How to set up smartphones and PCs. Informational portal
  • home
  • Iron
  • What is meant by the value of information. The more an event of interest to us has random outcomes, the more valuable the message about its result, the more information

What is meant by the value of information. The more an event of interest to us has random outcomes, the more valuable the message about its result, the more information

Business activity is always associated with the creation, use and storage of significant amounts of information and documents that are of specific value to the company and are subject to protection from different types threats.

Documented information resources that are used by an entrepreneur in business and company management are his own or private information that is of significant value to him. This information is the intellectual property of the entrepreneur and needs to be protected.

An intellectual product is understood as the result of the creative work of an entrepreneur or a team of employees of a firm, which has a specific value for the owner or owner. Intellectual product, as an integral element of intellectual property, is a commercially valuable idea implemented in an informational form.

The value of information can be a value category and characterize a specific amount of profit when using it or the amount of losses when it is lost. Information often becomes valuable because of its legal knowledge for the firm or business development, for example: constituent documents, programs and plans, agreements with partners and intermediaries, etc. The value can manifest itself in its promising scientific, technical or technological significance.

Usually, two types of information are distinguished that are intellectually valuable for an entrepreneur:

  • technical, technological: production methods, software, production indicators, chemical formulas, recipes, test results of prototypes, quality control data, etc.;
  • business: management decisions, methods of implementing functions, cost indicators, market research results, customer lists, economic forecasts, market strategy, etc.

Valuable information is generated in the following areas of the firm's activities:

  • company management - the applied non-traditional management methods, the procedure for preparing and making decisions on the directions of the firm's activities and other issues;
  • forecasting and planning of the firm's activities - the expansion or curtailment of production, the expected volume of research, development programs, programs of interaction with other firms, plans for investments, sales, purchases, etc .;
  • the financial activities of the company - balance sheet, information on the state of bank accounts and the level of profitability of products, information on obtaining loans, the circulation of funds and production operations, debt obligations, etc .;
  • production activities of the company - production facilities, type of equipment used, stocks of raw materials, materials and components, finished products, etc .;
  • the trading activity of the company - information about the market strategy, methods of sales, the results of market research, the effectiveness of commercial activities, etc .;
  • negotiations and meetings in the areas of the firm's activities - information on the preparation, content and results of negotiations with intermediaries and business partners, on meetings with the firm's personnel, etc .;
  • formation of a pricing policy for the company's products and services - information on the price structure, estimated estimated prices in the future, calculation methods, discounts, etc .;
  • formation of the composition of clients, partners, intermediaries and suppliers of the company, consumers of its products - information about foreign and domestic customers, contractors, suppliers, consumers, etc .;
  • study of the focus of the interests of the firm's competitors - the methods of analytical work used and methods of fighting for the market, the results of marketing research, etc .;
  • participation in tenders and auctions - strategic information, information on the preparation of target prices, results, etc .;
  • scientific and research activities on the creation of new equipment and technologies - information on advanced research programs, results, etc .;
  • the use of new technologies - information about their content, specifics of application, the resulting effect, etc .;
  • personnel management of the company - personal information about employees, methods of selection, testing of candidates for positions, results current work with staff, etc .;
  • organization of the company's security - information about the functioning of the security service, the content of the information security system, the security system, etc.

The most valuable are information about production and products, the market, scientific developments, the material and technical support of the company, the terms of contract negotiations, information about the personnel, the security system of the company. Most of all competitors are interested in information about the dynamics of sales of products and the effectiveness of the services provided by the company. In Russia, the competitor's sphere of interest usually includes, first of all, the financial activities of the firm and the areas of ensuring the safety of the firm's work.

The category of valuable and always subject to protection includes information constituting industrial or commercial secrets of partners, customers and clients cooperating with the company,

In accordance with the fundamental principles of ensuring the security of a company's information resources, information can be: a) open, i.e. publicly available, used in work without special permission published in the media, announced at conferences, speeches, interviews, etc. and b) limited access and use, i.e. containing one kind or another of secrets and subject to protection, guarding, supervision and control.

Information resources classified as limited access to them for personnel and other persons means valuable textual, visual or electronic information documented in any medium (paper, magnetic, photographic, etc.), reflecting priority achievements in the field of state, economic, entrepreneurial and other activity, the disclosure of which may harm the interests of the state or its owner.

Legislation Russian Federation prohibits referring to information of limited access:

  • legislative and other normative acts establishing the legal status of state and executive authorities, local self-government bodies, organizations, public associations, as well as the rights, freedoms and obligations of citizens, the procedure for their implementation;
  • documents containing information on emergency situations, environmental, meteorological, demographic, sanitary-epidemiological and other information necessary to ensure the safe functioning of settlements, production facilities, the safety of citizens and the population in general;
  • documents containing information on the activities of state and executive authorities and local self-government bodies on the use of budgetary funds and other state and local resources, on the state of the economy and the needs of the population, with the exception of information related to state secrets;
  • documents accumulated in open collections of libraries and archives, information systems of state and executive authorities, local governments, organizations, public associations that are of public interest or are necessary for the implementation of the rights, freedoms and duties of citizens.

Valuable publicly available information is protected by the rules of information law (patent, copyright, related rights, etc.). Valuable information limited access additionally protected by the regulation of the sphere and specially established order its distribution, use and processing. In accordance with this, documented information (documents) of limited access is divided into secret and unclassified.

An obligatory feature (criterion of belonging) of a secret document is the presence in it of information constituting a state secret in accordance with the legislation. Unclassified documents that include information related to non-state secrets (official, commercial, banking, production, company secrets, etc.) or containing personal data are referred to as confidential.

A confidential (closed, protected) document is understood as a properly designed carrier of documented information containing information of limited access or use that constitutes intellectual property legal or natural person.

Despite the fact that confidentiality is synonymous with secrecy, the term is widely used exclusively to refer to information resources of limited access, not classified as state secrets. Confidentiality reflects the restriction imposed by the owner of information on access to it by other persons, i.e. the owner establishes the legal regime of this information in accordance with the law.

Confidential documents include:

in government structures- documents, draft documents and related
materials related to official information of limited distribution (called in bureaucratic use documents for official use) containing information related to official secrets of a working nature and not subject to publication in open press;

in entrepreneurial structures and areas of similar activity- documents containing information that their owner or proprietor, in accordance with the law, has the right to refer to commercial (business) secrets, firm secrets, secrets of craftsmanship;

regardless of belonging - documents and databases that record any
personal data about citizens, containing professional secrets, ensuring the protection of personal or family secrets of citizens, as well as containing technical and technological innovations (before their patenting), secrets of communications enterprises, the service sector and other structures.

