Requirements for information in information systems. Basic requirements for information quality

Introduction. 3

1. The problem of the quality of socio-psychological information. 4

1.1. Requirements for information quality. 4

1.2. Methods used to obtain data and the possibility of increasing them when conducting research. 7

Chapter 2: Examining Data Quality through a Study of Ability to Complete the Early Childhood Adaptation Test educational institution.. 12

2.1. Stages and procedures of the study. 12

2.2. Research methods. 12

2.3. Analysis of the research results. 13

Conclusion. 18

References.. 19

Appendix 1. 21

Appendix 2. 23


Introduction

The problem of data quality in psychology is of great relevance and in different theoretical orientations this issue is solved differently.

According to the amount of data present in a socio-psychological study, they are all divided into two types: a) correlational, based on a large array of data, among which various kinds of correlations are established, and b) experimental, where the researcher works with a limited amount of data and where the meaning of the work is the random introduction of new variables by the researcher and control over them.

Target work is to identify conditions for improving data quality.

The purpose of the work determined tasks research:

Studying theoretical foundations data quality in research;

Study of methods, problems and process of data enhancement;

Carrying out empirical research in order to confirm the hypothesis put forward.

The object of the work is the quality of data when conducting research.

The subject of the work is the conditions for improving data quality.

Hypothesis: The quality of the data will be higher and the percentage of young children able to pass the Childhood Adjustment Test will be higher. preschool institution will be higher if children are created favorable conditions to complete tasks during the experiment (determining the level of adaptation).

When writing the work, both the works of Russian scientists and the research of foreign authors on this issue were used.


The problem of the quality of socio-psychological information

Information quality requirements

IN general view the problem of information quality is solved by ensuring the principle of representativeness, as well as by checking the method of obtaining data for reliability. IN social psychology these general problems acquire specific content. Whether it is an experimental or correlational study, the information collected in it must satisfy certain requirements. Taking into account the specifics of non-experimental research should not result in neglect of the quality of information. For social psychology, as for other human sciences, two types of information quality parameters can be distinguished: objective and subjective.

Requirements to the quality of information.

The main requirements for information quality are:

· Reliability - information must be accurate, reasonable, correspond to the real state of affairs and do not contain errors or distortions. For information included in the study, there must be possible definition source of primary information. Sources of information must meet the criterion of reliability.

· Completeness of information – the maximum possible disclosure of all aspects of the described situation. Completeness is achieved through the use of complementary sources of information.

· Appropriateness (usefulness) – information must correspond to the interests and information needs of target groups, contribute to their solving problems and making decisions in the field of interaction with subjects.

· Timeliness – information must be relevant and presented with frequency and within the time limits specified by the requirements for the procedure (regulations) for its provision.

· Accessibility of presentation – compliance of the nature of information provision (language, style, design, etc.) with the possibilities of perception by consumers of educational services.

This assumption follows from the peculiarity of the discipline that the source of information in it is always a person. This means that this fact cannot be ignored and one should only ensure the highest possible level of reliability and those parameters that qualify as “subjective”. Of course, answers to questions in a questionnaire or interview constitute “subjective” information, but it can also be obtained in the most complete and reliable form, and much may be missed. important points deriving from this “subjectivity”. To overcome errors of this kind, a number of requirements regarding the reliability of information are introduced.

Reliability of information is achieved primarily by checking the reliability of the instrument through which the data is collected. In each case, at least three reliability characteristics are provided: validity (validity), stability and accuracy.

The validity (validity) of an instrument is its ability to measure exactly those characteristics of an object that need to be measured. A social psychologist researcher, when constructing a scale, must be sure that this scale will measure exactly those properties, for example, of an individual’s attitudes, that he intends to measure. There are several ways to test the validity of an instrument. You can resort to the help of experts, a circle of people whose competence in the issue under study is generally recognized. The distributions of characteristics of the property being studied, obtained using a scale, can be compared with those distributions that experts will give (acting without a scale). The coincidence of the results obtained to a certain extent confirms the validity of the scale used. Another way, again based on comparison, is to conduct an additional interview: the questions in it should be formulated so that the answers to them also provide an indirect characteristic of the distribution of the property being studied. The agreement in this case is also considered as some evidence of the validity of the scale. As you can see, all these methods do not provide an absolute guarantee of the validity of the instrument used, and this is one of the significant difficulties of socio-psychological research. It is explained by the fact that there are no ready-made methods that have already proven their validity; on the contrary, the researcher essentially has to build the instrument anew each time.

