SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Chapter 2
Introduction to
Information,
Information Science,
and Information
Systems
Data
• Raw facts
Information
• Processed data that has meaning
• Information is data that is processed using
knowledge. In order for information to be
valuable or meaningful, it must be accessible,
accurate, timely, complete, cost effective, flexible,
reliable, relevant, simple, verifiable, and secure
Data Integrity
• Refers to whole, complete, correct, and
consistent data
• Can be compromised through human
error, viruses, worms, other bugs,
hardware failures or crashes,
transmission errors, and/or hackers
entering the system
High Quality Data
• Data that are relevant and accurately
represent their corresponding concepts.
• Data are dirty when there are errors in the
database such as duplicate, incomplete, or
outdated records
The data that we process
into information must be of
high quality and integrity to
create meaning to inform
our assessments and
decision making.
Quality of Information
• Necessary for it to be valuable and
meaningful.
• Characteristics of valuable, quality information
– accessibility, security, timeliness, accuracy,
relevancy, completeness, flexibility, reliability,
objectivity, utility, transparency, verifiability, and
reproducibility
Information Science
• Science of information, studying the
application and usage of information and
knowledge in organizations and the
interfacings or interaction between people,
organizations, and information systems
• Information science enables the processing of
information
Information Science
• is a multidisciplinary science that involves aspects from
computer science, cognitive science, social science,
communication science, and library science to deal
with obtaining, gathering, organizing, manipulating,
managing, storing, retrieving, recapturing, disposing of,
distributing, or broadcasting information. Information
science studies everything that deals with information
and can be defined as the study of information
systems. This science originated as a subdiscipline of
computer science, in an attempt to understand and
rationalize the management of technology within
organizations.
Information Processing
• Is the conversion of latent information into
manifest information.
• Latent information is that which is not yet
realized or apparent
• Manifest information is obvious or clearly
apparent.
• Information science and computational tools are
extremely important in enabling the processing
of data, information, and knowledge in health
care.
Information System (IS)
• Combinations of hardware, software and
telecommunications networks that people
build and use to collect, create, and distribute
useful data, typically in organizational settings
• Can be manually based, but for the purposes
of this text, the term refers to computer-based
information systems (CBISs)
• Designed for specific purposes within
organizations
IS
• Acquires data or inputs; processes data that
consists of the retrieval, analysis, and/or
synthesis of data; disseminates or outputs in
the form of reports, documents, summaries,
alerts, prompts, and/or outcomes; and
provides for responses or feedback
IS
• Capability to disseminate, provide feedback,
and adjust the data and information based on
these dynamic processes are what sets them
apart
• should be a user-friendly entity that provides
the right information at the right time and in
the right place.
Summary
• Organizations are recognizing that their most
precious asset is their information,
represented in their employees, experience,
competence or know-how, and innovative or
novel approaches, all of which are dependent
on a robust information network that
encompasses the information technology
infrastructure.

Weitere ähnliche Inhalte

Was ist angesagt?

Theories, models, & frameworks
Theories, models, & frameworksTheories, models, & frameworks
Theories, models, & frameworks
Minette Din
 
Informatics stppt ch1
Informatics stppt ch1Informatics stppt ch1
Informatics stppt ch1
angelaedgar
 
Application of interpersonal theory
Application of interpersonal theoryApplication of interpersonal theory
Application of interpersonal theory
Nursing Path
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introduction
Ian Jasper Mangampo
 
Humanistic nursing theory. ppt
Humanistic nursing theory. pptHumanistic nursing theory. ppt
Humanistic nursing theory. ppt
vaisakhgopakumar
 

Was ist angesagt? (20)

Theories, models, & frameworks
Theories, models, & frameworksTheories, models, & frameworks
Theories, models, & frameworks
 
Nursing Process Handouts
Nursing Process HandoutsNursing Process Handouts
Nursing Process Handouts
 
Practice Application- Nursing Informatics
Practice Application- Nursing InformaticsPractice Application- Nursing Informatics
Practice Application- Nursing Informatics
 
nursing informatic Competency
 nursing informatic Competency nursing informatic Competency
nursing informatic Competency
 
Informatics stppt ch1
Informatics stppt ch1Informatics stppt ch1
Informatics stppt ch1
 
Nursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworksNursing informatics theories, models, and frameworks
Nursing informatics theories, models, and frameworks
 
Application
ApplicationApplication
Application
 
Application of interpersonal theory
Application of interpersonal theoryApplication of interpersonal theory
Application of interpersonal theory
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
NEUMAN SYSTEMS MODEL.ppt
NEUMAN SYSTEMS MODEL.pptNEUMAN SYSTEMS MODEL.ppt
NEUMAN SYSTEMS MODEL.ppt
 
Theory of transpersonal caring (jean watson )...
Theory of transpersonal caring (jean watson )...Theory of transpersonal caring (jean watson )...
Theory of transpersonal caring (jean watson )...
 
