Application of Information Technology

  1. Applications of IT
  1. Smart, Mobile technologies and cloud computing

1.1 The need for a strategic perspective: new technologies:


• from a strategic perspective, the main reasons for organizations to adopt new technologies include:

Information technology strategy should align with business strategy:
• IT can be used defensively or offensively depending on strategy

2.1. Smart technology

2.3 Mobile technology

  1. Robotics and Artificial Intelligence

4.1. Benefits of robotic process automation (RPA):


Faster processing, lower costs, higher accuracy, freeing up staff for value-adding work.

4.2 Artificial Intelligence

  1. Information technology and data analysis

5.1 The widespread use of information


  1. Big data

6.1 The Vs of big data

6.2. Opportunities and threats of big data

  1. Data for decision making

7.1. New product development, marketing and pricing

  1. Information system controls from a strategic perspective

8.1 Need for information systems controls

  1. IT and systems security controls

9.1. Types of control

General controls:
ensure proper system and data security.

Facility controls

Application controls:
prevent, detect and correct errors for each application.

Software controls prevent:


• Unauthorized copies of software

Network controls

More on network controls

  1. Cybersecurity

10.1 The rise of cybersecurity

10.2. Promoting cybersecurity in organisations


Organizations should promote cybersecurity through:

  1. Improving IT/IS controls

practical measures senior management can take to improve IT/IS controls:

• Gaining a competitive edge through early adoption

• Improving performance by optimizing resource usage and obtaining customer insights

• Utilizing abundant data through effective storage and analytics enabled by new technologies

• Creating value for stakeholders by boosting profits, reducing costs or improving efficiencies

• IT can help provide strategic capabilities and reduce threats in strategic analysis.

• IT can impact Porter's Five Forces:

• IT can support generic strategies:
• IT can support different generic strategies by enabling cost cuts, differentiation or focusing on niche markets


• IT can help implement strategy through:

Create barriers to entry

Break down barriers

Compete on cost

Collaborate to change competition

Cost leadership:

Differentiation:

Focus:

Process redesign

Resource planning and scheduling

Supply chain management

Reduce inventory costs

Improve forecasting and planning

Provide easy ordering platforms

Enable customization

Provide customer insights

Exclude competitors from niche markets

Example:

• Respond to competitive threats by enabling differentiation

• Implement a focused niche strategy by providing customized capabilities

• Align IT investments with strategic goals to improve performance

provide differentiated services that competitors lacked, namely:

• Virtual design tools using CAD that let customers redesign properties digitally

• Providing a better customer experience through information and visualization

Smart technology refers to technology that can connect to a network and interact with users and other devices.


It can be categorized into three main groups:


Smart devices - automated devices that are programmable but do not require network connectivity.


Example: Programmable thermostats


Smart connected devices - remotely controllable using networks like WiFi or Bluetooth.


Example: Google Nest thermostat controlled via smartphone

Internet of Things (IoT) devices - have full internet connectivity enabling interactions with many other devices and remote control.


The Internet of Things connects physical devices through the internet, enabling data sharing and interaction.




smart technology ranges from:

• Automated devices lacking connectivity

• Devices connectable within a limited range network

• Fully connected "things" that interact within the Internet of Things

2.2. Benefits:

2.2. Risks:

Security of connected devices and data collected: hacking and data theft

Privacy concerns around data inputs required: exposed over the internet

Reliability issues if technology fails: Disruption

Regulatory gaps due to rapid development

• Risks throughout the technology ecosystem

• Increased convenience through automation

• Potential sustainability and efficiency gains through data insights

• More timely information through sensors and connectivity

While benefits can be substantial, managing risks through security, privacy protections, regulatory frameworks and ecosystem governance is critical to realizing the full value of smart technology for users.

Mobile technology refers to portable devices like:

• Laptops

• Tablets

• Smartphones

• GPS devices

Features:


• WiFi connectivity

• Bluetooth

• 4G networks

2.4. Benefits:

2.4. Risks:

• Refers to portable devices with internet connectivity

• Enables information access and interactions anywhere, anytime

• Offers convenience through features like payments

• Higher device costs

• Rapid obsolescence

• Increased security risks

• Requirement for robust data protection: Firewalls. Passwords, Training

While mobile technology provides flexibility and accessibility, organizations must adopt security measures to mitigate risks and maximize benefits. The appropriate balance of risk and value will vary by organization.

2.5 Cloud computing v owned technology

Cloud computing

offers benefits of:

But has disadvantages of:

• Expertise: Cloud providers have specialist skills

• Support: Cloud providers monitor systems continuously

• SLAs: Cloud providers are responsible for restoring systems and may pay penalties for downtime

Owned technology

has benefits of:

• Customization: Systems can be tailored exactly to organizational needs


• Support: In-house staff provide support

But has disadvantages of:


• Expertise: Expensive to employ specialists

• Support: Expensive to maintain 24/7 monitoring and support

• SLAs: Own responsibility to restore systems in case of outages

key factors to consider are:


• Expertise and cost of skilled staff

• Level of monitoring and support required

• Flexibility and customization needs

• Responsibility and guarantees around system availability

The optimal balance of cloud vs. owned technology depends on:
A balance must be struck weighing:



• Compatibility with business needs

• Expertise and resources available

• Complexity of data and compliance requirements

While cloud offers lower costs and on-demand scalability, owned solutions provide more customization and control. A hybrid approach combining the two may be best for some organizations.


The right choice varies case-by-case based on weighing benefits, drawbacks and specific organizational requirements for IT solutions.