The stability of information is its quality of being unambiguous, i.e. when received in different situations, it should be identical. (Sometimes this quality of information is called “credibility”). Methods for checking information for stability are as follows: a) repeated measurement; b) measurement of the same property by different observers; c) the so-called “scale splitting”, i.e. checking the scale in parts. As you can see, all these double-check methods are based on repeated measurements. All of them should give the researcher confidence that he can trust the data obtained.

Finally, the accuracy of the information is measured by how granular the metrics are, or in other words, how sensitive the tool is. Thus, this is the degree of approximation of the measurement results to the true value of the measured quantity. Of course, every researcher should strive to obtain the most accurate data. However, creating a tool with the required degree of accuracy is in some cases quite a difficult task. It is always necessary to decide what measure of accuracy is acceptable. When determining this measure, the researcher includes the entire arsenal of his theoretical ideas about the object.

Violation of one requirement negates another: say, the data may be substantiated, but unstable (in socio-psychological research, such a situation may arise when the survey being conducted turned out to be situational, i.e. the time of its conduct could play a certain role, and in some kind of force arose from this additional factor, not manifested in other situations); another example where the data may be robust but not valid.


©2015-2019 site
All rights belong to their authors. This site does not claim authorship, but provides free use.
Page creation date: 2016-04-26

14) Information can be presented in the following aspects:

Semantic, i.e. its meaning and significance;

Axiological, i.e. its value;

Symeotic, i.e. its iconicity;

Communicativeness, i.e. information connections in the system;

Theoretical-reflective, i.e. the method of reflecting information (media); 35

Epistemological, i.e. cognitive;

Causal, i.e. cause-and-effect relationships in the transmission of information;

Quantitative, i.e. its measurement;

Physical, i.e. its form (book, floppy disk, etc.).

The following requirements are imposed on the quality of information:

Relevance;

Reliability;

Adequacy;

Credibility;

Complexity;

Targeting;

Legal correctness;

Reusable;

High speed of collection, processing and transmission;

Encoding capability.

15. List the elements of nits (new information technologies). What functions do nits perform in the adoption of ur?

15) BIT include:

New communication technologies based on local and distribution computer networks;

New information processing technologies based on PCs and specialized workstations;

Technologies that exclude paper as the main information carrier;

New decision-making technologies based on artificial intelligence tools - knowledge bases, expert systems.

Functions of new information technologies:

1 General processing of documents, their verification and execution

2 Support technical and professional training of employees

3 Local document storage

4 Data transfer

5 Ensuring end-to-end accessibility of documents without duplicating them on paper, remote and joint work of employees on documents

6 Modeling of decisions and simulation of their adoption, information support for decision making

7 Support communication methods in a familiar workplace environment

8 Control of automatic correspondence

9 Email

10 Automatic learning

11 Personal data processing

12 Consultation service

13 Compilation, reproduction and printing of documents

14 Ensuring the stylistic quality of documents

15 Integrating electronic and verbal communication

16 Creation of adaptable automated workstations

17 Exchange of information between databases

18 Exchange of local and personalized information

19 Data and form entry

20 Videotext service

21 Maintaining professional databases

22 Software exchange and integration

23 Generating data processing reports

23 Transferring documents from one medium to another

24 Resource Management

25 Printing design

26 Execution control

27 Telephone and television meetings

28 Group contact via terminals

29 Personal time management

30 Ensuring variety in visual presentation of material

16. Describe the “man-machine” system. What are the features of the operator’s activity in the “man-machine” system?

16) MSM is understood as a system that includes a human operator (a group of operators) and machines through which work activities are carried out. A machine in FMCS is a set of technical means used by a human operator in the process of activity.

Features of human operator activity:

With the development of technology, the number of objects and their parameters that need to be controlled increases.

Remote control systems are being developed. A person is increasingly moving away from controlled objects.

The increasing complexity and speed of production processes puts increased demands on the accuracy of operator actions.

In modern production conditions, human working conditions are changing.

Increasing the degree of automation of production processes requires the operator to be highly prepared for emergency actions.

An analysis of the state of affairs in the field of information security shows that a fully formed concept and structure of protection has already emerged, the basis of which is:

1. Very developed arsenal technical means protection of information produced on an industrial basis.

2. A significant number of companies specializing in solving information security issues.

3. A fairly clearly defined system of views on this problem.

4. presence of significant practical experience and other.

