Information Processing
Information Processing
Information processing is the manipulation of data to produce useful information; it involves the
capture of information in a format that is retrievable and analyzable. Processing information
involves taking raw information and making it more useful by putting it into context. In general,
information processing means processing new data, which includes a number of steps: acquiring,
inputting, validating, manipulating, storing, outputting, communicating, retrieving, and disposing.
The future accessing and updating of files involves one or more of these steps. Information
processing provides individuals with basic skills to use the computer to process many types of
information effectively and efficiently.
The receiver of information takes actions and decisions based on the information received.
Collected data must be processed to get meaning out of it, and this meaning is obtained in the form
of information. Further information is considered useful & meaningful only if has these
characteristics:
1
Phases of information Processing
1.Input: Computer receives data and instructions
2.Process: Computer applies instructions to data to produce information (organized Data)
3.Storage: Saving the information for a subsequent use or use in future
4.Output: Computer sends information to people in a usable format.
5.Feed back: It is the process of receiving responses or reactions to processed information, which
can be used to modify future processing.
Input :
In the input stage, the data is entered into the computer. There are many ways to do this. In fact,
there are as many ways to input data as there are input devices. You would have learned about
input devices in Grade 10 but just to refresh your memory, input devices are things such as
keyboards, touchscreens and microphones. The user inputs the data (for example, by typing on a
keyboard or speaking into a microphone) into the computer. The device takes this data and converts
it into a series of 1s and 0s (this is called binary code).
i. Feeding the collected raw data in the cycle for processing. This is the raw data which is
supplied for processing & obtaining information.
ii. Input can be done by utilizing various devices such as keyboards, mice, flatbed scanners,
barcode readers, joysticks, digital data tablets (for graphics drawing), electronic cash
registers, etc
Processing :
The central processing unit (CPU) takes binary code and does the calculations needed to get that
data to display in a way that makes sense to the user. The CPU works with the computer’s memory
to get instructions on how to display the information from the input device and stores it as pixels
in the computer’s memory. This information is sent to the output device to be translated and
displayed in a way that is useful. All of this takes a fraction of a second to do.
i. Once the input is provided the raw data is processed by a suitable or selected processing
method. This is the most crucial step as it allows for the processed data in the form of
output which will be used further.
ii. Processing is usually done by CPU (Central Processing Unit) in a computer. CPU is the
crucial component for getting the operations done.
Storage :
Storage is where the computer takes the input and stores it in its memory banks. There are many
ways to store the data, but the basic process is as follows:
i. The CPU writes the data to the computer’s temporary storage, or random access memory
(RAM).
ii. The computer then waits for the user’s command to move the data from the RAM to more
permanent storage. If that command is given, the computer writes the data to the disk drive.
iii. Lastly, the computer saves the data in a location on the drive, either the default storage
location or a location set by the user. The user can then recall this stored information at any
time.
iv. You can also store information using external storage devices (for example USB drives or
external hard drives).
2
Output :
This is the outcome, and the raw data provided in the first stage is now “processed,” and the data
is useful and provides information and no longer called data. This might be further used for data
visualisation. Output is where the computer takes the pixels from the processing stage and displays
them in a way that the user can see them. There are many kinds of output devices, such as printers,
screens, video and audio devices.
These devices make the raw data usable and visible, allowing human users to interpret the data,
turning it into information. This could be the sound waves of a song or the letters in a document.
This can be used as it is or used for further processing along with more data.
Communication
Communication is linked to the other stages in the information processing cycle. Each part of the
cycle happens because one of the other steps came before it, meaning that they are linked. This
link is the communication aspect of the information processing cycle. The most visible aspect of
this is the relationship between input and output. Input and output happen almost immediately (for
example typing a letter on a keyboard makes it appear almost immediately on a screen). This is
communication between the user and the computer.
Communication can then further be sent across a network to other computers. Think about
browsing the internet. The internet is basically a huge network of computers linked across the
world. Opening your browser connects you to those other computers and these computers
communicate with each other to give you what you are looking for. Computers that are linked in
a network also communicate with each other. Examples of this are computers linked on a
company’s intranet or those linked to a server.
2. Processing: The browser fetches the requested page from the web server, which is a form of
processing. Then, it also processes the HTML, CSS, and JavaScript to render the page.
3. Output: The output is the display of the web page on your screen. Any videos or sounds that
play as part of the page are also considered output.
4. Storage: Web pages are often cached (stored) to make future access quicker. The browser also
stores cookies and other session data.
3
The Interconnectivity of Information Processing Cycle Components
How Components Work Together
The components of the Information Processing Cycle don’t work in isolation. They have
a sequential interaction, meaning one phase leads to the next, creating a cycle.
3. Data Security and Privacy: Securing the data throughout its lifecycle is crucial. Encryption,
firewalls, and secure coding practices are all part of this solution.
2. Role in Big Data and Analytics: Information processing in big data involves gathering vast
amounts of data (input), processing this data to find patterns or trends, presenting these findings
(output), and storing the results for future analysis.
Encoding and Decoding: Encoding involves converting information into a form that can be
transmitted, while decoding involves converting received information back into a usable form.
Filtering: Filtering as the process of selecting relevant information from a larger set of data, such
as sorting through emails to find important messages.
4
Information Processing in Decision-Making:
1. Gathering Data:
Data collection is the process of collecting and evaluating information or data from multiple
sources to find answers to research problems, answer questions, evaluate outcomes, and forecast
trends and probabilities. It is an essential phase in all types of research, analysis, and decision-
making, including that done in the social sciences, business, and healthcare.