Personal data means information about facts, events and circumstances privacy citizen, allowing to identify his identity.

It is not allowed to call confidential documents secret or to put a secrecy stamp on them.

A feature of a confidential document is that it is at the same time:

· Mass storage of valuable, protected information;

· The main source of accumulation and objective dissemination of this information, as well as its illegal disclosure or leakage;

· Mandatory object of protection.

It is important that the entrepreneur's own valuable information to be protected is not necessarily confidential. It is important to preserve an ordinary legal document intact and safe, protecting it from a kidnapper or natural disaster. Any official documented information, the mishandling of which may harm its owner, possessor, user and other person, is subject to protection.

Commercial value information, as a rule, is short-lived and is determined by the time required for a competitor to develop the same idea or its theft and reproduction, publication and transition to the number of generally known ones. The degree of information value and the required reliability of its protection are in direct proportion. At the same time, an entrepreneur always decides one fundamental question: to use valuable information for the production of goods, their sale, or, having patented an innovation, to profit from the sale of licenses. When solving the issue, it is taken into account that protecting valuable information is expensive and there is always a danger of losing it as a result of the actions of a competitor.

In accordance with this, the confidentiality of documents always has a significant spread in terms of limitation. free access to them the firm's personnel (from several hours to a significant number of years). It should be borne in mind that the bulk of confidential documents after the completion of their execution or work with them loses their value and confidentiality. For example, the correspondence before the conclusion of the contract may have a confidentiality stamp, but after its signing, this stamp is removed with the written permission of the first head of the company.

Executed documents that remain confidential and retain their value for the activities of the company are formed into cases in accordance with the nomenclature of cases. The period in which confidential documents remain in files can be short-term or long-term, depending on the value of the information contained in the documents in the case. The period of confidentiality of documents depends on the specifics of the company's activities. For example, manufacturing, research and development firms have much more valuable documents than trade, intermediary, etc.

It can be assumed that, on average, the short-term confidentiality period is 1-3 years, and the long-term one is over this period. Documents related to production, professional secrecy, as well as containing personal information about citizens, can maintain confidentiality for a long time. However, one should not equate two different concepts - the storage period of documents and the period of their confidentiality, although confidential documents are characterized by both concepts. The confidentiality period can be longer than the storage period for documents and files.

Documents of a long-term confidentiality period (programs and business development plans, technological documentation of know-how, inventions, etc.) have a complicated processing and storage option that ensures the security of information and its medium. Documents of a short-term confidentiality period, which are of operational importance for the company's activities, are processed and stored according to a simplified scheme and may not be separated from the technological processing system open documents if there are minimal protective, control and analytical elements in this system.

Consequently, the security of information resources of limited access is based on the development of criteria for the value of documented information (documents) for an entrepreneur and classifying them as confidential. The main aspects that characterize confidential documents are their presence in various types organizational structures and the objective instability of the duration of the restriction on staff access to them.

12.3. Regulation of the composition of confidential

information and documents

The process of identifying and regulating the real composition of information that is valuable to the entrepreneur, including the secret of the company, is a fundamental part of the information security system.

Taking into account that the system for protecting valuable and confidential information is an expensive technology, the determination of the composition of the information to be protected should be based on the principle of economic expediency of their protection. Therefore, the analysis of the company's information resources is carried out taking into account two main criteria: the degree of competitors' interest in information and the degree of information value (cost, legal, business).

For the analysis, it is necessary to have not only a complete list of real and potential competitors, but also to know the weak and strengths their activities, to have information about the state of affairs of each competitor, developed innovations, cooperation with industrial espionage structures or criminal structures. On this basis, it is possible to determine with complete confidence what information the firm would not like to disclose to competitors. It is also necessary to determine the economic significance of the innovation, calculate the amount of damage from its loss and, on this basis, draw a conclusion about whether it is a subject of trade secrets and an object of protection.

It should be borne in mind that the issue of confidentiality of information arises in the following cases: the firm adopts a new development strategy, concludes lucrative contracts, the emergence of a technical or technological innovation, the establishment of the fact of a potential or real threat to this innovation from a competitor. When determining the amount of damage from a possible loss of information, the cost of products that will not be produced, losses from freezing capital investments, the cost of research and development and other losses are taken into account.

In the process of analysis, the main elements of information that reflect the corporate secret are highlighted. This makes it possible to reduce the cost of the protection system and make it as targeted, dynamic and effective as possible. Protection of an innovation, including its well-known components, as a rule, does not give the desired result, due to the cumbersomeness of the protection system and the difficulty of controlling large volumes of confidential information. The massive nature of secrecy leads to an increase in the number of security services and, ultimately, to a decrease in the effectiveness of protection and the loss of information. For example, it makes sense to protect new formula in a known recipe for a manufactured product, new algorithm known actions, a new device in manufactured equipment, etc.

Information can be classified as a commercial (business) secret and become confidential if the following conditions are met:

  • the information should not reflect the negative aspects of the firm's activities, violations of the law, falsification of financial activities in order to avoid paying taxes and other similar facts;
  • information should not be publicly available or generally known;
  • the emergence or receipt of information by an entrepreneur must be legal and associated with the expenditure of the material, financial or intellectual potential of the company;
  • the staff of the company should be aware of the value of such information and be trained in the rules for working with it;
  • the entrepreneur must be able to fulfill real action to protect
    this information, i.e. have, for example, funds for the purchase or development of an information security system.

In accordance with the decree of the Government of the RSFSR "On the list of information that cannot constitute a commercial secret" dated December 5, 1991, the following information and documents cannot be classified as confidential:

  • constituent documents (decision to establish an enterprise or agreement of founders) and articles of association;
  • documents giving the right to practice entrepreneurial activity(registration certificates, licenses, patents);
  • information on established forms reporting on financial and economic activities and other information necessary to verify the correctness of the calculation and payment of taxes and other obligatory payments to the state budgetary system of the Russian Federation;
  • solvency documents;
  • information on the number, composition of employees, their wages and working conditions, as well as the availability of vacant jobs;
  • documents on payment of taxes and mandatory payments;
  • information on environmental pollution, violation of antimonopoly legislation, non-observance of safe working conditions, sale of products that harm the health of the population, as well as other violations of the legislation of the Russian Federation and the amount of damage caused in this case;
  • participation details officials enterprises in cooperatives, small enterprises, partnerships, joint stock companies, associations and other organizations engaged in entrepreneurial activity.

