................8
VI. Ergonomics & computer system design ..................................................................................................9
VII. Data Processing activities Map. ...........................................................................................................10
VIII. Research safely Internet using information communication technology (ICT) ..........................................11
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
2
I. Data and information
A ComputerBased Information System(CBIS) helpsprocessing data followingrequirementsand procedures
(strategies,rules,policies and methods)1
.Thisstudy underlinesvariousCBISaspectsproviding description on its
functionalitiesand utilities.
 Relationship between data and information
The difference between "data" and "information" lies in the way they are used. Data is qualified as "raw
material" such as numbers, words, symbols, that needs to be processed in useful hind sights.
Information involves the communication and reception of knowledge: Data are compiled/processed in
meaningful information for specific purposes that can be used in an organisation to allow planning, recording,
controlling, measuring and making specific decisions; hence the need for "data processing". Sound,
measurement, articles or pictures are information.
 Examples
Data Information
Messages converted into electrical or optical signals Content of a conversation
A set of namesand addresseswritten outon to formsready
for typing
A list of names and addresses
 Attributes of information
Accessible Accuracy Reliable Detailed Relevant
Easy to
access
Represents the
factual situation
Froma
verifiable
source
should be at a
level of detail that
allows readability
The required information
leads to improved decision
making
 Reports Identification steps - Operation processes.
1 http://www.slideshare.net/jandian/computer-based-information-system
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
3
 Flow chart
As described, each departmentneedsto report to the upper level of the hierarchy. Therefore gathering and
processing data is crucial. Processes, people and a CBIS are in place to facilitate reporting that includes all
identified steps and resources.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
4
II. Information flows
 How information differs across management levels
Communication flows at each stage of the organisation and might be different from one department to
another2
.
Each department(human resource,financial,marketing,operations…) needs to compile information in order
to manage efficiently and effectively their tasks and the whole business.
Examples:
Fromthe upperlevel (leadership),through themanagement, to thelowest level (workforce), and vice versa a
clear communication process needs to be defined in order to deliver the vision and value, enhance the
profitability of the business.
In this process, procedures and feedback allow verification and correction when necessary.
ECTDB follow a typical administration schema where several levels of hierarchy are involved, but the
communication flowbetween theleaders,managers, related Government bodies, and employees is complex
and ruled by strict protocols. However as training centre abides by laws, this heavy structure comply with all
prerogatives determined by the Irish regulations. This is an administration with a lot of written
communication running at all level of the hierarchy with plenty of reports done.
2 Private Limited Company (Ltd), Public Limited Company (PLC) or Voluntary Organization: seeCRO.ie
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
5
 Type of information3
:
Operational –routine tasks Tactical – non routine tasks Strategic – decision making
Management information
system (MIS)
Decision support system
(DSS)
Executiveinformation system
(EIS)
 Evaluation tool: comparison.
Evaluation and comparison tools help decision-making to prioritize decisions and vision4
when studying criteria
and evaluating data, report or project results.
CDETB has for instance chosen Do-IT Profilers that provides a two-way flow of information5
ensuring that the
tool is ‘fit for purpose'.
For the course,CDETB interview potentialusersto find outabout their experience and expectations. Meanwhile
CDETB refers to the Labour Market Trends in order to refine requirements and foresee courses in ad equation
with the demand.
 Motivation tool: feedback.
Feedbacks allow a better communication between all levels of the hierarchy as it clarifies, improves, informs on
how the organisation is or should be working.
The SMART tool is one of the tools used to set goals and performance objectives:
Specific - Objectives must be very specific so each person understands what is expected.
Measurable - quantitative or qualitative
Achievable - Employees must be able to reach the objectives.
Relevant - Objectives must be relevant to their wants, needs, and beliefs.
Timely - current feedback is more effective as deadlines measure tasks accomplishment.
 Management
is accountable for the well-being of the organisation and is in charge of “the process of dealing with or
controlling things or people” 6
, therefore needs to determine any issues (for which they are accountable too) is
possiblewith reporting on regularbasis;reporting factsdetermine new actions or corrections and allows further
hindsight that can be elevated to the upper hierarchical level, which decide further processes after analyses.
3 http://catalog.flatworldknowledge.com/bookhub/reader/7?e=collins-ch15_s03
4 Nancy R. Tague’s TheQuality Toolbox, Second Edition,ASQQuality Press, 2004.
5 http://www.doitprofiler.com/education/case-studies.aspx
6 http://www.oxforddictionaries.com/definition/english/management
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
6
III. The functions of the Main Components of a computer Processing System
IV. File Organization Structures
 The difference between static and dynamic data
Static data (i.e.in a list) stay the same whilst dynamic data (in a form) can be reassigned or altered.
 The main data collection methods are7
:
 Registration: full enumeration.
 Questionnaires: completed by respondents.
 Interviews: completed with the respondent.
 Direct observations: direct measurements.
 Reporting: analyse activities.
 Data verification and validation is used “to evaluate whether data has been generated according to
specifications, satisfies acceptance criteria, and are appropriate and consistent with their intended use”8
.
Data verification is the systematic process for evaluating performance and compliance of a set of data and