Cloud computing is a model for:

• On-demand access to configurable IT resources


• Shared pool of resources accessed via the internet

• Cloud provides on-demand, scalable IT resources

• Lower costs, flexibility and speed

• Customization: Limited customization options compared to in-house

• But risks center around loss of control, security and compliance

• Regulatory risks arise from using providers in different jurisdictions

• Reliance on provider performance and continuity

• Loss of control and security risks


• Cost savings and flexibility


• Sustainability - Can reduce energy use and carbon footprint

• Efficiency - IoT sensors detect issues early, enabling improvements

• Convenience - Automation frees up time and increases ease of use

• Information - Real-time data alerts users to take prompt action


Internet-of-Things Development

Concerns:

Government Work

Advantages:


• Potential for steady cash flows to fund investment in other areas

Concerns:


• Lower risk but also likely lower returns

Advantages:

• Potential for rapid growth through market expansion

• Opportunity to innovate and build reputation

• Ability to match business needs to technology, a core competence

• Committing to particular markets may be risky

• Early technology may be unreliable

• Limited applicability to existing clients

• Would require investment without guaranteed success

• Would need enhanced data storage and processing capacity

• Would require recruiting staff with IoT expertise, adding costs

• But could bring valuable expertise

• May damage standing and profitability

• Higher risks of security breaches and privacy violations, threatening reputation

Conclusion:

• Options are not mutually exclusive

• Represent different growth and risk profiles:

IoT:


• High risk


• High potential returns

Government:


• Lower risk


• Steadier returns

• Combining both could:


• Improve diversification


• Fund riskier IoT investment with government work cash flows

While IoT offers more transformational growth potential, government work provides a safer source of funding.


A balanced portfolio combining both could generate a mix of steady and higher-growth revenues to sustain investment.


Thoroughly evaluating risks, opportunities, needed capabilities and fit with strategy is key for each option.

Professional Judgement:


The evaluation demonstrates objectivity by:


• Identifying both advantages and concerns for each option proportionately

• Assessing quantitative factors like costs, investment needs and expected returns

• Considering qualitative factors like risks, capabilities and strategic fit

• Proposing a balanced combination that weighs different risk-return tradeoffs

For members:


Feedback - Instant messaging facility allows members to communicate needs



Convenience - Access fitness info and club updates anytime, anywhere


Sense of community - Constant presence in members' lives engages members

For Optima:


Engagement - Interesting and relevant content will be seen directly by target audience


Older members - Must ensure technology does not disengage these members; usage will vary by demographics


Data analytics - Evaluate app usage to identify needs of different customer segments and deliver information in multiple ways

For Optima:


Interaction - Mobile should complement, not replace, other forms of contact


Marketing - Instantly contact members with offers, updates and tailored messages


Customer insights - Collect continuous feedback and data to better understand and serve members

Scepticism:


• The director's claim that members only want to exercise and socialize is an oversimplification

• Mobile technology likely engages people of all ages when accessible; usage will vary but under-estimating potential risks disengagement

• Understanding members' varied needs across demographics is key to effective use of technology

• Provide convenience and communication for members


• Enable targeted marketing, customer insights and engagement for Optima


But Optima must:


• Ensure technology complements other interactions

• Cater for varied usage across demographics

• Evaluate use to identify needs of different segments

Used effectively with an inclusive approach, mobile technology has significant potential to enhance member experience and business performance for Optima.


However,a narrow view risks disengagement of some members.

the benefits of outsourcing IT:

For the city authority:

• Improved responsiveness, flexibility and access to expertise

• Elimination of management conflicts

• Focus on strategic priorities

For IT staff:


• More opportunities for growth and motivation within an IT specialist firm: learning, skill development, new technologies

Risks of outsourcing IT: job security, cultural adjustment and potential cost savings pressures.

Outsourcing IT:


• Careful management of the transition and selection of an outsourcing partner that shares the authority's objectives will be critical to maximizing benefits


• while mitigating potential downsides for both the authority and its IT employees.

the benefits of using the advertising agency's services:

• Timing is opportune given marketing director vacancy


• Agency expertise can overhaul marketing approach to fit strategy

Website:


• Current site focuses on reliability, not core messages for target market

• Review could identify key promotional messages

• SEO and banner ads can attract more traffic

Social media:


• Greater visibility can promote products and provide up-to-date image

• Engage loyal customers and facilitate two-way dialogue for feedback

• Competitors are not using social media effectively

Personalization:


• Consistent with Yexmarine's strength of customer relationships


• Can systematically build targeted online relationships and reach


Event marketing:


• Lacks experience for upcoming major product launch

• Agency can ensure marketing is effective and costs are known to assess investment viability

• Provides greater certainty around marketing expenditure

Commercial acumen:


• Agency expertise can strengthen Yexmarine's marketing and image to compete more effectively

• Improved website, social media and personalization can enhance customer loyalty, experience and feedback

• Targeted launch marketing can maximize chances of international sales success for new investments

• Competitive advantage may be gained over rivals with weak online presence

By upgrading its marketing, Yexmarine can strengthen its brand, relationships and launch execution to improve its competitive position and chances of growth. The agency's services offer a structured approach to achieve these benefits.

the key potential gains are stronger marketing capabilities, brands and customer relationships - all crucial factors for competitive advantage. The agency offers expertise and experience to realize these gains systematically.

the arguments for outsourcing SE's call handling:

Improve outsourced call center's performance in the short term


• Focus on core business - Letting an expert call center focus on support frees SE to focus on retailing

• Consider insourcing over the longer term for cost competitiveness and greater control of customer experience


• Financial - Outsourced costs are $600/day vs $1,500/day to provide in-house


• Reducing call volume and resolution times could make outsourced costs competitive

Publicize insourcing decision for potential marketing and ethical benefits

the arguments against outsourcing SE's call handling:

Cost savings could be achieved in-house through online support, FAQs and process improvements


Cost gap could narrow with in-house efficiencies

• Support is not SE's core competency but a critical part of the customer experience

• Outsourcing non-core activities like IT may be a better strategic fit


• given the specialized skill needs, more predictable costs, flexibility for strategic planning, lower need for direct oversight, and potential for innovation.

Customer dissatisfaction - Difficulty understanding offshore agents and long wait times

Negative publicity - Offshoring seen as job export, potential reputational damage

Loss of control - Outsourcing a critical customer touchpoint risks service quality

Ethical considerations - Bringing jobs in-house could boost sales through perceived social responsibility

While outsourcing currently provides clear cost benefits, factors like customer satisfaction, reputation and control increasingly favor bringing call handling in-house - especially as improvements reduce the cost gap.