Unlike state secrets the composition of information constituting a commercial secret is not centrally regulated by the state and is determined individually by each company. At the same time, the firm establishes required level confidentiality of this information, the degree of their required protection, duration of protection, its cost and technology. The composition of valuable and confidential information to be protected is determined by the owner or owner of this information and is recorded in a special list. The list is based on the typical composition of the protected information of firms of this profile.

The list of confidential information of the company is a classified list of typical and specific valuable information about the work performed, products manufactured, scientific and business ideas, technological innovations. It fixes the fact that information is classified as protected information and determines the period (period) of confidentiality (i.e. inaccessibility for everyone) of this information, the level (stamp) of their confidentiality, the list of positions of the company's employees who are given the right to use this information in their work. The list includes really valuable information ("highlights") about each work of the company.

The list is a permanent working material for company management, security services and confidential documents. Therefore, it must be regularly updated and revised. Restricting access to information related to new products but not valuable should not be used.

An important task of the list is to split trade secrets into separate information elements known to different persons. Assigning some of the information to specific positions reduces the likelihood of employees disclosing a secret and prevents them from including confidential information in documents.

The list is also necessary for the separation of confidential documents from the general document flow, their corresponding marking (stamping) and autonomous processing, use and storage. When considering in courts cases of theft by employees of information and losses incurred by the company in connection with this, the list is used as evidence that this information is classified as confidential.

The maintenance of the list consists in its regular adjustment and updating, reflecting new promising developments of the company, the transition to the release of a new type of product, a change in the subject of work, areas of activity, market conditions, etc. In the process of maintaining, the list includes confidential information that reflects real innovations, developments and inventions. For this purpose, the heads of the structural divisions of the company or its areas of activity should regularly draw up registers of new individual confidential information and information that has lost its confidentiality. The registers are submitted to the commission to amend the list.

Transfer of information included in the list from the category of confidential to the category of open, i.e. exclusion of information from the list is carried out by a commission on the presentation of the company's management, structural divisions and the security service.

Based on the list of confidential information, the security service or the firm's service draws up and maintains a classified list of valuable and confidential documents of the firm that are subject to protection, indicating the stamp of access restriction indicated on them and the composition of employees admitted to these documents. The list is compiled within the framework of structural divisions or areas of activity of the company and regulates two aspects of the work of employees of the company with confidential documents; a) the composition of the documents and documents created by the unit and sent to the unit for work, b) the composition of confidential information that can be included in each document specified in the list. The list is approved by the first head of the company.

The list also includes documents that do not contain protected information, but are valuable to the company and subject to protection. It is often important to keep a common open legal act intact and safe from a kidnapper or natural disaster. The lists are formed individually by each company in accordance with the recommendations of a special commission and approved by the first head of the company. The same commission regularly makes current changes to the lists in accordance with the dynamics of the company's performance of specific work.

The list should contain a provision stating that the preservation of trade secrets of partners is an integral part of the firm's activities. Open publication of information obtained on a contractual or fiduciary basis or resulting from a joint production activities, is allowed only with the general consent of the partners.

When concluding any agreement (contract), the parties must undertake mutual written obligations to protect the confidential information of the other party and documents obtained during the negotiations, and to fulfill the terms of the agreement.

Consequently, in order to determine the composition of the protected information and documents, each company must draw up and regularly update the appropriate lists, without which the company's information protection system cannot function. It is important that these lists are individual in nature for each firm and reflect the real information sphere of its activities, the requirements of the owner of the information to restrict personnel access to information that constitutes the intellectual property of the firm.

Control questions:

1. What does the concept of "confidential information" include?

2. What is the procedure for handling confidential documents?

3. What documents fit the definition of "commercial secret"?

4. What is the procedure for regulating the composition of confidential information?

The work is available in full only for official users of Beckmology. For the rest, there is an opportunity to purchase a work for 500 rubles. Address: becmology at gmail.com

The question of the value of this or that information in the daily practice of any adult or company arises so often that their understanding of the category of "information value" is taken for granted. People invariably associate such value with usefulness and benefit for themselves, i.e. information is valuable if useful / beneficial. It would seem that everything is clear, there is nothing further to talk about. But even with the most superficial analysis of this topic, many interesting details arise related to the perception of the value of information and the impact on it.

Not only is the scale of information value different for each individual, it can still be easily changed, and around this change the efforts of a whole army of managers, salesmen, writers, and political strategists are concentrated. Competition for the consumer has grown into competition in the sphere of channels for providing psychological influence. Management theorists have developed special tools for managing customer values. In the social sphere, sophisticated technologies are used that affect the mechanisms for the formation of values ​​in various social groups... Interest in this topic is growing every year, because managing the perception of the value of information provides truly unlimited possibilities. Undoubtedly, everyone who understands this and masters this "science" will be able to achieve their goals faster, and the goals that he sets for himself will become more rational. First, we need to stop confusing the concepts of “psychological impact” and “information value management”.

The generally accepted definition of the value of information is formulated as follows. The value of information depends on the purpose of its recipient. The more information helps to achieve a goal, the more valuable it is considered. If the goal is achievable by several possible ways the value of information can be determined by the reduction in resource costs (material, time) brought by this information.

Although, in principle, it is clear what in question, but this definition clearly requires decoding, because behind it there is a lot of details, which give the term "information value" full right to exist.

The value (value) of information is determined not on the basis of the labor expended on its production, but on the basis of its value for the consumer. The value will be proportional to the estimated amount of benefits derived by its consumer. Moreover, if the benefit cannot be obtained immediately after receiving the information, its cost decreases. The lowering the cost coefficient of relevance will be the less, the more distant and uncertain the prospect of using the information. So, low price all kinds of educational literature is associated precisely with the extremely low coefficient the relevance of the information it contains.

The value of information for its consumer will be maximum if, immediately after its perception, the individual can use it with immediate material benefit. The criterion for direct assessment of the usefulness of the information obtained is size of material benefit... All other criteria will be indirect, i.e. will not be directly related to possible material benefits. For example, knowledge of mathematics can bring undoubted benefits, pleasure and even material benefits. But in order to get this benefit, you need to make a lot of additional efforts: either become a tutor and find rich students, or write a research paper with a significant economic effect, or defend a thesis and become a professor at a prestigious university.

The information "the key to the apartment where the money lies" is much more valuable for any individual than information about the psyche of managers, staff motivation in a crisis, the principles of building effective teams, etc. So, valuable information should always contain some kind of direct instruction for obtaining or saving a scarce resource.

If there is a lot of information, then its value inevitably decreases. This, in all likelihood, occurs in connection with the purely mental characteristics of the human perception system. Interest in information dissipates if it cannot be immediately emphasized with clear accents that are important for deciding on its use.

