• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Illustrate the information flow between different functional areas and explain the issues related to the use of information

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐Illustrate the information flow between different functional areas and explain the issues related to the use of information Sources of information Sales ? sales will be involved with seeing what products they have sold. This is organised by many different categories. Firstly, the product and product group will be identified; from this they can see what product Purchasing ? Purchasing is The activity of acquiring goods or services to accomplish the goals of an organization. Manufacturing ? The manufacturing department are in charge of making a product from raw materials. Marketing ? Marketing is about communicating the value of a product, service or brand to customers or consumers for the purpose of promoting or selling that product, service, or brand. They may have campaigns to get the businesses products well known or rebrand the business. ...read more.

Middle

Across ? Across flow is when information is passed between different parts of the business so they can work together to achieve goals and objectives. External Information Flow Information also flows out of an organisation. Organisations will provide information to their customers which may be targeted to individual customers (for instance, a bank statement), a group of customers (such as a council?s report on its performance) or to all customers (such as a Plc annual report). Data Protection Act 1998 The data protection act ensures that personal information is handled correctly. Anyone who gives personal information has to register with the data protection act and comply with eight values. Doing this makes sure information is fair and lawfully processed, processed for limited purposes, relevant, up to data and accurate, not kept for longer than needed, secure and lastly, information cannot be transferred to other countries without protection. ...read more.

Conclusion

It will also include the use of internet. Inappropriate websites will be banned and there will be strict rules on. Codes of practice Many businesses have a code of practice to make it clear what uses can be made of their computing facilities. A code of practice will define which private use of the computer system is permitted. For example, an Item included on the code of practice is email. Threatening, spamming or harassing emails will be banned. In addition, use of the internet is included. Inappropriate websites will be banned and if a company has their own websites only certain people can post on it. Lastly, whistle blowing will be included in the code of practice. A whistle-blower is a person who exposes any kind of information or activity that is deemed illegal, dishonest, or not correct within an organization that is either private or public. The code of practice will protect computer users who draw management attention for misusing the system. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    The offices are also locked when not in use. In the proposed system, data held within the database will be protected by a username and password system. The offices will still be locked when not in use. Consideration of Staff Training From the interview with Fred regarding the ICT skills

  2. Peer reviewed

    Computer Crime

    5 star(s)

    The major concern so far is that the owner of an item will not necessarily be aware the tag can be read at a distance without the owner's acknowledgment, making it possible to gather sensitive data about an individual without consent and track the individual at a distance if the perimeter of signal is large enough.

  1. The aim of this task is to produce a report for the managing director ...

    The signal must then be converted back to pictures and sound, this is called decoding. Nowadays the decoder is built into the television set using an integrated digital television (iDTV). Advantages include the improved quality of pictures and sound, more programmes to be available including more interactive services.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    38 When I select the frmSearchCustomerWithTitle this box will appear When I enter the title I will then be brought to the form. Test 39 When I select the frmSearchCustomerWithTown this box will appear When I enter the town name I will be brought to the form Test 40 When

  1. Free essay

    The following report will outline how a business communicates effectively and efficiently within their ...

    is extensively used it refers to the structured transmission of data between organizations by electronic means. It is used to transfer electronic documents from one computer system to another. EDI is used through Email which is a method of exchanging digital messages.

  2. Feasibility Report

    o The sales for each type of pie o The amount of profit that each filling brings to the business o The profit that the sales of drinks, salads, and hot snacks bring to the business Deficiencies Of The Current system o The pies are made in a kitchen, five miles away, from the main office.

  1. How information is communicated

    Written information can be very quick, especially if the form of email. Written information can be kept and looked upon at a later date. Advantages * Written information is permanent. * Written information can be made attractive with colour and clip art.

  2. Assess how issues related to the use of information affect an organisation

    It is also important that all employees have regular breaks from looking at the computer. The IT department in the bank must make sure they follow all the regulations and that staff ensure their equipment is at a position that is suited to them to stop injuries.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work