And yet, as evidenced by domestic and foreign press, malicious actions against information not only do not decrease, but also have a steady tendency to increase.

Experience shows that to combat this trend, a slim and goal-oriented organization process of protecting information resources.

Moreover, the following should actively participate in this:

· professional specialists;

· administration;

· employees;

· users.

It follows that:

1. Ensuring information security cannot be a one-time act. This is a continuous process consisting of justification and implementation of the most rational methods, methods and ways of improving and developing the protection system, continuous monitoring of its condition, identifying its narrow and weak points and illegal actions.

2. Information security can be ensured only through the comprehensive use of the entire arsenal of available security measures in all structural elements production system and at all stages of the technological cycle of information processing. The greatest effect is achieved when all the means, methods and measures used are combined into a single holistic mechanism - information security system. At the same time, the functioning of the system must be monitored, updated and supplemented depending on changes in external and internal conditions.

3. No information security system can provide the required level of information security without proper training of users and compliance by all established rules aimed at its protection.

Taking into account the accumulated experience, we can define an information security system as an organized set of special bodies, means, methods and measures that provide protection against internal and external threats.

Thus, by security system we will understand an organized set of special bodies, services, means, methods and measures that ensure the protection of the vital interests of the individual, enterprise and state from internal and external threats.

Like any system, the system information security has its own goals, objectives, methods and means of activity, which are agreed upon in place and time depending on the conditions.

From the perspective systematic approach There are certain requirements for information protection. Information protection should be:

1. Continuous. This requirement stems from the fact that attackers are just looking for an opportunity to bypass the protection of the information they are interested in.

2. Planned. Planning is carried out by each service developing detailed plans for protecting information in its area of ​​competence, taking into account the overall goal of the enterprise (organization).

3. Purposeful. What is protected is what should be protected in the interests of specific purpose, and not everything in a row.

4. Reasonable. The complexity of the tasks being solved, the large amount of work, as well as limited resources necessitate a deep scientific justification of decisions made on information security. When justifying the need for protection, one must proceed from the foreign policy, defense and economic interests of the state, incorporating advanced scientific and technical ideas and achievements into solving problems.

5. Sufficient. Refers to the need to find reliable protection measures while avoiding unnecessary costs. Ensured by the use of the most advanced methods and means of protection. Promotes maintaining a balance of interests of the state and individual organizations (enterprises), citizens.

6. Flexible in management. Due to the large number of protected objects and information, possible sudden changes in the intelligence situation, protection conditions and the importance of the protected information, a flexible manageable structure is needed that provides the ability to predict threats and their proactive neutralization, prompt and effective elimination of the consequences of the threat. Mainly provided high degree automation of protection means and systems and the presence of high-speed feedback.

7. Specific . Specific data that are objectively subject to protection, the loss of which could cause certain damage to the organization, are subject to protection.

8. Active . It is necessary to protect information with a sufficient degree of persistence

9. Reliable. Methods and forms of protection must be reliably covered possible ways unauthorized access to protected secrets, regardless of the form of their presentation, the language of expression and the type of physical medium on which they are fixed.

10. Timely. Timeliness dictates the need to develop protection and control measures in advance, before the start of secret work. Untimely implementation of protection measures can not only reduce its effectiveness, but also lead to the opposite result.

11. Universal. It is believed that, depending on the type of leakage channel or method of unauthorized access, it must be blocked, wherever it appears, by reasonable and sufficient means, regardless of the nature, form and type of information.

12. Complex. To protect information in all its diversity structural elements All types and forms of protection must be applied in full. It is unacceptable to use only certain forms or technical means. The complex nature of protection stems from the fact that protection is a specific phenomenon, which is a complex system of inextricably interconnected and interdependent processes, each of which in turn has many different mutually conditioning aspects, properties, and tendencies.

Foreign and domestic experience shows that to ensure compliance with such multifaceted security requirements, the information protection system must satisfy certain conditions:

1. Cover everything technological complex information activities.

2. Be diverse in the means used, multi-level with a hierarchical sequence of access.

3. Be open to changes and additions to information security measures.

4. Be non-standard, diverse. When choosing security measures, you cannot count on attackers being unaware of its capabilities.

5. Be simple for Maintenance and convenient for users to use.

6. Be reliable. Any breakdown of technical equipment causes the emergence of uncontrolled channels of information leakage.