From the standpoint of the designated criterion for assessing the value of information - the size of the material benefit received "here and now" - the value of any book will be practically zero. This is clearly evidenced by its price. The price includes the cost of production and distribution, commissions from publishing houses and royalties. As a rule, the author's royalty directly depends on the circulation. Copyright royalties are usually 5-12% of the total cost of the print run. The cost of a print run is calculated simply: the selling price of one book must be multiplied by the number of books (print run). The selling price of the publishing house at the time of 2010 was approximately 70-80 rubles for one hardcover book. The sellers do the markup 100-300%. The size of the author's fee for a book published with a circulation of 11,000 copies will be approximately 50 thousand rubles. That fee hardly covers the cost of writing a book.

You can publish your work with the help of a literary agency. At the beginning of 2015, the amount of remuneration to the author is, as a rule, about 1,800 rubles per copyright sheet (40,000 characters with spaces). This is 45 rubles per thousand characters. For comparison, no more than 50 rubles per 1000 characters without spaces are received by so-called copywriters who write articles to order for websites. The purpose of creating such articles is one - the promotion (improvement of positions) of the site in the search engines Yandex and Google. In such articles, there can be no question of any semantic load. Only the keywords by which the consumer searches for goods on the Internet are important in them. Thus, the work of the author is equated to the little intellectual work of a copywriter / rewriter. This is directly evidenced by the purely symbolic fee he receives.

Typically, authors publish books to gain some prominence. Many writers agree to be left without money, if only their book was published. The books of the famous author are published and reprinted in large editions. This is where the impressive fees come in. However, they are by no means related to the value of the information provided, but to the scale of the commercial project.

Fame promises the author many material benefits. For a fee, he is asked to speak in the media, write a review, give a lecture, make a presentation. The "wedding general" is necessary to give greater social value to the process of extracting material benefits. For example, a computer manufacturing company uses well-known artists for marketing purposes to “promote” its own brand. It is quite natural that a product associated with a popular person is bought better, and a better-known brand wins the competition.

People who do not have valuable information for them in terms of deriving benefit from it "here and now" are forced to sell their services. They either sell their skilled labor or trade in information at their disposal that is of considerable value to others. A lawyer who knows the laws well can help a businessman to get out of a difficult situation. A mathematician can do statistical analysis sales and see some important trend for marketing. Surveyor sells his exploration services construction company, which wants to build residential buildings in this area. An inventor sells his patents to a manufacturer, a government official sells various secrets to politicians and businessmen, etc.

Thus, there is a large category of people for whom the value of information is determined not by the benefit “here and now”, but by the benefit that they can get by using it in the future in some way. Here we can talk about potential value of information. We come to the conclusion that it is not the possession of information that is important, but exclusively its use. Only when knowledge is used for a purpose is it really important and valuable. The value of knowledge can be expressed through the effectiveness of its use in practice.

The information contained in a book chosen by a physicist, as a rule, will be of no value to an accountant, similarly to information in a book chosen by an accountant for a physicist. Both cases imply the existence of very common distant behavioral goals: to obtain economic or mathematics education, i.e. build special displays of the problem environment. Quantifying the value of potential information in these cases is hardly possible.

So, the value of information is more common property than the usefulness of the information. In addition to useful information, that is, realized information, information can have potential value, be postponed for future tasks.

A truly rational person will only be interested in information that makes a profit "here and now." But who will voluntarily provide him with such information ?! Why would anyone hand over the "chicken that lays the golden eggs"? This means that the rational must get someone to produce useful information. But where is the guarantee that the forced laborer will work hard for the master and give him another enrichment technology? Rather, he will create a deadly weapon in order to get rid of the oppression of his hated master. Here, however, there is a variant that the rational will exchange valuable information for a worthy reward - and this is how the economy works. However, we all know very well how economic exchange actually works.

An entrepreneur always thinks in very specific categories, in the field of his immediate interests is only the process of extracting material benefits (obtaining scarce resources) that he has started, and he readily pays for services that are directly related to this process. Spending on fashionable clothes, delicacies, education, entertainment and recreation are indirect costs in the process of life, clearly focused on obtaining material benefits. So, in the economy, indirect costs are costs that, unlike direct costs, cannot be directly attributed to the cost of manufacturing products (rendering services, providing work) by an enterprise or organization. The composition of indirect costs is clearly defined in the economy of the enterprise; for the hotel individual, it will be approximately the same. In times of crisis, the first to start saving is on indirect costs - this pattern is manifested everywhere.

The information received by the entrepreneur has maximum value for him and he readily pays for it if he can use it directly in the process of extracting material benefits. Everything else is already lyrics. Any information that is not directly related to the extraction of benefits, as a rule, is funded on a leftover basis. True, there are special technologies for artificially increasing the value of information, thanks to which it is possible to force an individual to actively consume the information offered to him. Most of these technologies are well described and information about them is publicly available. but this information it is not regarded by people as valuable, since it does not provide material benefits “here and now”. Thus, a person is almost unprotected from social programming, which is more a pattern than some kind of annoying misunderstanding. An exception is made by people with a pronounced ability to create a stable microcosm around them, as a rule, they are extremely talented, large-scale and productive people (entrepreneurs, scientists, artists).

If a person wants to be deceived, it is unlikely that arguments about the need to counteract deception will be able to convince him. Psychologists talk a lot about the irrationality of human behavior and cannot find an explanation for this phenomenon. In general, it turns out that knowledge of the laws does not mean that material benefit will be derived from them. The thing is that a person is not capable of simultaneously ensuring his material gain and being at the level of abstraction from which he can control himself, rationally evaluate his own behavior. Most likely, in the future, biorobots and cyberbiological formations will have this ability. Man is destined to fully taste the merits and demerits of his own irrationality without any chance to overcome it.

People constantly demonstrate the irrationality of their own behavior, which some even call stupidity, and no one is going to learn the proper lessons from this. The philosopher will explain this behavior from the standpoint of dialectics, trying to calm himself and others, they say, everything is happening quite naturally. It seems that an individual individual only has to act as we are programmed, i.e. do deliberately irrational things with an intuitive awareness of the entire inexpediency of this activity.

However, a group of individuals united to achieve a specific purpose into the system, In a similar way itself no longer behaves. To control and rationalize their purposeful activities, a team of people is forced to use special tools, the most important of which is ...

end of fragment ...

The value of information depends mainly on the goal of making an optimal management decision. In addition, in different epochs in different societies within the framework of the dominant paradigm, the very concept of rationality and optimality of decisions can be interpreted in different ways. As a rule, the criteria for the optimality of managerial decisions can be based on logical, intuitive, ethical and psychological attitudes.