A phased transition - first improving outsourced performance, then insourcing over time - offers a compromise that balances costs with strategic opportunities around customer experience, corporate reputation and publicly demonstrated social responsibility.

Insourcing calls offers strategic benefits:


• Improves customer satisfaction

• Avoids negative publicity from offshoring

• Allows full control over customer experience

• Potential marketing benefits from perceived social responsibility

• Short term: Improve outsourced call center's performance

• Longer term: Transition to in-house over time

• Publicize insourcing for potential benefits

the disadvantages and risks of outsourcing the legal department

Disadvantages:


• Higher costs - Outsourcing providers need to make a profit

Risks:


• Costs are a key disadvantage and risk

Increased costs over time - Supplier power if locked into single provider

Choosing wrong provider - May not meet all future legal service needs

Leak of confidential information - Especially for unpublished articles

Loss of expertise - May require making legal staff redundant

Risk management:


maximize the benefits of outsourcing
while managing potential disadvantages and risks.



• Detailed service level agreement to specify all included fees and additional charges


• Ensure detailed SLAs (cover all needed legal services)

• Signed confidentiality agreement


• Careful selection and agreements with multiple providers can mitigate risks around expertise, confidentiality and control

• Outsource to multiple law firms, not a single supplier



• Using multiple suppliers prevents lock-in and maintains competitiveness over time

• Loss of control over quality
But:


• Specialist legal firm likely to deliver higher quality service than in-house legal department

  1. Skill requirements:
  1. Cost structure:
  1. Flexibility:
  1. Control:
  1. Innovation:

IT activities typically require specialized technical skills that can be hard for a company to maintain in-house. IT outsourcing providers specialize in these skills and can leverage economies of scale.

Call handling, on the other hand, requires more general communication and customer service skills that are easier for companies to find and retain.

IT costs tend to be more fixed and predictable, making them easier to outsource effectively.

Call volume and duration can fluctuate more, making call handling costs harder to manage when outsourced.


IT outsourcing contracts tend to be longer term and specify fixed deliverables. This allows for more strategic planning.

Call handling outsourcing often requires more flexibility to adjust to changing call volumes and priorities.

Companies tend to want more direct oversight and control over customer interactions like call handling.

IT outsourcing can often operate more independently once requirements are specified.

IT outsourcing providers can often bring new ideas and technologies that the company itself may not have access to.

Call handling tends to involve more routine tasks where providers offer mainly cost savings.

Definition:

Process automation: Using technology to automate repetitive workflows and tasks with low human interaction.

Robotic process automation (RPA): Software that acts like a "robot" performing repetitive rule-based tasks across systems. Multiple RPAs form a virtual workforce, reducing human labor for routine tasks.

Artificial intelligence (AI) and machine learning:

Benefits:
Artificial intelligence is being applied in many ways to:


Drawbacks:

Automation offers huge potential to improve processes during digital transformation. But you must analyze how and where to implement it, prepare workforce for change, and maintain data quality for reliable AI outcomes.

Faster processing - Robots can process higher volumes and work 24/7, speeding up transaction times.

Fewer errors - Robotic processes are rule-based and consistent, reducing errors and improving accuracy.

Lower costs - Using software "robots" reduces the need for human labor, lowering costs.

Staff focus on value work - Humans can focus on more complex tasks once repetitive processes are automated.

Example:


Bonduelle, a French canned vegetable producer, is developing robotic harvesters in collaboration with Fieldwork Robotics.


The robotic arms use machine learning and AI to identify and pick ripe cauliflowers.


The aim is to address labor shortages and gain productivity and consistency benefits.

While automation can replace some human labor for routine tasks, for more complex work it typically augments humans rather than replacing them entirely.

Programs/machines that mimic human cognitive abilities like reasoning, learning and problem solving, learning from data to make decisions with little human input.

AI powers technologies like chatbots, image recognition, and smart recommendations.

It involves algorithms that adapt based on input data.

AI is suitable for complex cognitive tasks, unlike robotic process automation (RPA) which is for repetitive rule-based tasks.


Identify complex data patterns

Make consistent decisions

Quickly analyze large data volumes

Enable better strategic planning

Reliability depends on quality of input data
AI bias from training data that reflects human bias

Lack flexibility; cannot match human thinking

AI-generated decisions require human oversight
Security issues if AI is misused
Unintended consequences from AI solutions

May replace some human labor.
Unemployment from AI replacing certain jobs

AI applications:
Uses of artificial intelligence include:

Autonomous vehicles

Personalized recommendations

Healthcare diagnostics and treatment

Fraud detection

Cybersecurity threat monitoring

While AI offers huge potential,
To address risks, organizations must:

Ensure high-quality data for reliable outcomes, to avoid AI bias

Prepare for changes in workforce roles to leverage AI

Closely monitor AI systems to avoid bias in decisions, for potential issues

AI augments human intelligence and abilities rather than aiming to replace humans. It is an integral part of digital transformation by enabling insights and decisions at scale

Netflix uses AI and machine learning to make personalized recommendations for its over 100 million subscribers.


The algorithms recommend content based on:


• Explicit data like past selections, reviews and social media


• Implicit data like binge watching behavior and viewing time

Netflix programs analyze every minute of content to identify key themes and details about shows. This data is fed to machine learning models that:


• Assign a weighting to factors that influence viewer choices


• Place viewers in "taste communities" to tailor recommendations

The more data Netflix collects, the more accurate recommendations become, helping build subscriber loyalty.

Increased wealth inequality

AI can improve customer experience through targeted insights but must be implemented responsibly to avoid negative outcomes.

determining legal liability
for the Tesla accident is complex:

Drivers are responsible for being vigilant while autopilot is engaged, but the technology can reduce vigilance.

Autopilot technology is designed to avoid accidents, but may have failed in this case.

While the pedestrian had right of way, he was in an area with fast-moving traffic.

Ethical AI and autonomous
vehicle technologies will require:


Systems that can reliably perform as intended to protect all road users

Drivers trained to understand technology limitations and maintain supervision

Rules and infrastructure that properly allocate liability in complex situations

Overall, this tragic accident highlights the need for a holistic, human-centered approach involving technology developers, policymakers, road users and the public to ensure ethical deployment of autonomous systems.


