SlideShare una empresa de Scribd logo
1 de 13
Chapter 2
Introduction to
Information,
Information Science,
and Information
Systems
Data
• Raw facts
Information
• Processed data that has meaning
• Information is data that is processed using
knowledge. In order for information to be
valuable or meaningful, it must be accessible,
accurate, timely, complete, cost effective, flexible,
reliable, relevant, simple, verifiable, and secure
Data Integrity
• Refers to whole, complete, correct, and
consistent data
• Can be compromised through human
error, viruses, worms, other bugs,
hardware failures or crashes,
transmission errors, and/or hackers
entering the system
High Quality Data
• Data that are relevant and accurately
represent their corresponding concepts.
• Data are dirty when there are errors in the
database such as duplicate, incomplete, or
outdated records
The data that we process
into information must be of
high quality and integrity to
create meaning to inform
our assessments and
decision making.
Quality of Information
• Necessary for it to be valuable and
meaningful.
• Characteristics of valuable, quality information
– accessibility, security, timeliness, accuracy,
relevancy, completeness, flexibility, reliability,
objectivity, utility, transparency, verifiability, and
reproducibility
Information Science
• Science of information, studying the
application and usage of information and
knowledge in organizations and the
interfacings or interaction between people,
organizations, and information systems
• Information science enables the processing of
information
Information Science
• is a multidisciplinary science that involves aspects from
computer science, cognitive science, social science,
communication science, and library science to deal
with obtaining, gathering, organizing, manipulating,
managing, storing, retrieving, recapturing, disposing of,
distributing, or broadcasting information. Information
science studies everything that deals with information
and can be defined as the study of information
systems. This science originated as a subdiscipline of
computer science, in an attempt to understand and
rationalize the management of technology within
organizations.
Information Processing
• Is the conversion of latent information into
manifest information.
• Latent information is that which is not yet
realized or apparent
• Manifest information is obvious or clearly
apparent.
• Information science and computational tools are
extremely important in enabling the processing
of data, information, and knowledge in health
care.
Information System (IS)
• Combinations of hardware, software and
telecommunications networks that people
build and use to collect, create, and distribute
useful data, typically in organizational settings
• Can be manually based, but for the purposes
of this text, the term refers to computer-based
information systems (CBISs)
• Designed for specific purposes within
organizations
IS
• Acquires data or inputs; processes data that
consists of the retrieval, analysis, and/or
synthesis of data; disseminates or outputs in
the form of reports, documents, summaries,
alerts, prompts, and/or outcomes; and
provides for responses or feedback
IS
• Capability to disseminate, provide feedback,
and adjust the data and information based on
these dynamic processes are what sets them
apart
• should be a user-friendly entity that provides
the right information at the right time and in
the right place.
Summary
• Organizations are recognizing that their most
precious asset is their information,
represented in their employees, experience,
competence or know-how, and innovative or
novel approaches, all of which are dependent
on a robust information network that
encompasses the information technology
infrastructure.

Más contenido relacionado

La actualidad más candente

Theories, models, & frameworks
Theories, models, & frameworksTheories, models, & frameworks
Theories, models, & frameworksMinette Din
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing InformaticsJadabear06
 
nursing informatic Competency
 nursing informatic Competency nursing informatic Competency
nursing informatic CompetencySaly Hassan
 
Informatics stppt ch1
Informatics stppt ch1Informatics stppt ch1
Informatics stppt ch1angelaedgar
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksJoseph Lagod
 
Application of interpersonal theory
Application of interpersonal theoryApplication of interpersonal theory
Application of interpersonal theoryNursing Path
 
NEUMAN SYSTEMS MODEL.ppt
NEUMAN SYSTEMS MODEL.pptNEUMAN SYSTEMS MODEL.ppt
NEUMAN SYSTEMS MODEL.pptSapana Shrestha
 
Theory of transpersonal caring (jean watson )...
Theory of transpersonal caring (jean watson )...Theory of transpersonal caring (jean watson )...
Theory of transpersonal caring (jean watson )...Ahamed Masooth mohamed
 
Orem's theory of nursing
 Orem's theory of nursing Orem's theory of nursing
Orem's theory of nursingMeera Kumari
 
Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informaticsjhonee balmeo
 
betty neumann's theory
betty neumann's theorybetty neumann's theory
betty neumann's theoryMahesh kumar
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introductionIan Jasper Mangampo
 
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEMIMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEMhowell00
 
Nursing informatics Tools
Nursing informatics ToolsNursing informatics Tools
Nursing informatics ToolsSheena Patel
 
Humanistic nursing theory. ppt
Humanistic nursing theory. pptHumanistic nursing theory. ppt
Humanistic nursing theory. pptvaisakhgopakumar
 

La actualidad más candente (20)

Theories, models, & frameworks
Theories, models, & frameworksTheories, models, & frameworks
Theories, models, & frameworks
 
Nursing Process Handouts
Nursing Process HandoutsNursing Process Handouts
Nursing Process Handouts
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing Informatics
 
nursing informatic Competency
 nursing informatic Competency nursing informatic Competency
nursing informatic Competency
 
Informatics stppt ch1
Informatics stppt ch1Informatics stppt ch1
Informatics stppt ch1
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworks
 
Application
ApplicationApplication
Application
 
Application of interpersonal theory
Application of interpersonal theoryApplication of interpersonal theory
Application of interpersonal theory
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
NEUMAN SYSTEMS MODEL.ppt
NEUMAN SYSTEMS MODEL.pptNEUMAN SYSTEMS MODEL.ppt
NEUMAN SYSTEMS MODEL.ppt
 
Theory of transpersonal caring (jean watson )...
Theory of transpersonal caring (jean watson )...Theory of transpersonal caring (jean watson )...
Theory of transpersonal caring (jean watson )...
 
Orem's theory of nursing
 Orem's theory of nursing Orem's theory of nursing
Orem's theory of nursing
 
Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informatics
 
betty neumann's theory
betty neumann's theorybetty neumann's theory
betty neumann's theory
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introduction
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEMIMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
 
Nursing informatics Tools
Nursing informatics ToolsNursing informatics Tools
Nursing informatics Tools
 
Humanistic nursing theory. ppt
Humanistic nursing theory. pptHumanistic nursing theory. ppt
Humanistic nursing theory. ppt
 

Destacado

Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best PracticesDavid Lange
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Chapter 12
Chapter 12Chapter 12
Chapter 12bodo-con
 
Chapter 14
Chapter 14Chapter 14
Chapter 14bodo-con
 
Chapter 16
Chapter 16Chapter 16
Chapter 16bodo-con
 

Destacado (7)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best Practices
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 

Similar a Chapter 2

Recovered file 1
Recovered file 1Recovered file 1
Recovered file 1siragezeynu
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaSee You Rise Holdings
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxRoshni814224
 
Management Information System: Introduction and Overview
Management Information System: Introduction and OverviewManagement Information System: Introduction and Overview
Management Information System: Introduction and OverviewKrutiBhatt11
 
MS Lecture 9 information technology
MS Lecture 9 information technologyMS Lecture 9 information technology
MS Lecture 9 information technologyEst
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management SystemsDr. C.V. Suresh Babu
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROLshinydey
 
Rethinking IT - Main Role of the IT Department
Rethinking IT - Main Role of the IT DepartmentRethinking IT - Main Role of the IT Department
Rethinking IT - Main Role of the IT DepartmentAxel Vanhooren
 
1-Management Information Systems documentation.pdf
1-Management Information Systems documentation.pdf1-Management Information Systems documentation.pdf
1-Management Information Systems documentation.pdfSayaBigstone
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)Muhammed Kedir Hiko
 

Similar a Chapter 2 (20)

Recovered file 1
Recovered file 1Recovered file 1
Recovered file 1
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
2 information system
2 information system2 information system
2 information system
 
Hm 418 harris ch11 ppt
Hm 418 harris ch11 pptHm 418 harris ch11 ppt
Hm 418 harris ch11 ppt
 
Quality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data WarehouseQuality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data Warehouse
 
Data management
Data managementData management
Data management
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
Data Preparation.pptx
Data Preparation.pptxData Preparation.pptx
Data Preparation.pptx
 
Information system
Information systemInformation system
Information system
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
 
