Information is a corporate resource, as important as the capital, labour, know-how etc. and is being used for decision-making. Its quality, therefore, is required to be very high. Low quality information would adversely affect the organizational performance as it affects decision-making. The quality of information is the result of the quality of the input data, processing design, system design, system and procedures which generate such a data, and the management of the data processing function. Quality, unlike any other product, is not an absolute concept. Its level is determined with reference to the context and its use, and the user. Perfect quality just as perfect information is non-achievable and has cost-benefit implications.
However, it is possible to measure the quality of information on certain parameters. All these parameters need not have a very high value. Some parameters may have lesser importance in the total value on account of their relevance in the information and its use. The quality of these important parameters is ensured by conducting a proper systems analysis, designing a suitable information system and ensuring its maintenance from time to time, and also subjecting it to audit checks to ensure the system integrity. The quality of the parameters is assured if the following steps are taken.
- All the input is processed and controlled, as input and process design.
- All updating and corrections are completed before the data processing begins.
- Inputs (transactions, documents, fields and records) are subject to validity checks.
- The access to the data files is protected and secured through an authorization scheme.
- Intermediate processing checks are introduced to ensure that the complete data is processed right through, i.e. run to run controls.
- Due attention is given to the proper file selection in terms of data, periods and so on.
- Backup of the data and files are taken to safeguard corruption or loss of data.
- The system audit is conducted from time to time to ensure that the information system specifications are not violated.
- The system modifications are approved by following a set procedure which begins with authorization of a change to its implementation followed by an audit.
- Systems are developed with a standard specification of design and development.
- Information system processing is controlled through program control, process control and access control.
- Ensure MIS model confirms consistency to business plan satisfying information needs to achieve business goals.
The assurance of quality is a continuing function and needs to be evolved over a period and requires to be monitored properly. It cannot be assessed in physical units of measure. The user of the information is the best judge of the quality.
Kavungya answered the question on May 10, 2019 at 14:08
- Give the approaches that can be taken by individuals or organizations to prevent theft.(Solved)
Give the approaches that can be taken by individuals or organizations to prevent theft.
Date posted: May 10, 2019. Answers (1)
- Explain three ways to protect computer from human aspect threat.(Solved)
Explain three ways to protect computer from human aspect threat.
Date posted: May 10, 2019. Answers (1)
- Describe the natural disaster Vs data backup.(Solved)
Describe the natural disaster Vs data backup.
Date posted: May 10, 2019. Answers (1)
- Define firewall.(Solved)
Define firewall.
Date posted: May 10, 2019. Answers (1)
- Define Anti spyware.(Solved)
Define Anti spyware.
Date posted: May 10, 2019. Answers (1)
- Describe Antivirus.(Solved)
Describe Antivirus.
Date posted: May 10, 2019. Answers (1)
- Define Cryptography.(Solved)
Define Cryptography.
Date posted: May 10, 2019. Answers (1)
- Describe the natural and environmental threats.(Solved)
Describe the natural and environmental threats.
Date posted: May 10, 2019. Answers (1)
- Describe the application controls.(Solved)
Describe the application controls.
Date posted: May 10, 2019. Answers (1)
- Describe the administration controls.(Solved)
Describe the administration controls.
Date posted: May 10, 2019. Answers (1)
- Describe the communication controls.(Solved)
Describe the communication controls.
Date posted: May 10, 2019. Answers (1)
- Describe the data security controls.(Solved)
Describe the data security controls.
Date posted: May 10, 2019. Answers (1)
- Describe the Access control.(Solved)
Describe the Access control.
Date posted: May 10, 2019. Answers (1)
- Describe the general computer controls.(Solved)
Describe the general computer controls.
Date posted: May 10, 2019. Answers (1)
- Explain the defense strategies implemented for computer crimes.(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted: May 10, 2019. Answers (1)
- Describe intentional threats.(Solved)
Describe intentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe Unintentional threats.(Solved)
Describe Unintentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe computer systems Vulnerability.(Solved)
Describe computer systems Vulnerability.
Date posted: May 10, 2019. Answers (1)
- Describe the database availability.(Solved)
Describe the database availability.
Date posted: May 10, 2019. Answers (1)
- Describe the database management systems security features.(Solved)
Describe the database management systems security features.
Date posted: May 10, 2019. Answers (1)