No single party alone can be considered fully responsible.

Organizations have much more data today due to information technology advances:


The Internet of Things creates data from sensors and connected devices

Social media, smartphones, and internet use generate user data trails

Internet search indexes provide datasets for analysis

Example: Car insurance companies using driving behavior data



Car insurance companies traditionally set premiums based on broad metrics like age and gender.

This enables:

More individualized risk assessment

Lower premiums for safe drivers

A more responsive strategy to customer concerns

Now some insurers are using smartphone apps that track:

• Driver behavior through GPS and driving data


• Provide tips to improve driving skills

• This transforms how organizations:


Gather data from many new sources

Extract actionable insights from that data

Inform and implement strategies based on data and customere needs

• This enables organizations to:

Understand their environments to identify opportunities and threats

Develop new customer insights and understand needs

Inform and implement strategy based on data-driven insights

• This data-driven approach aims to make organizations more responsive, competitive and able to target the right customers.


• However, data quality and privacy issues must also be managed responsibly.



Big data refers to the large volumes of data created and available today.


Large, complex data sets from a variety of sources, both structured and unstructured


Requires storage, processing and analysis to transform raw data into useful information

Volume: The sheer amount of data

Velocity: The speed data is created and processed

Variety: The different sources and types of data

Veracity: The accuracy and reliability of data

Big data has:


• Structured data stored in databases


• Unstructured data like photos, videos and social media

Benefits of big data analytics:


Predictive modelling to predict behavior and inform new strategies

Customer segmentation to target specific groups

Churn analysis to reduce customer loss

Big data allows businesses to:


Monitor and react to user actions in real time

Tailor content and rewards based on social metrics like reach and engagement

Conduct "field research" to test strategies

Data has become a valuable asset when used strategically through:


Large investments in technology, skills and governance

Collaborating and data sharing

Rapidly analyzing and acting on data

opportunities for businesses to:


Gain deeper customer insights

Identify new products and markets

Provide more targeted and relevant experiences

Improve competitive advantage

businesses must implement responsible data use and ethics policies to ensure data accuracy, privacy and security.


• Characteristics of effective use:


• Be skeptical of data-driven conclusions
•Use data ethically, responsibly and securely to minimize risk

big data applications:

Financial Services:

Supply Chain:



UPS uses sensors in delivery vehicles to monitor data on:

Speed

Braking performance

Vehicle condition

This data is combined with customer and GPS data to:


Optimize maintenance schedules
Improve delivery routes

Benefits include:


15 million less minutes of idling time, saving 103,000 gallons of fuel
1.7 million fewer miles driven, saving 183,000 gallons of fuel

Retail:


Walmart tracks data from:


Purchase history

Social media interactions

Weather

Events

This data enables a personalized customer experience. But critics argue Walmart makes judgements about customers' personal lives.


Entertainment:


Time Warner uses data to:


• Track and optimize bandwidth for customer experience


• Target advertising for clients based on viewer demographics and data

Netflix analyzes viewing data from 44 million subscribers watching 2 billion hours of content monthly. This data helps them decide:


• Which shows to invest in


• Estimated viewership before a show airs

In summary, big data helps businesses across industries gain insights to:


Identify the best investments

Optimize operations

Personalize customer experience

Target advertising

Predict viewership

MC mobile network:



is facing challenges:

Declining sales due to competition

Rising customer complaints

High customer churn rate

Using big data can drive MC's strategy by:


Analysing large volumes of structured and unstructured customer data from:

Transactions

Call history

Social media

This data can provide insights into:


In-demand handset models to bundle with tariffs

Main causes of customer complaints to resolve weaknesses

Popular communication types (data, calls, texts) to design optimal tariffs

Usage patterns of prepaid customers to inform offers

Competitor offerings to improve MC's value proposition

Big data can help MC:


Improve tariff design to match customer needs

Reduce customer complaints

Make competitive offers

Retain more customers

However, MC must address risks like:


Data security

Data privacy

Algorithmic bias in data

However, organizations must manage privacy and ethical use of data responsibly to gain customer trust.


• To implement big data responsibly and gain customer trust.


• This holistic strategy would aim to:


Improve customer experience

Strengthen competitive position

Drive sales growth

In summary, analysing and leveraging customer data through big data management can form the basis of an effective strategy to address MC's challenges.


But MC must balance data-driven opportunities with risks through responsible data governance.

Morgan Stanley analyzes vast investment and client data using Hadoop.
This allows them to identify the best investments for clients.

RW is a large international retail chain with success due to store expansion.


Big data, characterized by the 4 V's, can enhance RW's strategic development:


The '3Vs' of big data - volume, velocity and variety - could enhance RW's strategic development:

Volume:
Larger amounts of customer data can improve understanding of:


• Purchasing patterns


• Product demand


• Potential new store locations


Volume: More data over a longer time period could provide a better understanding of customer requirements and purchasing patterns to develop strategies that capitalize on trends.


Volume


Large amounts of data improve reliability of analysis and conclusions.


Organizations need adequate storage and processing capabilities.

Velocity:
Processing data in real time allows RW to:


• Quickly respond to product trends


• Make real-time recommendations to online customers


Velocity: Analyzing real-time data from transactions and social media could allow RW to continually update strategies for competitive advantage, such as quickly marketing trending products.


Velocity:


Data is generated and accessed in real time from transactions and interactions.


Information is available immediately to inform decisions.

Veracity:
Accurate data is critical for RW's store expansion strategy due to its fast growth.


Veracity:


Data must be accurate and reliable to be useful.


Ensuring data quality is critical for effective analytics.

Variety:
Data from diverse sources can provide a deeper understanding of:


• Competitors


• Industry trends


• Customer segments


Variety: Tapping different data sources beyond RW's control could provide the deepest understanding of customers to develop effective strategies. This includes competitor and industry data from online keywords and social media.


Variety:


Data comes from many types of sources and in different formats.


Both structured and unstructured data provide richer insights.

