Application of Information Technology
- Applications of IT
- Smart, Mobile technologies and cloud computing
1.1 The need for a strategic perspective: new technologies:
• from a strategic perspective, the main reasons for organizations to adopt new technologies include:
Information technology strategy should align with business strategy:
• IT can be used defensively or offensively depending on strategy
2.1. Smart technology
2.3 Mobile technology
- Robotics and Artificial Intelligence
4.1. Benefits of robotic process automation (RPA):
Faster processing, lower costs, higher accuracy, freeing up staff for value-adding work.
4.2 Artificial Intelligence
- Information technology and data analysis
5.1 The widespread use of information
- Big data
6.1 The Vs of big data
6.2. Opportunities and threats of big data
- Data for decision making
7.1. New product development, marketing and pricing
- Information system controls from a strategic perspective
8.1 Need for information systems controls
- IT and systems security controls
9.1. Types of control
General controls:
ensure proper system and data security.
Facility controls
Application controls:
prevent, detect and correct errors for each application.
Software controls prevent:
• Unauthorized copies of software
Network controls
More on network controls
- Cybersecurity
10.1 The rise of cybersecurity
10.2. Promoting cybersecurity in organisations
Organizations should promote cybersecurity through:
- Improving IT/IS controls
practical measures senior management can take to improve IT/IS controls:
• Gaining a competitive edge through early adoption
• Improving performance by optimizing resource usage and obtaining customer insights
• Utilizing abundant data through effective storage and analytics enabled by new technologies
• Creating value for stakeholders by boosting profits, reducing costs or improving efficiencies
• IT can help provide strategic capabilities and reduce threats in strategic analysis.
• IT can impact Porter's Five Forces:
• IT can support generic strategies:
• IT can support different generic strategies by enabling cost cuts, differentiation or focusing on niche markets
• IT can help implement strategy through:
Create barriers to entry
Break down barriers
Compete on cost
Collaborate to change competition
Cost leadership:
Differentiation:
Focus:
Process redesign
Resource planning and scheduling
Supply chain management
Reduce inventory costs
Improve forecasting and planning
Provide easy ordering platforms
Enable customization
Provide customer insights
Exclude competitors from niche markets
Example:
• Respond to competitive threats by enabling differentiation
• Implement a focused niche strategy by providing customized capabilities
• Align IT investments with strategic goals to improve performance
provide differentiated services that competitors lacked, namely:
• Virtual design tools using CAD that let customers redesign properties digitally
• Providing a better customer experience through information and visualization
Smart technology refers to technology that can connect to a network and interact with users and other devices.
It can be categorized into three main groups:
Smart devices - automated devices that are programmable but do not require network connectivity.
Example: Programmable thermostats
Smart connected devices - remotely controllable using networks like WiFi or Bluetooth.
Example: Google Nest thermostat controlled via smartphone
Internet of Things (IoT) devices - have full internet connectivity enabling interactions with many other devices and remote control.
The Internet of Things connects physical devices through the internet, enabling data sharing and interaction.
smart technology ranges from:
• Automated devices lacking connectivity
• Devices connectable within a limited range network
• Fully connected "things" that interact within the Internet of Things
2.2. Benefits:
2.2. Risks:
• Security of connected devices and data collected: hacking and data theft
• Privacy concerns around data inputs required: exposed over the internet
• Reliability issues if technology fails: Disruption
• Regulatory gaps due to rapid development
• Risks throughout the technology ecosystem
• Increased convenience through automation
• Potential sustainability and efficiency gains through data insights
• More timely information through sensors and connectivity
While benefits can be substantial, managing risks through security, privacy protections, regulatory frameworks and ecosystem governance is critical to realizing the full value of smart technology for users.
Mobile technology refers to portable devices like:
• Laptops
• Tablets
• Smartphones
• GPS devices
Features:
• WiFi connectivity
• Bluetooth
• 4G networks
2.4. Benefits:
2.4. Risks:
• Refers to portable devices with internet connectivity
• Enables information access and interactions anywhere, anytime
• Offers convenience through features like payments
• Higher device costs
• Rapid obsolescence
• Increased security risks
• Requirement for robust data protection: Firewalls. Passwords, Training
While mobile technology provides flexibility and accessibility, organizations must adopt security measures to mitigate risks and maximize benefits. The appropriate balance of risk and value will vary by organization.
2.5 Cloud computing v owned technology
Cloud computing
offers benefits of:
But has disadvantages of:
• Expertise: Cloud providers have specialist skills
• Support: Cloud providers monitor systems continuously
• SLAs: Cloud providers are responsible for restoring systems and may pay penalties for downtime
Owned technology
has benefits of:
• Customization: Systems can be tailored exactly to organizational needs
• Support: In-house staff provide support
But has disadvantages of:
• Expertise: Expensive to employ specialists
• Support: Expensive to maintain 24/7 monitoring and support
• SLAs: Own responsibility to restore systems in case of outages
key factors to consider are:
• Expertise and cost of skilled staff
• Level of monitoring and support required
• Flexibility and customization needs
• Responsibility and guarantees around system availability
The optimal balance of cloud vs. owned technology depends on:
A balance must be struck weighing:
• Compatibility with business needs
• Expertise and resources available
• Complexity of data and compliance requirements
While cloud offers lower costs and on-demand scalability, owned solutions provide more customization and control. A hybrid approach combining the two may be best for some organizations.
The right choice varies case-by-case based on weighing benefits, drawbacks and specific organizational requirements for IT solutions.