7. Be complex, have integrity, meaning that not a single part can be removed without damaging the entire system.

There are also certain requirements for the information security system :

· clear definition of the powers and rights of users to access certain types of information;

· providing the user with the minimum powers necessary for him to perform the assigned work;

· minimizing the number of protection tools common to several users;

· recording cases and attempts of unauthorized access to confidential information;

· ensuring an assessment of the degree of confidential information;

· ensuring control of the integrity of protective equipment and immediate response to their failure.

The historically established approach to classifying government information (data) according to the levels of requirements for its security is based on considering and ensuring only one property of information - its confidentiality (secrecy). Requirements for ensuring the integrity and availability of information, as a rule, appear only indirectly among general requirements to systems for processing this data. It is believed that since only a narrow circle of trusted persons has access to information, the likelihood of its distortion (unauthorized destruction) is negligible. Low level trust in speakers and preference for paper information technology further exacerbating the limitations of this approach.

If such an approach is to some extent justified due to the existing priority of the security properties of important government information, this does not mean that its mechanical transfer to another subject area (with other subjects and their interests) will be successful.

In many areas of activity (subject areas), the proportion of confidential information is relatively small. For commercial and personal information, as well as for government information that is not subject to classification, the priority of information security properties may be different. For open information, the damage from disclosure of which is insignificant, the most important may be such qualities as availability, integrity or security from unauthorized replication. For example, for payment (financial) documents the most important property is their integrity (reliability, undistortedness). Then, in order of importance, comes the property of availability (losing a payment document or delaying payments can be very expensive). There may be no requirements for ensuring the confidentiality of individual payment documents at all.

Attempts to approach the issues of protecting such information from the standpoint of traditionally ensuring only confidentiality fail. The main reasons for this, in our opinion, are the narrowness of the existing approach to information protection, the lack of experience and appropriate developments in terms of ensuring the integrity and availability of non-confidential information.

The development of a system for classifying information according to the levels of requirements for its security involves the introduction of a number of degrees (gradations) of requirements to ensure each of the properties of information security: availability, integrity, confidentiality and protection from replication. An example of gradations of security requirements:

· no requirements;

· low;

· average;

· tall;

· very high.

The number of discrete gradations and the meaning put into them may vary. The main thing is that the requirements for the security of various information properties are indicated separately and quite specifically (based on the seriousness of the possible damage caused to subjects of information relations from violation of each of the information security properties).

In the future, any separate functionally complete document (a certain set of signs) containing certain information, regardless of the type of medium on which it is located, will be called information package.

One type of information package will include packages (standard documents) that are similar in some respects (structure, processing technology, type of information, etc.).

The task is to determine the real levels of interest (high, medium, low, none) of subjects in ensuring the security requirements for each of the properties various types information packages circulating in the AS.

The requirements for the AS protection system as a whole (methods and means of protection) must be determined based on the security requirements for various types of information packets processed in the AS, and taking into account the characteristics of specific technologies for their processing and transmission (vulnerabilities).

Types of information packages with equal priorities and levels of security requirements (the degree of importance of ensuring their security properties: availability, integrity and confidentiality) are combined into one category.

The proposed procedure for determining the requirements for the security of information circulating in the system is presented below:

1. Compiled general list types of information packages circulating in the system (documents, tables). To do this, taking into account the subject area of ​​the system, information packages are divided into types according to its subject matter, functional purpose, similarity of processing technology, etc. signs.

2. At subsequent stages, the initial division of information (data) into packet types can be refined taking into account the requirements for their security.

Then, for each type of packet identified in the first paragraph, and each critical property of information (availability, integrity, confidentiality) are determined (for example, by the method expert assessments):

· list and importance (significance on a separate scale) of subjects whose interests are affected by a violation of this property information;

· the level of damage it causes (insignificant, small, medium, large, very large, etc.) and the corresponding level of security requirements.

When determining the level of damage caused, it is necessary to take into account:

· the cost of possible losses when a competitor obtains information;

· the cost of restoring information if it is lost;

· costs for restoring the normal functioning of the NPP, etc.

If difficulties arise due to a large spread of estimates for various parts information of one type of packet, then you should reconsider the division of information into types of packets, returning to the previous paragraph of the methodology.

3. For each type of information package, taking into account the significance of the subjects and the levels of damage caused to them, the degree of necessary security is established for each of the properties of the information (if the importance of the subjects is equal, the maximum value of the level is selected).

