How to set up smartphones and PCs. Informational portal

"Valuable information. Selection criteria

The value of information depends mainly on the purpose of making the optimal management decision. In addition, in different eras in different societies within the framework of the dominant paradigm, the very concept of rationality and optimality of decisions can be interpreted differently. As a rule, the criteria for the optimality of managerial decisions can be based on logical, intuitive, ethical and psychological attitudes.

There are several ways to quantify value. All of them are based on the idea of ​​the goal, the achievement of which contributes to the information received. The more information helps to achieve the goal, the more valuable it is considered.

1. If the goal is certainly achievable and, moreover, in several ways, then it is possible to determine the value (V) to reduce material or time costs through the use of information. So, for example, a combination of good subject and alphabetical catalogs of the library, the availability of bibliographic reference books reduce the time for compiling a list of references on a specific issue of interest to us.

This method of determining value was proposed by Stratononich.

  • 2. If the achievement of the goal is not necessary, but likely, then one of the following criteria is used:
    • a) the measure of value proposed by M. M. Bongard and A. A. Kharkevich is:

where R- the probability of achieving the goal before receiving information, and R- after.

Prior probability R depends on the information container or, what is the same, the total amount of information vr = 2-"

So, if all options are equally probable before obtaining information, then p = 1/p(where P is the number of options, and I = login).

Posterior Probability R can be more or less R. In the latter case, the value is negative and such information is called misinformation. An example of the latter is a sign at a fork in the road, which, for some reason, is turned in the other direction. So the probability R is within O 1,

b) the measure of value proposed by V. I. Korogodin is the value

It has the same properties as the value in the formula of M. M. Bongard and A. A. Kharkevich, but varies from 0 to 1.

The value of information depends on the value R- the probability of achieving the goal before receiving information, i.e., on what preliminary (a priori) information the receptor already has. Prior awareness is called thesaurus. If there is none, then the a priori probability in all cases is the same and is equal to R- 1/n (where P- number of options). In this case, the value R plays the role of a normalization factor. If, after receiving the information, the goal is achieved for sure (Р = 1), then the value of this information is maximum and equals Fs= V niax = logi/7., i.e. coincides with the maximum amount of information in this set. This coincidence is not accidental, for this the form was chosen, while the value of information can be understood as the amount of valuable information.

The amount of information that has zero value, as a rule, is not small compared to the amount of information that has at least some value (positive or negative). It follows that the value of information is subjective.

The value of the data can be ranked according to certain predetermined criteria. As a rule, it is the level of potential beneficial and negative effects for the organization. The rating can be assigned both to the information itself and to its sources.

The value of information refers to a wide range of properties of information that determine the degree of influence and impact on the activities of the organization. If the information concerns minor issues and errors in the analysis of such information do not lead to significant damage, then such information can, to a certain extent, be neglected. At the same time, data on a situation that is fraught with the bankruptcy of the organization require increased attention and the attraction of significant resources, even if the risk is unlikely.

Although the value of information includes a set of indicators, the main criterion of significance is the potential damage or, conversely, reward for the organization, measured in natural or monetary terms.

Representativeness - correctness, qualitative adequacy of the reflection of the given properties of the object. The representativeness of information depends on the correctness of its selection and formation. In this case, the most important importance is acquired by: the fidelity of the concept, on the basis of which the initial concept, displayed by the indicator, is formulated; the validity of the selection of essential features and relationships of the displayed phenomenon; the correctness of the measurement methodology and the algorithm for the formation of an economic indicator. Violation of the representativeness of information often leads to its significant errors, most often called algorithmic.

With an increase in the content of information, the semantic capacity of the information system increases, since it is necessary to convert a smaller amount of data to transfer the same information.

The sufficiency (completeness) of economic information means that it contains a minimum, but sufficient set of economic indicators for making the right managerial decision. The concept of information sufficiency is connected with its semantic content (semantics) and pragmatics. Both incomplete, that is, insufficient for making the right decision, and redundant information reduce the effectiveness of management; Complete information is of the highest quality.

The availability of information for perception when making a managerial decision is ensured by the implementation of the appropriate procedures for obtaining and converting it. So, the purpose of the computing system is to increase the availability of information by coordinating it with the user's thesaurus, that is, converting it to an accessible and user-friendly form.

The relevance of information is the property of information to retain its usefulness (value) for management over time. Relevance depends on the statistical characteristics of the displayed object (on the dynamics of changes in these characteristics) and on the time interval that has elapsed since the occurrence of this information.

Timeliness is a property of information that makes it possible to use it at a given point in time. Untimely information leads to economic losses in both management and production. The reason for the economic losses from untimeliness in the field of management is the violation of the established regime for solving functional problems, and sometimes their algorithms. This leads to an increase in the cost of solving problems due to a decrease in rhythm, an increase in downtime and overtime, etc. in the field of material production. Losses from untimely information are associated with a decrease in the quality of management decisions, decision-making based on incomplete information or low-quality information. Timely is such information that can be taken into account when developing a management decision without violating the regulations, which enters the management system no later than the appointed time.

The stability of information is the property of the resulting information to respond to changes in the initial data, while maintaining the necessary accuracy. The stability of information, as well as its representativeness, is primarily due to the methodological correctness of its selection and formation.

Information security is the property of information to resist unauthorized access and its deliberate distortion. The security of information is ensured by its cryptographic closure and, in particular, by digital signature.

The usefulness of information is a complex indicator of its quality, its measure at the pragmatic level. The usefulness of information is determined by the effectiveness of the management carried out on its basis.

One example of a modern method for assessing the value of information is the PageRank method used by the company.

PageRank is one of the link ranking algorithms. The algorithm is applied to a collection of hyperlinked documents (such as web pages from the World Wide Web) and assigns each of them a numerical value that measures its "importance" or "authority" among other documents. Generally speaking, the algorithm can be applied not only to web pages, but also to any set of objects interconnected by mutual links, that is, to any graph. PageRank is a numerical value that characterizes the "importance" of a web page. The more links to a page, the more important it is. In addition, the “weight” of page A is determined by the weight of the link transmitted by page B. Thus, PageRank is a method of calculating the weight of a page by calculating the importance of links to it.

The Google Toolbar browser add-on displays for each web page an integer between 0 and 10, which it calls PageRank, or the importance of that page from Google's point of view. According to some reports, these values ​​are updated only a few times a year (while the internal PageRank values ​​are recalculated continuously) and show PageRank values ​​of pages on a logarithmic scale.

While information about events that have occurred in the past can only be judged in terms of its reliability, events that will occur in the future cannot be spoken of in terms of reliability. To evaluate them, it is necessary to take into account the probability factor.

The degree (relative measure, quantitative assessment) of the possibility of the occurrence of some event. When the reasons for some possible event to actually occur outweigh the opposite reasons, then this event is called probable, otherwise - unlikely or improbable. The preponderance of positive grounds over negative ones, and vice versa, can be to varying degrees, as a result of which the probability (and improbability) is greater or lesser. Therefore, the probability is often estimated at a qualitative level, especially in cases where a more or less accurate quantitative assessment is impossible or extremely difficult. Various gradations of "levels" of probability are possible.

The empirical "definition" of probability is related to the frequency of the occurrence of an event, based on the fact that with a sufficiently large number of trials, the frequency should tend to the objective degree of possibility of this event. In the modern presentation of the theory of probability, probability is defined axiomatically, as a special case of the abstract theory of the measure of a set. However, the link between the abstract measure and the probability, which expresses the degree of possibility of an event, is precisely the frequency of its observation.

With the help of neural network modeling, in practice, they solve the problem of determining the probability of bankruptcy or insolvency.

If the information is determined to be insufficiently reliable, it is possible to analyze what actions can be taken to double-check it.

The first stage in the process of internal control is the process of perception of information, i.e., information fixation, and the reflection of individual properties and conditions of the external environment, arising from direct impact, in the relevant systems of the organization.

Exteroceptive perception involves seeking and receiving information from the external environment.

Interoceptive perception includes the search for and receipt of information coming from the internal environment.

After the information is recorded, first of all, its qualities such as significance, materiality, impact, relevance, modality, intensity, localization and duration are evaluated.

Value can be determined by a simple ranking method. The following scale can be used to assess significance.

Table 2.3. Value rating scale

ting

Grade

Description

Probability

Consequences

Is critical to the operation of the organization

Very high

catastrophic

high importance

Significant

Average significance

Moderate

Minor

Low significance

Minor

Minor

Minor

Minor

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Hosted at http://www.allbest.ru/

  • I. Not matter or energy
  • 1.1 Information transfer scheme
  • 1.2 The value of information
  • II. Economic information and its features
  • Conclusion

I. Not matter and not energy

Information- information about the world around us, about the processes taking place in it, which are perceived by living organisms, control machines and other information systems.

Information is a reflection of the outside world with the help of signs or signals. The informational value of a message lies in the new information it contains (in the reduction of ignorance).

Information properties:

1) completeness,

2) reliability,

3) value,

4) relevance,

5) clarity.

The word "information" is Latin. For a long life, its meaning has undergone evolution, sometimes expanding, sometimes narrowing its boundaries to the limit. Initially, the word "information" meant: "representation", "concept", then - "information", "transmission of messages".

In recent years, scientists have decided that the usual (accepted) meaning of the word "information" is too elastic, vague, and gave it this meaning: " measure certainty v message".