Cloud computing is a model for:
• On-demand access to configurable IT resources
• Shared pool of resources accessed via the internet
• Cloud provides on-demand, scalable IT resources
• Lower costs, flexibility and speed
• Customization: Limited customization options compared to in-house
• But risks center around loss of control, security and compliance
• Regulatory risks arise from using providers in different jurisdictions
• Reliance on provider performance and continuity
• Loss of control and security risks
• Cost savings and flexibility
• Sustainability - Can reduce energy use and carbon footprint
• Efficiency - IoT sensors detect issues early, enabling improvements
• Convenience - Automation frees up time and increases ease of use
• Information - Real-time data alerts users to take prompt action
Internet-of-Things Development
Concerns:
Government Work
Advantages:
• Potential for steady cash flows to fund investment in other areas
Concerns:
• Lower risk but also likely lower returns
Advantages:
• Potential for rapid growth through market expansion
• Opportunity to innovate and build reputation
• Ability to match business needs to technology, a core competence
• Committing to particular markets may be risky
• Early technology may be unreliable
• Limited applicability to existing clients
• Would require investment without guaranteed success
• Would need enhanced data storage and processing capacity
• Would require recruiting staff with IoT expertise, adding costs
• But could bring valuable expertise
• May damage standing and profitability
• Higher risks of security breaches and privacy violations, threatening reputation
Conclusion:
• Options are not mutually exclusive
• Represent different growth and risk profiles:
IoT:
• High risk
• High potential returns
Government:
• Lower risk
• Steadier returns
• Combining both could:
• Improve diversification
• Fund riskier IoT investment with government work cash flows
While IoT offers more transformational growth potential, government work provides a safer source of funding.
A balanced portfolio combining both could generate a mix of steady and higher-growth revenues to sustain investment.
Thoroughly evaluating risks, opportunities, needed capabilities and fit with strategy is key for each option.
Professional Judgement:
The evaluation demonstrates objectivity by:
• Identifying both advantages and concerns for each option proportionately
• Assessing quantitative factors like costs, investment needs and expected returns
• Considering qualitative factors like risks, capabilities and strategic fit
• Proposing a balanced combination that weighs different risk-return tradeoffs
For members:
• Feedback - Instant messaging facility allows members to communicate needs
• Convenience - Access fitness info and club updates anytime, anywhere
• Sense of community - Constant presence in members' lives engages members
For Optima:
• Engagement - Interesting and relevant content will be seen directly by target audience
• Older members - Must ensure technology does not disengage these members; usage will vary by demographics
• Data analytics - Evaluate app usage to identify needs of different customer segments and deliver information in multiple ways
For Optima:
• Interaction - Mobile should complement, not replace, other forms of contact
• Marketing - Instantly contact members with offers, updates and tailored messages
• Customer insights - Collect continuous feedback and data to better understand and serve members
Scepticism:
• The director's claim that members only want to exercise and socialize is an oversimplification
• Mobile technology likely engages people of all ages when accessible; usage will vary but under-estimating potential risks disengagement
• Understanding members' varied needs across demographics is key to effective use of technology
• Provide convenience and communication for members
• Enable targeted marketing, customer insights and engagement for Optima
But Optima must:
• Ensure technology complements other interactions
• Cater for varied usage across demographics
• Evaluate use to identify needs of different segments
Used effectively with an inclusive approach, mobile technology has significant potential to enhance member experience and business performance for Optima.
However,a narrow view risks disengagement of some members.
the benefits of outsourcing IT:
For the city authority:
• Improved responsiveness, flexibility and access to expertise
• Elimination of management conflicts
• Focus on strategic priorities
For IT staff:
• More opportunities for growth and motivation within an IT specialist firm: learning, skill development, new technologies
Risks of outsourcing IT: job security, cultural adjustment and potential cost savings pressures.
Outsourcing IT:
• Careful management of the transition and selection of an outsourcing partner that shares the authority's objectives will be critical to maximizing benefits
• while mitigating potential downsides for both the authority and its IT employees.
the benefits of using the advertising agency's services:
• Timing is opportune given marketing director vacancy
• Agency expertise can overhaul marketing approach to fit strategy
Website:
• Current site focuses on reliability, not core messages for target market
• Review could identify key promotional messages
• SEO and banner ads can attract more traffic
Social media:
• Greater visibility can promote products and provide up-to-date image
• Engage loyal customers and facilitate two-way dialogue for feedback
• Competitors are not using social media effectively
Personalization:
• Consistent with Yexmarine's strength of customer relationships
• Can systematically build targeted online relationships and reach
Event marketing:
• Lacks experience for upcoming major product launch
• Agency can ensure marketing is effective and costs are known to assess investment viability
• Provides greater certainty around marketing expenditure
Commercial acumen:
• Agency expertise can strengthen Yexmarine's marketing and image to compete more effectively
• Improved website, social media and personalization can enhance customer loyalty, experience and feedback
• Targeted launch marketing can maximize chances of international sales success for new investments
• Competitive advantage may be gained over rivals with weak online presence
By upgrading its marketing, Yexmarine can strengthen its brand, relationships and launch execution to improve its competitive position and chances of growth. The agency's services offer a structured approach to achieve these benefits.
the key potential gains are stronger marketing capabilities, brands and customer relationships - all crucial factors for competitive advantage. The agency offers expertise and experience to realize these gains systematically.
the arguments for outsourcing SE's call handling:
• Improve outsourced call center's performance in the short term
• Focus on core business - Letting an expert call center focus on support frees SE to focus on retailing
• Consider insourcing over the longer term for cost competitiveness and greater control of customer experience
• Financial - Outsourced costs are $600/day vs $1,500/day to provide in-house
• Reducing call volume and resolution times could make outsourced costs competitive
• Publicize insourcing decision for potential marketing and ethical benefits
the arguments against outsourcing SE's call handling:
• Cost savings could be achieved in-house through online support, FAQs and process improvements
• Cost gap could narrow with in-house efficiencies
• Support is not SE's core competency but a critical part of the customer experience
• Outsourcing non-core activities like IT may be a better strategic fit
• given the specialized skill needs, more predictable costs, flexibility for strategic planning, lower need for direct oversight, and potential for innovation.
• Customer dissatisfaction - Difficulty understanding offshore agents and long wait times
• Negative publicity - Offshoring seen as job export, potential reputational damage
• Loss of control - Outsourcing a critical customer touchpoint risks service quality
• Ethical considerations - Bringing jobs in-house could boost sales through perceived social responsibility
While outsourcing currently provides clear cost benefits, factors like customer satisfaction, reputation and control increasingly favor bringing call handling in-house - especially as improvements reduce the cost gap.