Several methods are known to quantify value. All of them are based on the idea of ​​the goal, the achievement of which is facilitated by the information received. The more information helps to achieve a goal, the more valuable it is considered.

1. If the goal is certainly achievable and, moreover, in several ways, then it is possible to determine the value (V) to reduce material or time costs through the use of information. So, for example, a combination of good subject and alphabetical catalogs of the library, the availability of bibliographic reference books reduce the time for compiling a list of references on a specific issue of interest to us.

This method of value determination was proposed by Stratononic.

  • 2. If the achievement of the goal is not necessary, but likely, then one of the following criteria is used:
    • a) the measure of value proposed by M. M. Bongard and A. A. Kharkevich is:

where R- the probability of achieving the goal before receiving information, and R- after.

Prior probability R depends on the information container or, what is the same, the total amount of information bp = 2- "

So, if, before receiving information, all options are equally probable, then p = 1 / n (where P is the number of options, and I = login).

Posterior probability R can be more or less R. In the latter case, the value is negative and such information is called disinformation. An example of the latter is a sign on a fork in a road, which for some reason is turned in the other direction. So the probability R is within O 1,

b) the measure of value proposed by V.I.Korogodin is the value

It has the same properties as the value in the formula of MM Bongard and AA Kharkevich, but varies from 0 to 1.

The value of information depends on the size R- the probability of achieving the goal before receiving information, i.e., on what preliminary (a priori) information the receptor already has. Prior awareness is called thesaurus. If there is none, then the prior probability in all variants is the same and is equal to R- 1 / p (where P- number of options). In this case, the quantity R plays the role of a normalization factor. If in this case, after receiving information, the goal is achieved for sure (P = 1), then the value of this information is maximum and is equal to Fs = V niax = logi / 7., I.e. coincides with the maximum amount of information in the given set. This coincidence is not accidental, it was for this that the form was chosen, while the value of information can be understood as the amount of valuable information.

The amount of information that has zero value, as a rule, is not small compared to the amount of information that has at least some value (positive or negative). It follows that the value of information is subjective.

The value of the data can be ranked according to a certain predetermined criterion. Typically, this is the level of potential beneficial and negative effects on the organization. The rating can be assigned both to the information itself and to its sources.

The value of information means a wide range of properties of information that determine the degree of influence and impact on the activities of the organization. If the information concerns minor issues and errors in the analysis of such information do not lead to significant damage, then such information can, to a certain extent, be neglected. At the same time, data on a situation that is fraught with bankruptcy of an organization requires increased attention and the attraction of significant resources, even if the risk is unlikely.

Although the value of information includes a set of indicators, the main criterion of significance is the potential damage or, conversely, the remuneration for the organization, measured in physical or monetary terms.

Representativeness - correctness, qualitative adequacy of the reflection of the given properties of the object. The representativeness of information depends on the correctness of its selection and formation. At the same time, the most important are: the fidelity of the concept, on the basis of which the initial concept, displayed by the indicator, is formulated; the validity of the selection of essential features and relationships of the displayed phenomenon; the correctness of the measurement technique and the algorithm for the formation of the economic indicator. Violation of the representativeness of information often leads to its significant errors, most often called algorithmic.

With an increase in the content of information, the semantic throughput information system, since less data needs to be converted to transfer the same information.

Sufficiency (completeness) economic information means that it contains a minimum, but sufficient set of economic indicators for making a correct management decision. The concept of sufficiency of information is associated with its semantic content (semantics) and pragmatics. As incomplete, that is, insufficient for acceptance correct decision and redundant information reduce the efficiency of management; It is the complete information that is of the highest quality.

The availability of information for perception when making a management decision is ensured by the implementation of the appropriate procedures for obtaining and transforming it. So, the purpose of a computing system is to increase the availability of information by aligning it with the user's thesaurus, that is, transforming it into an accessible and user-friendly form.

The relevance of information is the property of information to retain its usefulness (value) for management over time. The relevance depends on the statistical characteristics of the displayed object (on the dynamics of changes in these characteristics) and on the time interval that has passed since the appearance of this information.

Timeliness is a property of information that makes it possible to use it at a given moment in time. Untimely information leads to economic losses in both management and production. The reason for the economic losses from delays in the management sphere is the violation established regime solving functional problems, and sometimes their algorithms. This leads to an increase in the cost of solving problems due to a decrease in rhythm, an increase in downtime and overtime, etc. in the field of material production. Losses from information latency are associated with a decrease in the quality of management decisions, decision-making based on incomplete information or information of poor quality. Timely is such information that can be taken into account when developing a management decision without violating the rules, which is received by the management system no later than the appointed time.

Stability of information - the property of the resulting information to respond to changes in the original data, while maintaining the required accuracy. The stability of information, as well as its representativeness, is primarily due to the methodological correctness of its selection and formation.

Security of information - the property of information to resist unauthorized access and its deliberate distortion. The security of information is ensured by its cryptographic closure and, in particular, by a digital signature.

The usefulness of information is a complex indicator of its quality, its measure at a pragmatic level. The usefulness of information is determined by the effectiveness of the management carried out on its basis.

One example modern method for evaluating the value of information is the PageRank method used by Ooo§1.

PageRank is one of the link ranking algorithms. The algorithm is applied to a collection of hyperlinked documents (such as web pages on the World Wide Web) and assigns to each of them some numerical value that measures its "importance" or "authority" among other documents. Generally speaking, the algorithm can be applied not only to web pages, but also to any set of objects that are mutually linked to each other, that is, to any graph. PageRank is a numeric value that characterizes the "importance" of a web page. The more links a page has, the more “important” it is. In addition, the "weight" of page A is determined by the weight of the link transmitted by page B. Thus, PageRank is a method of calculating the weight of a page by calculating the importance of links to it.

Browser add-on Google Toolbar shows for each web page an integer from 0 to 10, which it calls PageRank, or the importance of that page from the point of view of Google. According to some reports, these values ​​are updated only a few times a year (while the internal PageRank values ​​are recalculated continuously) and show the PageRank values ​​of pages on a logarithmic scale.

While information about events that occurred in the past can only be assessed in terms of its reliability, events that will occur in the future cannot be spoken of in terms of reliability. To assess them, it is necessary to take into account the probability factor.