Information theory was brought to life by the needs of practice. Its origin is associated with the work of Claude Shannon "Mathematical Theory of Communication", published in 1946. The foundations of information theory are based on the results obtained by many scientists. By the second half of the 20th century, the globe was buzzing with transmitted information, running through telephone and telegraph cables and radio channels. Later, electronic computers appeared - information processors. And for that time, the main task of information theory was, first of all, to increase the efficiency of the functioning of communication systems. The difficulty in the design and operation of means, systems and communication channels is that it is not enough for the designer and engineer to solve the problem from physical and energy positions. From these points of view, the system can be the most perfect and economical. But it is also important when creating transmission systems to pay attention to what number information will pass through this transmission system. After all, information can be quantified, calculated. And they act in such calculations in the most usual way: they abstract from the meaning of the message, as they renounce concreteness in the arithmetic operations familiar to all of us (as from the addition of two apples and three apples they pass to the addition of numbers in general: 2 + 3).

The scientists said they "completely ignored human evaluation of the information." To a sequence of 100 letters, for example, they assign a certain meaning to information, without regard to whether that information makes sense and whether, in turn, practical application makes sense. The quantitative approach is the most developed branch of information theory. According to this definition, a collection of 100 letters—a 100-letter phrase from a newspaper, Shakespeare's play, or Einstein's theorem—has exactly the same amount of information.

This quantification of information is highly useful and practical. It corresponds exactly to the task of the communications engineer, who must convey all the information contained in the submitted telegram, regardless of the value of this information for the addressee. The communication channel is soulless. One thing is important for the transmitting system: to transmit the required amount of information in a certain time. How to calculate the amount of information in a particular message?

The assessment of the amount of information is based on the laws of probability theory, more precisely, it is determined through the probabilities of events. This is understandable. The message has value, carries information only when we learn from it about the outcome of an event that has a random character, when it is to some extent unexpected. After all, the message about the already known does not contain any information. Those. if, for example, someone calls you on the phone and says: “It is light during the day and dark at night,” then such a message will surprise you only with the absurdity of the statement of the obvious and well-known, and not with the news that it contains.

Another thing, for example, the result of the race at the races. Who will come first? The outcome here is hard to predict.

The more the event of interest to us has random outcomes, the more valuable the message about its result, the more information.

An event message that has only two equally possible outcomes contains one piece of information called bit. The choice of the unit of information is not accidental. It is associated with the most common binary way of encoding it during transmission and processing.

Let us try, at least in the most simplified form, to imagine that general principle of the quantitative evaluation of information, which is the cornerstone of the entire theory of information.

We already know that the amount of information depends on the probabilities of certain outcomes of an event. If an event, as scientists say, has two equally likely outcomes, this means that the probability of each outcome is 1/2. This is the probability of getting heads or tails when tossing a coin. If an event has three equally likely outcomes, then the probability of each is 1/3. Note that the sum of the probabilities of all outcomes is always equal to one: after all, one of all possible outcomes will definitely come.

An event, as you understand, can have unequal outcomes. So, in a football match between strong and weak teams, the probability of a strong team winning is high - for example, 4/5. The probability of a draw is much less, for example 3/20. The probability of defeat is very small.

information economic value sign

It turns out that numberinformation - itmeasuredecreaseuncertaintysomesituations. Various amounts of information are transmitted over communication channels, and numberpassingacrosschannelinformationnotmaybebemorehisthroughputcapabilities. And it is determined by how much information passes here per unit of time.

One of the characters in Jules Verne's novel "The Mysterious Island", journalist Gideon Spillet, transmitted a chapter from the Bible by telephone so that his competitors could not use the telephone. In this case, the channel was loaded completely, and the amount of information was equal to zero, because the subscriber received information known to him. This means that the channel was idle, passing a strictly defined number of pulses, without loading them with anything.

Meanwhile, the more information each of a certain number of pulses carries, the more fully the channel bandwidth is used. Therefore, it is necessary to intelligently encode information, to find an economical, stingy language for transmitting messages.

The information is "screened" in the most thorough manner. In the telegraph, frequently occurring letters, combinations of letters, even whole phrases are depicted with a shorter set of zeros and ones, and those that are less common are shown with a longer one. Vcase,whenreducelengthcodethe wordsforoftenencounteredsymbolsandincreaseforrarelymeeting,they sayabouteffective coding information.

But in practice, it often happens that the code resulting from the most thorough "sifting", a convenient and economical code, can distort the message due to interference, which, unfortunately, always happens in communication channels: sound distortion in the phone, atmospheric noise in radio, distortion or darkening of the image in television, transmission errors in the telegraph. These interferences, or, as they are called by experts, noise, fall on the information. And from this there are the most incredible and, of course, unpleasant surprises.

Therefore, to increase the reliability in the transmission and processing of information, it is necessary to introduce extra characters - a kind of protection against distortion. They - these extra characters - do not carry the actual content in the message, they redundant. From the point of view of information theory, everything that makes a language colorful, flexible, rich in shades, multifaceted, multi-valued, is redundancy. How redundant from such positions is Tatyana's letter to Onegin! How much informational excesses are in it for a short and understandable message "I love you"! And how informationally accurate are the hand-drawn signs that are clear to anyone and everyone who enters the subway today, where instead of the words and phrases of announcements there are laconic symbolic signs indicating: "Entrance", "Exit".

In this regard, it is useful to recall an anecdote told at one time by the famous American scientist Benjamin Franklin about a hatter who invited his friends to discuss a sign project.

It was supposed to draw a hat on the sign and say: "John Thompson, a hatter, makes and sells hats for cash."

One of the friends remarked that the words "for cash" are redundant - such a reminder would be offensive to the buyer. Another found the word "sells" superfluous, since it goes without saying that a hatter sells hats, and does not give them away for free. A third thought that the words "hatter" and "makes hats" were an unnecessary tautology, and the last words were thrown out. The fourth suggested that the word "hatter" be thrown out as well - the painted hat clearly says who John Thompson is. Finally, the fifth assured that it was completely indifferent to the buyer whether the hatter was called John Thompson or otherwise, and suggested that this indication be dispensed with.

Thus, in the end, there was nothing left on the sign but a hat.

Of course, if people used only such codes, without redundancy in messages, then all "information forms" - books, reports, articles - would be extremely brief. But they would lose in intelligibility and beauty.

1.1 Communication scheme

Every event, every phenomenon serves as a source of information.

Every event, every phenomenon can be expressed in different ways, in different ways, in different ways. alphabetically. To information more exactly and economically hand over on channels communications, her necessary respectively encode.

Information cannot exist without a material carrier, without energy transfer. The encoded message takes the form of information carrier signals. They are on the channel. Having reached the receiver, the signals should regain a generally understandable form.

To this end, the signals run through the decoding device, acquiring a form convenient for the subscriber. The communication system worked, the goal was achieved. When talking about communication channels, about communication systems, most often they take the telegraph as an example. But communication channels are a very broad concept, including many different systems.

To make clear the many-sided nature of the concept of "communication channel", it is enough to give a few examples.

In telephone transmission, the source of the message is the speaker. The encoder that changes the sounds of words into electrical impulses is the microphone. The channel through which information is transmitted is a telephone wire. The part of the tube that we bring to our ear acts as a decoding device. Here the electrical signals are again converted into sounds. And finally, the information enters the "receiving device" - the human ear at the other end of the wire. But the communication channel is of a completely different nature - a living nerve. Here all messages are transmitted by a nerve impulse. But in technical communication channels, the direction of information transfer can change, but through the nervous system, the transfer goes in one direction.

Another example is a computer. And here are the same characteristics. Separate computer systems transmit information to one another using signals. After all, a computer is an automatic device for processing information, just like a machine tool is a device for processing metal. The machine does not create information from "nothing", it transforms only what is entered into it.

General scheme of information transfer.

1.2 The value of information

We already know that the quantitative method - one of the directions in information theory - is the most common and most developed. There are other methods as well. They, as opposed to quantitative, try to capture the meaning of information, its value, its quality.

The amount of information in two messages can be exactly the same, but the meaning is completely different. Two words, such as "World" and "Rome", contain the same amount of information, consist of the same letters, but the meaning of the words is different.

In everyday life, we, as a rule, evaluate the information received from the semantic side: we perceive new information not as a certain amount of information, but as new content. Is it possible to calculate the meaning of the information, to count it in the message? Yes, it is trying semantictheoryinformation. Here is another example and another direction (pragmatic - business) in this science.

Passengers ride on the bus. The driver announces the stop. Some people get out, the rest do not pay attention to the words of the driver - the information transmitted to them. Why? Because the information here is different value for recipients, which in this example are passengers. The one for whom the information was valuable came out. Means, valuecandefinehowpropertyinformation,influencingon thebehaviorherrecipient.

II. Economic information and its features

Information is a fundamental concept of informatics. Economic information is understood as the knowledge that reduces uncertainty in relation to objects of interest to us, events, processes occurring in the economic sphere, and the management and processing of economic information is called EIS. Economic information is characterized by simple algorithms, the predominance of logical operations on arithmetic, tabular presentation of input and output data. The most important feature of the classification of economic information system:

relation to a given control system, this allows you to divide messages into input, internal, output.

a sign of time, messages are divided into promising (planned and predicted information), retrospective (accounting information).

by time of receipt: periodically, by request.

functional sign, according to the functional subsystems of the object's eq: - information about labor, material, financial resources, production processes. - a sign of stability: constant (data never changes), conditionally constant, variable. Stability coefficient = number of unchanged information / total number of units of information Coefficient = 0.88 information is conditionally constant.