Big data can help RW:


Benefits could include:


Identify optimal new store locations

Track emerging product trends

Gain insight into customer preferences

Generate revenue by selling customer data

Opportunities:

Potential to identify new trends and patterns to gain insights and understanding not previously known.

Ability to analyze large data sets in real time allows faster response to changing conditions.

Access to more diverse types of data including unstructured data sources.

Potential to gain more accurate and detailed performance data in real time.

Threats:

Greater risk of data breaches and hacker attacks due to larger data stores.

Challenge of keeping data safe from viruses and other threats.

Risk of legal issues if data is stolen or corrupted.

Risk of focusing too much effort on analyzing data rather than running the business.

Correlations identified in data may not indicate actual causation.

Cost and challenges of upgrading IT infrastructure to capture and store larger data sets.

Issues of data reliability and truthfulness impacting decision making.

Sainsbury's is using big data technologies to better monitor its wild fish suppliers to ensure sustainability.


Around 25% of fish caught globally is illegally caught, so Sainsbury's partnered with Satellite Catapult to track fishing vessels in real time via satellite data.


Satellites photograph fishing vessels, including data on:


Vessel location signal

Home port

License and quota

Fishing method

Using algorithms, Sainsbury's can determine if a vessel is behaving as expected based on this data.


This enables Sainsbury's to:


Detect illegal, unreported and unregulated fishing
Protect ocean life and fulfill sustainability commitments

In summary, big data and satellite technologies are giving Sainsbury's unprecedented visibility into its supply chain to combat illegal fishing and source sustainable wild fish for its customers.



Optimizing new store locations based on customer shopping habits data

Discovering previously unknown trends to capitalize on before competitors

Generating new revenue streams by selling customer data to manufacturers

The finance director is right to consider big data, otherwise RW risks falling behind competitors. However, RW must consider the costs and benefits before implementation.

In summary, all 3 'Vs' could enhance RW's strategic development through deeper customer insights, faster strategies and potential new revenue sources, if implemented appropriately.



Senior management needs data to make informed decisions on new product development, marketing and pricing strategies.


They need data to answer questions like:


• What are the potential costs/benefits of new products?

• Which customers are most profitable?

• How will customers respond to different prices?

• How does the proposed price compare to competitors?

Data comes from:


Primary research:


Questionnaires

Focus groups

Customer interviews

Secondary research:


Competitor reports

Finance records

Customer complaints

Loyalty schemes

Organizations are also capturing more data from:


• Social media channels
• Technologies like IoT devices


This data helps organizations:

• Determine if new products will achieve objectives

• Decide how to promote and deliver products/services

• Update processes to sell products effectively

• Gauge how competitors will respond

• Identify which customers are most important and profitable

In summary, various types of primary and secondary data help senior management with vital decision-making regarding new products, marketing and pricing strategies.


An information system consists of processes for collecting, storing, processing and distributing information.

The information systems (IS) strategy is the long-term plan for how systems will support organizational strategies through information.


Information systems need controls because:


Information systems need controls from a strategic perspective for the following reasons:


Information is a competitive advantage:
Well-managed information can give organizations an edge over competitors.


Information systems involve high costs High costs of information systems:
Controlling information systems is important due to the high costs of technology.


Information affects all levels and external stakeholders


Wide impact of information:
Information affects internal stakeholders at all levels and external stakeholders.


Information needs may require structural changes


Structural changes:
Information needs may require changes to organizational structure.


Information quality impacts customer service


Customer service:
The quality of information flows impact customer service.

Information is critical to organizational success

The IS strategy should align with the overall organizational strategy by:


Providing the right type and amount of information management needs
Generating information relevant to the organizational strategy

For example, if pursuing product differentiation based on quality, information on product quality is needed.


Managing information effectively could become a source of competitive advantage through:


Responding quickly to market trends based on gathered information

In summary, controls are needed for information systems due to the strategic importance of reliable information for decision making. The IS strategy must align with the organizational strategy to provide the right information to support it.


Critical to success:
Reliable information is critical for organizational success.

In summary, information systems controls are important from a strategic perspective because information provides competitive advantages, involves high costs, impacts stakeholders widely, drives organizational changes, affects customers and is critical to success. Therefore, organizations need to control their information systems to maximize the benefits and minimize the risks of information.



IT and systems security controls are important to:


Prevent theft

Prevent fraud

Prevent human error

Types of controls:


Physical access controls - Prevent unauthorized access to IT assets.

Logical access controls - Ensure only authorized users access IT systems (e.g. passwords).

Operational controls - Ensure day-to-day activities run effectively (e.g. segregation of duties, audit trails).

Input controls - Ensure accuracy, completeness and validity of input data (e.g. data verification, checks).

The 2021 Facebook data leak of 533 million user records

shows the impact of insufficient controls:


Hackers accessed vulnerable data for 2 years before it was published
Exposed personal information could enable cybercrime against victims

The leak highlights the importance of:


Implementing wide-ranging controls to protect large datasets
Strengthening controls beyond users' privacy settings


The 2021 Facebook data leak highlights the need for:


• Wide-ranging controls to protect large datasets
• Strengthening controls beyond users' privacy settings


In summary, organizations must implement different types of IT controls to prevent threats from within and outside the organization. Incidents like the Facebook data leak demonstrate the risks of insufficient controls and the need to constantly improve security measures.


the main threats to IT/information security are:

• Hacking - Unauthorized access to systems to obtain/alter data

• Viruses - Malicious software that spreads and damages systems

• Input errors - Human errors when entering data

Controls to mitigate these threats include:


For hacking:
• Usernames and passwords
• Firewalls

For viruses:
• Anti-virus software
• Warnings about file downloads

For input errors:
• Staff training on accurate data entry
• Validation checks on input data

Other security controls include:


• Physical access controls to prevent unauthorized access

• Logical access controls like passwords

• Operational controls like segregation of duties and audit trails

• Input controls to ensure accuracy, validity and completeness of data

In summary, organizations must implement different types of IT controls to mitigate key threats to information security from hacking, viruses and input errors. Incidents like the Facebook data leak show that constant improvement of security measures is needed.



