Global Information
0.0 / 5
- Created by: base12
- Created on: 05-01-22 11:23
Information Styles
Text, Graphics
Video, Animated Graphics
Numerical, Audio
Textile Image, Subtitles
Tables and spreadsheets
Braille, Boolean
Graphs and charts
Video, Animated Graphics
Numerical, Audio
Textile Image, Subtitles
Tables and spreadsheets
Braille, Boolean
Graphs and charts
1 of 38
Information classification
Sensitive, non-sensitive
private, public
personal, business
confidential, classified
anonymized
private, public
personal, business
confidential, classified
anonymized
2 of 38
Information categories
Communication
Education and training
Entertainment
Planning
Financial
Research
Location dependent
Education and training
Entertainment
Planning
Financial
Research
Location dependent
3 of 38
Information formats
Web pages
Blogs
Podcast
Streamed audio and video
Social media channels
Emails
Document stores
RSS feed
Blogs
Podcast
Streamed audio and video
Social media channels
Emails
Document stores
RSS feed
4 of 38
Data types and sources
External and internal
Primary and secondary
Qualitative and quantitative
Primary and secondary
Qualitative and quantitative
5 of 38
External Source
Information outside of an organisation:
Government reports
Financial data
Competitors
Price list from suppliers
Government reports
Financial data
Competitors
Price list from suppliers
6 of 38
Internal Source
Information within an organisation:
Financial reports
Data analysis
Employee surveys
Financial reports
Data analysis
Employee surveys
7 of 38
Primary Data
Collected by yourself or another employee within an organisation.
8 of 38
Secondary Data
Collected by someone outside of the organisation
9 of 38
Qualitative Data
Descriptive data often composed of text that can be observed but not measured.
10 of 38
Quantitative Data
Measured data often in the form of numbers, percentage or statistics.
11 of 38
Information systems
Open Information System (OIS)
Close Information System (CIS)
Close Information System (CIS)
12 of 38
Open Information System (OIS)
Interact with other information system to exchange data even from different platforms.
Risk of data loss and/or hacking
Risk of data loss and/or hacking
13 of 38
Close Information System (CIS)
System is private and cannot exchange data with other systems.
Access limited but it is so much more secure.
Access limited but it is so much more secure.
14 of 38
Holders of Information
Business, Government
Individual, Education
Healthcare, Charity &Community
Individual, Education
Healthcare, Charity &Community
15 of 38
Comparison of locations
Developed vs. Developing Countries
Urban vs. rural
Internet Access from remote location
Urban vs. rural
Internet Access from remote location
16 of 38
Storage Media
Magnetic
Optical
Solid State
Paper
Optical
Solid State
Paper
17 of 38
Access & Storage Devices
Handheld
Portable
Fixed
Shared
Portable
Fixed
Shared
18 of 38
WWW Technologies
World Wide Web
World Wide Web
Internet
Intranet
Extranet
Intranet
Extranet
19 of 38
Network Characteristics
Speed
Security
Access Levels
Accessibility
Security
Access Levels
Accessibility
20 of 38
Information Formats
Web Pages
Blogs
Podcast
Streamed Audio & Video
Social Media Channels
Emails
Document Stores
RSS Feeds
Blogs
Podcast
Streamed Audio & Video
Social Media Channels
Emails
Document Stores
RSS Feeds
21 of 38
Internet
Advantage for Individuals
Advantage for Individuals
Increased speed of personal communication
easy access to information
24/7 access to services
social interaction with others
easy access to information
24/7 access to services
social interaction with others
22 of 38
Internet
Disadvantage for Individuals
Disadvantage for Individuals
Potential for identity theft
Cost of connection and services
source of distraction
cyberbullying and trolling
spreading misinformation
Cost of connection and services
source of distraction
cyberbullying and trolling
spreading misinformation
23 of 38
Internet
Advantage for Organisation
Advantage for Organisation
share data quickly globally
online services always available
easy internal communication
open up the workplace
online services always available
easy internal communication
open up the workplace
24 of 38
Internet
Disadvantage for Organisation
Disadvantage for Organisation