The structure of economic information determines its structure, the allocation of certain documents. Such elements are called information units. From simple IE complex ones are formed - composite ones. The smallest indivisible IE is props - an attribute. Requisites can be divided into two groups: base and features. The basis characterizes the quantitative properties of the entity, obtained as a result of the issuance of counting natural units, weighing, measuring, calculating.

Signs express, as a rule, the qualitative properties of the entity and characterize the circumstances under which the details were obtained - the grounds. Larger IE than requisites have an indicator. Indicators are formed from one basis and the attribute details related to it. Even larger indicators are arrays and streams.

The array is a set of indicators and details combined on the basis of homogeneity. A set of arrays related to one control function is called a thread. The totality of flows characterizing management work as a whole is called the information system of the management object. In the process of decomposition of the components of the economic information system, the following are distinguished: functional and supporting parts.

Functional- a number of subsystems that depend on the characteristics of a particular economic information system. These subsystems are divided according to a certain feature (functional or structural) and combine the corresponding complexes of management tasks. The supporting part of the economic information system consists of: information, software, mathematical, technical, legal, linguistic, ergonomic and metrological parts. The composition of the information support includes out-of-machine and in-machine support. (off-machine software includes: classifiers of technical and economic information, regulatory reference information, methodological materials for the organization and use of the listed components. In-machine information support - an information base and a DBMS, software - a set of programs that implement the goals and objectives of the EIS).

The composition of software tools: system-wide, application software, instructive and methodological materials on the use of software tools. Mathematical software includes: a set of methods for solving control problems, models, information processing algorithms. Technical support includes the whole complex of technical means that ensure the operation of the system, i.e. technical means of collecting, registering, transmitting, processing, displaying, reproducing information.

Conclusion

In information theory, many systems, methods, approaches, ideas are being developed nowadays. However, scientists believe that new trends will be added to the modern trends in information theory, new ideas will appear. As proof of the correctness of their assumptions, they cite the "live", developing nature of science, point out that information theory is surprisingly quickly and firmly introduced into the most diverse areas of human knowledge. Information theory has penetrated physics, chemistry, biology, medicine, philosophy, linguistics, pedagogy, economics, logic, technical sciences, and aesthetics. According to the experts themselves, the doctrine of information, which arose due to the needs of the theory of communication and cybernetics, stepped over their limits. And now, perhaps, we have the right to talk about information as a scientific concept that puts into the hands of researchers an information-theoretical method with which you can penetrate into many sciences about animate and inanimate nature, about society, which will allow not only to look at all problems from a new perspective. side, but also to see the unseen. That is why the term "information" has become widespread in our time, becoming part of such concepts as the information system, information culture, even information ethics.

Many scientific disciplines use information theory to emphasize a new direction in the old sciences. This is how, for example, information geography, information economics, and information law arose.

But the term "information" has become extremely important in connection with the development of the latest computer technology, the automation of mental work, the development of new means of communication and information processing, and especially with the emergence of computer science.

One of the most important tasks of information theory is the study of the nature and properties of information, the creation of methods for its processing, in particular, the transformation of a wide variety of modern information into computer programs, with the help of which the automation of mental work takes place - a kind of strengthening of intelligence, and hence the development of the intellectual resources of society.

Economic information reflects socio-economic processes both in the sphere of production and in the non-production sphere. Economic information, like any other, is necessary in order to make certain decisions.

In the structure of information activity, the following typical technological operations can be distinguished: collection of information (primary documents), analytical and synthetic processing of information, storage of information (formation and maintenance of an information fund), information search, reproduction (copying, reproduction) of documents, transfer of information, provision of processed information to consumers.

The data bank is a modern form of organization of storage and access to information in automated systems.

List of sources used

1. Pekelis V. Cybernetics from A to Ya. M., 1990.

2. Dmitriev V. Applied information theory. M., 1989.

3. Computers, systems and networks: Textbook / A.P. Pyatibratov, S.N. Belyaev, G.M. Kozyreva and others; Ed. Prof. A.P. Pyatibratov. - M.: Finance and statistics, 1991. - 400 p.

4. Chernyak N.G. and other Architecture of computer systems and networks: Proc. allowance / N.G. Chernyak, I.N. Buravtseva, N.M. Pushkin. - 2nd ed., revised. and additional - M.: Finance and statistics, 1986. - 318 p.

5. Figurnov V.E. IBM PC for the user, 2nd ed., revised and supplemented. - M.: Finance and statistics, Computer Press, 1991. - 288 p.

6. Figurnov V.E. IBM PC for the user. Ed. 6th revised. And extra. - M.: INFRA-M, 1996. - 432 p.

7. McDona R. Fundamentals of microcomputer computing: Per. from English. / T.G. Nikolskaya; Ed. V.F. Shangin. - M.: Higher. Shk., 1989. - 272 p.

8. A.N. Voroshchuk. Fundamentals of digital computers and programming. The main edition of the physical and mathematical literature of the publishing house "Nauka", M., 1978.

9. Abel P. Assembly language for IBM PC and programming / Per. from English. Yu.V. Salnikov. - M.: Higher. Shk., 1992. - 447 p.

10. Ovechkin Yu.A. Microelectronics: Textbook for technical schools. - M.: Radio and communication, 1982 - 288 p.

11. Kagan B.M. Electronic computers and systems: Proc. allowance for universities. - 2nd ed., revised. and additional - M.: Energoatomizdat, 1985. - 552 p.

Hosted on Allbest.ru

Similar Documents

    Fundamentals of the theory of information transmission. Experimental study of quantitative aspects of information. Amount of information on Hartley and K. Shannon. Frequency characteristics of text messages. The amount of information as a measure of the removed uncertainty.

    laboratory work, added 02/15/2011

    Information as a reflection of the objective world with the help of signs and signals; properties, display, measurement, computer technologies of information processing. Architecture of hardware and software of personal computers. Working with application programs.

    course of lectures, added 09.10.2009

    The amount of information and its measure. Determining the amount of information contained in a message from the source's message ensemble. Properties of the amount of information and entropy of messages. Redundancy, informational characteristic of the source of discrete messages.

    abstract, added 08/08/2009

    The essence of the term "information". Information as a relationship between a message and its consumer. Properties of information: philosophical, cybernetic approach. Characteristics of information carriers. Units of quantity of information: probabilistic and volumetric approaches.

    abstract, added 03/27/2010

    Basic properties of information. The minimum unit for measuring the amount of information, its analogy with knowledge from the point of view of the process of cognition. Characteristics of the main information processes: search, collection, processing, transmission and storage of information.

    test, added 10/01/2011

    Ways of transferring and storing information by the most reliable and economical methods. Relationship between probability and information. The concept of a measure of the amount of information. Entropy and its properties. Formula for calculating entropy. Average amount of information.

    abstract, added 08/19/2015

    The mechanism of information transfer, its quantity and measurement criteria. Units of information depending on the base of the logarithm. Basic properties and characteristics of the amount of information, its entropy. Definition of entropy, redundancy of information messages.

    abstract, added 08/10/2009

    Information and information processes in nature, society, technology. Information activity of a person. Information encoding. coding methods. Image encoding. Information in cybernetics. Information properties. Measuring the amount of information.

    abstract, added 11/18/2008

    Types of information that modern computers work with. The concept of "information": in physics, biology, cybernetics. Representation of information. Coding and channels of information transmission. Local computer networks. Storing information in files.

    control work, added 01/13/2008

    The concept of information. Computer science, a short history of computer science. Information analog and digital. Analog-to-digital conversion, analog and digital devices. The concept of information encoding. Storage of digital information. Bit.

Topic: "BASIC CONCEPTS AND PROVISIONS OF INFORMATION PROTECTION IN INFORMATION SYSTEMS"

The main objectives of studying the discipline are to introduce students to specific information security systems and instill some practical skills in the field of building secure information systems that operate within the same enterprise (organization).

As a discipline of specialization, this course prepares students for a specific professional activity and should serve as a basis for their further growth in the positions of information security specialists.

The entry of mankind into the 21st century is marked by the rapid development of information technologies in all spheres of public life. Information is increasingly becoming a strategic resource of the state, a productive force and an expensive commodity. This cannot but cause the desire of states, organizations and individual citizens to gain advantages by mastering information that is inaccessible to opponents, as well as by damaging the information resources of the enemy (competitor) and protecting their information resources.

The importance of ensuring the security of the state in the information sphere is emphasized in the "Doctrine of Information Security of the Russian Federation" adopted in September 2000: "The national security of the Russian Federation essentially depends on ensuring information security, and in the course of technological progress this dependence will increase".

The severity of interstate information confrontation can be observed in the defense sphere, the highest form of which is information warfare. Elements of such a war have already taken place in local military conflicts in the Middle East and the Balkans. Thus, NATO troops managed to disable Iraq's air defense system with the help of information weapons. Experts suggest that the alliance troops used a software tab, embedded in advance in printers that were purchased by Iraq from a French company and used in the air defense automated control system.