checking if data conforms to specification standards (complete, correct, and consistent).
Data validation (datavetting, data cleaning) uses specifications to ascertain the usability of the data in light of
its measurement quality objectives and to ensure that results obtained are scientifically defensible.
7 http://www.fao.org/docrep/003/x2465e/x2465e09.htm
8 http://www.epa.gov/QUALITY/vandv.html
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
7
 The difference between single- and multi-user environments
A single-useroperating systemisa system in which only oneuser can access the computer system at a time (e.g.
MicrosoftWindows) whilea multi-user environment design is more complex allowing a multi-connection access
to a computer at the same or different time.
 Data security means the protection of data.
Security involves protecting data and software from being lost / destroyed / corrupted / modified or disclosed
(unauthorised access)
Data integrity means accuracy and completeness
Preserving data: Archives and back-up system are commonly used to prevent breach of security. A backup file
allows a safe copy of the original one.
Other safeguards include:
Password to individual files
Dataencryption:useof secret keysto codeand decodedata so thatit is unreadableby anyone elsewho doesnot
have the ‘key’.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
8
V. File Organization Structures
Copyright under Intellectual property (IP) rights 9
jurisdiction confers an automatic protection on an original
literary, scientific, artistic work or commercial creation of mind.
Protected by national and International laws, IP rights cover financial aspects with royalties, but also a
recognition status for the creator10
.
Software copyright is the extension of copyright law to machine-readable software and is used by proprietary
software companies to prevent piracy (unauthorized copying) that induce a loss of incomes11
.
PRIVATE database creates a proprietary link in a specific schema of the local database while Public creates a
database-wide link. The authorisation accesses to the corresponding remote database are different: in private
database, only the private database’s owner who has access to the conceptual schema (logical design model)
can accessdatabaseobjects;whilein publicdatabaseall usersin the physicaldatabasehaveauthorisation to use
the link to access database objects 12
.
Data Protection Acts 1988 and the Data Protection (Amendment) Act set employers and businesses obligations
on how to deal with data access and transmission related to personal data of staff and customers13
.
The European Union directive was adopted in 1995, and implemented in 200314
, regulates the processing of
personal data within the European Union. The Data Protection Directive is an important component of EU
privacy and human rights law.
9 IP covers Copyright,Patents,Trademarks, IndustrialDesigns, GeographicalIndications (wipo.com)
10 http://www.wipo.int/about-ip/en/
11 http://www.answers.com/topic/software-copyright
12 https://community.oracle.com/thread/686026?tstart=0
13 http://www.lawyer.ie/labour-law-1/data-protection#sthash.4Ym5eJ1f.dpuf
14 officially Directive95/46/EC on the protection ofindividuals withregardto theprocessing ofpersonal data andon thefree movement ofsuchdata)
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
9
 Describe EU directive on privacy
On 25 January 2012, the European Commission unveiled a draft European General Data Protection Regulation
that will supersede the Data Protection Directive15
This major reform of the EU legal framework on the
protection of personal data will strengthen individual rights and tackle the challenges of globalisation and new
technologies notably through:
 The right to be forgotten
 Access to personal data
 Information about data breaches that could adversely affect customers
 Data protection safeguards built-in into products/services as default setting.
VI. Ergonomics & computer system design
Ergonomics is the study of how a workplace, the equipment used and the work environment itself can best be
designed for comfort, efficiency, safety and productivity.
Below illustrates three potential postures and related problems16
:
Too high, too low or in the lap, a laptop can affect the body17
.
Keyboard and computermonitorshould bedirectly in frontof the user atthe appropriateheight and adjusted to
match his/her specific physical requirements.
15 http://en.wikipedia.org/wiki/Data_Protection_Directive
16 Griffin, Timothy,"The AdaptiveLaptop". October,2001. Timothy Griffin, IndustrialDesign Program, The University ofCalgary.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
10
VII. Data Processing activities Map.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
11
VIII. Research safely Internet using information communication technology (ICT)
ICTs include computers, the Internet, broadcasting and integrated technologies (instant presence information,
video, and telephony -VOIP) to create, store, communicate and manage information.
CDETB website ismade /secured by: http://www.biznetiis.com18
18 http://www.biznetiis.com/Who-We-Are/Quality-Standards.aspx
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
12
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
13
Along with the ISO standards, some protective measures to secure CDETB website and data are implemented
within the network and on each location:
Anti-virus
Common security threats are Malicious code (worms, Trojan, viruses, spyware), denial of service attack
(overwhelming a networkwithmassivecommunication),spoofing(phishing,scam,man-in–the-middle) and Anti-
virus, anti-spyware and anti-adware can stop them.
Other specific tools:
- Built-in firewalls: create Inbound/outbound rules to HTTP conversation to identify and block attacks.
- OS Update
- Network isolation (Subnetting) avoids internal data access.
- Data encryption using symmetric and asymmetric keys.
- Securing authentication with Smartcards, biometrics controls and digital print.
For studentsfollowingcourses,verifying information from the Internet is crucial, therefore Search needs to be
made in order to find out if:
 The author qualified to write on the given topic
 The purpose is dealt by experts
 The information is objective, impartial?
 The information is accurate, factual, up-to-date and clearly sourced, which means also that the
Reliability/Credibility/ Legitimacy should be verified outside of the Internet.
Business Management FETAC MINORLevel 5
Information and Communication Systems AISCode:5N1952
Yasmina Rayeh 05/08/14
14