Management Information System: Introduction and Overview
Management Information System: Introduction and OverviewManagement Information System: Introduction and Overview
Management Information System: Introduction and Overview
 
MS Lecture 9 information technology
MS Lecture 9 information technologyMS Lecture 9 information technology
MS Lecture 9 information technology
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Rethinking IT - Main Role of the IT Department
Rethinking IT - Main Role of the IT DepartmentRethinking IT - Main Role of the IT Department
Rethinking IT - Main Role of the IT Department
 
1-Management Information Systems documentation.pdf
1-Management Information Systems documentation.pdf1-Management Information Systems documentation.pdf
1-Management Information Systems documentation.pdf
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
ch2 DS.pptx
ch2 DS.pptxch2 DS.pptx
ch2 DS.pptx
 
Information system
Information systemInformation system
Information system
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)
 

Más de bodo-con

5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24bodo-con
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23bodo-con
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22bodo-con
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21bodo-con
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20bodo-con
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18bodo-con
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17bodo-con
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16bodo-con
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15bodo-con
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14bodo-con
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13bodo-con
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12bodo-con
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11bodo-con
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10bodo-con
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9bodo-con
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8bodo-con
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7bodo-con
 

Más de bodo-con (20)

SUSHCS
SUSHCSSUSHCS
SUSHCS
 
PPA
PPAPPA
PPA
 
OHPE
OHPEOHPE
OHPE
 
5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Chapter 2

  • 1. Chapter 2 Introduction to Information, Information Science, and Information Systems
  • 2. Data • Raw facts Information • Processed data that has meaning • Information is data that is processed using knowledge. In order for information to be valuable or meaningful, it must be accessible, accurate, timely, complete, cost effective, flexible, reliable, relevant, simple, verifiable, and secure
  • 3. Data Integrity • Refers to whole, complete, correct, and consistent data • Can be compromised through human error, viruses, worms, other bugs, hardware failures or crashes, transmission errors, and/or hackers entering the system
  • 4. High Quality Data • Data that are relevant and accurately represent their corresponding concepts. • Data are dirty when there are errors in the database such as duplicate, incomplete, or outdated records
  • 5. The data that we process into information must be of high quality and integrity to create meaning to inform our assessments and decision making.
  • 6. Quality of Information • Necessary for it to be valuable and meaningful. • Characteristics of valuable, quality information – accessibility, security, timeliness, accuracy, relevancy, completeness, flexibility, reliability, objectivity, utility, transparency, verifiability, and reproducibility
  • 7. Information Science • Science of information, studying the application and usage of information and knowledge in organizations and the interfacings or interaction between people, organizations, and information systems • Information science enables the processing of information
  • 8. Information Science • is a multidisciplinary science that involves aspects from computer science, cognitive science, social science, communication science, and library science to deal with obtaining, gathering, organizing, manipulating, managing, storing, retrieving, recapturing, disposing of, distributing, or broadcasting information. Information science studies everything that deals with information and can be defined as the study of information systems. This science originated as a subdiscipline of computer science, in an attempt to understand and rationalize the management of technology within organizations.
  • 9. Information Processing • Is the conversion of latent information into manifest information. • Latent information is that which is not yet realized or apparent • Manifest information is obvious or clearly apparent. • Information science and computational tools are extremely important in enabling the processing of data, information, and knowledge in health care.
  • 10. Information System (IS) • Combinations of hardware, software and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings • Can be manually based, but for the purposes of this text, the term refers to computer-based information systems (CBISs) • Designed for specific purposes within organizations
  • 11. IS • Acquires data or inputs; processes data that consists of the retrieval, analysis, and/or synthesis of data; disseminates or outputs in the form of reports, documents, summaries, alerts, prompts, and/or outcomes; and provides for responses or feedback
  • 12. IS • Capability to disseminate, provide feedback, and adjust the data and information based on these dynamic processes are what sets them apart • should be a user-friendly entity that provides the right information at the right time and in the right place.
  • 13. Summary • Organizations are recognizing that their most precious asset is their information, represented in their employees, experience, competence or know-how, and innovative or novel approaches, all of which are dependent on a robust information network that encompasses the information technology infrastructure.