Data, information and knowledge - information system, Computer Engineering

Assignment Help:

Data, information and knowledge - Information System

The nature of information can most easily be defined in the context of its relationship to data and knowledge. Bohn (1994) describes this relationship as follows:

  • Data is raw material, it can be thought of as a basic description, it may be a set of measurements taken by sensors and recorded as a set of numbers. It could be a dimension of size or weight, or a quantity of items or money. Data is sterile and will most often have no meaning other than that attributed to the numbers themselves that are used to measure it.
  • Information is all, or a subset of, the gathered data that is relevant to a specific question or issue. This relevant data is then structured and organised so that some meaning can be attributed to it. I could be a trend of profit up or down or a gain or loss of weight.
  • Knowledge is this 'relevant' information processed by the human mind using thinking skills taken in context and mixed with other information and experience to produce something that is useful in the making of decisions, associations or predictions.

 

Therefore in summary, empirical data given structure and meaning becomes information. Thinking skills are then applied to the information so converting this information into knowledge. A detailed and up to date study of the place of information within the organisation can be found in Boiset and Canals (2004).


Related Discussions:- Data, information and knowledge - information system

What do you mean by data distribution, Q. What do you mean by Data Distribu...

Q. What do you mean by Data Distribution? Data distribution directives tell compiler how program data is to be distributed among memory areas connected with a group of processo

What qualifications needs to be an security professionals, Qualifications o...

Qualifications of security professionals For the security professionals, it is essential that they have adequate freedom to check the security measures and enforce them and

Comparator, 6 bit magnitude comparator

6 bit magnitude comparator

Time slice, The Linux Process Scheduler uses time slice to prevent a single...

The Linux Process Scheduler uses time slice to prevent a single process from using the CPU for too long. A time slice specifies how long the process can use the CPU. In our simulat

Scientific knowledge, Scientific knowledge: This is not to be confused...

Scientific knowledge: This is not to be confused with the applications of "AI" programs to other sciences, discussed later. Its subfields can be classified into a variety of t

What is system prompt, Q. What is System Prompt? On loading (or Switchi...

Q. What is System Prompt? On loading (or Switching to) DOS, the screen displays C :\>, C>, A :\> or a similar message. The message displayed by DOS is called DOS Prompt or Sys

Evaluate fixed execution time, The statement of Gustafson's law can be desc...

The statement of Gustafson's law can be described with the help of an illustration. Let us take a problem, say P, which has to be solved using a parallel computer. Let Ts be the ti

forensics capability relevant to a honeynet server, A local government org...

A local government organisation needs to deploy a honey net. To this end you are to deploy a honeynet based on the supplied network diagram (separate download) that should give sop

Which approaches not require knowledge of the system state, Which approache...

Which approaches do not require knowledge of the system state? Ans. Deadlock detection, deadlock prevention and deadlock avoidance; none of the given require knowledge of the s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd