Beruflich Dokumente
Kultur Dokumente
Unit 2
Unit 2
Structure
2.0 Introduction
2.1 Data, Information and Knowledge
Interrelationship, differences and characteristics
2.2 Data Meaning, Definition and types
Importance of Data in Managerial Process
2.3 Information Meaning, Definition, Changing concepts
Types and quality
2.4 Data / Information Processing Cycle
2.5 Data / Information Security, Cyber Security
2.6 Knowledge Meaning, Definition, Types
2.7 Summary
191
Unit 2
2.0 Introduction
In the earlier unit, you came to know about Information Technology conceptual basis, definition, components, and application areas;
developments in computer hardware, software and their role in digital
transformation; developments in Telecommunication technology and
convergence of technologies.
Data are values of qualitative or quantitative variables, belonging to a set of
items. Data are typically the results of measurements and can be visualized
using graphs or images. Information, in its most restricted technical sense,
is a sequence of symbols that can be interpreted as a message. Information
can be recorded as signs, or transmitted as signals. Information is any kind
of event that affects the state of a dynamic system. Knowledge is a
familiarity with someone or something, which can include facts, information,
descriptions, or skills acquired through experience or education. It can refer
to the theoretical or practical understanding of a subject. It can be implicit
(as with practical skill or expertise) or explicit (as with the theoretical
understanding of a subject); and it can be more or less formal or systematic.
(http://www.landcareresearch.co.nz/research/sustainablesoc/social/images/da
taknowledgesmall.gif)
192
Unit 2
In this unit, we appreciate the interrelation between Data-InformationKnowledge dimensions; their types, interrelationship, differences and
characteristics; their importance in managerial process; processing cycle &
security aspects of data & information. For a better understanding of this
unit, prior knowledge about the Information Technology for Management is
recommended.
Objectives:
After studying this unit, you should be able to:
Explain the terms data, information, and knowledge
Appreciate the interrelation between the above terms
Understand the importance of data in managerial process
Explain the data/information processing cycle & security aspects
193
Unit 2
(http://ww w.viktoria.se/~dixi/img/dik-table.gif)
Interrelationship, differences and characteristics
194
Unit 2
The terms data, information and knowledge are frequently used for
overlapping concepts. The main difference is in the level of abstraction
being considered. Data is the lowest level of abstraction, information is the
next level, and finally, knowledge is the highest level among all three. Data
on its own carries no meaning. For data to become information, it must be
interpreted and take on a meaning. For example, the height of Mt. Everest is
generally considered as "data", a book on Mt. Everest geological
characteristics may be considered as "information", and a report containing
practical information on the best way to reach Mt. Everest's peak may be
considered as "knowledge".
(http://www.systems-thinking.org/dikw/dikw1.gif)
Information as a concept bears a diversity of meanings, from everyday
usage to technical settings. Generally speaking, the concept of information
is closely related to notions of constraint, communication, control, data,
form, instruction, knowledge, meaning, mental stimulus, pattern, perception,
and representation.
It is people and computers who collect data and impose patterns on it.
These patterns are seen as information which can be used to enhance
knowledge. These patterns can be interpreted as truth, and are authorized
as aesthetic and ethical criteria. Events that leave behind perceivable
physical or virtual remains can be traced back through data. Marks are no
longer considered data once the link between the mark and observation is
broken.
195
Unit 2
(http://www.trainmor-knowmore.eu/img/1.3.1.jpg)
196
Unit 2
197
Unit 2
Ratio
In a ratio scale, numbers can be compared as multiples of one another.
Thus one person can be twice as tall as another person. Important also, the
number zero has meaning. Thus the difference between a person of 35 and
a person 38 is the same as the difference between people who are 12 and
15. A person can also have an age of zero.
Ratio data can be multiplied and divided because not only is the difference
between 1 and 2 the same as between 3 and 4, but also that 4 is twice as
much as 2. Interval and ratio data measure quantities and hence are
quantitative. Because they can be measured on a scale, they are also called
scale data. Example: a person's weight; the number of pizzas I can eat
before fainting.
(http://www.socialresearchmethods.net/kb/Assets/images/measlev2.gif)
Parametric vs. Non-parametric
Interval and ratio data are parametric, and are used with parametric tools in
which distributions are predictable (and often Normal). Nominal and ordinal
data are non-parametric, and do not assume any particular distribution.