More Related Content

What's hot

Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31
Alexis Chua
 
13099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part213099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part2
Ngaire Taylor
 
Managing International Information Systems
Managing International Information Systems Managing International Information Systems
Managing International Information Systems
Mostafa Ewees
 
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMMis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
pankaj pandey
 

What's hot (20)

IT class IV - ICAB PS-KL
IT class IV - ICAB PS-KLIT class IV - ICAB PS-KL
IT class IV - ICAB PS-KL
 
Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31
 
Types of Information Systems
Types of Information SystemsTypes of Information Systems
Types of Information Systems
 
Information Systems
Information SystemsInformation Systems
Information Systems
 
Mangement Information Systems
Mangement Information SystemsMangement Information Systems
Mangement Information Systems
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
13099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part213099838 management-information-system-unit1-part2
13099838 management-information-system-unit1-part2
 
Cbis
CbisCbis
Cbis
 
Mis model
Mis modelMis model
Mis model
 
Information systems and its components 1
Information systems and its components 1Information systems and its components 1
Information systems and its components 1
 
Managing International Information Systems
Managing International Information Systems Managing International Information Systems
Managing International Information Systems
 
Bis Chapter6
Bis Chapter6Bis Chapter6
Bis Chapter6
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Master of business administration m.i.s
Master of business administration  m.i.sMaster of business administration  m.i.s
Master of business administration m.i.s
 
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEMMis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
Mis project report on DELHI INFO.COM MANAGEMENT INFORMATION SYSTEM
 
Lecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information SystemLecture #1 - Introduction to Information System
Lecture #1 - Introduction to Information System
 
Computer Based Information System
Computer Based Information SystemComputer Based Information System
Computer Based Information System
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components ii
 
Mis notes unit 4
Mis notes unit 4Mis notes unit 4
Mis notes unit 4
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systems
 

Similar to Information and communication systems

Information Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessInformation Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its Usefulness
Diane Allen
 
Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02
Sanya Sharma
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).ppt
khawlamuseabd
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information Systems
Ram Dutt Shukla
 

Similar to Information and communication systems (20)

information system and computers
information system and computersinformation system and computers
information system and computers
 
M is details (1)
M is details (1)M is details (1)
M is details (1)
 
Information Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its UsefulnessInformation Retrieval And Evaluating Its Usefulness
Information Retrieval And Evaluating Its Usefulness
 
System Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docxSystem Analysis and Design chap 1 to 8.docx
System Analysis and Design chap 1 to 8.docx
 
BIS-bit (1).pdf
BIS-bit (1).pdfBIS-bit (1).pdf
BIS-bit (1).pdf
 
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
206 - Management Information System [Unit 1: Introduction] [BBA II, Rajasthan...
 
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdfSYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
SYBCA SEM 4 VNSGU INFORMATION SYSTEM.pdf
 
Effect of management_information
Effect of management_informationEffect of management_information
Effect of management_information
 
Software Project Implementation
Software Project Implementation Software Project Implementation
Software Project Implementation
 
Chapter One.pdf
Chapter One.pdfChapter One.pdf
Chapter One.pdf
 
ERP and related technology
ERP and related technology ERP and related technology
ERP and related technology
 
CHP-3ERP and Related Technologies(1).ppt
CHP-3ERP and Related Technologies(1).pptCHP-3ERP and Related Technologies(1).ppt
CHP-3ERP and Related Technologies(1).ppt
 
Information Systems and Knowledge Management
 Information Systems and Knowledge Management Information Systems and Knowledge Management
Information Systems and Knowledge Management
 
Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2Lo3=p4, p5, m2, d2
Lo3=p4, p5, m2, d2
 
Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02Eisdss 131005141822-phpapp02
Eisdss 131005141822-phpapp02
 
CHP-3ERP and Related Technologies.ppt
CHP-3ERP and Related Technologies.pptCHP-3ERP and Related Technologies.ppt
CHP-3ERP and Related Technologies.ppt
 
Ch01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).pptCh01 The Information Sys (Accountant's Perspective).ppt
Ch01 The Information Sys (Accountant's Perspective).ppt
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information Systems
 
Mis
MisMis
Mis
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2
 

More from Yasmina Rayeh

More from Yasmina Rayeh (10)

Roles and objectives in performance management - Supervisory Skills -Yasmina ...
Roles and objectives in performance management - Supervisory Skills -Yasmina ...Roles and objectives in performance management - Supervisory Skills -Yasmina ...
Roles and objectives in performance management - Supervisory Skills -Yasmina ...
 
Supervisory skills
Supervisory skillsSupervisory skills
Supervisory skills
 
AIS Code: 6N3325 Training Needs Identification and Design Training Needs A...
AIS Code: 6N3325  Training Needs  Identification and Design  Training Needs A...AIS Code: 6N3325  Training Needs  Identification and Design  Training Needs A...
AIS Code: 6N3325 Training Needs Identification and Design Training Needs A...
 