A phased transition - first improving outsourced performance, then insourcing over time - offers a compromise that balances costs with strategic opportunities around customer experience, corporate reputation and publicly demonstrated social responsibility.
Insourcing calls offers strategic benefits:
• Improves customer satisfaction
• Avoids negative publicity from offshoring
• Allows full control over customer experience
• Potential marketing benefits from perceived social responsibility
• Short term: Improve outsourced call center's performance
• Longer term: Transition to in-house over time
• Publicize insourcing for potential benefits
the disadvantages and risks of outsourcing the legal department
Disadvantages:
• Higher costs - Outsourcing providers need to make a profit
Risks:
• Costs are a key disadvantage and risk
• Increased costs over time - Supplier power if locked into single provider
• Choosing wrong provider - May not meet all future legal service needs
• Leak of confidential information - Especially for unpublished articles
• Loss of expertise - May require making legal staff redundant
Risk management:
maximize the benefits of outsourcing
while managing potential disadvantages and risks.
• Detailed service level agreement to specify all included fees and additional charges
• Ensure detailed SLAs (cover all needed legal services)
• Signed confidentiality agreement
• Careful selection and agreements with multiple providers can mitigate risks around expertise, confidentiality and control
• Outsource to multiple law firms, not a single supplier
• Using multiple suppliers prevents lock-in and maintains competitiveness over time
• Loss of control over quality
But:
• Specialist legal firm likely to deliver higher quality service than in-house legal department
- Skill requirements:
- Cost structure:
- Flexibility:
- Control:
- Innovation:
IT activities typically require specialized technical skills that can be hard for a company to maintain in-house. IT outsourcing providers specialize in these skills and can leverage economies of scale.
Call handling, on the other hand, requires more general communication and customer service skills that are easier for companies to find and retain.
IT costs tend to be more fixed and predictable, making them easier to outsource effectively.
Call volume and duration can fluctuate more, making call handling costs harder to manage when outsourced.
IT outsourcing contracts tend to be longer term and specify fixed deliverables. This allows for more strategic planning.
Call handling outsourcing often requires more flexibility to adjust to changing call volumes and priorities.
Companies tend to want more direct oversight and control over customer interactions like call handling.
IT outsourcing can often operate more independently once requirements are specified.
IT outsourcing providers can often bring new ideas and technologies that the company itself may not have access to.
Call handling tends to involve more routine tasks where providers offer mainly cost savings.
• Definition:
Process automation: Using technology to automate repetitive workflows and tasks with low human interaction.
Robotic process automation (RPA): Software that acts like a "robot" performing repetitive rule-based tasks across systems. Multiple RPAs form a virtual workforce, reducing human labor for routine tasks.
Artificial intelligence (AI) and machine learning:
Benefits:
Artificial intelligence is being applied in many ways to:
Drawbacks:
Automation offers huge potential to improve processes during digital transformation. But you must analyze how and where to implement it, prepare workforce for change, and maintain data quality for reliable AI outcomes.
Faster processing - Robots can process higher volumes and work 24/7, speeding up transaction times.
Fewer errors - Robotic processes are rule-based and consistent, reducing errors and improving accuracy.
Lower costs - Using software "robots" reduces the need for human labor, lowering costs.
Staff focus on value work - Humans can focus on more complex tasks once repetitive processes are automated.
Example:
Bonduelle, a French canned vegetable producer, is developing robotic harvesters in collaboration with Fieldwork Robotics.
The robotic arms use machine learning and AI to identify and pick ripe cauliflowers.
The aim is to address labor shortages and gain productivity and consistency benefits.
While automation can replace some human labor for routine tasks, for more complex work it typically augments humans rather than replacing them entirely.
Programs/machines that mimic human cognitive abilities like reasoning, learning and problem solving, learning from data to make decisions with little human input.
AI powers technologies like chatbots, image recognition, and smart recommendations.
It involves algorithms that adapt based on input data.
AI is suitable for complex cognitive tasks, unlike robotic process automation (RPA) which is for repetitive rule-based tasks.
Identify complex data patterns
Make consistent decisions
Quickly analyze large data volumes
Enable better strategic planning
Reliability depends on quality of input data
AI bias from training data that reflects human bias
Lack flexibility; cannot match human thinking
AI-generated decisions require human oversight
Security issues if AI is misused
Unintended consequences from AI solutions
May replace some human labor.
Unemployment from AI replacing certain jobs
AI applications:
Uses of artificial intelligence include:
Autonomous vehicles
Personalized recommendations
Healthcare diagnostics and treatment
Fraud detection
Cybersecurity threat monitoring
While AI offers huge potential,
To address risks, organizations must:
Ensure high-quality data for reliable outcomes, to avoid AI bias
Prepare for changes in workforce roles to leverage AI
Closely monitor AI systems to avoid bias in decisions, for potential issues
AI augments human intelligence and abilities rather than aiming to replace humans. It is an integral part of digital transformation by enabling insights and decisions at scale
Netflix uses AI and machine learning to make personalized recommendations for its over 100 million subscribers.
The algorithms recommend content based on:
• Explicit data like past selections, reviews and social media
• Implicit data like binge watching behavior and viewing time
Netflix programs analyze every minute of content to identify key themes and details about shows. This data is fed to machine learning models that:
• Assign a weighting to factors that influence viewer choices
• Place viewers in "taste communities" to tailor recommendations
The more data Netflix collects, the more accurate recommendations become, helping build subscriber loyalty.
Increased wealth inequality
AI can improve customer experience through targeted insights but must be implemented responsibly to avoid negative outcomes.
determining legal liability
for the Tesla accident is complex:
Drivers are responsible for being vigilant while autopilot is engaged, but the technology can reduce vigilance.
Autopilot technology is designed to avoid accidents, but may have failed in this case.
While the pedestrian had right of way, he was in an area with fast-moving traffic.
Ethical AI and autonomous
vehicle technologies will require:
Systems that can reliably perform as intended to protect all road users
Drivers trained to understand technology limitations and maintain supervision
Rules and infrastructure that properly allocate liability in complex situations
Overall, this tragic accident highlights the need for a holistic, human-centered approach involving technology developers, policymakers, road users and the public to ensure ethical deployment of autonomous systems.