They are used with non-parametric tools such as the Histogram.
Continuous and Discrete
198
Unit 2
199
Unit 2
200
Unit 2
(http://www.jbase.com/new/products/databases.jpg)
201
Unit 2
202
Unit 2
(http://www.emeraldinsight.com/content_images/fig/0291030701002.png)
"Information quality" is a measure of the value which the information
provides to the user of that information. "Quality" is often perceived as
subjective and the quality of information can then vary among users and
among uses of the information. Nevertheless, a high degree of quality
increases its objectivity or at least the inter-subjectivity. Accuracy can be
seen as just one element of IQ but, depending upon how it is defined, can
also be seen as encompassing many other dimensions of quality.
If not, it is perceived that often there is a trade-off between accuracy and
other dimensions, aspects or elements of the information determining its
suitability for any given tasks. A list of dimensions or elements used in
assessing subjective Information Quality is:
Intrinsic IQ: Accuracy, Objectivity, Believability, Reputation
Contextual
IQ:
Relevancy,
Value-Added,
Timeliness,
Completeness, Amount of information
Representational IQ: Interpretability, Ease of understanding,
Concise representation, Consistent representation
Accessibility IQ: Accessibility, Access security
Proposed Quality Metrics
Authority/Verifiability: Authority refers to the expertise or
recognized official status of a source. Consider the reputation of the
author and publisher. When working with legal or government
information, consider whether the source is the official provider of
203
Unit 2
204
Unit 2
Collection
Data originates in the form of events transaction or some observations. This
data is then recorded in some usable form. Data may be initially recorded
on paper source documents and then converted into a machine usable form
for processing. Alternatively, they may be recorded by a direct input device
in a paperless, machine-readable form. Data collection is also termed as
data capture.
205
Unit 2
Conversion
Once the data is collected, it is converted from its source documents to a
form that is more suitable for processing. The data is first codified by
assigning identification codes. A code comprises of numbers, letters, special
characters, or a combination of these. For example, an employee may be
allotted a code as 52-53-162, his category as A class, etc. It is useful to
codify data, when data requires classification. To classify means to
categorize, i.e., data with similar characteristics are placed in similar
categories or groups. For example, one may like to arrange accounts data
according to account number or date. Hence a balance sheet can easily be
prepared.
After classification of data, it is verified or checked to ensure the accuracy
before processing starts. After verification, the data is transcribed from one
data medium to another. For example, in case data processing is done
using a computer, the data may be transformed from source documents to
machine sensible form using magnetic tape or a disk.
Manipulation
Once data is collected and converted, it is ready for the manipulation
function which converts data into information. Manipulation consists of
following activities:
Sorting: It involves the arrangement of data items in a desired
sequence. Usually, it is easier to work with data if it is arranged in a
logical sequence. Most often, the data are arranged in alphabetical
sequence. Sometimes sorting itself will transform data into
information. For example, a simple act of sorting the names in
alphabetical order gives meaning to a telephone directory. The
directory will be practically worthless without sorting.
Business data processing extensively utilizes sorting technique.
Virtually all the records in business files are maintained in some
logical sequence. Numeric sorting is common in computer-based
processing systems because it is usually faster than alphabetical
sorting.
Calculating: Arithmetic manipulation of data is called calculating.
Items of recorded data can be added to one another, subtracted,
divided or multiplied to create new data. Calculation is an integral
part of data processing. For example, in calculating an employee's
pay, the hours worked multiplied by the hourly wage rate gives the
206
Unit 2
207
Unit 2
208
Unit 2
Processing
The term processing denotes the actual data manipulation techniques such
as classifying, sorting, calculating, summarizing, comparing, etc. that
convert data into information.
Output
It is a communication function which transmits the information, generated
after processing of data, to persons who need the information. Sometimes
output also includes decoding activity which converts the electronically
generated information into human-readable form.
Storage
It involves the filing of data and information for future use. The above
mentioned four basic functions are performed in a logical sequence as
shown in above figure in all data processing systems.
2.5 Information Security
Information security means protecting information and information systems
from unauthorized access, use, disclosure, disruption, modification, perusal,
inspection, recording or destruction. The terms information security,
computer security and information assurance are frequently used
interchangeably. These fields are interrelated often and share the common
209
Unit 2
210
Unit 2
For over twenty years, information security has held confidentiality, integrity
and availability (known as the CIA triad) to be the core principles of
information security.