No less acute is the issue of information confrontation at the level of organizations and individual citizens. This is evidenced by numerous attempts by criminal elements to gain control over computer technology for material gain. According to the Institute for Computer Security in San Francisco, of the surveyed information security professionals, 64% report security breaches, 44% report tampering with files, 25% report attacks leading to system disruption, and 24% report attacks from outside , 18% - about the theft of important information, 15% - about financial abuse, 14% - about intentional data damage. All these types of violations lead to significant material damage. In contrast to this, it is necessary to create organizational and technical security systems in automated systems.

It is also important to ensure the constitutional rights of citizens to receive reliable information, to use it in the interests of carrying out legal activities, as well as to protect information that ensures personal security.

The confrontation of states in the field of information technology, the desire of criminal structures to illegally use information resources, the need to ensure the rights of citizens in the information sphere, the presence of many random threats cause an urgent need to ensure the protection of information in computer systems (CS), which are the material basis of informatization of society.

The problem of ensuring information security at all levels can be successfully solved only if an integrated information protection system is created and operates, covering the entire life cycle of computer systems from development to disposal and the entire technological chain of collecting, storing, processing and issuing information.

Information(from lat. information- awareness, clarification, presentation, from lat. informare- to give shape) - in a broad sense, an abstract concept that has many meanings, depending on the context. In the narrow sense of the word - information (messages, data) regardless of the form of their presentation. Currently, there is no single definition of the term information. From the point of view of various fields of knowledge, this concept is described by its specific set of features. For example, "information" can be interpreted as a set of data recorded on a material carrier, stored and distributed in time and space.

That is, Wiener attributed information (in the information-theoretic sense of this term) to fundamental concepts that cannot be derived through simpler ones. That, however, does not prevent us from explaining the meaning of the concept of information on specific examples and describing its properties. For example, if in the course of interaction between objects one object transfers some substance to another, but does not lose it itself, then this substance is called information, and the interaction is called informational.

Information has a number of features:

She is intangible;

The intangibility of information is understood in the sense that its parameters cannot be measured by known physical methods and instruments. Information has no mass, energy, etc.

Information is stored and transmitted using material media;

Information is stored and transmitted on physical media. Such media are the human brain, sound and electromagnetic waves, paper, machine media (magnetic and optical disks, magnetic tapes and drums), etc.

Any material object contains information about itself or about another object.

Information has the following properties

1. Information is available to a person if it is contained on a material carrier.

Therefore, it is necessary to protect material information carriers, since only material objects can be protected with the help of material means.

2. Information has value.

The value of information is determined by the degree of its usefulness to the owner. The possession of true (reliable) information gives its owner certain advantages. True or reliable information is information that reflects the objects and processes of the surrounding world with sufficient accuracy for the owner (user) within certain time and space limits.

Information that misrepresents reality (inaccurate information) can cause significant material and moral damage to the owner. If the information is deliberately distorted, then it is called disinformation .

The Law "On Information, Informatization and Protection of Information" guarantees the right of the owner of information to use it and protect other persons (organizations) from accessing it.

If access to information is restricted, then such information is confidential. Confidential information may contain state or commercial secrets.

A commercial secret may contain information belonging to a private person, a firm, a corporation, etc. A state secret may contain information belonging to the state (state institution). In accordance with the law "On State Secrets", information of value to the state can be assigned one of three possible degrees of secrecy. In order of increasing value (importance) of information, it can be assigned a degree (bar) "secret", "top secret" or "special importance". In government agencies, less important information may be classified as "for official use."

Three categories are used to indicate the value of confidential business information:

- "trade secret - strictly confidential";

- "trade secret - confidential";

- "trade secret".

Another approach to grading the value of commercial information is also used:

- "strictly confidential - strict accounting";

- "strictly confidential";

- "confidential".

Basic concepts

System(from Greek systema- a whole, a connection made up of parts) is a set of elements interacting with each other, forming a certain integrity, unity. Here are some concepts that are often used to characterize a system.

1. System element- a part of the system that has a specific functional purpose. Complex elements of systems, in turn, consisting of simpler interconnected elements, are often called subsystems.

2. System organization- internal orderliness, consistency of the interaction of the elements of the system, which manifests itself, in particular, in limiting the diversity of the states of the elements within the system.

3. System Structure- composition, order and principles of interaction of the elements of the system, which determine the main properties of the system. If the individual elements of the system are spaced apart at different levels and the internal connections between the elements are organized only from higher to lower levels and vice versa, then they speak of hierarchical structure systems. Purely hierarchical structures are practically rare, therefore, expanding this concept somewhat, a hierarchical structure is usually understood to mean such structures where, among other connections, hierarchical connections are of paramount importance.

4. System architecture- a set of system properties that are essential for the user.

5. System Integrity- the fundamental irreducibility of the properties of the system to the sum of the properties of its individual elements (the emergence of properties) and, at the same time, the dependence of the properties of each element on its place and function within the system.

Information system- an interconnected set of means, methods and personnel used for storing, processing and issuing information in the interests of achieving the goal.

The Federal Law "On Information, Informatization and Information Protection" provides the following definition:

"Information system- an organizationally ordered set of documents (arrays of documents) and information technologies, including the use of computer technology and communication tools that implement information processes"

Scale classification

By scale, information systems are divided into the following groups:

single;

group;

corporate.

Single information systems are implemented, as a rule, on a stand-alone personal computer (the network is not used). Such a system may contain several simple applications connected by a common information fund, and is designed for the operation of one user or a group of users who share one workplace in time. Such applications can be created using so-called desktop or local database management systems (DBMS). Among the local DBMS, the most famous are Clarion, Clipper, FoxPro, Paradox, dBase and Microsoft Access.

Group information systems are focused on the collective use of information by members of the working group and are most often built on the basis of a local area network. These applications are developed using database servers (also called SQL servers) for workgroups. There are a fairly large number of different SQL servers, both commercial and freely distributed. Among them, the most famous database servers are Oracle, DB2, Microsoft SQL Server, InterBase, Sybase, Informix.

Corporate information systems are an evolution of systems for workgroups, they are focused on large companies and can support geographically dispersed nodes or networks. Basically, they have a hierarchical structure of several levels. Such systems are characterized by a client-server architecture with specialization of servers or a multi-level architecture. When developing such systems, the same database servers can be used as when developing group information systems. However, in large information systems, the most widely used servers are Oracle, DB2 and Microsoft SQL Server.

For group and corporate systems, the requirements for the reliability of operation and data safety are significantly increased. These properties are provided by maintaining the integrity of data, links and transactions in the database servers.

Classification by scope

According to the scope of information systems are usually divided into four groups:

transaction processing systems;

Decision-making systems;

information and reference systems;

office information systems.

Transaction processing systems, in turn, according to the efficiency of data processing, are divided into batch information systems and operational information systems. In information systems of organizational management, the mode of operational processing of transactions prevails, to reflect up-to-date state of the subject area at any time, and batch processing occupies a very limited part.

Decision support systems - DSS (Decision Support Systeq) - are another type of information systems in which, with the help of rather complex queries, data is selected and analyzed in various sections: temporal, geographical and other indicators.

Extensive class information and reference systems based on hypertext documents and multimedia. Such information systems have received the greatest development on the Internet.

Class office information systems is aimed at converting paper documents into electronic form, office automation and document management.

Classification by way of organization

According to the method of organization, group and corporate information systems are divided into the following classes:

systems based on file-server architecture;

systems based on client-server architecture;

systems based on a multi-level architecture;

· Systems based on Internet/Intranet technologies.

In any information system, it is possible to identify the necessary functional components that help to understand the limitations of various information system architectures.

File server architecture only extracts data from files so that additional users and applications add only a minor load on the CPU. Each new client adds processing power to the network.

Client-server architecture is designed to solve the problems of file server applications by separating application components and placing them where they will function most efficiently. A feature of the client-server architecture is the use of dedicated database servers that understand queries in the Structured Query Language SQL (Structured Query Language) and search, sort and aggregate information.

Currently, the client-server architecture has been recognized and widely used as a way to organize applications for workgroups and enterprise-level information systems. This organization of work increases the efficiency of application execution by using the capabilities of the database server, offloading the network and ensuring data integrity control.

Layered architecture became the development of the client-server architecture and in its classical form consists of three levels:

The lower layer is the client applications having a programming interface to invoke the middle layer application;

The middle tier is the application server;

The top level is a remote specialized database server.

The three-tier architecture further balances the load across different hosts and networks, promotes specialization of application development tools, and eliminates the shortcomings of the two-tier client-server model.

In development technologies Internet/Intranet the main emphasis so far is on the development of software tools. At the same time, there is a lack of developed tools for developing applications that work with databases. A compromise solution for creating convenient and easy-to-use and maintain information systems that effectively work with databases was the combination of Internet / Intranet technologies with a multi-level architecture. In this case, the structure of the information application takes the following form: browser - application server - database server - dynamic page server - web server.

According to the nature of the stored information, databases are divided into factual and documentaries. If we draw an analogy with the examples of information repositories described above, then factographic databases are file cabinets, and documentary databases are archives. Factual databases store brief information in a strictly defined format. Documentary databases contain all sorts of documents. Moreover, it can be not only text documents, but also graphics, video and sound (multimedia).

An automated control system (ACS) is a complex of hardware and software tools, together with organizational structures (individuals or a team), that provides control of an object (complex) in an industrial, scientific or public environment.

Allocate education management information systems (For example, personnel, applicant, student, library programs). Automated systems for scientific research (ASNI), which are software and hardware systems that process data from various kinds of experimental setups and measuring instruments, and, based on their analysis, facilitate the detection of new effects and patterns. Computer-aided design systems and geographic information systems.