No single party alone can be considered fully responsible.
Organizations have much more data today due to information technology advances:
The Internet of Things creates data from sensors and connected devices
Social media, smartphones, and internet use generate user data trails
Internet search indexes provide datasets for analysis
Example: Car insurance companies using driving behavior data
Car insurance companies traditionally set premiums based on broad metrics like age and gender.
This enables:
More individualized risk assessment
Lower premiums for safe drivers
A more responsive strategy to customer concerns
Now some insurers are using smartphone apps that track:
• Driver behavior through GPS and driving data
• Provide tips to improve driving skills
• This transforms how organizations:
Gather data from many new sources
Extract actionable insights from that data
Inform and implement strategies based on data and customere needs
• This enables organizations to:
Understand their environments to identify opportunities and threats
Develop new customer insights and understand needs
Inform and implement strategy based on data-driven insights
• This data-driven approach aims to make organizations more responsive, competitive and able to target the right customers.
• However, data quality and privacy issues must also be managed responsibly.
Big data refers to the large volumes of data created and available today.
Large, complex data sets from a variety of sources, both structured and unstructured
Requires storage, processing and analysis to transform raw data into useful information
Volume: The sheer amount of data
Velocity: The speed data is created and processed
Variety: The different sources and types of data
Veracity: The accuracy and reliability of data
Big data has:
• Structured data stored in databases
• Unstructured data like photos, videos and social media
Benefits of big data analytics:
Predictive modelling to predict behavior and inform new strategies
Customer segmentation to target specific groups
Churn analysis to reduce customer loss
Big data allows businesses to:
Monitor and react to user actions in real time
Tailor content and rewards based on social metrics like reach and engagement
Conduct "field research" to test strategies
Data has become a valuable asset when used strategically through:
Large investments in technology, skills and governance
Collaborating and data sharing
Rapidly analyzing and acting on data
opportunities for businesses to:
Gain deeper customer insights
Identify new products and markets
Provide more targeted and relevant experiences
Improve competitive advantage
businesses must implement responsible data use and ethics policies to ensure data accuracy, privacy and security.
• Characteristics of effective use:
• Be skeptical of data-driven conclusions
•Use data ethically, responsibly and securely to minimize risk
big data applications:
Financial Services:
Supply Chain:
UPS uses sensors in delivery vehicles to monitor data on:
Speed
Braking performance
Vehicle condition
This data is combined with customer and GPS data to:
Optimize maintenance schedules
Improve delivery routes
Benefits include:
15 million less minutes of idling time, saving 103,000 gallons of fuel
1.7 million fewer miles driven, saving 183,000 gallons of fuel
Retail:
Walmart tracks data from:
Purchase history
Social media interactions
Weather
Events
This data enables a personalized customer experience. But critics argue Walmart makes judgements about customers' personal lives.
Entertainment:
Time Warner uses data to:
• Track and optimize bandwidth for customer experience
• Target advertising for clients based on viewer demographics and data
Netflix analyzes viewing data from 44 million subscribers watching 2 billion hours of content monthly. This data helps them decide:
• Which shows to invest in
• Estimated viewership before a show airs
In summary, big data helps businesses across industries gain insights to:
Identify the best investments
Optimize operations
Personalize customer experience
Target advertising
Predict viewership
MC mobile network:
is facing challenges:
Declining sales due to competition
Rising customer complaints
High customer churn rate
Using big data can drive MC's strategy by:
Analysing large volumes of structured and unstructured customer data from:
Transactions
Call history
Social media
This data can provide insights into:
In-demand handset models to bundle with tariffs
Main causes of customer complaints to resolve weaknesses
Popular communication types (data, calls, texts) to design optimal tariffs
Usage patterns of prepaid customers to inform offers
Competitor offerings to improve MC's value proposition
Big data can help MC:
Improve tariff design to match customer needs
Reduce customer complaints
Make competitive offers
Retain more customers
However, MC must address risks like:
Data security
Data privacy
Algorithmic bias in data
However, organizations must manage privacy and ethical use of data responsibly to gain customer trust.
• To implement big data responsibly and gain customer trust.
• This holistic strategy would aim to:
Improve customer experience
Strengthen competitive position
Drive sales growth
In summary, analysing and leveraging customer data through big data management can form the basis of an effective strategy to address MC's challenges.
But MC must balance data-driven opportunities with risks through responsible data governance.
Morgan Stanley analyzes vast investment and client data using Hadoop.
This allows them to identify the best investments for clients.
RW is a large international retail chain with success due to store expansion.
Big data, characterized by the 4 V's, can enhance RW's strategic development:
The '3Vs' of big data - volume, velocity and variety - could enhance RW's strategic development:
Volume:
Larger amounts of customer data can improve understanding of:
• Purchasing patterns
• Product demand
• Potential new store locations
Volume: More data over a longer time period could provide a better understanding of customer requirements and purchasing patterns to develop strategies that capitalize on trends.
Volume
Large amounts of data improve reliability of analysis and conclusions.
Organizations need adequate storage and processing capabilities.
Velocity:
Processing data in real time allows RW to:
• Quickly respond to product trends
• Make real-time recommendations to online customers
Velocity: Analyzing real-time data from transactions and social media could allow RW to continually update strategies for competitive advantage, such as quickly marketing trending products.
Velocity:
Data is generated and accessed in real time from transactions and interactions.
Information is available immediately to inform decisions.
Veracity:
Accurate data is critical for RW's store expansion strategy due to its fast growth.
Veracity:
Data must be accurate and reliable to be useful.
Ensuring data quality is critical for effective analytics.
Variety:
Data from diverse sources can provide a deeper understanding of:
• Competitors
• Industry trends
• Customer segments
Variety: Tapping different data sources beyond RW's control could provide the deepest understanding of customers to develop effective strategies. This includes competitor and industry data from online keywords and social media.
Variety:
Data comes from many types of sources and in different formats.
Both structured and unstructured data provide richer insights.