There are four main types of IT/IS controls:


Physical access controls - Prevent unauthorized access to IT assets.

Logical access controls - Ensure only authorized users access IT systems (e.g. passwords).

Operational controls - Ensure day-to-day activities run effectively:


Segregation of duties - Separate roles to prevent abuse of power
Audit trails - Records of system access and operations

Input controls - Ensure accuracy, validity and completeness of input data through:


Data verification

Data validation

Checks like:

Check digits

Control totals

Range checks

Limit checks

Compatibility checks

Format checks

In summary, organizations should implement a range of physical, logical, operational and input controls to adequately secure their IT systems and information. Different control types target different threats and risks. Together they form a comprehensive control framework.



In summary, organizations must implement general controls, application controls, personnel controls, logical access controls, physical access controls and facility controls to adequately secure information systems and mitigate risks. No single control is sufficient, a combination is needed.



Importance of
information systems controls:


Reduce risk of incorrect decisions from incorrect data

Improve performance measurement

Ensure customer satisfaction

Avoid reputational damage

Minimize business disruption

Specific control examples:


Personnel controls for competence

Logical access controls like passwords

Audit trails to record system access

Physical access controls to limit access to areas

Facility controls to protect hardware and data

Password issues:


Users may share passwords

Passwords can be guessed

Passwords written down can be found

Controls to address issues:


Require regular password changes

Use memorable but not obvious passwords

Prohibit writing down passwords

Monitor failed login attempts

Auditors assess controls by considering:


Frequency of reports
Follow-up of security breaches

the location of IT facilities and disaster recovery:

Important considerations for IT facility location:


Protection from fire, flood, smoke, dust, drinks and power failure

Suitable environmental conditions

Ensuring business continuity

Disaster recovery

planning involves:


• Risk assessment
• Developing contingency plans to address risks

plans should include:


• Backup copies of data files stored securely offsite
• Alternative IT systems that can be activated if main system fails

System backups:


• Copies data to protect against data loss or corruption
• Should be done regularly to limit amount of lost data


Backup copies should be:


• Stored securely in a safe, offsite location

Application controls ensure:


• Accurate and complete data input
• Authorized distribution of data

mitigate risks of:


•Unauthorized access to network data
• Compromised data integrity

Network controls include:

Firewalls

Data encryption

Virus protection

In summary, locating IT facilities to protect against potential risks, implementing effective system backups, and having comprehensive disaster recovery plans and controls are key to ensuring business continuity and data/system security. Regular backups, securely stored offsite copies and alternative IT systems reduce disruption in the event of a disaster.



computerised accounting process controls:

Computerised accounting systems can:


• Reduce human error through standardized rules
• Ensure entries are complete with debits and credits

Setting up a chart of accounts is important to:

Segregate assets, liabilities, revenue and expenses

Define how transactions will be treated

Meet reporting requirements

Controls over the chart of accounts are needed to:


• Prevent unauthorized additions or deletions of accounts
• Ensure it still meets needs through regular reviews

Testing the accounting software




helps ensure:


Posting rules are working correctly

Test data

Test data involves:


• Entering sample transactions
• Comparing results to expected outcomes

Test data can check controls that:

Prevent invalid data

Reject non-existent codes

Flag unrealistic amounts

Enforce credit limits

In summary, while computerised accounting systems can reduce human error, organizations must implement controls to ensure transactions are properly processed and reported. This includes controls over the chart of accounts, testing of accounting software and the use of test data to verify processing controls work as intended. Proper controls help ensure the reliability of computerised accounting information.



Cybersecurity means:


• Protecting systems, networks and data in cyberspace


Cyberspace refers to:


The environment where IT networks operate

External threats to cybersecurity include threats from:


Different countries

Growing number of devices and applications

Security failures

To improve cybersecurity, organizations should:


• Learn from past security breaches
• Determine risk tolerance for cyber risks

The need for cybersecurity is rising due to:


In summary, cybersecurity means protecting data, systems and networks from both internal and external threats. Organizations need a holistic approach involving technical solutions, process changes, senior management oversight and learning from past incidents. Effective cybersecurity requires strategic changes and an enterprise-wide effort.

Communicating the importance in simple terms:


• Making it relevant for non-IT staff
• Educate non-executive board members to keep their cybersecurity knowledge up to date and challenge executive directors.

Assigning clear accountability and responsibility


• Appointing a Chief Information Security Officer
• Have a team to address cyber attacks
• Ensuring board member oversight

Learning from past incidents

Determining risk appetite
to design management strategies

Providing adequate resources

Organizations must prioritize cybersecurity, make it relevant across departments and assign accountability at senior levels. A holistic, enterprise-wide approach is needed involving technology, processes, roles, and oversight from management and the board.


• Increasing frequency of cyber attacks


• Data security now involves external threats in addition to internal controls

Cybersecurity protects technology and data from unauthorized access or attacks

NCCP relies on technology for its operations and is therefore at risk of cyber attacks

NCCP currently only has controls around staff passwords which is not robust enough

Hackers could alter NCCP's website, impersonate the organization, infect hardware

Actions by the Board:


Make cybersecurity a priority and include it on board meeting agendas

Seek expert advice due to lack of technical expertise

Establish and communicate a clear cybersecurity policy to all stakeholders

Have contingency plans in place for rapid response in case of a breach

Regularly review cybersecurity risks as they change rapidly

Separating Sponsor and Manager Roles:


Provides good corporate governance

Project sponsor sets overall direction

Project manager manages actual delivery

Sponsor can represent project at senior levels and provide oversight

Sponsor ensures necessary resources are allocated

Manager decides how to utilize resources for delivery

Sponsor may lack expertise to manage operational activities

key recommendations are to:


Prioritize cybersecurity at the board level

Obtain external advice due to lack of in-house expertise

Develop and communicate a clear cybersecurity policy

Implement response and contingency plans

Regularly monitor cybersecurity risks

Separate project sponsor and manager roles for effective oversight and delivery

Continuity planning:


• Have plans in place to address IT infrastructure failures
• Plans should include contact details and offsite backup locations

Systems development and maintenance:


• Implement security controls by regularly updating software and hardware
• Ensure controls remain effective

Personnel security measures:

Implement suitable recruitment processes

Provide adequate training on using IT systems

Provide regular training to keep skills up-to-date

Asset classification and control:


Assign information owners to be accountable for maintaining key data

Compliance measures:


• Have organizational policies for using IT systems and data
• Ensure policies comply with laws like data protection

Additional measures needed to enhance IT/IS controls will depend on the organization's specific situation.