An artificial intelligence system built on the basis of high-quality special knowledge about a certain subject area (obtained from experts - specialists in this field) is called an expert system. Expert systems - one of the few types of artificial intelligence systems - are widely used and have found practical application. There are expert systems for military affairs, geology, engineering, computer science, space technology, mathematics, medicine, meteorology, industry, agriculture, management, physics, chemistry, electronics, law, etc. And only the fact that expert systems remain very complex, expensive, and, most importantly, highly specialized programs, hinders their even wider distribution.

Expert systems (ES) are computer programs designed to perform those types of activities that are within the power of a human expert. They work in a way that mimics the behavior of a human expert, and differs significantly from precise, well-reasoned algorithms and does not resemble the mathematical procedures of most traditional developments.

The subject of our study is information technologies that are put into practice in automated information systems (AIS) for various purposes.

The main means (tool) of automating the professional activities of people today are the means of computer and communication.

As the main classification feature of AIS, it is advisable to consider the features of automated professional activity - the process of processing input information to obtain the required output information, in which AIS acts as a tool of an official or a group of officials involved in the management of the organizational system.

In accordance with the proposed classification feature, the following classes of AIS can be distinguished:

· automated control systems (ACS);

decision support systems (DSS);

· automated information and computing systems (AIVS);

Automated learning systems (ATS);

· automated information and reference systems (AISS).

Consider the features of each class of AIS and the characteristics of possible types of AIS within each class.

Modeling centers

MC is an automated information system, which is a set of ready-to-use models united by a single subject area, an information base and a language of communication with users.

MCs, as well as POIS, are designed to provide research on various models. But unlike POIS, MCs do not automate the creation of simulation models, but provide the user with the opportunity to comfortably work with ready-made models.

MCs can be systems of both collective and individual use and, in principle, do not require powerful computers for their implementation.

Random Threats

Threats that are not related to the deliberate actions of intruders and are realized at random times are called random or unintentional.

The implementation of threats of this class leads to the greatest loss of information (according to statistics - up to 80% of the damage caused to information resources of the CS by any threats). In this case, destruction, violation of the integrity and availability of information can occur. The confidentiality of information is less often violated, but this creates the preconditions for malicious influence on information.

Natural disasters and accidents are fraught with the most devastating consequences for the COP, since the latter are subject to physical destruction, information is lost or access to it becomes impossible.

Crashes and failures complex systems are inevitable. As a result of failures and failures, the performance of technical means is disrupted, data and programs are destroyed and distorted, and the algorithm of devices operation is violated. Violations of the operation algorithms of individual nodes and devices can also lead to a violation of information confidentiality. For example, failures and failures of the means of issuing information can lead to unauthorized access to information by unauthorized issuing it to a communication channel, to a printing device, etc.

Errors in the development of CS, algorithmic and software errors lead to consequences similar to the consequences of failures and failures of technical means. In addition, such errors can be used by attackers to influence CS resources. Of particular danger are errors in operating systems (OS) and information security software.

According to the US National Institute of Standards and Technology (NIST), 65% of information security breaches occur as a result of errors of users and maintenance personnel . Incompetent, negligent or inattentive performance of functional duties by employees leads to the destruction, violation of the integrity and confidentiality of information, as well as compromise of protection mechanisms.

Characterizing the threats to information in the CS that are not related to deliberate actions, in general, it should be noted that the mechanism for their implementation has been studied quite well, and significant experience has been accumulated in countering these threats. Modern technology for the development of hardware and software, an efficient system of operation of the CS, including mandatory redundancy of information, can significantly reduce losses from the implementation of threats of this class.

Deliberate Threats

The second class of information security threats in the CS are intentionally created threats.

This class of threats has not been studied enough, is very dynamic and is constantly updated with new threats. Threats of this class, in accordance with their physical nature and implementation mechanisms, can be divided into five groups:

1) traditional or universal espionage and sabotage;

2) unauthorized access to information;

3) electromagnetic radiation and interference;

4) modification of CS structures;

5) sabotage programs.

Malware

One of the main sources of information security threats in the CS is the use of special programs, collectively called "wrecking programs".

Depending on the mechanism of action, saboteurs are divided into four classes:

"logic bombs"

"worms"

"Trojan horses"

· "computer viruses".

"Logic Bombs"- these are programs or their parts that are permanently located in a computer or computing systems (CS) and are executed only under certain conditions. Examples of such conditions can be: the occurrence of a given date, the transition of the COP to a certain mode of operation, the occurrence of certain events a specified number of times, etc.

"Worms" are called programs that are executed every time the system boots, have the ability to move to the VS or networks and self-reproduce copies. An avalanche-like reproduction of programs leads to overloading of communication channels, memory and, ultimately, to blocking the system.

"Trojan horses" are programs obtained by explicitly modifying or adding commands to user programs. When user programs are subsequently executed, unauthorized, modified or new functions are executed along with the specified functions.

"Computer viruses"- these are small programs that, after being introduced into a computer, are independently distributed by creating their copies, and under certain conditions, have a negative impact on the CS.

Since viruses have the properties of all classes of malicious programs, in recent times any malicious programs are often referred to as viruses.

CS facility security system

When protecting information in the CS from traditional espionage and sabotage, the same means and methods of protection are used as for protecting other objects that do not use CS. To protect CS objects from threats of this class, the following tasks should be solved:

Creation of a security system for the facility;

organization of work with confidential information resources at the CS facility;

Opposition to surveillance

· resistance to eavesdropping;

protection against malicious actions of personnel.

The object where work is carried out with valuable confidential information has, as a rule, several lines of protection:

1. controlled territory;

2. building;

3. room;

4. device, information carrier;

5. program;

6. information resources.

From espionage and sabotage it is necessary to protect the first four frontiers and service personnel.

The facility security system (SOS) of the CS is created in order to prevent unauthorized entry into the territory and premises of the facility by unauthorized persons, maintenance personnel and users.

The composition of the security system depends on the protected object. In general, the QS CS should include the following components:

· engineering constructions;

· security alarm;

means of observation;

· subsystem of access to the object;

shift of guards on duty.

Engineering structures

Engineering structures serve to create mechanical obstacles in the way of intruders. They are created along the perimeter of the controlled zone. Buildings and premises of objects are also equipped with engineering structures. Concrete or brick fences, gratings or mesh structures are used along the perimeter of the controlled area. Concrete and brick fences usually have a height of 1.8-2.5 m, mesh - up to 2.2 m. To increase the protective properties of the fences, barbed wire, sharp rods, and reinforced barbed tape are strengthened over the fences. The latter is made by reinforcing barbed tape with galvanized steel wire with a diameter of 2.5 mm. Reinforced barbed tape is often used in the form of a spiral with a diameter of 500-955 mm.

Barriers can be used to make it difficult for an intruder to enter a controlled area. An example of inconspicuous obstacles is a thin wire metal net. Such a network is located along the fence to a width of up to 10 meters. It eliminates the fast movement of the attacker.

Attackers try to get into buildings and premises, as a rule, through doors or windows. Therefore, with the help of engineering structures, first of all, this weak link in the protection of objects is strengthened. The reliability of the door depends on the mechanical strength of the door itself and on the reliability of the locks. The higher the requirements for the reliability of the door, the more durable it is, the higher the requirements for mechanical strength and the ability to resist unauthorized opening are imposed on the lock.

Combination locks are increasingly being used instead of mechanical locks. The most common among them (usually called safe locks) are disk combination locks with the number of combinations of the key code within 10 6 -10 7 .

Electronic locks built using microcircuits have the highest resistance.

For instance, When building electronic locks, Touch Memoru microcircuits are widely used. The microcircuit is placed in a steel case, which in appearance resembles a battery of watches, calculators, etc. The diameter of the cylindrical part is 16 mm, and the height is 3-5 mm. The power supply of the microcircuit is provided by a battery located inside the case, the resource of which is designed for 10 years of operation. The body can be placed on a plastic card or in a plastic frame in the form of a keychain. The chip stores its individual 64-bit number. Such a capacity provides about 10 20 key combinations, which practically excludes its selection. The chip also has a rewritable memory, which allows it to be used to write and read additional information. The exchange of information between the microcircuit and the lock is carried out when the contact of the lock and a certain part of the microcircuit body are touched.

On the basis of electronic locks, automated access control systems to premises are built. In each lock, the numbers of microcircuits are entered, the owners of which are admitted to the corresponding room. An individual time interval can also be set during which access to the premises is possible. All locks can be combined into a single automated system, the central part of which is a PC. All control information to the locks is transferred from the PC by the administrator. If the lock is also opened from the inside with an electronic key, the system allows recording the time of entry and exit, as well as the time spent by the key holders in the premises. This system allows you to determine the location of an employee at any time. The system ensures that the door is always closed. When trying to open the door bypassing the electronic lock, an alarm is activated with a notification to the central control point. Such automated systems include the domestic system "Bars".

According to statistics, 85% of cases of penetration into objects occur through window openings. These data indicate the need for engineering strengthening of windows, which is carried out in two ways:

installation of window grilles;

use of glass resistant to mechanical stress.

The traditional protection of windows from intruders is the installation of bars. The bars must have a diameter of at least 10 mm, the distance between them must not exceed 120 mm, and the depth of the bars into the wall must be at least 200 mm.