Big data can help RW:
Benefits could include:
Identify optimal new store locations
Track emerging product trends
Gain insight into customer preferences
Generate revenue by selling customer data
Opportunities:
Potential to identify new trends and patterns to gain insights and understanding not previously known.
Ability to analyze large data sets in real time allows faster response to changing conditions.
Access to more diverse types of data including unstructured data sources.
Potential to gain more accurate and detailed performance data in real time.
Threats:
Greater risk of data breaches and hacker attacks due to larger data stores.
Challenge of keeping data safe from viruses and other threats.
Risk of legal issues if data is stolen or corrupted.
Risk of focusing too much effort on analyzing data rather than running the business.
Correlations identified in data may not indicate actual causation.
Cost and challenges of upgrading IT infrastructure to capture and store larger data sets.
Issues of data reliability and truthfulness impacting decision making.
Sainsbury's is using big data technologies to better monitor its wild fish suppliers to ensure sustainability.
Around 25% of fish caught globally is illegally caught, so Sainsbury's partnered with Satellite Catapult to track fishing vessels in real time via satellite data.
Satellites photograph fishing vessels, including data on:
Vessel location signal
Home port
License and quota
Fishing method
Using algorithms, Sainsbury's can determine if a vessel is behaving as expected based on this data.
This enables Sainsbury's to:
Detect illegal, unreported and unregulated fishing
Protect ocean life and fulfill sustainability commitments
In summary, big data and satellite technologies are giving Sainsbury's unprecedented visibility into its supply chain to combat illegal fishing and source sustainable wild fish for its customers.
Optimizing new store locations based on customer shopping habits data
Discovering previously unknown trends to capitalize on before competitors
Generating new revenue streams by selling customer data to manufacturers
The finance director is right to consider big data, otherwise RW risks falling behind competitors. However, RW must consider the costs and benefits before implementation.
In summary, all 3 'Vs' could enhance RW's strategic development through deeper customer insights, faster strategies and potential new revenue sources, if implemented appropriately.
Senior management needs data to make informed decisions on new product development, marketing and pricing strategies.
They need data to answer questions like:
• What are the potential costs/benefits of new products?
• Which customers are most profitable?
• How will customers respond to different prices?
• How does the proposed price compare to competitors?
Data comes from:
Primary research:
Questionnaires
Focus groups
Customer interviews
Secondary research:
Competitor reports
Finance records
Customer complaints
Loyalty schemes
Organizations are also capturing more data from:
• Social media channels
• Technologies like IoT devices
This data helps organizations:
• Determine if new products will achieve objectives
• Decide how to promote and deliver products/services
• Update processes to sell products effectively
• Gauge how competitors will respond
• Identify which customers are most important and profitable
In summary, various types of primary and secondary data help senior management with vital decision-making regarding new products, marketing and pricing strategies.
An information system consists of processes for collecting, storing, processing and distributing information.
The information systems (IS) strategy is the long-term plan for how systems will support organizational strategies through information.
Information systems need controls because:
Information systems need controls from a strategic perspective for the following reasons:
Information is a competitive advantage:
Well-managed information can give organizations an edge over competitors.
Information systems involve high costs High costs of information systems:
Controlling information systems is important due to the high costs of technology.
Information affects all levels and external stakeholders
Wide impact of information:
Information affects internal stakeholders at all levels and external stakeholders.
Information needs may require structural changes
Structural changes:
Information needs may require changes to organizational structure.
Information quality impacts customer service
Customer service:
The quality of information flows impact customer service.
Information is critical to organizational success
The IS strategy should align with the overall organizational strategy by:
Providing the right type and amount of information management needs
Generating information relevant to the organizational strategy
For example, if pursuing product differentiation based on quality, information on product quality is needed.
Managing information effectively could become a source of competitive advantage through:
Responding quickly to market trends based on gathered information
In summary, controls are needed for information systems due to the strategic importance of reliable information for decision making. The IS strategy must align with the organizational strategy to provide the right information to support it.
Critical to success:
Reliable information is critical for organizational success.
In summary, information systems controls are important from a strategic perspective because information provides competitive advantages, involves high costs, impacts stakeholders widely, drives organizational changes, affects customers and is critical to success. Therefore, organizations need to control their information systems to maximize the benefits and minimize the risks of information.
IT and systems security controls are important to:
Prevent theft
Prevent fraud
Prevent human error
Types of controls:
Physical access controls - Prevent unauthorized access to IT assets.
Logical access controls - Ensure only authorized users access IT systems (e.g. passwords).
Operational controls - Ensure day-to-day activities run effectively (e.g. segregation of duties, audit trails).
Input controls - Ensure accuracy, completeness and validity of input data (e.g. data verification, checks).
The 2021 Facebook data leak of 533 million user records
shows the impact of insufficient controls:
Hackers accessed vulnerable data for 2 years before it was published
Exposed personal information could enable cybercrime against victims
The leak highlights the importance of:
Implementing wide-ranging controls to protect large datasets
Strengthening controls beyond users' privacy settings
The 2021 Facebook data leak highlights the need for:
• Wide-ranging controls to protect large datasets
• Strengthening controls beyond users' privacy settings
In summary, organizations must implement different types of IT controls to prevent threats from within and outside the organization. Incidents like the Facebook data leak demonstrate the risks of insufficient controls and the need to constantly improve security measures.
the main threats to IT/information security are:
• Hacking - Unauthorized access to systems to obtain/alter data
• Viruses - Malicious software that spreads and damages systems
• Input errors - Human errors when entering data
Controls to mitigate these threats include:
For hacking:
• Usernames and passwords
• Firewalls
For viruses:
• Anti-virus software
• Warnings about file downloads
For input errors:
• Staff training on accurate data entry
• Validation checks on input data
Other security controls include:
• Physical access controls to prevent unauthorized access
• Logical access controls like passwords
• Operational controls like segregation of duties and audit trails
• Input controls to ensure accuracy, validity and completeness of data
In summary, organizations must implement different types of IT controls to mitigate key threats to information security from hacking, viruses and input errors. Incidents like the Facebook data leak show that constant improvement of security measures is needed.