Business environment | case study: Company Type in Ireland - Yasmina Rayeh
Business environment |  case study: Company Type in Ireland - Yasmina RayehBusiness environment |  case study: Company Type in Ireland - Yasmina Rayeh
Business environment | case study: Company Type in Ireland - Yasmina Rayeh
 
Change management - HRM - Conflict resolution - Case Study: Renault
Change management  - HRM - Conflict resolution - Case Study: RenaultChange management  - HRM - Conflict resolution - Case Study: Renault
Change management - HRM - Conflict resolution - Case Study: Renault
 
Louis vuitton MARKETING MANAGEMENT PROCESS
Louis vuitton MARKETING MANAGEMENT PROCESSLouis vuitton MARKETING MANAGEMENT PROCESS
Louis vuitton MARKETING MANAGEMENT PROCESS
 
Business management 1 A
Business management 1 A Business management 1 A
Business management 1 A
 
Business management - Yasmina Rayeh
Business management - Yasmina RayehBusiness management - Yasmina Rayeh
Business management - Yasmina Rayeh
 
BUSINESS MANAGEMENT 6N4310 - 2 - 2014
BUSINESS MANAGEMENT 6N4310 - 2 - 2014BUSINESS MANAGEMENT 6N4310 - 2 - 2014
BUSINESS MANAGEMENT 6N4310 - 2 - 2014
 
Louis vuitton - strategic process management
Louis vuitton - strategic process managementLouis vuitton - strategic process management
Louis vuitton - strategic process management
 

Recently uploaded

一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
MAQIB18
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
ewymefz
 

Recently uploaded (20)

Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
Uber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis ReportUber Ride Supply Demand Gap Analysis Report
Uber Ride Supply Demand Gap Analysis Report
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单
 

