Contents INTRODUCTION 5 PRIMARY TAKEAWAYS 7 CONTEXT 8 CONSIDERATIONS Contextualise vs adapt Digital security concerns Priorities Finding information Choosing a tool 10 10 11 11 11 USEFULNESS OF TOOLS Recognising patterns Partnerships Sharing information 16 16 17 Managing large amounts of data 17 BARRIERS TO TOOLS USE Digital security Data storage Managing expectations Internal reluctance Communication 18 18 19 19 19

Select target paragraph3