There are four main types of IT/IS controls:
Physical access controls - Prevent unauthorized access to IT assets.
Logical access controls - Ensure only authorized users access IT systems (e.g. passwords).
Operational controls - Ensure day-to-day activities run effectively:
Segregation of duties - Separate roles to prevent abuse of power
Audit trails - Records of system access and operations
Input controls - Ensure accuracy, validity and completeness of input data through:
Data verification
Data validation
Checks like:
Check digits
Control totals
Range checks
Limit checks
Compatibility checks
Format checks
In summary, organizations should implement a range of physical, logical, operational and input controls to adequately secure their IT systems and information. Different control types target different threats and risks. Together they form a comprehensive control framework.
In summary, organizations must implement general controls, application controls, personnel controls, logical access controls, physical access controls and facility controls to adequately secure information systems and mitigate risks. No single control is sufficient, a combination is needed.
Importance of
information systems controls:
Reduce risk of incorrect decisions from incorrect data
Improve performance measurement
Ensure customer satisfaction
Avoid reputational damage
Minimize business disruption
Specific control examples:
Personnel controls for competence
Logical access controls like passwords
Audit trails to record system access
Physical access controls to limit access to areas
Facility controls to protect hardware and data
Password issues:
Users may share passwords
Passwords can be guessed
Passwords written down can be found
Controls to address issues:
Require regular password changes
Use memorable but not obvious passwords
Prohibit writing down passwords
Monitor failed login attempts
Auditors assess controls by considering:
Frequency of reports
Follow-up of security breaches
the location of IT facilities and disaster recovery:
Important considerations for IT facility location:
Protection from fire, flood, smoke, dust, drinks and power failure
Suitable environmental conditions
Ensuring business continuity
Disaster recovery
planning involves:
• Risk assessment
• Developing contingency plans to address risks
plans should include:
• Backup copies of data files stored securely offsite
• Alternative IT systems that can be activated if main system fails
System backups:
• Copies data to protect against data loss or corruption
• Should be done regularly to limit amount of lost data
Backup copies should be:
• Stored securely in a safe, offsite location
Application controls ensure:
• Accurate and complete data input
• Authorized distribution of data
mitigate risks of:
•Unauthorized access to network data
• Compromised data integrity
Network controls include:
Firewalls
Data encryption
Virus protection
In summary, locating IT facilities to protect against potential risks, implementing effective system backups, and having comprehensive disaster recovery plans and controls are key to ensuring business continuity and data/system security. Regular backups, securely stored offsite copies and alternative IT systems reduce disruption in the event of a disaster.
computerised accounting process controls:
Computerised accounting systems can:
• Reduce human error through standardized rules
• Ensure entries are complete with debits and credits
Setting up a chart of accounts is important to:
Segregate assets, liabilities, revenue and expenses
Define how transactions will be treated
Meet reporting requirements
Controls over the chart of accounts are needed to:
• Prevent unauthorized additions or deletions of accounts
• Ensure it still meets needs through regular reviews
Testing the accounting software
helps ensure:
Posting rules are working correctly
Test data
Test data involves:
• Entering sample transactions
• Comparing results to expected outcomes
Test data can check controls that:
Prevent invalid data
Reject non-existent codes
Flag unrealistic amounts
Enforce credit limits
In summary, while computerised accounting systems can reduce human error, organizations must implement controls to ensure transactions are properly processed and reported. This includes controls over the chart of accounts, testing of accounting software and the use of test data to verify processing controls work as intended. Proper controls help ensure the reliability of computerised accounting information.
Cybersecurity means:
• Protecting systems, networks and data in cyberspace
Cyberspace refers to:
The environment where IT networks operate
External threats to cybersecurity include threats from:
Different countries
Growing number of devices and applications
Security failures
To improve cybersecurity, organizations should:
• Learn from past security breaches
• Determine risk tolerance for cyber risks
The need for cybersecurity is rising due to:
In summary, cybersecurity means protecting data, systems and networks from both internal and external threats. Organizations need a holistic approach involving technical solutions, process changes, senior management oversight and learning from past incidents. Effective cybersecurity requires strategic changes and an enterprise-wide effort.
Communicating the importance in simple terms:
• Making it relevant for non-IT staff
• Educate non-executive board members to keep their cybersecurity knowledge up to date and challenge executive directors.
Assigning clear accountability and responsibility
• Appointing a Chief Information Security Officer
• Have a team to address cyber attacks
• Ensuring board member oversight
Learning from past incidents
Determining risk appetite
to design management strategies
Providing adequate resources
Organizations must prioritize cybersecurity, make it relevant across departments and assign accountability at senior levels. A holistic, enterprise-wide approach is needed involving technology, processes, roles, and oversight from management and the board.
• Increasing frequency of cyber attacks
• Data security now involves external threats in addition to internal controls
Cybersecurity protects technology and data from unauthorized access or attacks
NCCP relies on technology for its operations and is therefore at risk of cyber attacks
NCCP currently only has controls around staff passwords which is not robust enough
Hackers could alter NCCP's website, impersonate the organization, infect hardware
Actions by the Board:
Make cybersecurity a priority and include it on board meeting agendas
Seek expert advice due to lack of technical expertise
Establish and communicate a clear cybersecurity policy to all stakeholders
Have contingency plans in place for rapid response in case of a breach
Regularly review cybersecurity risks as they change rapidly
Separating Sponsor and Manager Roles:
Provides good corporate governance
Project sponsor sets overall direction
Project manager manages actual delivery
Sponsor can represent project at senior levels and provide oversight
Sponsor ensures necessary resources are allocated
Manager decides how to utilize resources for delivery
Sponsor may lack expertise to manage operational activities
key recommendations are to:
Prioritize cybersecurity at the board level
Obtain external advice due to lack of in-house expertise
Develop and communicate a clear cybersecurity policy
Implement response and contingency plans
Regularly monitor cybersecurity risks
Separate project sponsor and manager roles for effective oversight and delivery
Continuity planning:
• Have plans in place to address IT infrastructure failures
• Plans should include contact details and offsite backup locations
Systems development and maintenance:
• Implement security controls by regularly updating software and hardware
• Ensure controls remain effective
Personnel security measures:
Implement suitable recruitment processes
Provide adequate training on using IT systems
Provide regular training to keep skills up-to-date
Asset classification and control:
Assign information owners to be accountable for maintaining key data
Compliance measures:
• Have organizational policies for using IT systems and data
• Ensure policies comply with laws like data protection
Additional measures needed to enhance IT/IS controls will depend on the organization's specific situation.