Orem's theory of nursing
 Orem's theory of nursing Orem's theory of nursing
Orem's theory of nursing
 
Introduction to Nursing Informatics
Introduction to Nursing InformaticsIntroduction to Nursing Informatics
Introduction to Nursing Informatics
 
betty neumann's theory
betty neumann's theorybetty neumann's theory
betty neumann's theory
 
Nursing informatics introduction
Nursing informatics   introductionNursing informatics   introduction
Nursing informatics introduction
 
Nursing informatics
Nursing informaticsNursing informatics
Nursing informatics
 
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEMIMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
IMPORTANCE OF NURSING INFORMATICS IN THE PHILIPPINE HEALTH CARE DELIVERY SYSTEM
 
Nursing informatics Tools
Nursing informatics ToolsNursing informatics Tools
Nursing informatics Tools
 
Humanistic nursing theory. ppt
Humanistic nursing theory. pptHumanistic nursing theory. ppt
Humanistic nursing theory. ppt
 

Andere mochten auch

Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best Practices
David Lange
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
bodo-con
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
bodo-con
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
bodo-con
 

Andere mochten auch (7)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Alarm Fatigue Best Practices
Alarm Fatigue Best PracticesAlarm Fatigue Best Practices
Alarm Fatigue Best Practices
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 

Ähnlich wie Chapter 2

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
Priyank Hada
 
MS Lecture 9 information technology
MS Lecture 9 information technologyMS Lecture 9 information technology
MS Lecture 9 information technology
Est
 

Ähnlich wie Chapter 2 (20)

Recovered file 1
Recovered file 1Recovered file 1
Recovered file 1
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
2 information system
2 information system2 information system
2 information system
 
Hm 418 harris ch11 ppt
Hm 418 harris ch11 pptHm 418 harris ch11 ppt
Hm 418 harris ch11 ppt
 
Quality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data WarehouseQuality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data Warehouse
 
Data management
Data managementData management
Data management
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 
Data Preparation.pptx
Data Preparation.pptxData Preparation.pptx
Data Preparation.pptx
 
Information system
Information systemInformation system
Information system
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
 
Management Information System: Introduction and Overview
Management Information System: Introduction and OverviewManagement Information System: Introduction and Overview
Management Information System: Introduction and Overview
 
MS Lecture 9 information technology
MS Lecture 9 information technologyMS Lecture 9 information technology
MS Lecture 9 information technology
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Rethinking IT - Main Role of the IT Department
Rethinking IT - Main Role of the IT DepartmentRethinking IT - Main Role of the IT Department
Rethinking IT - Main Role of the IT Department
 
1-Management Information Systems documentation.pdf
1-Management Information Systems documentation.pdf1-Management Information Systems documentation.pdf
1-Management Information Systems documentation.pdf
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
ch2 DS.pptx
ch2 DS.pptxch2 DS.pptx
ch2 DS.pptx
 
Information system
Information systemInformation system
Information system
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)
 

Mehr von bodo-con

5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
bodo-con
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
bodo-con
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
bodo-con
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
bodo-con
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
bodo-con
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
bodo-con
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
bodo-con
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
bodo-con
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
bodo-con
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
bodo-con
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
bodo-con
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
bodo-con
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
bodo-con
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
bodo-con
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
bodo-con
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
bodo-con
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
bodo-con
 

Mehr von bodo-con (20)

