Identification (information)

Identification (information)

The function of identification is to map a known quantity to an unknown entity so as to make it known. The known quantity is called the identifier (or ID) and the unknown entity is what needs identification. A basic requirement for identification is that the ID be unique. IDs may be scoped, that is, they are unique only within a particular scope. IDs may also be built out of a collection of quantities such that they are unique on the collective.

Identification is the capability to find, retrieve, report, change, or delete specific data without ambiguity. This applies especially to information stored in databases. In database normalization, it is the central, defining function to the discipline.

Example

To retrieve the data stored about an individual with the Internal Revenue Service (IRS) of the United States, the IRS needs to be supplied with the individual's Social Security Number (SSN). The SSN, then, "identifies" a unique individual to the IRS. No other living person has that SSN, and that individual is assumed to not have more than one SSN. Other data that the individual's SSN identifies with the IRS would be such things as his or her name, birthdate, and current employer.

----


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Identification — can mean * Identification (psychoanalysis); * Identification (information); * Identification (parameter), in statistics and econometrics, how parameters can be inferred from data; * Identification (literature), in literary criticism; *… …   Wikipedia

  • Information Awareness Office — seal The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • IDENTIFICATION — Dans l’acception psychologique de la notion, la forme d’identité la plus directement accessible est celle qu’a dégagée, en rupture avec la tradition cartésienne, la critique de la substantialité du moi. «Le soi (Self ), écrit Locke, est cette… …   Encyclopédie Universelle

  • Information needs — Information need is an individual or group s desire to locate and obtain information to satisfy a conscious or unconscious need. The ‘information’ and ‘need’ in ‘information need’ are inseparable interconnection. Needs and interests call forth… …   Wikipedia

  • Information technology audit process — Information technology audit process:Generally Accepted Auditing Standards (GAAS)In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. The standards cover the following three… …   Wikipedia

  • identification — UK US /aɪˌdentɪfɪˈkeɪʃən/ noun ► [U] an official card or document with your name and photograph or other information on it, used for proving who you are: provide/show identification »To open a new account, the bank will require you to show four… …   Financial and business terms

  • Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… …   Wikipedia

  • Information forensics — is the science of investigation into systemic processes that produce information. Systemic processes utilize primarily computing and communication technologies to capture, treat, store and transmit data. Manual processes complement technology… …   Wikipedia

  • Information assurance — (IA) is the practice of managing information related risks. More specifically, IA practitioners seek to protect and defend information and information systems by ensuring confidentiality, integrity, authentication, availability, and non… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”