You are on page 1of 10

9780170364829 Index 305

INDEX
accessibility back-end tools 20
data collection design principle 19, 205 balance (data collection design principle)
message communication 186, 1923 1617, 2089
accidental threats to data and information bar graphs 158
275, 2767 bech test 49
accuracy (data integrity) 11421 biased information 248
challenges 11518 biometric identification 1712
clarity 11415, 117, 120 Boolean data type 22, 23
completeness 114, 11617, 11820 botnet 278
consistency 114, 115, 118, 1201 brainstorming 20911
correctness 114, 11516, 118 browsers 1956
measures to improve 11821
accurate information 2478 cables, network 169
acquisition and information systems 292 case studies
ADSL 298 Australia Card 258
age appropriateness and global message Gantt chart for creating a database 13943
1902 Pavlovs dogs 78
algorithms 220 Pizzas on the Go 278, 29, 356, 38, 39, 40,
alignment (data collection design principle) 42, 456, 48, 57, 59
15, 206 Ready Set Go gym 8790
American Psychological Association (APA) causality (statistical concept) 152, 1567
107, 10810 chain of custody 91
analogue data 157 character (data type) 22, 23
analytic coding 90 Charter of Human Rights and Responsibilities
annotated diagrams 221 Act 2006 (Vic) 1334
antivirus software 1734 Chromebook 298
appearance (data collection design principle) citation 108
1517, 2069 clarity
application programming interface (API) 106 and data accuracy 11415, 117, 120
archiving data 151 and message communication 186, 193
artwork 169 closed questions 945
ASP 19 cloud computing 1489, 2978
ASP.Net 19 advantages 2978
attacks to data and information 278 disadvantages 298
attractiveness and message communication 186, codes of conduct 2656
1989 coding
attribute listening 214 analytic 90
Australian Bureau of Statistics (ABS) 93 descriptive 90
Australian National Data Service 93 and open questions 95
Australian Privacy Principles (APPs) 1312, qualitative data 867
25860, 262 theoretical 90
authenticity (data integrity) 11213 column graphs 158
authority 91 communication and information systems 293
average (statistical concept) 152, 1534 communication hardware 165, 1689
communicating your message 186
306 Index 9780170364829

complete information 247 usernames and passwords 58


completeness visualisations 1579, 170
and data accuracy 114, 11617, 11820 data, components of 2916
and message communication 186, 198 digital systems 2946
computer-use policies 2656 people 291
conditional formatting, database 1645 processes 2924
consistency and data accuracy 114, 115, 118, data acquisition 94107
1201 asking questions 947
constraints (solution design) 801 conducting interviews 978
content ( functionality) of data accuracy 114 observing subjects 989
contrast (data collection design principle) 16, by organisations 910
2078 querying resources 1057
conventions for MMOS 2024 surveys and questionnaires 99105
cookies 19, 20, 267 data acquisition software 10, 1920
Copyright Act 1968 133, 269 data analytics 12875
correctness and data accuracy 114, 11516, 118 data security 1705
correlation (statistical concept) 152, 1567 digital systems 16570
CSIROs Data Access Portal 93 file naming strategies 1446
culture and global message 1889 identifying patterns and relationships 15265
curating data 146 legal requirements 12934
patterns and relationships 15265
data project management 13444
accidental threats to 275, 2767 solution requirements 7980
analogue 157 solution specifications 7882
backing up 57 data and information
definition 73 concept xiv, 247
deliberate threats to 275, 2789 importance of 24770
digital 157 see also information; information systems
electrical protection 578 data collection
encryption (storage and transmitted) design principles 1520
59, 173 online 35
event-based threats to 275, 27980 protection of rights 201
manipulation 199202 techniques for efficient and effective 1315
and online transactions 59 data collection design principles 1520, 2049
organising and storing 14652 accessibility 19, 205
primary 824 alignment 15, 206
protecting valuable 579, 1705 appearance 1517, 204, 206
protection of rights 201 balance 1617, 2089
qualitative and quantitative 8591 contrast 16, 2078
secondary 824 flexibility and ease of use 1819
security 1705 functionality 1820, 204, 205
systems security software 58 MMOS 2049
technical threats to 275, 2778 repetition 16, 2067
test 413 space 16, 208
testing the solution 4957 useability 18, 205
threats to 27580 data dictionary 368
types, characteristics of 223, 1213 data integrity 30, 11121
user flow diagrams 1113 accuracy 11421
9780170364829 Index 307

