.1 Draw the information integrity model of Flowerday and Von Solms. (5) 2.2 Using the diagram illustrated in 2.1, discuss the quality principles relating to information and data. (20) Question 3 [25] 3.1 Explain the levels of access to the information system that you are allowed access to at your own working environment. (10) 3.2 Discuss the role of a commander in the management of information systems within your unit or organisation. (10) 3.3 Discuss the identification and dissemination of information about crime trends and crime problems. (5)
Comments
Leave a comment