Unit 3 Outcome 3 IP&M - 2003

Evaluate the effectiveness of the strategies used by an organisation to manage the storage, communication and disposal of data and information.

This outcome will contribute 30 marks out of the 100 marks allocated to School-assessed Coursework for Unit 3. It will be assessed by one task.

Task

Description

·          A written report

or

·          A test

Designing the assessment task

Teachers should design an assessment task that allows the student to:

·          identify the existing procedures and equipment (strategies) used by an organisation to manage the storage, communication and disposal of information, explain the strengths and weaknesses of each strategy and recommend improvements

·          evaluate the extent to which the procedures used by an organisation meet its legal obligations

·          have the opportunity to demonstrate the highest level of performance.

Resources and scheduling

Schools may determine the conditions for the task including access to resources and notes. Students should be advised of the timeline and conditions under which the task is to be conducted.


Performance descriptors

The following descriptors provide a guide to the standards expected when setting and marking assessment tasks. They describe the knowledge and skills typically demonstrated by students who have achieved scores within each range on the assessment task/s.

Outcome 3

Evaluate the effectiveness of the strategies used by an organisation to manage the storage, communication and disposal of data and information.

MARK RANGE

DESCRIPTOR: typical performance in each range

24–30 marks

 

All facts are accurately interpreted to determine the goals and objectives of the existing information system. All existing procedures and equipment are correctly identified.

A complete and relevant set of criteria is used to evaluate the effectiveness of all of the existing strategies. The strengths and weaknesses of each strategy are accurately described, and, where appropriate, use correct technical terminology.

All relevant legal obligations and/or ethical dilemmas are considered when determining the extent to which existing procedures allow these obligations to be met. This evaluation is based on valid criteria.

All threats to the security of information are fully described and are logically connected to the stated consequences, if the security measures are violated or ignored.

All recommended strategies are defensible and sound. Explicit connections exist between the strategies, the causes of security breaches and the goals and objectives of the information system.

A complete and accurate description is provided of the types, roles and functions of the recommended equipment and procedures.

16–23 marks

 

Most facts are accurately interpreted to determine the goals and objectives of the existing information system. Most existing procedures and equipment are correctly identified.

Relevant criteria are used to evaluate the effectiveness of most of the existing strategies. The strengths and weaknesses of most strategies are described; however, some inaccuracies exist. Where appropriate, technical terminology has been used.

Most relevant legal obligations and/or ethical dilemmas are considered when determining the extent to which existing procedures allow these obligations to be met. This evaluation is mostly based on valid criteria.

Most of the threats to the security of information are explained and logical connections exist to most of the stated consequences, if the security measures are violated or ignored.

Most recommended strategies are relevant and adequately described. Logical connections exist between most of the proposed strategies, the causes of the breaches, the effectiveness of the existing strategies and the goals and objectives of the information system.

An adequate and mainly accurate description is provided of the types, roles and functions of the recommended equipment and procedures.


 

8–15 marks

Some facts are inaccurately interpreted as revealed in the description of the goals and objectives of the existing information system. Some existing procedures and equipment are correctly identified.

Some inappropriate criteria are used to evaluate the effectiveness of some of the existing strategies. The strengths and weaknesses of some strategies are described; however, misunderstandings of theory or organisation needs are revealed.

Some relevant legal obligations and/or ethical dilemmas are considered when determining the extent to which existing procedures allow these obligations to be met. This evaluation is based on some inappropriate criteria.

Some threats to the security of the organisation’s information are explained, and the connections between these threats and possible consequences for the organisation if security breaches occur are not always coherent.

Some recommendations to improve the strategies are logically linked to the causes of the breaches and the goals and objectives of the information system. Some recommendations are supported; however, the appropriate matching of strategies to the organisation’s needs are limited.

Descriptions of the types, roles and functions of the recommended equipment and procedures are incomplete or superficial.

1–7 marks

The description of the goals and objectives of the existing information system is incomplete and/or reveals misunderstanding of facts. Few existing procedures and equipment are correctly identified.

Little or no criteria have been used to evaluate the effectiveness of the identified existing strategies. The strengths and weaknesses of few strategies are superficially described, and misunderstandings of theory and organisation needs are revealed.

Incorrect or irrelevant legal obligations and/or ethical dilemmas are considered when determining the extent to which existing procedures allow these obligations to be met. This evaluation is based on no stated criteria.

Limited threats to the security of the organisation’s information are provided. Few connections between these threats and possible consequences if security breaches occur are provided.

Limited recommendations to improve the strategies are relevant; however, others are not appropriately matched to the needs of the organisation.

Descriptions of the types, roles and functions of some recommended equipment and procedures are incomplete and superficial.