No less serious obstacle in the way of an intruder can be special glasses. The increase in mechanical strength goes in three directions:

Glass tempering

production of laminated glass;

application of protective films.

The mechanical strength of semi-tempered glass is 2 times, and tempered glass is 4 times higher than ordinary building glass.

Laminated glass uses special films with high tear resistance. With the help of these "laminated" films and synthetic adhesives, molecular bonding of films and glasses is ensured. Such laminated glasses with a thickness of 48-83 mm provide protection against a steel 7.62 mm bullet fired from a Kalashnikov assault rifle.

Multifunctional protective polyester films are becoming more and more popular. Pasted on ordinary window glass, they increase its strength by 20 times. The film consists of six very thin (a few microns) layers: lavsan (3 layers), metallized and non-drying adhesive adhesive and varnish coating. In addition to mechanical strength, they give windows a number of protective properties and improve performance. Films attenuate electromagnetic radiation by 50 times, significantly complicate reconnaissance by visual-optical methods and interception of speech information by laser means. In addition, the films improve the appearance of glass, reflect up to 99% of ultraviolet rays and 76% of the thermal energy of the sun, and contain the spread of fire during fires for 40 minutes.

Security alarm

The burglar alarm is used to detect attempts of unauthorized entry to the protected object. Alarm systems must meet the following requirement:

coverage of the controlled area around the perimeter;

high sensitivity to the actions of an intruder;

Reliable operation in all weather and time conditions;

resistance to natural disturbances;

speed and accuracy of determining the location of the violation;

Possibility of centralized control of events.

The structure of a typical security alarm system is shown in fig. one.

Rice. 1. Structure of a typical burglar alarm system

Sensor(detector) is a device that generates an electrical alarm signal when exposed to the sensor or to the field of external forces or objects created by it.

Alarm loop forms an electrical circuit for transmitting an alarm signal from the sensor to the control panel.

Reception and control device serves for receiving signals from sensors, their processing and registration, as well as for issuing signals to the siren.

Annunciator gives light and sound signals to the security guard on duty.

According to the principle of detecting intruders, sensors are divided into:

contact;

· acoustic;

optoelectronic;

Microwave

vibrating;

capacitive;

television.

Contact sensors react to the closing or opening of contacts, to the breakage of a thin wire or a strip of foil. They are electrocontact, magnetic contact, shock-contact and breakaway.

Electrocontact sensors are push-button switches that open (close) electrical circuits, through which an alarm signal is sent to the control panel in case of unauthorized opening of doors, windows, hatches, cabinets, etc. Electrocontact sensors include DEK-3, VK-1M, SK-1M and others.

From Wikipedia, the free encyclopedia

The value of information- one of the important properties of information, the assessment of which depends on the goals of the processes of its generation, reception and processing. It is studied by special information theories, decision theory, synergetics.

It is most convenient to consider the problem of the value of information, taking it as the definition of information, in the spirit of the work of G. Kastler ( Henry Quastler), the following:

The concept of quantity of information is closely connected with the concept of information. The amount of information is applicable as a numerical characteristic of the total amount of information, as well as the amount of valuable information. The information of a certain message may be either completely valuable or contain no valuable information at all. The concepts of "value" and "meaningfulness" of information, despite their importance in computer science, usually did not give a strict definition.

In traditional computer science (developed from communication theory), unlike synergetics, the value of information, its evolution and questions of spontaneous occurrence in complex systems are not the subject of study, since the goal is assumed to be given from the outside. Semantic and pragmatic aspects of information, including value and meaningfulness, are studied within the framework of semantic and pragmatic information theories.

Example

In texts in two languages ​​(Russian and English) that convey the same meaning, the amount of valuable information will be the same. At the same time, the amount of information calculated from the number of letters used will most likely be different.

Approaches to measuring the value of information

The value of information depends on the purpose of its recipient. If the goal is achievable in several possible ways, according to R. L. Stratonovich, the value of information can be determined by the reduction in resource costs (material, time) brought by this information. The more information leads to the achievement of the goal, the more useful it is, the more valuable it is. However, the value of information is a more general property than usefulness of information . In addition to useful information, that is, realized information, information may have potential value, be set aside for solving future problems.

If the achievement of the goal is feasible with a certain probability, it is possible to apply the measure of value (expediency) of A. A. Kharkevich and M. M. Bongard:

V = log_2\frac Pp

where p- the probability of achieving the goal before receiving information, and P- after receiving it. The formula also works in the case when the probability of achieving the goal with the receipt of information has decreased - in this case, the value of the information is negative, and the information itself is better called disinformation.

The above information value formula V = log_2\frac Pp also provides valuable information. For example, if P=1(the goal is fulfilled with probability 1), and p = 1/n(for n equiprobable outcomes - prior knowledge (thesaurus), that is, there is no a priori information), then V = log_2n- the maximum amount of information in this situation.

M. M. Bongard introduces the concept of “useful information” and obtains a more general probabilistic-algebraic approach, in which the Kharkevich formula becomes a special case.

Other approaches based on the language of formal logic were developed by R. Karnap, I. Bar-Hillel, D. Harrach, D. Kemeny, J. Hintikka.

V = \frac (AIT)(B+I)e^(-CT/I)

where I- amount of incoming information, T- thesaurus, A, B and C- constants. The maximum value is achieved with a thesaurus that is proportional to the amount of information received. This approach emphasizes the versatility of the value of information.

The value of information is tied to the hierarchy of information levels of the system. Thesaurus is the information of a given level of the hierarchy, but is used as a basis for generating or obtaining information at the next level. (Related to the semantic measures of information, the thesaurus measure was proposed by Yu. A. Schrader and takes into account the semantic properties of information, together with the recipient's ability to perceive the message, which depend on the recipient's thesaurus.)

For all the above approaches, there are three common points that are present in each of them:

  1. actual information
  2. receptor thesaurus and reception conditions
  3. the purpose for which the information is used

The development of the theory of determining the value of information will most likely follow the path of studying the thesaurus and the conditions of reception as the most variable part of the noted triad.

The value of management information

One of the practical applications of the concept of the value of information is in economics and management. As in other areas, it makes sense to talk about the value of information when all three elements of the triad highlighted above are present: the internal content of information, the subject - the decision maker (DM) and the goal facing the decision maker. For the decision maker, valuable information will be information that contains the information necessary for making a decision, but still unknown information, in an understandable form. The value of management information is always specific and may change over time.

In economics they talk about pragmatic measure of information - that is, the usefulness (value) of information for the user or management, usually measured in the same units as the values ​​of the objective function in the management system, which usually have the dimension of monetary units. The value of information can be defined as an increase in economic effect due to the pragmatic properties of management information.

The value of protected information

see also

  • DIKW (information hierarchy where each level adds certain properties to the previous level)

Write a review on the article "The value of information"

Notes

  1. , With. 69-70.
  2. , With. 28-30.
  3. , With. thirteen.
  4. , With. sixteen.
  5. , With. 17.
  6. , With. nineteen.
  7. Chursin N. N.// Popular informatics. - Kiev: Technique, 1982. - 157 p.
  8. .
  9. , With. 176.
  10. Zabolotsky V. P., Ovodenko A. A., Stepanov A. G. Semantic measures of information // Mathematical models in management: Textbook. - St. Petersburg: GUAP, 2001.
  11. , With. eighteen.
  12. .
  13. , With. 174.
  14. , With. 73.
  15. , With. 21.
  16. .
  17. .
  18. .

Literature

  • Bongard M. M. The problem of recognition. - M .: Fizmatgiz, 1967.
  • Broido V. L., Ilyina O. P. Architecture of computers and systems. - 2nd ed. - St. Petersburg. : Peter, 2009. - S. 31-33. - 720 s. - ISBN 978-5-388-00384-3.
  • Wolkenstein M. Poems as a complex information system // Science and Life. - 1970. - No. 1.
  • Grusho A. A., Timonina E. E. The value of information // Theoretical foundations of information security. - M .: Publishing house of the Yachtsman Agency, 1996.
  • Derevyagin A. I.// Bulletin of the Voronezh State University. Economics and management. - 2009. - № 9. - pp. 58-61.
  • Castler G. The Emergence of Biological Organization = The Emergence of Biological Organization. - M .: Mir, 1967.
  • Budanov V. G. Self-organization of time: evolutionary score, from cycles to rhythmic cascades // Synergetics of time. - M .: Repronix, 2007.
  • Korogodin V. I., Korogodina V. L. Information is the basis of life. - Dubna: Publishing Center "Phoenix", 2000. - 208 p.
  • Leonov V.P. Modern problems of informatics. Introduction to the semiotics of information technology. - Tomsk: NTL Publishing House, 2011. - 248 p. - ISBN 978-5-89503-485-9.
  • Stratonovich R. L. Information theory. - M .: Soviet radio, 1975.
  • Kharkevich A. A. On the value of information // Problems of Cybernetics. - 1960. - Issue. 4 . - S. 54.
  • Chernavsky D.S. Synergetics and information (dynamic theory of information). - 2nd ed., corrected. and additional .. - M .: Editorial URSS, 2004. - 288 p. - (Synergetics: from the past to the future). - ISBN 5-354-00241-9.
  • Schreider Yu. A. On one model of semantic information theory // Problems of Cybernetics. - M ., 1965. - Issue. thirteen . - pp. 233-240.

