Contents
INTRODUCTION	5
PRIMARY TAKEAWAYS	7
CONTEXT	8
CONSIDERATIONS
Contextualise vs adapt 	
Digital security concerns	
Priorities	
Finding information	
Choosing a tool	

10
10
11
11
11

USEFULNESS OF TOOLS
Recognising patterns	
Partnerships	
Sharing information	

16
16
17

Managing large amounts of data	

17

BARRIERS TO TOOLS USE
Digital security	
Data storage	
Managing expectations	
Internal reluctance	
Communication	

18
18
19
19
19

Select target paragraph3