Accurate data collection is necessary to make informed business decisions, ensure quality
assurance, and keep research integrity.
Before collecting data, they must answer three questions first:
• What’s the goal or purpose of this research?
• What kinds of data are they planning on gathering?
• What methods and procedures will be used to collect, store, and process the
information?
Additionally, we can break up data into qualitative and quantitative types. Qualitative data
covers descriptions such as color, size, quality, and appearance. Quantitative data,
unsurprisingly, deals with numbers, such as statistics, poll numbers, percentages, etc.
Methods of Data Collection
Primary and secondary methods of data collection are two approaches used to gather information
for research or analysis purposes. Let's explore each data collection method in detail:
1. Primary Data Collection:
Primary data collection involves the collection of original data directly from the source or
through direct interaction with the respondents. This method allows researchers to obtain
firsthand information specifically tailored to their research objectives. There are various
techniques for primary data collection, including:
a. Surveys and Questionnaires: Researchers design structured questionnaires or surveys to
collect data from individuals or groups. These can be conducted through face-to-face
interviews, telephone calls, mail, or online platforms.
b. Interviews: Interviews involve direct interaction between the researcher and the
respondent. They can be conducted in person, over the phone, or through video
conferencing.
c. Observations: Researchers observe and record behaviors, actions, or events in their
natural setting. This method is useful for gathering data on human behavior, interactions,
or phenomena without direct intervention.
d. Experiments: Experimental studies involve the manipulation of variables to observe their
impact on the outcome. Researchers control the conditions and collect data to draw
conclusions about cause-and-effect relationships.
e. Focus Groups: Focus groups bring together a small group of individuals who discuss
specific topics in a moderated setting. This method helps in understanding opinions,
perceptions, and experiences shared by the participants.
2. Secondary Data Collection:
Secondary data collection involves using existing data collected by someone else for a purpose
different from the original intent. Researchers analyze and interpret this data to extract relevant
information. Secondary data can be obtained from various sources, including:
a. Published Sources: Researchers refer to books, academic journals, magazines,
newspapers, government reports, and other published materials that contain relevant data.
b. Online Databases: Numerous online databases provide access to a wide range of
secondary data, such as research articles, statistical information, economic data, and
social surveys.
c. Government and Institutional Records: Government agencies, research institutions, and
organizations often maintain databases or records that can be used for research purposes.
5
d. Publicly Available Data: Data shared by individuals, organizations, or communities on
public platforms, websites, or social media can be accessed and utilized for research.
e. Past Research Studies: Previous research studies and their findings can serve as valuable
secondary data sources. Researchers can review and analyze the data to gain insights or
build upon existing knowledge.
2. Analyzing Data: Analyzing data as the process of examining and interpreting data to identify
patterns, trends, or insights.
3. Interpreting Data: Interpreting data as the process of making sense of analyzed data to inform
decision-making.
4. Supporting Technologies: Technologies such as data analytics, machine learning, and artificial
intelligence support decision-making by processing large amounts of data quickly and accurately.
6
7. Ensure any third-party storage providers, such as cloud storage providers, share data
privacy requirements and techniques; and
8. Regularly educate employees, partners and customers about data privacy guidelines.
Information Security: Information security is a broad field that covers many areas such as
physical security, endpoint security, data encryption, and network security. It is also closely related
to information assurance, which protects information from threats such as natural disasters and
server failures.
Best Practices for Ensuring Data/Information Security
There is no silver bullet that will guarantee 100 percent security of your data. However, there are
several steps, tactics, and best practices that can help minimize the chances of a data breach, loss,
and exposure.
1. Quarantine Sensitive Files: One common data management mistake is placing sensitive
files on a shared or open drive accessible to the entire company. You’ll want to eliminate
this practice, placing sensitive data into safely quarantined areas. Gain control of your data
by using data security software that continually classifies sensitive data and moves it to a
secure location.
2. Behavior-Based Permissions: Overly permissive behavior is another common misstep,
where more people have access to data than is necessary. A convoluted web of temporary
access and permissions quickly arises, with individuals having access to data that they
shouldn’t. Limit over-permissioning by using software that profiles user behavior and
automatically places appropriate behavior-based permissions via an entitlement review.
3. Prepare for Cyber Threats: Good data security is all about thinking ahead. You’ll want
to have a solid cybersecurity policy that encompasses current and potential future threats
to your data. This includes both external hackers and insider threats. Aside from your
policy, employ software that provides real-time monitoring and alerts of suspicious
activities.
4. Delete Unused Data: Storing stale data for longer than necessary presents a significant
liability in terms of data security. You’ll want to have processes and technologies in place
to eliminate sensitive data that’s no longer necessary for ongoing business activities. The
last thing you want is a mountain of data that you’re unaware of as a sitting duck for
hackers.
5. Knowing Where Data Lives: It’s critical to know where all of your data resides at any
given time. This includes data you’re currently using as well as data that should be deleted
or retired. Make sure you have both technologies and processes in place that will give you
visibility into your data at all times.
6. Tracking User Access: One of the biggest dangers to data security is internal personnel
gaining access to data that they shouldn’t. Therefore, you’ll need to track user access to
ensure only the right people are accessing the most sensitive data.
7. Blocking High-Risk Activities: Not all data handling actions are created equal. Individuals
can engage in high-risk activities and data movements, such as sending sensitive
information in a non-encrypted format via email. You want to have systems and software
in place that block all high-risk activities.