The degree (relative measure, quantitative assessment) of the possibility of some event occurring. When the reasons for some possible event to actually occur outweigh the opposite reasons, then the event is called probable, otherwise - unlikely or improbable. The preponderance of positive grounds over negative ones, and vice versa, can be in varying degrees, as a result of which the probability (and improbability) is more or less. Therefore, the probability is often assessed at a qualitative level, especially in cases where a more or less accurate quantitative assessment is impossible or extremely difficult. Various gradations of probability "levels" are possible.

The empirical "determination" of the probability is associated with the frequency of the occurrence of the event on the basis that with a sufficiently large number of tests, the frequency should tend to the objective degree of the possibility of this event. In the modern presentation of the theory of probability, the probability is determined axiomatically as special case abstract set measure theory. Nevertheless, the link between the abstract measure and the probability, which expresses the degree of possibility of the occurrence of an event, is precisely the frequency of its observation.

With the help of neural network modeling, in practice, they solve the problem of determining the probability of bankruptcy or insolvency.

If the information is determined as insufficiently reliable, it is possible to analyze what actions can be taken to double-check it.

The first stage in the process of internal control is the process of perception of information, that is, informational fixation, and the reflection of individual properties and states of the external environment, arising from direct impact, in the corresponding systems of the organization.

Exteroceptive perception includes searching for and receiving information from the external environment.

Interoceptive perception includes seeking and receiving information from the internal environment.

After the information is recorded, first of all, its qualities are assessed, such as significance, materiality, impact, relevance, modality, intensity, localization and duration.

Value can be determined using a simple ranking method. The following scale can be applied to assess significance.

Table 2.3. Valuation scale

ting

Grade

Description

Probability

Consequences

Critical to the organization's performance

Very high

Catastrophic

High importance

Significant

Average significance

Moderate

Insignificant

Low significance

Minor

Insignificant

Minor

Insignificant

From Wikipedia, the free encyclopedia

The value of information- one of the important properties of information, the assessment of which depends on the goals of the processes of its generation, reception and processing. It is studied by special information theories, decision theory, synergetics.

It is most convenient to consider the problem of the value of information, taking for the definition of information, in the spirit of the work of G. Kastler ( Henry quastler), the following:

The concept of the amount of information is closely related to the concept of information. The amount of information is applicable as a numerical characteristic of the total amount of information and the amount of valuable information. The information of a certain message may be completely valuable, or it may not contain any valuable information at all. The concepts of “value” and “meaningfulness” of information, despite their importance in computer science, were usually not strictly defined.

In traditional informatics (developed from the theory of communication), in contrast to synergetics, the value of information, its evolution and issues of spontaneous emergence in complex systems are not a subject of study, since the goal is assumed to be set from the outside. Semantic and pragmatic aspects of information, including value and meaningfulness, are studied within the framework of semantic and pragmatic information theories.

Example

In texts in two languages ​​(Russian and English), conveying the same meaning, the amount of valuable information will be the same. At the same time, the amount of information calculated by the number of letters used will most likely be different.

Approaches to measuring the value of information

The value of information depends on the purpose of its recipient. If the goal is achievable in several possible ways, according to RL Stratonovich, the value of information can be determined by the reduction in resource costs (material, time) brought by this information. The more information leads to achieving the goal, the more useful it is, the more valuable it is. However, the value of information is a more general property than usefulness of information ... In addition to useful information, that is, realized information, information can have potential value, be postponed for solving future problems.

If the achievement of the goal is feasible with some probability, the measure of value (expediency) of A.A. Kharkevich and M.M. Bongard can be applied:

V = log_2 \ frac Pp

where p- the probability of achieving the goal before receiving information, and P- after receiving it. The formula also works in the case when the probability of achieving the goal with obtaining information has decreased - in this case, the value of the information is negative, and the information itself is better called disinformation.

The above formula for the value of information V = log_2 \ frac Pp also gives the amount of valuable information. For example, if P = 1(the goal is fulfilled with probability 1), and p = 1 / n(for n equiprobable outcomes - preliminary awareness (thesaurus), that is, there is no prior information), then V = log_2 n- the maximum amount of information in a given situation.

MM Bongard introduces the concept of "useful information" and obtains a more general probabilistic-algebraic approach, in which the Kharkevich formula becomes a special case.

Other approaches based on the language of formal logic were developed by R. Carnap, I. Bar-Hillel, D. Harrach, D. Kemeny, J. Hintikka.

V = \ frac (AIT) (B + I) e ^ (- CT / I)

where I- the amount of incoming information, T- thesaurus, A, B and C- constants. Maximum value is achieved with a thesaurus proportional to the amount of information received. This approach emphasizes the multidimensional value of information.

The value of information is tied to the hierarchy of information levels of the system. The thesaurus is information at this level of the hierarchy, but it is used as a basis for generating or receiving information at the next level. (The thesaurus measure related to semantic measures of information was proposed by Yu. A. Shreider and takes into account the semantic properties of information together with the recipient's capabilities to perceive the message, which depend on the recipient's thesaurus.)

For all the approaches indicated above, three common points can be distinguished that are present in each of them:

  1. information itself
  2. receptor thesaurus and reception conditions
  3. the purpose for which the information is applied

The development of the theory of determining the value of information will most likely follow the path of studying the thesaurus and the conditions of reception as the most variable part of the noted triad.

The value of management information

One of practical applications the concept of the value of information is found in economics and management. As in other areas, it makes sense to talk about the value of information when all three elements of the triad highlighted above are present: the internal content of information, the subject - the decision-maker (DM) and the goal facing the DM. For the decision maker, valuable information will be the information that contains the information necessary for making a decision, but still unknown information, in an understandable form. The value of management information is always specific and can change over time.

In economics they talk about pragmatically information - that is, the usefulness (value) of information for the user or management, usually measured in the same units as the values ​​of the objective function in the management system, which usually have the dimension of monetary units. The value of information can be defined as an increase in the economic effect due to pragmatic properties management information.

The value of the protected information

see also

  • DIKW (information hierarchy, where each level adds certain properties to the previous level)

Write a review on the article "The value of information"

Notes (edit)

  1. , With. 69-70.
  2. , With. 28-30.
  3. , With. thirteen.
  4. , With. sixteen.
  5. , With. 17.
  6. , With. nineteen.
  7. Chursin N. N.// Popular informatics. - Kiev: Technics, 1982 .-- 157 p.
  8. .
  9. , With. 176.
  10. Zabolotsky V.P., Ovodenko A.A., Stepanov A.G. Semantic measures of information // Mathematical models in management: Textbook. - SPb .: GUAP, 2001.
  11. , With. eighteen.
  12. .
  13. , With. 174.
  14. , With. 73.
  15. , With. 21.
  16. .
  17. .
  18. .