An excerpt characterizing the value of information

After the village, and in the serious mood in which Natasha was, all this was wild and surprising to her. She could not follow the progress of the opera, could not even hear the music: she saw only painted cardboard and strangely dressed men and women moving, talking and singing strangely in the bright light; she knew what all this was supposed to represent, but it was all so pretentiously false and unnatural that she felt ashamed of the actors, then laughed at them. She looked around her, at the faces of the spectators, looking for in them the same sense of mockery and bewilderment that was in her; but all the faces were attentive to what was happening on the stage and expressed feigned, as it seemed to Natasha, admiration. "It must be so necessary!" thought Natasha. She alternately looked either at these rows of pomaded heads in the stalls, or at the naked women in the boxes, especially at her neighbor Helen, who, completely undressed, with a quiet and calm smile, without taking her eyes off the stage, feeling the bright light spilled throughout the hall and the warm, crowd-warmed air. Natasha, little by little, began to come into a state of intoxication she had not experienced for a long time. She did not remember what she was and where she was and what was happening before her. She looked and thought, and the strangest thoughts suddenly, without connection, flashed through her head. Now she had the idea of ​​jumping up on the ramp and singing the aria that the actress sang, then she wanted to hook the old man who was sitting not far from her with a fan, then to lean over to Helen and tickle her.
At one of the minutes, when everything was quiet on the stage, waiting for the beginning of the aria, the front door of the parterre creaked, on the side where the Rostovs' box was, and the steps of a belated man sounded. "Here he is Kuragin!" whispered Shinshin. Countess Bezukhova, smiling, turned to the incoming person. Natasha looked in the direction of Countess Bezukhova's eyes and saw an unusually handsome adjutant, with a self-confident and at the same time courteous look, approaching their box. It was Anatole Kuragin, whom she had long seen and noticed at the St. Petersburg ball. He was now in the uniform of an aide-de-camp, with one epaulette and an exelbane. He walked with a restrained, valiant gait, which would have been ridiculous if he were not so good-looking and if there were not such an expression of good-natured contentment and merriment on his beautiful face. Despite the fact that the action was going on, he, slowly, slightly rattling his spurs and saber, smoothly and high carrying his perfumed beautiful head, walked along the carpet of the corridor. Glancing at Natasha, he went up to his sister, put his hand in a drenched glove on the edge of her box, shook her head and leaned over to ask something, pointing to Natasha.
Mais charmante! [Very nice!] - he said, obviously about Natasha, as she not only heard, but understood from the movement of his lips. Then he went into the first row and sat down beside Dolokhov, friendly and casually elbowing that Dolokhov, whom others treated so ingratiatingly. He winked merrily, smiled at him and put his foot on the ramp.
How similar brother and sister are! the count said. And how good both are!
Shinshin in an undertone began to tell the count some story of Kuragin's intrigue in Moscow, to which Natasha listened precisely because he said charmante about her.
The first act ended, everyone in the stalls got up, got mixed up and began to walk and go out.
Boris came to the Rostovs' box, very simply accepted congratulations and, raising his eyebrows, with an absent-minded smile, conveyed to Natasha and Sonya the request of his bride to be at her wedding, and left. Natasha, with a cheerful and coquettish smile, talked to him and congratulated on his marriage the same Boris with whom she had been in love before. In the state of intoxication in which she was, everything seemed simple and natural.
Naked Helen sat beside her and smiled the same way at everyone; and Natasha smiled at Boris in exactly the same way.
Helen's box was filled and surrounded on the parterre side by the most distinguished and intelligent men, who, it seemed, vying with each other wanted to show everyone that they knew her.
Kuragin stood all this intermission with Dolokhov in front of the ramp, looking at the Rostov box. Natasha knew that he was talking about her, and it gave her pleasure. She even turned so that he could see her profile, in her opinion, in the most advantageous position. Before the start of the second act, the figure of Pierre appeared in the stalls, whom the Rostovs had not seen since their arrival. His face was sad, and he had grown even fatter since Natasha had last seen him. He, not noticing anyone, went to the front rows. Anatole went up to him and began to say something to him, looking and pointing to the Rostov box. Pierre, seeing Natasha, perked up and hurriedly, along the rows, went to their bed. Going up to them, he leaned on his elbows and, smiling, talked for a long time with Natasha. During her conversation with Pierre, Natasha heard a male voice in the box of Countess Bezukhova and for some reason found out that it was Kuragin. She looked back and met his eyes. He looked almost smiling straight into her eyes with such an admiring, affectionate look that it seemed strange to be so close to him, to look at him like that, to be so sure that he liked you, and not to be familiar with him.
In the second act there were paintings depicting monuments and there was a hole in the canvas depicting the moon, and the lampshades on the ramp were raised, and trumpets and double basses began to play bass, and many people in black robes came out to the right and left. People began to wave their hands, and in their hands they had something like daggers; then some other people came running and began to drag away that girl who was previously in a white dress, but now in a blue dress. They didn’t drag her away right away, but sang with her for a long time, and then they dragged her away, and behind the scenes they hit something metal three times, and everyone knelt down and sang a prayer. Several times all these actions were interrupted by the enthusiastic cries of the audience.
During this act, every time Natasha looked into the stalls, she saw Anatole Kuragin, throwing his arm over the back of the chair and looking at her. She was pleased to see that he was so captivated by her, and it did not occur to her that there was something bad in this.
When the second act was over, Countess Bezukhova got up, turned to the Rostovs' box (her chest was completely bare), beckoned the old count to her with a gloved finger, and not paying attention to those who entered her box, she began talking to him kindly smiling.
“Yes, introduce me to your lovely daughters,” she said, “the whole city is shouting about them, but I don’t know them.
Natasha got up and sat down to the magnificent countess. Natasha was so pleased with the praise of this brilliant beauty that she blushed with pleasure.
“Now I also want to become a Muscovite,” Helen said. - And how shameless you are to bury such pearls in the village!
Countess Bezukhaya, in fairness, had a reputation as a charming woman. She could say what she did not think, and especially flatter, quite simply and naturally.
- No, dear count, you let me take care of your daughters. At least I won't be here for long. And you too. I will try to amuse yours. I heard a lot about you back in Petersburg, and I wanted to get to know you, ”she said to Natasha with her uniformly beautiful smile. - I heard about you from my page - Drubetskoy. Did you hear he's getting married? And from a friend of my husband - Bolkonsky, Prince Andrei Bolkonsky, - she said with special emphasis, hinting that she knew his relationship with Natasha. - She asked, in order to get to know each other better, to allow one of the young ladies to sit the rest of the performance in her box, and Natasha went over to her.
In the third act, a palace was presented on the stage, in which many candles burned and paintings depicting knights with beards were hung. In the middle were probably the king and queen. The king waved his right hand, and, apparently shy, sang something badly, and sat down on the crimson throne. The girl, who was first in white, then in blue, was now dressed in one shirt with loose hair and stood near the throne. She sang about something sadly, turning to the queen; but the king waved his hand sternly, and men with bare legs and women with bare legs came out from the sides, and they all began to dance together. Then the violins began to play very thinly and cheerfully, one of the girls with bare thick legs and thin arms, separating from the others, went backstage, straightened her corsage, went to the middle and began to jump and soon beat one foot against the other. Everyone in the stalls clapped their hands and shouted bravo. Then one man stood in a corner. In the orchestra, cymbals and trumpets began to play louder, and this one man with bare legs began to jump very high and mince his legs. (This man was Duport, who received 60 thousand a year for this art.) Everyone in the stalls, in the boxes and the raike began to clap and shout with all their might, and the man stopped and began to smile and bow in all directions. Then others danced, with bare legs, men and women, then again one of the kings shouted something to the music, and everyone began to sing. But suddenly a storm broke out, chromatic scales and chords of a diminished seventh were heard in the orchestra, and everyone ran and dragged again one of those present backstage, and the curtain fell. Again a terrible noise and crackling arose between the spectators, and everyone, with enthusiastic faces, began to shout: Duport! Duport! Duport! Natasha no longer found this strange. She looked around with pleasure, smiling happily.
- N "est ce pas qu" il est admirable - Duport? [Isn't it true that Duport is delightful?] - said Helen, turning to her.
- Oh, oui, [Oh, yes,] - Natasha answered.

During the intermission, there was a smell of cold in Helen's box, the door opened and, bending down and trying not to catch anyone, Anatole entered.
“Let me introduce my brother to you,” Helen said, uneasily shifting her eyes from Natasha to Anatole. Natasha turned her pretty head over her bare shoulder to the handsome man and smiled. Anatole, who was as good up close as he was from a distance, sat down next to her and said that he had long wanted to have this pleasure, ever since the Naryshkin ball, at which he had had the pleasure, which he had not forgotten, to see her. Kuragin with women was much smarter and simpler than in male society. He spoke boldly and simply, and Natasha was strangely and pleasantly struck by the fact that not only was there nothing so terrible in this man, about whom so much was said, but that, on the contrary, he had the most naive, cheerful and good-natured smile.

That's when someone told us the information we need at the moment and saved us from unnecessary time costs, how do we usually treat him?

Let's do some thought experiments in this article.

(listen to the podcast if your eyes are tired or just too lazy to read)

The building is on fire, and this is my first time in it. Having got lost along the endless corridors, flights of stairs and passages, I lost my bearings, I have no idea where the exit is and I feel like I'm in a maze. Panic is already setting in. But then a man appears from the smoke, who comes up and says that you need to go this way and there will be a way out. Was it like a savior, Jesus? Or is the dude just sharing valuable information?