Information and communication systems

  • 1. Information & Communication Systems FETAC MinorLevel 5 - AIS code:5N1952 Analyse of a computer-based information system used in the work environment detailing inputs to the system, methods of processing, and information produced in the form of report. YasminaRayeh 8/5/2014 1589 words
  • 2. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 1 Contents I. Data and information............................................................................................................................2 II. Information flows .................................................................................................................................4 III. The functions of the Main Components of a computer Processing System.................................................6 IV. File Organization Structures...................................................................................................................6 V. File Organization Structures...................................................................................................................8 VI. Ergonomics & computer system design ..................................................................................................9 VII. Data Processing activities Map. ...........................................................................................................10 VIII. Research safely Internet using information communication technology (ICT) ..........................................11
  • 3. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 2 I. Data and information A ComputerBased Information System(CBIS) helpsprocessing data followingrequirementsand procedures (strategies,rules,policies and methods)1 .Thisstudy underlinesvariousCBISaspectsproviding description on its functionalitiesand utilities.  Relationship between data and information The difference between "data" and "information" lies in the way they are used. Data is qualified as "raw material" such as numbers, words, symbols, that needs to be processed in useful hind sights. Information involves the communication and reception of knowledge: Data are compiled/processed in meaningful information for specific purposes that can be used in an organisation to allow planning, recording, controlling, measuring and making specific decisions; hence the need for "data processing". Sound, measurement, articles or pictures are information.  Examples Data Information Messages converted into electrical or optical signals Content of a conversation A set of namesand addresseswritten outon to formsready for typing A list of names and addresses  Attributes of information Accessible Accuracy Reliable Detailed Relevant Easy to access Represents the factual situation Froma verifiable source should be at a level of detail that allows readability The required information leads to improved decision making  Reports Identification steps - Operation processes. 1 http://www.slideshare.net/jandian/computer-based-information-system
  • 4. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 3  Flow chart As described, each departmentneedsto report to the upper level of the hierarchy. Therefore gathering and processing data is crucial. Processes, people and a CBIS are in place to facilitate reporting that includes all identified steps and resources.
  • 5. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 4 II. Information flows  How information differs across management levels Communication flows at each stage of the organisation and might be different from one department to another2 . Each department(human resource,financial,marketing,operations…) needs to compile information in order to manage efficiently and effectively their tasks and the whole business. Examples: Fromthe upperlevel (leadership),through themanagement, to thelowest level (workforce), and vice versa a clear communication process needs to be defined in order to deliver the vision and value, enhance the profitability of the business. In this process, procedures and feedback allow verification and correction when necessary. ECTDB follow a typical administration schema where several levels of hierarchy are involved, but the communication flowbetween theleaders,managers, related Government bodies, and employees is complex and ruled by strict protocols. However as training centre abides by laws, this heavy structure comply with all prerogatives determined by the Irish regulations. This is an administration with a lot of written communication running at all level of the hierarchy with plenty of reports done. 2 Private Limited Company (Ltd), Public Limited Company (PLC) or Voluntary Organization: seeCRO.ie
  • 6. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 5  Type of information3 : Operational –routine tasks Tactical – non routine tasks Strategic – decision making Management information system (MIS) Decision support system (DSS) Executiveinformation system (EIS)  Evaluation tool: comparison. Evaluation and comparison tools help decision-making to prioritize decisions and vision4 when studying criteria and evaluating data, report or project results. CDETB has for instance chosen Do-IT Profilers that provides a two-way flow of information5 ensuring that the tool is ‘fit for purpose'. For the course,CDETB interview potentialusersto find outabout their experience and expectations. Meanwhile CDETB refers to the Labour Market Trends in order to refine requirements and foresee courses in ad equation with the demand.  Motivation tool: feedback. Feedbacks allow a better communication between all levels of the hierarchy as it clarifies, improves, informs on how the organisation is or should be working. The SMART tool is one of the tools used to set goals and performance objectives: Specific - Objectives must be very specific so each person understands what is expected. Measurable - quantitative or qualitative Achievable - Employees must be able to reach the objectives. Relevant - Objectives must be relevant to their wants, needs, and beliefs. Timely - current feedback is more effective as deadlines measure tasks accomplishment.  Management is accountable for the well-being of the organisation and is in charge of “the process of dealing with or controlling things or people” 6 , therefore needs to determine any issues (for which they are accountable too) is possiblewith reporting on regularbasis;reporting factsdetermine new actions or corrections and allows further hindsight that can be elevated to the upper hierarchical level, which decide further processes after analyses. 3 http://catalog.flatworldknowledge.com/bookhub/reader/7?e=collins-ch15_s03 4 Nancy R. Tague’s TheQuality Toolbox, Second Edition,ASQQuality Press, 2004. 5 http://www.doitprofiler.com/education/case-studies.aspx 6 http://www.oxforddictionaries.com/definition/english/management