Literature

  • Bongard M. M. Recognition problem. - M .: Fizmatgiz, 1967.
  • Broido V. L., Ilyina O. P. Computer architecture and systems. - 2nd ed .. - St. Petersburg. : Peter, 2009 .-- S. 31-33. - 720 p. - ISBN 978-5-388-00384-3.
  • Volkenstein M. Poems as a complex information system // Science and Life. - 1970. - No. 1.
  • A. A. Grusho, E. E. Timonina The value of information // Theoretical foundations of information security. - M .: Publishing house of the Yakhtsman Agency, 1996.
  • A. I. Derevyagin// Bulletin of Voronezh state university... Economics and Management .. - 2009. - No. 9. - S. 58-61.
  • Kastler G. The emergence of a biological organization = The Emergence of Biological Organization. - M .: Mir, 1967.
  • V. G. Budanov Self-organization of time: evolutionary score, from cycles to rhythm cascades // Synergetics of time. - M .: Repronix, 2007.
  • V. I. Korogodin, V. L. Korogodina Information as the basis of life. - Dubna: Publishing Center "Phoenix", 2000. - 208 p.
  • V.P. Leonov Contemporary problems informatics. Introduction to the semiotics of information technology. - Tomsk: Publishing house NTL, 2011 .-- 248 p. - ISBN 978-5-89503-485-9.
  • Stratonovich R. L. Information theory. - M .: Soviet radio, 1975.
  • Kharkevich A.A. On the value of information // Problems of Cybernetics. - 1960. - Issue. 4 . - S. 54.
  • Chernavsky D.S. Synergetics and information (dynamic information theory). - 2nd ed., Rev. and additional .. - M .: Editorial URSS, 2004. - 288 p. - (Synergetics: from the past to the future). - ISBN 5-354-00241-9.
  • Shreider Yu.A. On one model of semantic information theory // Problems of Cybernetics. - M., 1965. - Issue. thirteen . - S. 233-240.

An excerpt characterizing the value of information

After the village and in the serious mood in which Natasha was, all this was wild and surprising to her. She could not follow the progress of the opera, could not even hear the music: she saw only painted cardboard and strangely dressed men and women, strangely moving in the bright light, talking and singing; she knew what all this was supposed to represent, but it was all so pretentiously false and unnatural that she felt now ashamed of the actors, now funny at them. She looked around her, at the faces of the audience, seeking in them the same feeling of ridicule and bewilderment that was in her; but all the faces were attentive to what was happening on the stage and expressed a feigned, as it seemed to Natasha, admiration. "It must be so necessary!" thought Natasha. She alternately looked back at these rows of anointed heads in the stalls, then at the naked women in the boxes, especially at her neighbor Helene, who, completely undressed, with a quiet and calm smile, without taking her eyes off, looked at the stage, feeling the bright light poured throughout the hall and warm, warm air from the crowd. Little by little, Natasha began to fall into a state of intoxication that she had not experienced for a long time. She did not remember who she was and where she was and what was going on in front of her. She looked and thought, and the strangest thoughts suddenly, without connection, flashed in her head. Now she had the idea to jump on the ramp and sing that aria that the actress was singing, then she wanted to hook an old man sitting not far from her with a fan, then bend over to Helen and tickle her.
One minute, when everything calmed down on the stage, waiting for the start of the aria, the entrance door of the parterre creaked, on the other side where the Rostovs' box was, and the steps of a belated man sounded. "Here he is Kuragin!" whispered Shinshin. Countess Bezukhova, smiling, turned to the incoming person. Natasha looked in the direction of Countess Bezukhova's eyes and saw an unusually handsome adjutant, with a self-confident and at the same time courteous air, approaching their bed. It was Anatol Kuragin, whom she had long seen and noticed at the St. Petersburg ball. He was now in an adjutant's uniform with one epaulette and an excellency. He walked with a restrained, valiant gait, which would have been ridiculous if he had not been so handsome and if there had not been such an expression of good-natured contentment and gaiety on his beautiful face. In spite of the fact that the action was going on, he, slowly, slightly rattling his spurs and saber, smoothly and high carrying his perfumed beautiful head, walked along the carpet of the corridor. Glancing at Natasha, he went up to his sister, put his hand in a doused glove on the edge of her box, shook her head and bending over asked something, pointing at Natasha.
- Mais charmante! [Very sweet!] - he said, obviously about Natasha, as she did not so much hear as she understood from the movement of his lips. Then he went to the first row and sat down beside Dolokhov, friendly and carelessly nudging that Dolokhov with whom others so ingratiatingly treated. He winked cheerfully, smiled at him and rested his foot on the ramp.
- How alike brother and sister! - said the count. - And how good both are!
Shinshin in an undertone began to tell the count some story of Kuragin's intrigue in Moscow, to which Natasha listened precisely because he said charmante about her.
The first act ended, in the stalls everyone got up, got mixed up and began to walk and go out.
Boris came to the Rostovs' box, very simply accepted the congratulations and, raising his eyebrows, with an absent-minded smile, conveyed to Natasha and Sonya the request of his bride to be at her wedding, and left. Natasha, with a cheerful and flirtatious smile, talked to him and congratulated him on the marriage of the very Boris with whom she had been in love before. In the state of intoxication in which she was, everything seemed simple and natural.
Naked Helen sat beside her and smiled equally at everyone; and Natasha smiled at Boris in the same way.
Helen's box was filled and surrounded from the side of the parterre by the most noble and intelligent men, who, it seemed, vying with each other wanted to show everyone that they knew her.
Kuragin all this intermission stood with Dolokhov in front of the ramp, looking at the Rostovs' box. Natasha knew that he was talking about her, and this gave her pleasure. She even turned so that he could see her profile, in her opinion, in the most advantageous position. Before the start of the second act, the figure of Pierre appeared in the stalls, whom the Rostovs had not seen since their arrival. His face was sad, and he had grown even fatter since Natasha had last seen him. He, not noticing anyone, went to the first rows. Anatole went up to him and began to say something to him, looking and pointing at the Rostovs' box. Pierre, seeing Natasha, perked up and hurriedly, through the rows, went to their bed. Approaching them, he leaned his elbows and spoke with Natasha for a long time, smiling. During her conversation with Pierre, Natasha heard in Countess Bezukhova's box male voice and for some reason she found out that it was Kuragin. She looked around and met his eyes. He almost smiling looked straight into her eyes with such an admiring, affectionate look that it seemed strange to be so close to him, to look at him so, to be so sure that he liked you, and not to be familiar with him.
In the second act there were paintings depicting monuments and there was a hole in the canvas depicting the moon, and the lampshades on the ramp were raised, and trumpets and double basses began to play bass, and many people in black robes came out on the right and left. People began to wave their hands, and in their hands were something like daggers; then some other people came running and began to drag away that girl, who was in a white dress, and now in a blue dress. They did not drag her away at once, but sang with her for a long time, and then they dragged her away, and behind the curtains they hit something metallic three times, and everyone knelt down and sang a prayer. Several times all these actions were interrupted by the enthusiastic shouts of the audience.
During this act, Natasha, every time she glanced into the stalls, saw Anatol Kuragin, throwing his hand over the back of the chair and looking at her. She was pleased to see that he was so captivated by her, and it did not occur to her that there was anything wrong in this.
When the second act was over, Countess Bezukhova got up, turned to the Rostovs' bed (her chest was completely bare), beckoned to the old count with her gloved finger, and ignoring those who had entered her box, began talking to him with a courteous smile.
“Yes, introduce me to your lovely daughters,” she said, “the whole city is shouting about them, but I don’t know them.
Natasha got up and sat down to the magnificent Countess. Natasha was so pleased with the praise of this brilliant beauty that she blushed with pleasure.
“Now I also want to become a Muscovite,” Helen said. - And how are you not ashamed to bury such pearls in the village!
Countess Bezukhaya, in all fairness, had a reputation as a charming woman. She could say what she did not think, and especially flatter, in a completely simple and natural way.
“No, dear count, let me take care of your daughters. At least I'm not here for long now. And you too. I will try to amuse yours. Back in Petersburg, I heard a lot about you, and I wanted to get to know you, ”she told Natasha with her monotonously beautiful smile. - I heard about you and from my page - Drubetskoy. Did you hear he is getting married? And from a friend of my husband - Bolkonsky, Prince Andrei Bolkonsky, - she said with special emphasis, hinting that she knew his relationship to Natasha. - She asked to get to know each other better, let one of the young ladies sit for the rest of the performance in her box, and Natasha went over to her.
In the third act, a palace was presented on the stage, in which many candles were burning and pictures of knights with beards were hung. In the middle were probably the king and queen. The king waved right hand, and, apparently shy, sang something badly, and sat down on the crimson throne. The girl, who was first in white, then in blue, was now dressed in one shirt with her hair down and stood near the throne. She sang mournfully about something, addressing the queen; but the king sternly waved his hand, and men with bare feet and women with bare feet came out from the sides, and all began to dance together. Then the violins began to play very delicately and cheerfully, one of the girls with bare fat legs and thin hands, separated from the others, went backstage, straightened her bodice, went out into the middle and began to jump and soon beat one foot against the other. Everyone in the stalls clapped their hands and shouted bravo. Then one man stood in a corner. The orchestra began to play louder with cymbals and trumpets, and this one man with bare legs began to jump very high and mince with his legs. (This man was Duport, who received 60 thousand a year for this art.) Everyone in the stalls, in boxes and in the district began clapping and shouting with all their might, and the man stopped and began to smile and bow in all directions. Then others danced, with bare feet, men and women, then again one of the kings shouted something to the music, and everyone began to sing. But suddenly a storm broke out, the orchestra heard chromatic scales and chords of a diminished seventh, and everyone ran and dragged one of those present backstage again, and the curtain fell. Again, a terrible noise and crackling arose between the spectators, and everyone began to shout with enthusiastic faces: Duport! Duport! Duport! Natasha no longer found this strange. She looked around her with pleasure, smiling happily.
- N "est ce pas qu" il est admirable - Duport? [Isn't Duport adorable?] Helene said to her.
- Oh, oui, [Oh, yes,] - Natasha answered.