In summary, practical ways to improve IT/IS controls include:

Implementing continuity plans

Maintaining up-to-date systems and software

Applying personnel security and training

Assigning asset owners

Enforcing compliance policies

Artificial intelligence refers to intelligence demonstrated by machines, such as:


Learning and problem solving abilities

Ability to perceive environment and take actions to achieve objectives

Making active decisions using data analysis

Ability to learn and adapt over time

Algorithms are vital for artificial intelligence. They are step-by-step processes for solving problems or accomplishing tasks.


Retail:

Creating adaptive environments

Building customer profiles and relationships

Guiding purchasing decisions

Improving supply chain and pricing strategies

Informing product development

Other sectors:


Medical diagnosis and treatment personalization

Self-driving cars and route optimization

Crop monitoring and yield prediction in agriculture

Cybersecurity threat detection

Job matching and talent assessment in HR

Autonomous investment practices and high-speed trading in finance

Enhance customer experience

Personalize products and services

Automate routine tasks

Analyze large amounts of data

Make faster and more accurate decisions

Machine Learning:

Uses algorithms to gain experience from data and learn without being programmed

Can predict and provide guidance based on historical data and new inputs

Types are supervised, unsupervised and reinforcement learning

Deep learning uses neural networks to analyze unstructured data

Self-learning computes decisions based on programmed 'emotions'

Artificial Intelligence:

Demonstrates intelligence through tasks such as learning, problem-solving, perceiving and deciding

Uses algorithms, machine learning, data analysis and adaptation

Applications include personalized services, automating tasks, optimizing processes and faster decision making

Robotics:

Builds machines that can replicate human actions

Used where accuracy, repeatability and hazardous conditions are important

Reduces costs and increases precision, reliability in manufacturing

Perform welding, quality control and surgery through machine vision and telemanipulators

Home robots assist with everyday tasks

Robot learning algorithms acquire skills through self-exploration and human interaction

Challenges:

High initial investments

Training costs for human workers

Health and safety concerns with human interactions

In summary, artificial intelligence relies on algorithms, machine learning and big data. It is being used across industries to improve processes, optimize operations and gain competitive advantages. However, the rapid development of AI also raises ethical concerns about its impact on jobs, privacy and accountability. Regulatory frameworks may be needed to govern emerging AI technologies.

key ethical issues related to artificial intelligence and machine learning:

• Mistakes - AI may make different types of mistakes than humans.

• Bias - AI may reflect the biases of its creators or have unintentional programmed bias.

• Security - As AI capabilities increase, effective cybersecurity is critical.

• Unintended consequences - AI may achieve intended solutions but have unforeseen negative impacts.

• Control - There are concerns about AI ultimately surpassing human control.

Other issues:


• Unemployment - AI and robotics may displace human jobs with few alternatives.

• Income distribution - Benefits of AI may concentrate in hands of owners, not workers.

• Behavior influence - AI interactions may inadvertently influence human behavior.

• Treatment of AI - There are debates about ethics of "negative reinforcement" of AI systems.

An ethics framework should include:


• Defining AI ethics aligned with business values

• Integrating ethics into AI product design

• Obtaining stakeholder feedback during development

• Continuously monitoring for bias

• Ensuring transparency about data use

key ethical considerations for AI include:

• Potential negative impacts and risks

• Economic and social consequences

• Responsible design and use of the technology

While exam exhibits will focus on business context, answers should demonstrate an understanding of:


• Ethical issues specific to the organization's use of AI


• The organization's approach to addressing those issues in a responsible manner


The increased value of data from growing volumes, value-adding analysis and AI applications

Lack of public awareness of how personal data could be misused, as shown by the Facebook/Cambridge Analytica scandal

Exposure created by storing and sharing data in the cloud

The inevitability of software flaws due to complexity

As a strategic leader, you should:


Understand the value of your company's data and potential consequences of data loss or misuse

Ensure employees are aware of data security policies and risks


ensure your finance team:

Implement appropriate technical, physical and administrative controls to protect data

Oversee contingency plans in the event of an attack

Continuously monitor threats and your organization's vulnerabilities

Allocate sufficient resources for effective cybersecurity efforts

Cyber attacks are increasing in frequency and cost, targeting large companies in particular. The average cost of an attack rose 61% in 2019.


Cybersecurity should be part of an overall risk management program, but requires leadership focus due to the threats outlined above.


key measures to promote cybersecurity

Establish a risk management regime that explicitly addresses cybersecurity risk

Secure the network perimeter to prevent unauthorized access

Educate and raise awareness among users of how they could be exploited

Use up-to-date anti-malware software to screen for viruses and malware threats

Strictly regulate the use of removable media like USB sticks

Configure all hardware and software securely before connecting to the network

Separate user privileges and restrict access based on job function

Have an incident response plan to minimize immediate threats and learn lessons

Monitor network activity to spot and prevent unsuccessful cyberattacks

Implement effective controls for remote and mobile working like VPNs and device configurations

key elements of a cybersecurity program

Technical measures - like firewalls, encryption, malware protection

Organizational measures - such as user policies, separation of duties, monitoring

Human factors - including security awareness training and incident response plans

And all of it needs oversight and buy-in from senior leadership who set the right "tone from the top."

The most critical initial step is establishing an explicit risk management regime that assigns clear roles and responsibilities for cybersecurity. This will help embed it as a strategic, enterprise-wide priority.

the finance department's role in managing cybersecurity:

Cyber risk is highly relevant to CFOs and finance teams due to potential financial impacts.

They should take a broader view of cybersecurity as a business-wide risk, not just a technical issue.

Redefining risk and resilience, improving recovery plans, securing the supply chain and insuring against losses are key actions for CFOs.