authenticity 11213 dependent variable 75


relevance 11314 descriptive coding 90
timeliness 11112 design ideas 20920
data patterns and relationships 15265 attribute listening 214
basic statistics 1537 creative techniques 20913
conditional formatting 1645 de Bonos Six Hats 21415
data visualisations 1579 evaluating 21820
filtering 163 tips for creative thinking 21518
pivot tables 15962 design principles see data collection design
queries and searches 159 principles
sorting 162 design tools 2203
data sources 924 input-process-output (IPO) charts 220
government 92 layout diagrams 223
government agencies 93 mock ups or annotated diagrams 221
libraries 92 organisational and hierarchy charts 223
referencing 10711 site map 221
data storage and organisation 14652 storyboard 222
archiving 151 digital data 157
cloud and file sharing 1489 digital signatures 113
email 151 digital systems 16570
encryption 59 concept xiv, 2
hierarchies 1468 definition 165
metadata 1501 hardware 1659, 294
spreadsheets 14950 networks 296
synchronising files 152 software 16970, 2946
data structure diagram (DSD) 389 disaster recovery plans (DRP) 275, 2809
data structures 1213 recovery strategies 2889
database, querying a 1056 security failure 28990
database design tools 3641 scope 2817
data dictionary 368 testing disaster plan 2878
data structure diagram (DSD) 389 disposal and information systems 2934
naming conventions 36 distribution questions 104
query design 3940 drive-by downloads 277
testing the solution 4957 dynamic webpage 19
database elements 412
database record 23 ease of use (data collection design principle)
database terminology 234 1819
databases 3, 236 economic constraints 81
and data storage 148 educating a global audience 18693
data types 223 effectiveness 3
relational 2536, 448 efficiency 3
data.gov.au 92 email (data storage) 151
date (data type) 22, 23 employee monitoring 2667
DDoS (distributed denial of service) 278 encryption (storage and transmitted data) 59, 173
de Bonos Six Hats 21415 entityrelationship diagram (ERD) 26, 289
deliberate threats to data and information ethical dilemmas 270
275, 2789 ethics
dependencies (project management) 135 definition 265
308 Index 9780170364829

and information systems 26570 Hansard 92


and the internet 2679 hardware 1659, 196, 294
evaluation and problem-solving methodology hashing 59
2379 Health Records Act 2001 252, 256, 2634
evaluation criteria 237 hidden agenda in questioning 96
evaluation methods 238 hierarchies (data storage) 1468
event-based threats to data and information hierarchy charts 223
275, 27980 HTTPS 20
human rights 1334
field (databases) 23 hypothesis 738
field notes 99 characteristics of a reasonable 756
file backups 175 formulating your 767
file management (MMOS) 2278 definition 735
file system basics 2278 proof, support and refutation 77
planning disk structure 228
terms 2289 images, editing 169
utilities 22930 independent variable 75
version control 229 information
file naming conventions (data analytics) 1456 accidental threats to 275, 2767
file naming formats (data analytics) 144 accurate 2478
file naming strategies (data analytics) 1446 biased 248
file sharing 1489 characteristics 2479
file storage 151 clarity of message 249
files, synchronising 152 complete 247
filtering, database 163 concept xiv, 247
firewalls 173 deliberate threats to 275, 2789
first normal form (1NF) 30, 31 event-based threats to 275, 27980
flat field (databases) 23, 24 importance of 24770
flexibility (data collection design principle) 1819 legal and ethical tensions 26970
floating point (numeric data type) 22 legal obligations 2556
form (appearance) of data accuracy 114 maximising opportunities 2524
formats for MMOS 2024 minimising risk 256
formulas and summary statistics, testing 545 privacy policies 256, 257
frequency distribution tables 80 storage and disposal, key legislation
functionality (data collection design principle) 25665
1820, 205 technical threats to 275, 2778
fuzzy logic 121 threats to 27580
fuzzy searches 293 timely 247
unbiased 248
Gantt charts 134, 137, 13844, 169, 2235 information management strategies 2526
gender inclusion and global message 1878 effectiveness 299300
global economy 4 efficiency criteria 300
government agencies 93 evaluation 299300
government data sources 92 legal obligations 2556
GovPond 92 maximising opportunities 2524
graphic organisers 21213 minimising risk 255
graphs 80, 1589 privacy policies 256
9780170364829 Index 309