An example of assessing the security requirements for a certain type of information package is given in Table 1.

Table 1

Assessment of security requirements for information packages

Subjects Damage level by information properties
Confidentiality Integrity Availability Replication protection
N 1 No Average Average No
N 2 High Average Average No
N 3 Low Low Low No
Eventually High Average Average No

An information security system, like any system, must have certain types of its own support, relying on which it will perform its target function.

Taking this into account, an information security system may have:

1. Legal support. This includes regulations, regulations, instructions, guidelines, the requirements of which are mandatory within the scope of their validity.

2. Organizational support. This means that the implementation of information security is carried out by certain structural units, such as: document security service; regime, access, security service; information security service by technical means; information and analytical activities and others.

3. Hardware. It is expected that technical means will be widely used both to protect information and to ensure the operation of the information security system itself.

4. Information Support. It includes information, data, indicators, parameters that underlie the solution of problems that ensure the functioning of the system. This may include both indicators of access, accounting, storage, and information support systems for calculation tasks of various nature related to the activities of the security service.

5. Software. It includes various information, accounting, statistical and calculation programs that provide an assessment of the presence and danger of various leakage channels and ways of unauthorized penetration to sources of confidential information.

6. Mathematical software. Involves use mathematical methods for various calculations related to the assessment of the danger of technical means of attackers, zones and standards of necessary protection.

7. Linguistic support. A set of special language means of communication between specialists and users in the field of information security.

8. Regulatory and methodological support. This includes norms and regulations for the activities of bodies, services, tools that implement information security functions, various techniques that ensure the activities of users when performing their work under strict information security requirements.

What may be the requirements for information? The most diverse, depending on what kind of information we are talking about. This concept is very multifaceted. For example, the requirements for a private advertisement for the sale of something will be different from what a newspaper article or television news story must meet.

In order to understand what the information requirements are, you need to clearly understand what exactly is meant by this term.

What is information? Definition

Scientists have not given a single universal definition of this concept. Moreover, many of them, for example, Russian academician Nikita Nikolaevich Moiseev, believe that it is completely impossible to give a single definition of the term “information” due to the wide range of components.

The most common and universal is the idea of ​​information as a list of information about things, events, objects, people, animals or something else. People exchange information directly during communication or receive it in other ways. Of course, the presentation of facts is also information.

What is information? Concept

This word came into Russian speech from Latin. Literally translated, informatio means:

  • familiarization;
  • mixing;
  • clarification.

In fact, any type of communication between people is nothing more than an exchange of information. The transmission of information or the presentation of facts can take any form. These are speech, recordings, images, etc. Information can also be transmitted using conventional signals or technical media.

For humanity it is one of critical resources, with the help of which not only the accumulated knowledge and experience is preserved, but also the process of development of society becomes possible. This concept affects absolutely all spheres of life. Information processes are studied in many scientific disciplines, from philosophy to marketing.

How is this concept classified?

The requirements for information directly depend on the type of information it belongs to. This concept is classified as follows:

  • by way of perception;
  • according to the form of provision;
  • for the intended purpose.

Each of these groups includes several types, which, in turn, can also be divided into even more thematic and narrow ones.

The flow of information is the path of data transmission that ensures the existence of any system. Thus, it is important to know where its source is, conditionally - below or above. For example, the information presented to citizens by the president is a flow of information from above. And rumors that reached the head of state about events in a provincial village are an information flow from below.

Information on the method of perception

Main species included in this type information:

  • visual;
  • tactile;
  • sound;
  • taste;
  • olfactory.

The visual category includes all information that is perceived by a person through the organs of vision. Accordingly, sound transmission of information involves hearing, tactile, olfactory and gustatory - receptors responsible for this type of perception.

Information on the submission form

Depending on the form in which the facts are presented or information is provided, the information may be:

  • text;
  • numerical;
  • graphic;
  • sound.

IN modern world Other categories are also distinguished - information presented on technical media, in videos. Of course, the requirements for text form differ from those for video recordings.

Information on intended use

The intended purpose is the concept of who exactly this or that information is addressed to. According to the “addressee” the information may be:

  • mass;
  • special;
  • personal;
  • secret.

Massive is one that is available to all members of society, without exception or any type of restrictions. As a rule, these are trivial facts and information that are not important for government agencies and are understandable to all people, regardless of their level of culture or education.

Special is one that is characterized by being addressed to a narrow social group and contains specific information. For example, a reference book of terms in higher mathematics is special information. An accounting report, a work schedule, a schedule of holiday events in a particular city are also examples of special information.

