You are on page 1of 5

M1 FEEDBAKCK

The information flow between different functional areas has not been sufficiently illustrated - there are no
information flows, just boxes and lines. You have also not explained 3 situations where Human Resources
and Sales & Marketing share information with external organisations Bilal.

Boxex and lines are the info flow diagram just make arrows and explain the diagram. Like how the info
flows.

M2 FEEDBACK

You have not sufficiently assessed how issues related to the use of information affect Belfast Met.

Make sure to wirte the word Belfast MET

Information flows

Administration

Sales Research Distributi Person Marketing Purchas Manufacturi


and on al ing ng

Customers

Suppliers
Using Belfast Metropolitan College as an example, explain the following:

Primary Information

It is the information that you collect by yourself and it cannot be regenerated


automatically, you can get primary information by gathering information yourself like
doing surveys or interviewing different people. Primary information can be trusted
because you can track the information where it came from.

Secondary Information

It is the type of information that has been collected by someone else e.g. the internet,
newspaper or the books. Secondary information can be untrustworthy and biased
maybe because the author is trying to make a point in his favour.

Qualitative Information

This type of information cant be measured because it is non-numeric information


created on quality of a thing an example of qualitative information would be the
softness of the skin and the colour of a sky.

Quantitative Information

This type of information can be measured numerically It is measured in statistics an


example of a quantitative would be someones age, numbers of cars in the parking
lot. Any 5 of the characteristics of good information e.g.

1. Valid
Valid information is a correct information and it can be used for the purpose that it is
going to be used for, an information provided to you directly by governing body is an
example of valid information.

2. Reliable

This type of information is the information you can rely on as being accurate It will also
be from a trustworthy source. An example of where you can find reliable information is
the governments or BMC website or a book. And an unreliable source of getting
information would be Wikipedia because anyone can edit the articles on it.

3. Timely

This is type of information which is from the precise time period. An example of timely
information would be air traffic control need this type of information to know exact
speed and location of an airplane otherwise it would be very risky for aircraft if the
location and speed info are behind few sec.
4. Fit for purpose
This type of information is important to what you need it for example if you are going to
open a small business in Belfast than it would be worthwhile to look at population
within a certain region where you want to open a business looking at the population of
Liverpool would not be fit for purpose.

5. Accessible
It is a kind of information which is stored in a way that it would be easy for you to
access it any time. For example all the PowerPoint presentations and documents
about the course are stored on blackboard on BMCs website and I can access them
anytime I want.

Describe each of the following issues related to use of information and explain how
each of these issues may affect BMC:
Legal issues:
Data Protection Act
This act covers information and data that is managed via computer sources it
also force people who collect store and process this data or individual
accounts about customers the main purpose for the act is to make sure that
data is managed fairly and lawfully. Data needs to have a lawful or precise
purpose to be kept and that this data is not revealed outside of the lawful or
particular reason the information should be constantly correct appropriate to
the purpose and only it should only be stored for the amount of time it needs
to be BMC can get into trouble if the college give students information to
someone.

Computer Misuse Act 1990


This act covers Three Points:
1. Get into someones computer without their authorisation for example
looking at their files without their knowledge.
2. Accessing someones computer without their authorisation with intending
to commit more criminal violations for example hacking into their banks
details.
3. Modifying someones computer data without their authorisation for
example putting a virus into their computer remove their data.

Ethical issues:
Email
Most business tell their employees that they can only use email
services for work and sometimes they can check their personal emails
at breaks. The employers do that to make sure that their staff is not
wasting time chatting to friends on email but doing their work. Bullying
through email is also forbidden.
Internet
Companies have a code of conduct on what site are suitable for surfing
and also colleges like BMC also have a firewall on their networks which
prevents students from going to gambling or pornographic websites.
Organisational policies
Organisations have policies where they state the correct uses of
computing faculties.

Operational issues:
Security of information
System users assume the system to be secure this means unapproved
user would not be able to access personal information this also
includes altering or deleting data the IT department who keep up the
system will have to also specify who can look at and change
information. For example in college you dont want some student to
have an access to your account because they can delete important
coursework on your computer or someone to have access to your
banking account because they can withdraw money.

Health and safety


There is a law that employer must provide the following things to their
employers if they are working on a computer for long period of time like
in an office or maintain systems.
They should provide tillable screens, anti-glaze screen filters,
adjustable chair, foot supports etc. but these regulation dont apply to
students who are studying in schools and colleges. These regulations
are created so that the person wont have any back and next strain
injuries and the staff should take consistent breaks to avoid RSI
Repetitive strain injury.

SOURCES:

http://www.investopedia.com/terms/r/rsi.asp

https://sites.google.com/site/u3assignment1/task-3-p3-m2---explain-the-issues-
related-to-the-use-of-information-assess-how-issues-related-to-the-use-of-
information-affect-an-organisation

https://belfastmet.blackboard.com/webapps/blackboard/content/listContent.jsp?
course_id=_7242_1&content_id=_574993_1

http://btec-it-help-unit3.blogspot.co.uk/2014/10/p3-explain-issues-related-to-use-
of.html

http://btec-it-help-unit3.blogspot.co.uk/2014/10/m1-illustrate-information-flow-
between.html
https://en.wikipedia.org/wiki/Data_Protection_Act_1998

https://en.wikipedia.org/wiki/Computer_Misuse_Act_1990

You might also like