Information systems: types. Classification and types of information systems

The use of information systems of various types is widespread in various fields of activity of society, public administration and the economy. The key factor that predetermined this trend is computerization, which penetrated into most sectors of the national economy. What are information systems? What are the classification criteria for this kind of instrument?

Information System: Definition

Among the definitions of what an “information system” is common in the Russian expert community , one can pay attention to the following wording. It is of interest primarily due to the fact that it is used in some sources of law, which means that its main idea is generally recognized by the community.

State Information System




, , . . , - ( ), , .





, , , . , . , , , . - , , , , , . , , , .

, . , , .

-, . , . , , , . - , - .

-, . , - . , , , . , , .





-, . , , , - , , . , , - .

Information Systems Development




- IT- , , , . , - . , . , , .

, , - , - . , , , . , . - , , . , , . , , , , - . - .

Information systems types




. , . , . , . , , , , . , , , - , - .

- , . , , , , . .

? , , . , , , , , , . , . , , . - .

, . , . , , , .

- . , , , , - , , , , . , - . , , , , .

, , . , , , . , , , . , , . , , , , , - , - , , .

Information support of information systems




. - , , , . IT- . - . - .

, , - , , . , , , , , , , , .

, , . ? , . , , . , , , .

Corporate Information Systems




, . , "". , , , . , , . , , . , , , , , , , , , .

Yandex, Google - ?

, - Yandex, Google, ? - . , , Yandex Google - . , , , , , , .

Key Information Systems




, Yandex, Google , . ? , -, , , , - , . , , , . , Yandex Google, , .

- . , , , , , . , , - , , . , , , , , - .

Information System Security




: . - - . , , - , , , , , . . , , . , , , , , , .

, , , . , , , IT-, , , , . , , .

- , , , , . , - , , . - , - . IT- - .

Ensuring the security of information systems should not go to the detriment of the main tasks that are entrusted to this kind of software and hardware solutions. According to some experts, none of the data protection measures, no matter how reliable, can be justified if the end user of the IT product is not able to fully utilize the necessary functions of the solution.




All Articles