Personal is a list of private information related to a specific person and is not in the public domain. Secret is a concept that includes all information and facts that must be protected from dissemination and are of value to government agencies or certain social groups. For example, a business plan for the development oil company- secret information of value to the owners and shareholders of this enterprise. Quantity nuclear warheads- secret information concerning the country's defensive potential.

List of basic information requirements

Of course, the list of what is expected of any information and what it must comply with depends entirely on what type it is. However, there are also basic requirements for information that must be met regardless of what area of ​​life the information relates to.

They are as follows:

  • continuity, speed of collection and processing;
  • timeliness;
  • the reliability of what is stated;
  • reliability and consideration of potential risk;
  • quality and resource intensity;
  • targeting;
  • legal compliance;
  • reusability or one-time use;
  • relevance;
  • compliance with the given topic, if any.

Which information requirement needs to be considered more carefully depends on its type and specific life situation. For example, if we are talking about localizing a fire, then the priority will be collection speed and reliability.

Are data and information the same thing?

The requirements for have some differences due to the fact that these concepts, although close in meaning, are still not identical.

Data is a list of information, instructions, concepts and facts that can be verified, processed and reused. Data is what security systems, computer technology, logisticians, compilers of statistical reports, financiers and others work with.

Thus, the information requirements of documents are the conditions that the data must meet. That is, this is a form of completion, reliability, relevance, legal compliance, convenient provision. For example, a statistical report on profit growth using graphs is data about the company's performance. The information in a passport is data about a person.

Accordingly, data is a narrower concept than information, which is one of its component areas.

What information can I request?

Typically, any request for information concerns data. For example, when applying for a loan from a bank, you are required to provide information about yourself. If the director of an enterprise demands a financial report from the accounting department, this is also the provision of data.

You can request almost any information, but only if it is justified. For example, a person can collect data about his ancestors in city archives. But if he wants to obtain data on the design of the first nuclear warheads, then the requirements for information, namely its safety and secrecy, will not allow this without special permissions.

Many structures and organizations have the right to receive data from a person. The requirements for the information people provide about themselves differ depending on the purposes for which it is collected. For example, when filling out medical documents, you need to provide a list of data that is absolutely not required by customs officials.

Page 38 of 39

Information requirements in the management process.

Information used in control systems must meet certain requirements. These requirements include:

1. Necessary and sufficient quantity and the quality of information, with the qualitative side being dominant.

2. Reliability and accuracy of information , It is completely unacceptable to use false and inaccurate information. If the information is insufficient or approximate, a decision can be made with disastrous consequences. The contradiction lies in the fact that absolutely reliable and accurate information does not exist, and the information that approaches it is of little use for acceptance. management decisions- it becomes outdated quite quickly. The unreliability of information is determined not only by the sources of its receipt, incorrect or ineffective methods of processing it, but also by the goals of its transformation and interpretation of application.

3. Timely receipt of information. Information needed for management must be timely. The requirement for earlier submission of information can often be associated with significant material and financial costs ( increased speed computer processing and throughput communication channels, expert processing of information arrays, etc.). On the other hand, belated information is also of no practical interest.

4. Completeness of information. The manager must have information at his disposal in sufficient volume to ensure effective solution all tasks. Reduced (truncated) information can dramatically reduce management efficiency or even lead to management errors. At the same time, the requirement for completeness of information may border on its redundancy. Both the completeness of information and its incompleteness do not have objective criteria and limitations, which should not be attributed to the advantages or disadvantages of information. This is an objective contradiction that is resolved in the process of creative work of each leader.

5. Utility. To make a decision, certain, specific information is needed, the rest forms information noise. Selection useful information from noise is a complex analytical work and is expensive.

6. Technological characteristics of information, which should include the density of its placement, the possibility of storing it in different conditions, speed of processing, retrieval, printing, presentation, forms of service, etc. The technical and technological perfection of systems, unification of terminology, the procedure for drawing up documents and their presentation are very important here. Information should be divided by levels and levels of management, as well as by normative, reference, calculation, analytical and other areas. Important characteristic is the noise immunity of information - the ability to withstand both active and passive interference. High noise immunity ensures stable control and its necessary confidentiality (preservation of commercial and state secrets). The cost of information in management systems is constantly increasing, which obliges us to strive for constant improvement in the efficiency of its acquisition and use.