During the intermission, Helen's box smelled of cold, the door opened and, bending down and trying not to catch anyone, Anatole entered.
“Let me introduce you to my brother,” Helen said, restlessly running her eyes from Natasha to Anatole. Natasha turned her pretty head over her bare shoulder to the handsome man and smiled. Anatole, who was as good up close as he was from afar, sat down next to her and said that he had long wanted to have this pleasure, even from the Naryshkinsky ball, at which he had the pleasure, which he had not forgotten, to see her. Kuragin with women was much smarter and simpler than in male society. He spoke boldly and simply, and Natasha was strangely and pleasantly struck by the fact that not only there was nothing so terrible in this man, about whom so much was told, but that, on the contrary, he had the most naive, cheerful and good-natured smile.

There are so many definitions today for the term "information"! There are said to be over a hundred of them. What does it mean? Probably, the fact that specialists who study this term do not always fully understand the subject of their research. In order to understand what a given word actually means, one should turn to its etymology.

From time immemorial

Linguists believe that it is rooted in the East and is derived from the Arabic verb "aarafa" meaning "to know, to recognize." The ancient Greeks did not understand how to read this word correctly, so, just in case, they read it in both directions. So it turned out: shape and morph. Synonyms. Other education from: ma'rif, this is “what I know”. This shows a very significant difference between two often indistinguishable experts. Information as the difference between things and concepts, as well as information as knowledge. But let's not delve so deeply into the meaning of this word... Perhaps much more important today is the role this term has come to play in our world. And its importance cannot be underestimated.

New time - new terms

Information is more than just knowledge. Possession of it provides tremendous opportunities both in business and in politics. It has become the most important resource of the state. Information is evaluated in the same way (if not higher), as well as the main natural, economic, and labor ones. A number of psychologists argue that rational humanity is slowly but surely turning into informational. And by the way, together with the traditional method of managing society (the same administrative and organizational) and individuals, a special method of centralized influence on the population is gaining more and more popularity - the method of information governance. Indeed. With the development of mass media, and in particular the Internet, a situation has developed that information is a tool for influencing the minds of consumers. Therefore, she began to meet us everywhere. There is so much of it that consumers have to filter it every day, filtering out "garbage". Otherwise, you can fall under her influence and turn into a zombie, completely controlled creature.

In our fast-paced age, the concept of "information entropy" has appeared. What is it, you ask? This is a criterion for the randomness of information, the uncertainty of the appearance of a certain symbol of the primary alphabet. In the absence of information losses, it is numerically equal to the symbol of the transmitted message.

Information is more than just power

The importance of information has long been appreciated in the West. The United States administration at the state level views it as a strategic resource. It can be obtained as a result of data processing and analysis using specialized system analysis. Naturally, the protection of information in the United States is at a very high level. This is constantly being done by, perhaps, the most secret services - the FBI and the CIA. Thus, in the 21st century, information is both a resource of the state and an object of bargaining with other states. It has become as expensive as oil or gold.

Top related articles