Data are extremely important for creating competitive advantage. The key is knowing which data matter and ensuring those who need the data, have access to the data, when they need it.
Based on the company you have identified for your Final Paper, discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.? Remember to respond to two other learners’ post, letting them know if they missed any data or details in their industry.
Significant Data for Creating Competitive advantage
When we consider American football and Rigby, it is evident that football and running sports have broad and diverse sports portfolios. Considerably, Adidas will group people and resources depending on the function and the product brand. Employees are usually on projects, manufacturing, and engineering departments, with other data being employees in the other six central departments. These departments include marketing, finance, human resource, projects, and engineering. The additional data targets the company executives who have to consider the strategic focus to increase the credibility of the brands, elevate customer experiences and push the boundaries to sustainability. When executing the strategy, the executive enables their mindset for innovations across the dynamic business dimensions and digital transformations.
The responsible individuals for data in Adidas are called the joint controllers” per the GDPR and local privacy regulations. This personnel is jointly responsible for determining the purpose and manner of processing data and the lawful basis for the actions with the information. Therefore, they are responsible entities who necessitate understanding information (Wang et al., 2019). There are also other Adidas and non-Adidas entities for utilizing customer data. Under the GDPR, Adidas AG has a primary role in determining compliance strategies for implementing effective technical solutions.
Various approaches are used to ensure that authorized users access the appropriate data. In this case, the primary method involves using reasonable security procedures to protect the information. Data transfer through the internet cannot be guaranteed 100% secure; therefore, it must be protected during transmissions (Wang et al., 2019). Personal information originating from the collection of organizations’ websites may be stored in secure operating environments that are not accessible by the public. Industry-standard encryption is necessary for this situation to secure customer data. The encryption approach in this exercise is called Secure Socket Layer (SSL) (Brooks, 2021). The company could also establish a secure shopping guarantee for customer transactions. Cookies and pixel tags help the company understand the customer preferences such as language and country choices. The company can provide devices for clients to improve their online experiences.
Brooks, T. J. (2021). German ncp Releases Final Report under oecd Guidelines on Failure of Adidas to Mitigate Human Rights Effects of Subcontractor Actions in Indonesia. International Labor Rights Case Law, 7(1), 24-30.
Hagiu, A., & Wright, J. (2020). Data-enabled learning, network effects and competitive advantage. Unpublished manuscript.
Wang, K., Dong, J., Wang, Y., & Yin, H. (2019). Securing data with blockchain and AI. Ieee Access, 7, 77981-77989.
Information Governance and Information Technology Functions
Data that matters to the executive
The DEF company has availed several data sources to carry out its data-based operations. However, the performance of the row data in business has attained considerable importance in data analysis (Stevelman & Haan, 2020). For instance, intelligence adoption has resulted positively in these business operations using row data. Also, data mining and business data analysis have been established. This has been made easy and efficient by the GIGO of this DEF company. These business analytics and data analyses make planned operations significant to the company. This is because, for instance, the company can plan for its future functions and requirements through analytics.
In DEF company, several bodies need data significantly as there are critical operations. Business applications, for instance, need data that can give necessary functionalities that can be operated internally or externally (Mukherjee, 2019). This is, however, very critical, especially to the business applications related to data business applications in its data collection. These data application, however, is used to ensure that there is running of the data in a continuity manner. These data application has helped critically in some data operations like a database: data management operations, application programs, and others. In addition, the application descriptor and the program’s loading are essential data application operations that are meaningful when data is available.
Critical data upheld by users
The data, however, is most critical to the organization, especially concerning user information data. This data should be essential in terms of security and privacy matters. Some security tools that should be enhanced in the data operations will ensure that these critical data are in users’ hands, especially to the GIGO at DEF company. Examples are authorization, encryption, and masking of data operations (Stevelman & Haan, 2020). These data include passwords, user IDs, and any information related to the data critical to the organization. These operations will ensure that the necessary data is maintained in the user’s hand and establish security mechanisms.
Mukherjee, S. (2019). Information Governance for the Implementation of Cloud Computing: A Review. IUP Journal of Information Technology, 15(3).
Stevelman, F., & Haan, S. C. (2020). Boards in information governance. U. Pa. J. Bus. L., 23, 179.