Information Management

All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Other


There are 410 entries in the glossary.
Pages: 1 2 3 4 5 6 7 8 9

Term Definition
IDDStorage products. Intelligent Disk Drive. Usually refers to disk drives with either a SCSI or ATA interface
Identification and Authentication (I&A)The service, which protects against the claims of individuals to be someone they are not. Identification is the establishment of the unique identity of an individual, group, or information system component. Authentication is the means for verifying the claimed identity. Use of username and password is an example of I&A. Suggested password length for critical systems is a minimum of 7 characters with forced password changes every 30 days. Non-critical systems should use a 6 character minimum with forced password changes every 60-90 days. The suggested time-out value for screensaver password challenge is 10 minutes or less.
IEEE829An IEEE standard for documenting the testing of software. The standard typically applies to any stage in the testing of developing software, and each stage in the software's development typically is documented using the same application of the standard. The IEEE specifies eight stages in the documentation process, each stage producing its own separate document.
ImagingThe capability of turning a paper based document into digital form and represent it in user viewable format.
IndexingProcess of establishing access points to facilitate retrieval of records and/or information.
InformaticsA term that is used in a variety of ways. Some regard it as the study of the impact that technology has on people. Some take a broader view and consider it to be the science of information and information technology. Others regard it as being broader still, referring to the creation, recognition, representation, collection, organisation, transformation, communication, evaluation and control of information in various contexts.
InformationData elements or objects generated, transferred, stored, processed and destroyed in the conduct of business functions.
Information auditA method of reviewing and mapping information in an organisation. An information audit looks at things like what information is needed, what information there currently is, where it is, in what forms, how it flows around the organisation, where there are gaps and where there is duplication, how much is it costing, what its value is, how it is used etc.
Information Domain
A security entity composed of three elements:

  • a user identified to have some responsibilities or privileges in the management of the objects of an information domain
  • a logical description of information management, which depicts the users, processes, and information, which support a business enterprise
  •  method to ensure that information is used correctly.
Information ManagementA broader professional grouping for all activities and functions concerned with managing information, regardless of its nature or medium. The records management and archives professions fit into this category.
Information Security OfficerThe person appointed by business unit management to be responsible for information security for that business unit.
Information SystemA network of related computer software, hardware and data transmission devices that collects and stores data, and is further more able to retrieve and present that data in a human readable format.
INITSCSI Initiator. SCSI term that describes any device that has initiated an input/output operation on another SCSI device on the bus which in turn is called TARG.
IntegrityThe service that protects information from modification or loss. Restricting user's rights to information as "read only" and use of tape backup systems are examples of Integrity security services.
Interleave FactorStorage products. If a program occupies several sectors, the contents of the first sector will first be transmitted from the controller to the computer system when the program is read. This sector is then saved in the memory, which requires a certain period of time. During this time, however, the disk continues to revolve and so it would be necessary to wait one complete revolution of the disk for access to the next sector. During formatting, the continuous sectors therefore are not arranged one after the other physically, but staggered to reduce this waiting time. With an interleave factor of 3, for instance, two sectors are skipped after each sector read. This means the controller has time to further process its data until the disk surface advances two sectors underneath the head. The next logical sector is physical sector 4, and so on. Modern hard disks with integrated controller and own data buffer, the interleave factor is normally 1:1.
InternetA network consisting of a network of computers.
InterpolationScanners. The process of increasing the resolution of an image by the addition of new pixels throughout the image, the colours of which are based on neighboring pixels.
IntranetEssentially a private Internet. It makes use of the same technology as the Internet but is used to establish a network that is private to a company or organisation. People outside the organisation cannot access it.
IPNetworking. Internet Protocol: Network layer protocol in the TCP/IP protocol suite. IP is the part of TCP/IP which handles routing.
IPX/SPXNetworking. Internetworking Packet eXchange / Sequenced Packet eXchange. Transport layer protocols mainly used in Novell Netware networks but can also be used in Microsoft networks with the NetBIOS interface.
ISISScanners. An industry standard driver interface designed to providing a level of device independence between the scanner and application, ISIS was developed by Pixel Translations
ItemA single indivisible unit within an archive e.g. a letter, a file, a ledger

All | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | Other

Glossary V1.8
Copyright 1998 - 2010 Audata Ltd. All rights reserved.
Audata Ltd, 30 Salisbury Road, Canterbury, Kent, CT2 7HH, UK
Tel: +44(0)203 303 0354 Email:
Audata Ltd. is registered in England, number 355 1839.