information systems libraries 92


codes of conduct 2656 line graphs 159
digital systems 2946 loaded questions 96
disaster recovery plans (DRP) 275, 2801 logging out 172
employee monitoring 2667
ethics 26570 machine validation (online data acquisition) 9
ethics and the internet 2679 malware 58, 173, 278
legal and ethical tensions 26970 mandatory conventions 203
organisational goals and objectives 24952 manmade disasters 279
and people 291 manual validation (online data acquisition) 9
and processes 2924 many-to-many relationship (relational
security failure 28990 databases) 26
workplace responsibilities 265 mean (statistics) 153
input and information systems 292 media and message communication 197
input hardware 1657 median (statistics) 153
input masks (test data) 42 Melbourne Data 92
inputprocessoutput (IPO) charts 36, 220 message clarity (information) 249
integer (numeric data type) 22 message communication
intellectual property legislation 133 accessibility 186, 1923
interactions and impact (concept) xiv, 2 accuracy 186, 195
internet and ethics 2679 attractiveness 186, 1989
Internet Message Access Protocol (IMAP) 297 clarity 186, 193
interpolation 119 communicating your message 186
interview technique 978 completness 186, 198
interviews (data acquisition) 978 educating a global audience 18692
effective 18691
jargon 193 readability 186, 1934
relevance 186, 195
key concepts xiv, 2 useability 186, 1957
keyloggers 278 metadata 1501
milestones (project management) 135
language commonality and global message 190 mindmapping 80, 21112
layout diagrams 11, 223 mission statement 24950
leading questions 96 mock ups 221
legacy assessment 239 mode (statistics) 153
legal constraints 81 modems 169
legal obligations (information management) multimodal authoring 231
2556 multimodal data 231
legal requirements and data analytics 12934 multimodal online solution (MMOS) 18599
human rights 1334 accessibility 186, 1923
intellectual property legislation 133 accuracy 186, 195
legislation 12933 attractiveness 186, 1989
privacy legislation 1312 clarity 186, 193
Spam Act 2003 1323 communicating your message 186
legislation completness 186, 198
and data analytics 12933 data manipulation software 2312
data and information storage and disposal 25664 definition 185
information management 252 design ideas 20920
310 Index 9780170364829

design principles 2049 organisations


documenting the progress of projects 22347 goals and objectives (information systems)
educating a global audience 18692 24952
an effective 18691 and online data 35
formats and conventions 2024 outcomes viiixi
managing files 22730 outlier (statistics) 153
manipulating data 199202 output and information systems 293
project plan assessment 23940 output hardware 1657
readability 186, 1934
relevance 186, 195 paraphrasing 107
solution evaluation 2379 passwords (data protection) 58, 171
testing 2326 people and information systems 291
timeliness 186, 1978 PHP 19
useability 186, 1957 physical security 1701
multimodal resources 92 physical security controls 275
pie charts 158
naming conventions (database design tool) 36 primary data 824
networks 296 primary key (databases) 23
advantages of 296 privacy legislation and data analytics 1312
and communication 1689 privacy policies (data protection) 201
disadvantages of 2967 pivot tables 15962
nodes 296 plug-ins 195
normalisation (RDBMS structure) 26 POP 297
numeric fields (data types) 22, 23 ports 168
preferred conventions 203
observation printers 1667
approaches 99 Privacy Act 1988 252, 256, 25762, 269
disadvantages of 99 Privacy and Data Protection Act 2014 252,
observing subjects (data acquisition) 989 256, 2623
one-to-many relationship (relational privacy policies (information management) 256, 257
databases) 25 problem solving
one-to-one relationship (relational databases) 25 approaches to xiv, 2
ongoing services and organisations 4 testing the solution (data management) 4957
online data problem-solving methodology xiixiii
acquisition 10 design stage xiixiii
acquisition techniques used by organisations and evaluation 2379
910 problem analysis xii
collecting 35 solution development xiii
user flow diagrams 1113 solution evaluation xiii
and users 59 stages xii
see also data processes and information systems 2924
online form 3 processing and information systems 2923
online resources 92 project management 13444
open questions 94, 956 concepts 135
optional conventions 203 definition 134
organisational charts 223 processes 13544
organisational goals 24951 project plan assessment 23940
projects, documenting the progress of 22347
9780170364829 Index 311