  • 7. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 6 III. The functions of the Main Components of a computer Processing System IV. File Organization Structures  The difference between static and dynamic data Static data (i.e.in a list) stay the same whilst dynamic data (in a form) can be reassigned or altered.  The main data collection methods are7 :  Registration: full enumeration.  Questionnaires: completed by respondents.  Interviews: completed with the respondent.  Direct observations: direct measurements.  Reporting: analyse activities.  Data verification and validation is used “to evaluate whether data has been generated according to specifications, satisfies acceptance criteria, and are appropriate and consistent with their intended use”8 . Data verification is the systematic process for evaluating performance and compliance of a set of data and checking if data conforms to specification standards (complete, correct, and consistent). Data validation (datavetting, data cleaning) uses specifications to ascertain the usability of the data in light of its measurement quality objectives and to ensure that results obtained are scientifically defensible. 7 http://www.fao.org/docrep/003/x2465e/x2465e09.htm 8 http://www.epa.gov/QUALITY/vandv.html
  • 8. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 7  The difference between single- and multi-user environments A single-useroperating systemisa system in which only oneuser can access the computer system at a time (e.g. MicrosoftWindows) whilea multi-user environment design is more complex allowing a multi-connection access to a computer at the same or different time.  Data security means the protection of data. Security involves protecting data and software from being lost / destroyed / corrupted / modified or disclosed (unauthorised access) Data integrity means accuracy and completeness Preserving data: Archives and back-up system are commonly used to prevent breach of security. A backup file allows a safe copy of the original one. Other safeguards include: Password to individual files Dataencryption:useof secret keysto codeand decodedata so thatit is unreadableby anyone elsewho doesnot have the ‘key’.
  • 9. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 8 V. File Organization Structures Copyright under Intellectual property (IP) rights 9 jurisdiction confers an automatic protection on an original literary, scientific, artistic work or commercial creation of mind. Protected by national and International laws, IP rights cover financial aspects with royalties, but also a recognition status for the creator10 . Software copyright is the extension of copyright law to machine-readable software and is used by proprietary software companies to prevent piracy (unauthorized copying) that induce a loss of incomes11 . PRIVATE database creates a proprietary link in a specific schema of the local database while Public creates a database-wide link. The authorisation accesses to the corresponding remote database are different: in private database, only the private database’s owner who has access to the conceptual schema (logical design model) can accessdatabaseobjects;whilein publicdatabaseall usersin the physicaldatabasehaveauthorisation to use the link to access database objects 12 . Data Protection Acts 1988 and the Data Protection (Amendment) Act set employers and businesses obligations on how to deal with data access and transmission related to personal data of staff and customers13 . The European Union directive was adopted in 1995, and implemented in 200314 , regulates the processing of personal data within the European Union. The Data Protection Directive is an important component of EU privacy and human rights law. 9 IP covers Copyright,Patents,Trademarks, IndustrialDesigns, GeographicalIndications (wipo.com) 10 http://www.wipo.int/about-ip/en/ 11 http://www.answers.com/topic/software-copyright 12 https://community.oracle.com/thread/686026?tstart=0 13 http://www.lawyer.ie/labour-law-1/data-protection#sthash.4Ym5eJ1f.dpuf 14 officially Directive95/46/EC on the protection ofindividuals withregardto theprocessing ofpersonal data andon thefree movement ofsuchdata)
  • 10. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 9  Describe EU directive on privacy On 25 January 2012, the European Commission unveiled a draft European General Data Protection Regulation that will supersede the Data Protection Directive15 This major reform of the EU legal framework on the protection of personal data will strengthen individual rights and tackle the challenges of globalisation and new technologies notably through:  The right to be forgotten  Access to personal data  Information about data breaches that could adversely affect customers  Data protection safeguards built-in into products/services as default setting. VI. Ergonomics & computer system design Ergonomics is the study of how a workplace, the equipment used and the work environment itself can best be designed for comfort, efficiency, safety and productivity. Below illustrates three potential postures and related problems16 : Too high, too low or in the lap, a laptop can affect the body17 . Keyboard and computermonitorshould bedirectly in frontof the user atthe appropriateheight and adjusted to match his/her specific physical requirements. 15 http://en.wikipedia.org/wiki/Data_Protection_Directive 16 Griffin, Timothy,"The AdaptiveLaptop". October,2001. Timothy Griffin, IndustrialDesign Program, The University ofCalgary.
  • 11. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 10 VII. Data Processing activities Map.
  • 12. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 11 VIII. Research safely Internet using information communication technology (ICT) ICTs include computers, the Internet, broadcasting and integrated technologies (instant presence information, video, and telephony -VOIP) to create, store, communicate and manage information. CDETB website ismade /secured by: http://www.biznetiis.com18 18 http://www.biznetiis.com/Who-We-Are/Quality-Standards.aspx
  • 13. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 12
  • 14. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 13 Along with the ISO standards, some protective measures to secure CDETB website and data are implemented within the network and on each location: Anti-virus Common security threats are Malicious code (worms, Trojan, viruses, spyware), denial of service attack (overwhelming a networkwithmassivecommunication),spoofing(phishing,scam,man-in–the-middle) and Anti- virus, anti-spyware and anti-adware can stop them. Other specific tools: - Built-in firewalls: create Inbound/outbound rules to HTTP conversation to identify and block attacks. - OS Update - Network isolation (Subnetting) avoids internal data access. - Data encryption using symmetric and asymmetric keys. - Securing authentication with Smartcards, biometrics controls and digital print. For studentsfollowingcourses,verifying information from the Internet is crucial, therefore Search needs to be made in order to find out if:  The author qualified to write on the given topic  The purpose is dealt by experts  The information is objective, impartial?  The information is accurate, factual, up-to-date and clearly sourced, which means also that the Reliability/Credibility/ Legitimacy should be verified outside of the Internet.
  • 15. Business Management FETAC MINORLevel 5 Information and Communication Systems AISCode:5N1952 Yasmina Rayeh 05/08/14 14