Organizations should not wait for an attack to occur before improving their cybersecurity posture.

Adopt a "zero trust" model that verifies all users and equipment before network access. Question if current risk and resilience measures are sufficient.

Develop robust recovery plans for dealing with attacks and restoring systems afterwards. Prevention is impossible, so focus on minimizing impact.

Audit suppliers' cybersecurity protocols, as the supply chain is often the weakest link. Require adequate controls from connected third parties.

Invest in cyber insurance after quantifying potential financial losses from an attack. However, paying ransomware attackers may only encourage further attacks.

Understands potential financial consequences of data loss or network downtime

Helps quantify cyber risks and implements appropriate controls

Develops and funds effective recovery plans

Audits suppliers for adequate cybersecurity

Investigates options for cyber insurance coverage

Example: Amazon Echo which can play music, make calls, answer questions, control lights, etc.


It involves:


• Connected sensors, processors and transmitters
• Smart devices that can collect data and control the physical world

Businesses should consider:


• How IoT can be part of their business model
• Strategic and operational uses across sectors

Helping with tasks through better data, like oil exploration

Generating efficiencies in energy, resources and supply chains

Monitoring for problems through warning systems and predictive analytics

Informing strategic development like customizing products

Examples:

Smart home devices

Traffic alerts for commuters

Crop sensors for farmers

Predictive maintenance for manufacturers

3D printing for automakers

the Internet of Things has the potential to transform businesses by:

Providing vast amounts of data for analysis

-Automating routine tasks

Improving efficiency and productivity

Enabling customized products and services

However, businesses must determine where and how IoT can add value to their specific strategies, operations and customer propositions.


Effective adoption depends on identifying and assessing relevant opportunities based on organizational goals.


sector examples:

Medical sector:

Transport sector:


• Smart devices like traffic cameras and sensors warn of traffic issues
• Collect data to identify routes for simplification and optimization

Smart home devices alert to medical emergencies

Continuous remote monitoring of vitals

Remote monitoring and support for treatment compliance

• Security - IoT applications have not kept pace with security development, creating risks


• Security risks from connected devices

• Privacy - Data collection raises concerns about individual monitoring and behavior prediction


• Ethical issues around privacy and data protection

• Technical - Platform fragmentation, device obsolescence, data costs and complexity


• Technical challenges of integrating diverse systems and technologies

• Implementation challenges - Many pilots do not scale, lack of clear business case, long time horizons, legacy infrastructure limitations


• Barriers to successfully implementing and scaling IoT initiatives

As a strategic business leader, you should be able to evaluate potential IoT applications, develop an implementation roadmap and optimize IoT initiatives to achieve intended benefits.

• Assess the opportunities and risks specific to your organization's industry and operations

• Develop strategies to mitigate threats, ensure compliance and optimize IoT initiatives

• Consider the organizational changes needed to support widescale IoT adoption

• Guide how IoT can create new business models or transform existing ones

Inform and implement strategy

Identify new opportunities and risks

Improve decision-making and create business value

As a strategic business leader, you should:

Determine how big data can transform your business model and strategies

Evaluate potential use cases based on organizational goals

Design governance and risk management frameworks

Define success metrics for big data initiatives

Guide ethical and secure use of customer and employee data

Leaders play a vital role in articulating a clear vision, setting the right "tone from the top" and designing governance systems to maximize benefits and manage threats.

while big data and analytics offer great opportunities, organizations must balance opportunities with risks.

Their ability to assess and evaluate potential applications based on organizational needs will determine the value realized from big data and analytics.

Value:


Analyzing data is not enough; insights must be extracted through:

• Identifying patterns and trends

• Asking the right business questions

• Making informed assumptions

• Accurately predicting behavior

• Finding relevant solutions

In summary,

volume, velocity and variety of data provide opportunities for deeper insights.

However, veracity and value determine whether those insights are trustworthy and actionable for businesses.

As a strategic leader:


play a key role in realizing actual value from big data.

• Evaluate how much and what types of data are relevant for your needs

• Ensure data quality and governance frameworks

• Guide analysts to ask the right questions of the data

• Challenge conclusions and verify insights for accuracy

• Translate insights into strategic recommendations and value creation

Data analytics

refers to extracting insights from large or unstructured/raw data.


Provides information to answer business questions and make better decisions

data analytics techniques progress from:

Describing what happened (descriptive)

To predicting what will happen (predictive)

To recommending what should be done (prescriptive)

Examines trends and patterns in the data

Classifies data in different ways to gain insight

Uses visualizations like graphs, charts and pivot tables

Purposes:


Inform strategies

Improve decision-making

Identify risks and opportunities

Applies statistical models, machine learning and AI to the data

Makes predictions based on past and present data

Forecasts future outcomes and trends

Purposes:

Predict customer behavior

Forecast sales, demand and costs

Identify potential threats

Goes beyond prediction to recommend courses of action


Optimizes decisions based on complexity, constraints and trade-offs

Purposes:

Recommend the best option from multiple choices

Generate heuristics to improve performance

Determine the most cost-effective or profitable actions

All techniques provide insights to support better business decisions. But prescriptive analytics has the greatest potential to transform business performance by recommending optimal (best) actions based on data.

As a strategic leader, you should

• Revise strategies

• Improve operational efficiency

• Enhance customer experience

• Create competitive advantage

Selecting and implementing the right analytics technique for the right purpose is critical for extracting maximum value from data.


Uses statistical models, AI and machine learning to predict future outcomes based on past and present data

Allows businesses to evaluate strategies and foresee different scenarios

Tools like Excel's Scenario Manager and Data Analysis pack can be used

Risks:


Correlations are not always causations


Predictions may not be 100% accurate

Goes beyond prediction to recommend optimal courses of action

Optimizes decisions based on constraints, trade-offs and complexity

Tools like Excel's Goal Seek and Solver can generate optimal solutions

Example:


Minimizing transportation costs by optimally allocating TV deliveries from depots to stores

determine which technique is most appropriate for a given business problem and apply insights to:

interpret findings skeptically and question assumptions



Data should be used ethically and responsibly