I used to peel onions and eggs for a very long time, but I was told how to do it quickly:

I didn’t particularly need this knowledge in everyday life, but, let’s say, I became a cook and at work I need to peel onions and eggs in very large quantities every day for salads. At first, I spent so much time on it that I barely had a minute to sit down and have a cup of coffee. And then I remembered how to do it quickly!

Now I am so grateful to those people who discovered the quick way and shared information that I am ready to kiss them! At work, now I have enough time to clean all the products without straining, to cook every dish on the menu with pleasure and without haste, to drink my coffee and still have time to go to the stall for cookies! The work is done in pleasure, without fuss and I became a happier person))

Or, for example, I am healthy, but somehow I learned that cancer at the last stage can be cured. For me, this information is not as important as for patients with this terrible disease. In the world, millions of people suffer from the disease, many children and adults die every day in terrible agony. I don't do anything for them, I just know that they can be helped, but I haven't tested it myself.

But a person close to me was offended and angry with himself for a long time and as a result fell ill. He is looking for a way to recover, asks everyone for help, is completely open and ready for a miracle, catches any information from the outside world, but there is still no need and no. He grabs every opportunity like a straw, but I don’t even suspect that he is ill - a common thing, he pretends, hides and does not want to upset me. This often happens according to the law of meanness, when it is not necessary - information in bulk, and as it becomes necessary, then "by day with fire."

What does he owe me? Life? Most likely, he will think so. But I didn’t do anything, I didn’t prescribe treatment, I didn’t conduct therapy, and in general I’m not a doctor, I just gave him a link to the information, that’s all. He treated himself, followed all the instructions on his own initiative, showed his will to cure, and now he is healthy and happy.

But am I happy knowing that my friend has been cured by chance knowledge? Yes, of course, but not so much when compared to the size of his joy.

Another Long Term Survival Experiment

There are people who advise everyone in a row how to make a lot of money. This is their business, they, as they say, "make money on money", "out of thin air". They are real troublemakers: beckoning, insisting, rushing, creating tension with countdown timers and a limited offer of their information products and intellectual property. They think that they help people by providing the necessary (in their opinion) information for money.

But is it all logical?

It seems to me that something is out of place.

Businessmen say that “being poor is bad, ugly, pathetic and generally sucks”, that “there is a psychology of poverty, according to which a person does not allow himself to be rich because of the belief that no one likes the rich”, that “all social problems from poverty, and only poverty is the cause of all problems.

I really want to object to this that if rich people hadn’t grabbed everything into their own hands, if they hadn’t taken all the wealth of the world for themselves, they wouldn’t have created such a dissonance in the distribution of resources, when the minority has everything, and the majority has nothing, and if they hadn’t been protected by armies , policemen and laws from the poor, then there would be no problem of poverty. Everything would be enough for everyone in abundance, tension would not exist and then it would not be necessary to become a competitive businessman, receive various similar educations and make money on cunning and deceit of the state. Everyone would do what he likes and be happy, because there would be no fuss, no competition, no tension and no hurry.

The logic here is very simple:

the problem is not poverty at all, but the off-scale greed and selfishness of some unconscious people.

By creating tension and instilling a toxic belief that you are not good the way you are if you are not making thousands of dollars a day. In this case, you must subject yourself to suffering, self-destruction and self-torture. You are unworthy, you are a person of the lowest order, a nonentity.

It is very humiliating for a person to be a commodity for sale. With this artificial tension, businessmen inspire the idea that there are people who, they say, know how to earn money (basically, this definition means “sell”, and by “sell” it means “sell”, and by “sell” it means “deceive ”), and there are those who do not have the necessary skills, experience, knowledge of the seller.

Only by acquiring the necessary knowledge and cracking the code of the OSP (optimal sales system), you can deftly wishful thinking, be an illusionist and earn your hard-earned millions. This is a typical model of all successful businesses.

But why is this information so destructive to humans? Why, thanks to fuss, struggle and deceit, great tension is created, which very soon results in illness, cancer, early death?

Everything in society is turned upside down. Rough, strong, stiff, tense - what is more characteristic of death is considered valuable, and flexible, mobile, relaxed - what is characteristic of life is considered empty. Young flexible trees bend to the ground, and the old ones are uprooted by a hurricane.

Thus, any artificially created tension is initially against nature.

Yes, there are people who, no matter what they do, create value, and there are those who, no matter how hard they try, do only one bad thing - even when they create, they actually only destroy. Almost all businessmen are such destroyers. By their unconscious activity they create class divisions, poverty and wars in the long run.

I am, of course, also partly an information businessman. I listened to them for a long time and thought there was truth in these words, but the further I listened, the more I realized that this was only a deceit and dirt and it was impossible to find a diamond in it, since more than one generation of businessmen had rummaged through this dirt with their noses and so nothing in it and not found. Yes, businessmen have material wealth, but there is no happiness. The only plus is that they now know that wealth does not mean happiness, which means suffering from the fear of losing wealth.

I refocused my business. Now my job is to go to the center of myself and help those who wish to come to themselves. I think that's where you can find your happiness.

In conditions of wild information overload, it becomes vital to be able to clearly determine what information is valuable and what is not.

So I think that

Information "how to make big money" is a false value.

Information "how to help yourself be happy, how to help other people be happy"- value.

If you ask the rich if they are happy, they will lie that they are happy, but in fact they are not. They are disappointed because the riches did not give them what they were looking for. Few people admit it, since no one likes to look stupid. This is really very stupid - they fought their ass, they strained, but they turned out to be fools. Therefore, they want everyone else to become the same fools, so that one does not look so stupid. A fool among fools is not so insulting. Here they are inviting.

This is a recurring story about Alexander the Great, who, having conquered the whole World, locked himself in his office and began to cry, as he was thrown back to himself, everything that he conquered turned out to be empty, it was just a big stupidity. No riches of the World are able to fill the inner emptiness of a person. They only distract for a while from what is important, from oneself.

Practice shows that an unambitious non-attachment person can easily be much happier, since a life based on possessions is less happy than a life based on creation. Happiness has nothing to do with wealth at all, it has to do with wealth and presence.

And among the rich, according to statistics, the number of suicides is much higher. These facts speak for themselves.

Here is Osho. He had a hundred Rolls-Royces and private jets, but he didn't earn them by hard work, business or deceit - he did nothing at all for this, he celebrated life and meditated. They were given to him by the rich who were disappointed in their wealth, whom Osho simply taught to be happy, to live consciously. He shared valuable information with them.

Or Arthur Sita. A successful businessman left the business to his partners when he realized that money, position and connections would not give him what he really needed in life, would not give him the happiness of a total experience of the present moment.

Or the carbon monoxide German Etgar Tolle, or many more of our contemporaries who have awakened.

These Buddhas are not rich on the outside, but infinitely rich on the inside, and no one can ever take this wealth from them in any situation. If you have total awareness in the moment now, then it is simply impossible to lose this grace.

If anyone remembers, then the Buddha himself was a prince and gave up the whole kingdom in favor of being a realized beggar - here and now to be who you are.

What do such irrational, uneconomical and categorically unacceptable actions of far from stupid people testify to? The first people of mankind, those who are called gods and to whom they usually pray. Perhaps they realized that everything material is empty and false goals, chasing after them in tension, you miss a priceless moment of the totality of the bliss of life?

Probably, you can live with wealth, the main thing is not to completely and completely depend on it, not to become attached to knick-knacks with your mind, which you can’t take with you to the grave and on the further journey of the soul.

In one parable, the traveler Buddha came to a certain king and stayed with him, enjoying all the privileges for so long that the king had doubts about the authenticity of the Buddha. Before the king had time to ask the question that tormented him, the Buddha preceded him and said: “I see your question and today I will leave you. Please guide me to the borders of your kingdom."

For the king, this was a surprise, he agreed, and together they galloped to the border. Buddha gave the horse to the king and already wanted to go, but the king, seeing such a thing, began to apologize for his doubts and begged the Buddha to stay, saying how good it was with him, that he could live in the palace even until his death and not deny himself anything that he repents of his insecurities and now he has learned his lesson.

To this, the Buddha replied that if he stayed, then after a while the king would again have doubts, so it would be better if he still left. And the king, if he wants, can go with him.

The king replied, "I can't, I'm too attached to my kingdom." On this they parted, and the king wept (apparently, like Alexander the Great).

Harmful information- leading away from oneself, creating internal tension, discrepancy between the real oneself and the desired one (the image created by the mind, the ideal); this is any knowledge about external projections, where there is tension, complication, such as different laws, rules, obligations, checks, balances, etc. This includes politics, religion, economics, jurisprudence, psychology, competitive business, in short, everything that carries at its core, inequality and division at any level: poverty - wealth, leadership - submission, knowledge - ignorance, etc.

Valuable information- simplifying, integrating, unifying, helping to find the way to the true self and become integral, single, total, conscious in the present moment, besides which there is nothing else throughout a person's life.

This question is very controversial, therefore, the author's opinion is presented in the article solely with the aim of encouraging readers to independently search for their own answers.

If, after reading the article, there is a desire to do an independent search, then be active, share the article with friends and relatives on social networks, leave your comments and fearlessly spread your thoughts, testing them for strength.

Thank you for attention!

No related posts.

Top Related Articles