In summary, practical ways to improve IT/IS controls include:
Implementing continuity plans
Maintaining up-to-date systems and software
Applying personnel security and training
Assigning asset owners
Enforcing compliance policies
Artificial intelligence refers to intelligence demonstrated by machines, such as:
Learning and problem solving abilities
Ability to perceive environment and take actions to achieve objectives
Making active decisions using data analysis
Ability to learn and adapt over time
Algorithms are vital for artificial intelligence. They are step-by-step processes for solving problems or accomplishing tasks.
Retail:
Creating adaptive environments
Building customer profiles and relationships
Guiding purchasing decisions
Improving supply chain and pricing strategies
Informing product development
Other sectors:
Medical diagnosis and treatment personalization
Self-driving cars and route optimization
Crop monitoring and yield prediction in agriculture
Cybersecurity threat detection
Job matching and talent assessment in HR
Autonomous investment practices and high-speed trading in finance
Enhance customer experience
Personalize products and services
Automate routine tasks
Analyze large amounts of data
Make faster and more accurate decisions
Machine Learning:
Uses algorithms to gain experience from data and learn without being programmed
Can predict and provide guidance based on historical data and new inputs
Types are supervised, unsupervised and reinforcement learning
Deep learning uses neural networks to analyze unstructured data
Self-learning computes decisions based on programmed 'emotions'
Artificial Intelligence:
Demonstrates intelligence through tasks such as learning, problem-solving, perceiving and deciding
Uses algorithms, machine learning, data analysis and adaptation
Applications include personalized services, automating tasks, optimizing processes and faster decision making
Robotics:
Builds machines that can replicate human actions
Used where accuracy, repeatability and hazardous conditions are important
Reduces costs and increases precision, reliability in manufacturing
Perform welding, quality control and surgery through machine vision and telemanipulators
Home robots assist with everyday tasks
Robot learning algorithms acquire skills through self-exploration and human interaction
Challenges:
High initial investments
Training costs for human workers
Health and safety concerns with human interactions
In summary, artificial intelligence relies on algorithms, machine learning and big data. It is being used across industries to improve processes, optimize operations and gain competitive advantages. However, the rapid development of AI also raises ethical concerns about its impact on jobs, privacy and accountability. Regulatory frameworks may be needed to govern emerging AI technologies.
key ethical issues related to artificial intelligence and machine learning:
• Mistakes - AI may make different types of mistakes than humans.
• Bias - AI may reflect the biases of its creators or have unintentional programmed bias.
• Security - As AI capabilities increase, effective cybersecurity is critical.
• Unintended consequences - AI may achieve intended solutions but have unforeseen negative impacts.
• Control - There are concerns about AI ultimately surpassing human control.
Other issues:
• Unemployment - AI and robotics may displace human jobs with few alternatives.
• Income distribution - Benefits of AI may concentrate in hands of owners, not workers.
• Behavior influence - AI interactions may inadvertently influence human behavior.
• Treatment of AI - There are debates about ethics of "negative reinforcement" of AI systems.
An ethics framework should include:
• Defining AI ethics aligned with business values
• Integrating ethics into AI product design
• Obtaining stakeholder feedback during development
• Continuously monitoring for bias
• Ensuring transparency about data use
key ethical considerations for AI include:
• Potential negative impacts and risks
• Economic and social consequences
• Responsible design and use of the technology
While exam exhibits will focus on business context, answers should demonstrate an understanding of:
• Ethical issues specific to the organization's use of AI
• The organization's approach to addressing those issues in a responsible manner
The increased value of data from growing volumes, value-adding analysis and AI applications
Lack of public awareness of how personal data could be misused, as shown by the Facebook/Cambridge Analytica scandal
Exposure created by storing and sharing data in the cloud
The inevitability of software flaws due to complexity
As a strategic leader, you should:
Understand the value of your company's data and potential consequences of data loss or misuse
Ensure employees are aware of data security policies and risks
ensure your finance team:
Implement appropriate technical, physical and administrative controls to protect data
Oversee contingency plans in the event of an attack
Continuously monitor threats and your organization's vulnerabilities
Allocate sufficient resources for effective cybersecurity efforts
Cyber attacks are increasing in frequency and cost, targeting large companies in particular. The average cost of an attack rose 61% in 2019.
Cybersecurity should be part of an overall risk management program, but requires leadership focus due to the threats outlined above.
key measures to promote cybersecurity
Establish a risk management regime that explicitly addresses cybersecurity risk
Secure the network perimeter to prevent unauthorized access
Educate and raise awareness among users of how they could be exploited
Use up-to-date anti-malware software to screen for viruses and malware threats
Strictly regulate the use of removable media like USB sticks
Configure all hardware and software securely before connecting to the network
Separate user privileges and restrict access based on job function
Have an incident response plan to minimize immediate threats and learn lessons
Monitor network activity to spot and prevent unsuccessful cyberattacks
Implement effective controls for remote and mobile working like VPNs and device configurations
key elements of a cybersecurity program
Technical measures - like firewalls, encryption, malware protection
Organizational measures - such as user policies, separation of duties, monitoring
Human factors - including security awareness training and incident response plans
And all of it needs oversight and buy-in from senior leadership who set the right "tone from the top."
The most critical initial step is establishing an explicit risk management regime that assigns clear roles and responsibilities for cybersecurity. This will help embed it as a strategic, enterprise-wide priority.
the finance department's role in managing cybersecurity:
Cyber risk is highly relevant to CFOs and finance teams due to potential financial impacts.
They should take a broader view of cybersecurity as a business-wide risk, not just a technical issue.
Redefining risk and resilience, improving recovery plans, securing the supply chain and insuring against losses are key actions for CFOs.