SUSHCS
SUSHCSSUSHCS
SUSHCS
 
PPA
PPAPPA
PPA
 
OHPE
OHPEOHPE
OHPE
 
5530: Chapter 24
5530: Chapter 245530: Chapter 24
5530: Chapter 24
 
5530: Chapter 23
5530: Chapter 235530: Chapter 23
5530: Chapter 23
 
5530: Chapter 22
5530: Chapter 225530: Chapter 22
5530: Chapter 22
 
5530: Chapter 21
5530: Chapter 215530: Chapter 21
5530: Chapter 21
 
5530: Chapter 20
5530: Chapter 205530: Chapter 20
5530: Chapter 20
 
5530: Chapter 18
5530: Chapter 185530: Chapter 18
5530: Chapter 18
 
5530: Chapter 17
5530: Chapter 175530: Chapter 17
5530: Chapter 17
 
5530: Chapter 16
5530: Chapter 165530: Chapter 16
5530: Chapter 16
 
5530: Chapter 15
5530: Chapter 155530: Chapter 15
5530: Chapter 15
 
5530: Chapter 14
5530: Chapter 145530: Chapter 14
5530: Chapter 14
 
5530: Chapter 13
5530: Chapter 135530: Chapter 13
5530: Chapter 13
 
5530: Chapter 12
5530: Chapter 125530: Chapter 12
5530: Chapter 12
 
5530: Chapter 11
5530: Chapter 115530: Chapter 11
5530: Chapter 11
 
5530: Chapter 10
5530: Chapter 105530: Chapter 10
5530: Chapter 10
 
5530: Chapter 9
5530: Chapter 95530: Chapter 9
5530: Chapter 9
 
5530: Chapter 8
5530: Chapter 85530: Chapter 8
5530: Chapter 8
 
5530: Chapter 7
5530: Chapter 75530: Chapter 7
5530: Chapter 7
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Chapter 2

  • 1. Chapter 2 Introduction to Information, Information Science, and Information Systems
  • 2. Data • Raw facts Information • Processed data that has meaning • Information is data that is processed using knowledge. In order for information to be valuable or meaningful, it must be accessible, accurate, timely, complete, cost effective, flexible, reliable, relevant, simple, verifiable, and secure
  • 3. Data Integrity • Refers to whole, complete, correct, and consistent data • Can be compromised through human error, viruses, worms, other bugs, hardware failures or crashes, transmission errors, and/or hackers entering the system
  • 4. High Quality Data • Data that are relevant and accurately represent their corresponding concepts. • Data are dirty when there are errors in the database such as duplicate, incomplete, or outdated records
  • 5. The data that we process into information must be of high quality and integrity to create meaning to inform our assessments and decision making.
  • 6. Quality of Information • Necessary for it to be valuable and meaningful. • Characteristics of valuable, quality information – accessibility, security, timeliness, accuracy, relevancy, completeness, flexibility, reliability, objectivity, utility, transparency, verifiability, and reproducibility
  • 7. Information Science • Science of information, studying the application and usage of information and knowledge in organizations and the interfacings or interaction between people, organizations, and information systems • Information science enables the processing of information
  • 8. Information Science • is a multidisciplinary science that involves aspects from computer science, cognitive science, social science, communication science, and library science to deal with obtaining, gathering, organizing, manipulating, managing, storing, retrieving, recapturing, disposing of, distributing, or broadcasting information. Information science studies everything that deals with information and can be defined as the study of information systems. This science originated as a subdiscipline of computer science, in an attempt to understand and rationalize the management of technology within organizations.
  • 9. Information Processing • Is the conversion of latent information into manifest information. • Latent information is that which is not yet realized or apparent • Manifest information is obvious or clearly apparent. • Information science and computational tools are extremely important in enabling the processing of data, information, and knowledge in health care.
  • 10. Information System (IS) • Combinations of hardware, software and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings • Can be manually based, but for the purposes of this text, the term refers to computer-based information systems (CBISs) • Designed for specific purposes within organizations
  • 11. IS • Acquires data or inputs; processes data that consists of the retrieval, analysis, and/or synthesis of data; disseminates or outputs in the form of reports, documents, summaries, alerts, prompts, and/or outcomes; and provides for responses or feedback
  • 12. IS • Capability to disseminate, provide feedback, and adjust the data and information based on these dynamic processes are what sets them apart • should be a user-friendly entity that provides the right information at the right time and in the right place.
  • 13. Summary • Organizations are recognizing that their most precious asset is their information, represented in their employees, experience, competence or know-how, and innovative or novel approaches, all of which are dependent on a robust information network that encompasses the information technology infrastructure.