Malicious attacks and threats
cost of maintaining services
reputation and controversies
cost of maintaining services
reputation and controversies
25 of 38
Information Characteristics
Valid
Biased
Reliable
Relevant
Accurate
Biased
Reliable
Relevant
Accurate
26 of 38
Data
unprocessed facts or statistics that have no context
27 of 38
Information
data that has been processed organised and structured into contect
28 of 38
Stages of Data Analysis
Identify the need
Define the scope
Identify potential sources
Source and select information
Select the most appropriate tools
Process and analyse data
Record and store information
Share result
Define the scope
Identify potential sources
Source and select information
Select the most appropriate tools
Process and analyse data
Record and store information
Share result
29 of 38
UK Legislations
Data Protection Act (2018)/GDPR
Computer Misuse Act (1990)
Freedom of Information Act (2000)
Regulation of Investigatory Powers Act (20000)
Copyright, Design & Patents Act (1988)
Information Commissioner's Office (ICO) Codes of Practice, Protection of Fre
Computer Misuse Act (1990)
Freedom of Information Act (2000)
Regulation of Investigatory Powers Act (20000)
Copyright, Design & Patents Act (1988)
Information Commissioner's Office (ICO) Codes of Practice, Protection of Fre
30 of 38
Global Legislation
Data Protection Outside of the UK
EU-US Privacy Shield
UNCRPD
EU-US Privacy Shield
UNCRPD
31 of 38
Data Flow Diagram
External Entity
Process
Data Flow
Data Store
Process
Data Flow
Data Store
32 of 38
Security Principles
Confidentiality
Integrity
Availability
Integrity
Availability
33 of 38
Risks
Unauthorised Access to Data
Accidental Loss of Data
Intentional Destruction of Data
Intentional Tampering with Data
Accidental Loss of Data
Intentional Destruction of Data
Intentional Tampering with Data
34 of 38
Impacts
Loss of Intellectual Property
Loss of Service and Access
BReach of Confidential Information
Loss of Third Party Data
Loss of Reputation
Identity Theft
Threat to National Security
Recent Examples of Security Failure
Loss of Service and Access
BReach of Confidential Information
Loss of Third Party Data
Loss of Reputation
Identity Theft
Threat to National Security
Recent Examples of Security Failure
35 of 38
Protection Measures
Staff Responsibilities
Disaster & Recovery Planning
Assessment and Effectiveness
Disaster & Recovery Planning
Assessment and Effectiveness
36 of 38
Physical Protection
Locks
Biometrics
Security Staff
Backup
Shredding
RFID & Tokens
Biometrics
Security Staff
Backup
Shredding
RFID & Tokens
37 of 38
Logical Protection
Username and Password
Anti-Malware
Firewall
Encryption
Tiered Level of Access
Obfuscation
Anti-Malware
Firewall
Encryption
Tiered Level of Access
Obfuscation
38 of 38
Other cards in this set
Card 2
Front
Sensitive, non-sensitive
private, public
personal, business
confidential, classified
anonymized
private, public
personal, business
confidential, classified
anonymized
Back
Information classification
Card 3
Front
Communication
Education and training
Entertainment
Planning
Financial
Research
Location dependent
Education and training
Entertainment
Planning
Financial
Research
Location dependent
Back
Card 4
Front
Web pages
Blogs
Podcast
Streamed audio and video
Social media channels
Emails
Document stores
RSS feed
Blogs
Podcast
Streamed audio and video
Social media channels
Emails
Document stores
RSS feed
Back
Card 5
Front
External and internal
Primary and secondary
Qualitative and quantitative
Primary and secondary
Qualitative and quantitative
Back
Related discussions on The Student Room
- Royal Holloway MA Global Health, Society, Culture and Behaviour »
- KCL or Queen Mary’s UCAS »
- Advice on Communication for Social Change in Loughborough »
- Bank of America Apprenticeship »
- Warwick Global Excellence Scholarship »
- Alevel Business edexel paper 3 »
- Anyone studying global creative industries at Leeds this year? »
- A level Geography revision »
- UBS degree apprenticeship 2023 »
- AQA A Level Geography Paper 2 7037/2 - 8 Jun 2022 [Exam Chat] »
Similar Computing resources:
1.0 / 5 based on 1 rating
0.0 / 5
5.0 / 5 based on 1 rating
0.0 / 5
3.5 / 5 based on 3 ratings
4.0 / 5 based on 1 rating
0.0 / 5
0.0 / 5
0.0 / 5
0.0 / 5
Comments
No comments have yet been made