Contents
INTRODUCTION 5
PRIMARY TAKEAWAYS 7
CONTEXT 8
CONSIDERATIONS
Contextualise vs adapt
Digital security concerns
Priorities
Finding information
Choosing a tool
10
10
11
11
11
USEFULNESS OF TOOLS
Recognising patterns
Partnerships
Sharing information
16
16
17
Managing large amounts of data
17
BARRIERS TO TOOLS USE
Digital security
Data storage
Managing expectations
Internal reluctance
Communication
18
18
19
19
19