Organizations should not wait for an attack to occur before improving their cybersecurity posture.
Adopt a "zero trust" model that verifies all users and equipment before network access. Question if current risk and resilience measures are sufficient.
Develop robust recovery plans for dealing with attacks and restoring systems afterwards. Prevention is impossible, so focus on minimizing impact.
Audit suppliers' cybersecurity protocols, as the supply chain is often the weakest link. Require adequate controls from connected third parties.
Invest in cyber insurance after quantifying potential financial losses from an attack. However, paying ransomware attackers may only encourage further attacks.
Understands potential financial consequences of data loss or network downtime
Helps quantify cyber risks and implements appropriate controls
Develops and funds effective recovery plans
Audits suppliers for adequate cybersecurity
Investigates options for cyber insurance coverage
Example: Amazon Echo which can play music, make calls, answer questions, control lights, etc.
It involves:
• Connected sensors, processors and transmitters
• Smart devices that can collect data and control the physical world
Businesses should consider:
• How IoT can be part of their business model
• Strategic and operational uses across sectors
Helping with tasks through better data, like oil exploration
Generating efficiencies in energy, resources and supply chains
Monitoring for problems through warning systems and predictive analytics
Informing strategic development like customizing products
Examples:
Smart home devices
Traffic alerts for commuters
Crop sensors for farmers
Predictive maintenance for manufacturers
3D printing for automakers
the Internet of Things has the potential to transform businesses by:
Providing vast amounts of data for analysis
-Automating routine tasks
Improving efficiency and productivity
Enabling customized products and services
However, businesses must determine where and how IoT can add value to their specific strategies, operations and customer propositions.
Effective adoption depends on identifying and assessing relevant opportunities based on organizational goals.
sector examples:
Medical sector:
Transport sector:
• Smart devices like traffic cameras and sensors warn of traffic issues
• Collect data to identify routes for simplification and optimization
Smart home devices alert to medical emergencies
Continuous remote monitoring of vitals
Remote monitoring and support for treatment compliance
• Security - IoT applications have not kept pace with security development, creating risks
• Security risks from connected devices
• Privacy - Data collection raises concerns about individual monitoring and behavior prediction
• Ethical issues around privacy and data protection
• Technical - Platform fragmentation, device obsolescence, data costs and complexity
• Technical challenges of integrating diverse systems and technologies
• Implementation challenges - Many pilots do not scale, lack of clear business case, long time horizons, legacy infrastructure limitations
• Barriers to successfully implementing and scaling IoT initiatives
As a strategic business leader, you should be able to evaluate potential IoT applications, develop an implementation roadmap and optimize IoT initiatives to achieve intended benefits.
• Assess the opportunities and risks specific to your organization's industry and operations
• Develop strategies to mitigate threats, ensure compliance and optimize IoT initiatives
• Consider the organizational changes needed to support widescale IoT adoption
• Guide how IoT can create new business models or transform existing ones
Inform and implement strategy
Identify new opportunities and risks
Improve decision-making and create business value
As a strategic business leader, you should:
Determine how big data can transform your business model and strategies
Evaluate potential use cases based on organizational goals
Design governance and risk management frameworks
Define success metrics for big data initiatives
Guide ethical and secure use of customer and employee data
Leaders play a vital role in articulating a clear vision, setting the right "tone from the top" and designing governance systems to maximize benefits and manage threats.
while big data and analytics offer great opportunities, organizations must balance opportunities with risks.
Their ability to assess and evaluate potential applications based on organizational needs will determine the value realized from big data and analytics.
Value:
Analyzing data is not enough; insights must be extracted through:
• Identifying patterns and trends
• Asking the right business questions
• Making informed assumptions
• Accurately predicting behavior
• Finding relevant solutions
In summary,
volume, velocity and variety of data provide opportunities for deeper insights.
However, veracity and value determine whether those insights are trustworthy and actionable for businesses.
As a strategic leader:
play a key role in realizing actual value from big data.
• Evaluate how much and what types of data are relevant for your needs
• Ensure data quality and governance frameworks
• Guide analysts to ask the right questions of the data
• Challenge conclusions and verify insights for accuracy
• Translate insights into strategic recommendations and value creation
• Data analytics
refers to extracting insights from large or unstructured/raw data.
Provides information to answer business questions and make better decisions
data analytics techniques progress from:
Describing what happened (descriptive)
To predicting what will happen (predictive)
To recommending what should be done (prescriptive)
Examines trends and patterns in the data
Classifies data in different ways to gain insight
Uses visualizations like graphs, charts and pivot tables
Purposes:
Inform strategies
Improve decision-making
Identify risks and opportunities
Applies statistical models, machine learning and AI to the data
Makes predictions based on past and present data
Forecasts future outcomes and trends
Purposes:
Predict customer behavior
Forecast sales, demand and costs
Identify potential threats
Goes beyond prediction to recommend courses of action
Optimizes decisions based on complexity, constraints and trade-offs
Purposes:
Recommend the best option from multiple choices
Generate heuristics to improve performance
Determine the most cost-effective or profitable actions
All techniques provide insights to support better business decisions. But prescriptive analytics has the greatest potential to transform business performance by recommending optimal (best) actions based on data.
As a strategic leader, you should
• Revise strategies
• Improve operational efficiency
• Enhance customer experience
• Create competitive advantage
Selecting and implementing the right analytics technique for the right purpose is critical for extracting maximum value from data.
Uses statistical models, AI and machine learning to predict future outcomes based on past and present data
Allows businesses to evaluate strategies and foresee different scenarios
Tools like Excel's Scenario Manager and Data Analysis pack can be used
Risks:
Correlations are not always causations
Predictions may not be 100% accurate
Goes beyond prediction to recommend optimal courses of action
Optimizes decisions based on constraints, trade-offs and complexity
Tools like Excel's Goal Seek and Solver can generate optimal solutions
Example:
Minimizing transportation costs by optimally allocating TV deliveries from depots to stores
determine which technique is most appropriate for a given business problem and apply insights to:
interpret findings skeptically and question assumptions
Data should be used ethically and responsibly