Confidentiality
Confidentiality is the term used to prevent the disclosure of information to
unauthorized individuals or systems. For example, a credit card transaction
on the Internet requires the credit card number to be transmitted from the
buyer to the merchant and from the merchant to a transaction processing
network. The system attempts to enforce confidentiality by encrypting the
card number during transmission, by limiting the places where it might
appear (in databases, log files, backups, printed receipts, and so on), and
by restricting access to the places where it is stored. If an unauthorized
party obtains the card number in any way, a breach of confidentiality has
occurred.
Integrity
In information security, integrity means that data cannot be modified
undetectably. This is not the same thing as referential integrity in databases,
although it can be viewed as a special case of Consistency as understood in
the classic ACID model of transaction processing. Integrity is violated when
a message is actively modified in transit. Information security systems
typically provide message integrity in addition to data confidentiality.
Availability
For any information system to serve its purpose, the information must be
available when it is needed. This means that the computing systems used to
store and process the information, the security controls used to protect it,
and the communication channels used to access it must be functioning
correctly. High availability systems aim to remain available at all times,
preventing service disruptions due to power outages, hardware failures, and
system upgrades. Ensuring availability also involves preventing denial-ofservice attacks.
Authenticity
In computing, e-Business, and information security, it is necessary to ensure
that the data, transactions, communications or documents (electronic or
211
Unit 2
212
Unit 2
access to what they need; that important knowledge is stored; and that the
knowledge is reviewed, updated, or discarded.
Many theoreticians regard explicit knowledge as being less important (e.g.
Brown & Duguid 1991, Cook & Brown 1999, Bukowitz & Williams 1999,
etc.). It is considered simpler in nature and cannot contain the rich
experience based know-how that can generate lasting competitive
advantage.
Although this is changing to some limited degree, KM initiatives driven by
technology have often had the flaw of focusing almost exclusively on this
type of knowledge. As discussed previously, in fields such as IT there is
often a lack of a more sophisticated definition. This has therefore created
many products labeled as KM systems, which in actual fact are/were
nothing more than information and explicit knowledge management
software. Explicit knowledge is found in: databases, memos, notes,
documents, etc. (Botha et al. 2008)
Tacit (Embodied) Knowledge
This type of knowledge was originally defined by Polanyi in 1966. It is
sometimes referred to as know-how (Brown & Duguid 1998) and refers to
intuitive, hard to define knowledge that is largely experience based.
Because of this, tacit knowledge is often context dependent and personal in
nature. It is hard to communicate and deeply rooted in action, commitment,
and involvement (Nonaka 1994).
Tacit knowledge is also regarded as being the most valuable source of
knowledge, and the most likely to lead to breakthroughs in the organization
(Wellman 2009). Gamble & Blackwell (2001) link the lack of focus on tacit
knowledge directly to the reduced capability for innovation and sustained
competitiveness. KMS have a very hard time handling this type of
knowledge. An IT system relies on codification, which is something that is
difficult / impossible for the tacit knowledge holder.
Using a reference by Polanyi (1966), imagine trying to write an article that
would accurately convey how one reads facial expressions. It should be
quite apparent that it would be near impossible to convey our intuitive
understanding gathered from years of experience and practice. Virtually all
practitioners rely on this type of knowledge. An IT specialist for example will
troubleshoot a problem based on his experience and intuition. It would be
213
Unit 2
very difficult for him to codify his knowledge into a document that could
convey his know-how to a beginner. This is one reason why experience in a
particular field is so highly regarded in the job market.
The exact extent to which IT systems can aid in the transfer and
enhancement of tacit knowledge is a rather complicated discussion. For
now, suffice it to say that successful KM initiatives must place a very strong
emphasis on the tacit dimension, focusing primarily on the people involved,
and they must understand the limitations imposed by computerized
systems.
Tacit knowledge is found in: the minds of human stakeholders. It includes
cultural beliefs, values, attitudes, mental models, etc. as well as skills,
capabilities and expertise (Botha et al 2008). On this site, I will generally
limit tacit knowledge to knowledge embodied in people, and refer separately
to embedded knowledge (as defined below), whenever making this
distinction is relevant.
(http://www.cognitivedesignsolutions.com/images/ExplicitTacitIceberg.jpg)
Embedded Knowledge
214
Unit 2
2.7 Summary
Let us sum up what we have discussed in this unit.
215
Unit 2
216