protection of rights (data) 201 resources, querying (data acquisition) 1057


privacy policies 201 retrieval and information systems 293
security protocols 20 risk assessment analysis 2812
routers 169
qualitative data 8591 rubric 901
coding 867
quantitative data 8591 scatter graphs 159
queries (database tables) 245, 478, 159 searches, database 159
query by example (QBE) 1056 second normal form (2NF) 30, 313
querying a database 1056, 159 secondary data 824
querying other resources 1067 secure sockets layer (SSL 20
querying resources (data acquisition) 1057 security
query design (database design tool) 3940 data 1705
query selection criteria, testing 523 failure, consequences of 28990
questionnaires 99105 physical 1701
advantages/disadvantages 100 software 1715
writing 1014 security protocols (data protection) 20
questions (data acquisition) sequencing (project management) 137
closed 945 school-assessed coursework (SAC) 275
distribution 104 shipping and returns policy 20, 21
faults in questions 967 significance (statistical concept) 152, 1545
hidden agenda in 96 site map 221
leading 96 software 16970
loaded 96 antivirus 1734
open 94, 956 applications 295
quotations in referencing 111 digital systems 2945
security 58, 1715
ransomware 278 security controls 275
readability and message communication 186, utilities 295
1934 solution requirements (data analytics) 7980
reference list 111 data requirements 7980
referencing data sources 10711 functional requirements 79
relational database management systems non-functional requirements 79
(RDBMS) solution specifications (data analytics) 7882
creating a RDBMS structure 2536 constraints 801
definition 25 scope 812
developing 448 sorting, database 162
entity 26 space (data collection design principle) 16, 208
entityrelationship diagram (ERD) 26, 289 Spam Act 2003 1323
normalisation 26, 306 spreadsheet charts 1589
setting up queries 478 spreadsheets 122, 14950
table normalisation 306 spyware 20
tables and relationships 445 standard deviation (statistical concept) 152, 154
relational databases 256 statistical concepts 152
relevance (data integrity) 11314 statistics, basic 1537
repetition (data collection design principle) 16, storage hardware 165, 1678
2067 storyboard 222
312 Index 9780170364829

structured query language (SQL) 105, 106 timeliness


subjective assessment 98 data integrity 11112
survey tools 170 and message communication 186, 1978
surveys 99105 timely information 247
switches 169 transport layer security (TLS) 20
synchronising files 152 type face and message communication 194
system goals (organisational information) 251
systems security software 58 unbiased information 248
useability
table normalisation (entityrelationship diagram data collection design principle 18, 205
(ERD) 306 message communication 186, 1957
table validation, testing 4952 user acceptance testing 49
task completeness 18 user flow diagrams (UFD) 1113
task identification (project management) 1356 usernames (data protection) 58
technical constraints 81 users and online data transactions 59
technical threats to data and information 275, convenience 58
2778 reducing cost 89
test data 412, 233 variety of choice 8
test plan 412
testing validation 4
formulas and summary statistics 545 and information systems 292
MMOS 2326 techniques 2312
procedure (data management) 4957 testing table validation 4952
query selection criteria 523 validation rules (test data) 42
sorting 556 validation techniques (test data) 423
the solution (data management) 4957 vested interest 116
types 233 visualisations, data 1579, 170
testing table 2356
validation 4952 white space and message communication 194
text data type 22, 23 wireless access points 169
theoretical coding 90 work breakdown structure (WBS) 135
third normal form (3NF) 30, 345 workstations 297
time allocation resources (project management)
1378 XML files 105

You might also like