SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
36% say big data insights are
not reliable. Rising to 53% for
data users themselves.
Survey conducted in April 2015 by Vanson Bourne.
Respondents were 100 ITDMs from organisations with
1000 or more employees.
BIG DATA IS GREAT
BIG DATA
COST IS A BARRIER
UNDER-UTILISED
LACK OF TRUST
WHO HAS CONTROL?
TOOLS FAIL THE TEST
1
2
1
6
5
2
4
3
6
5
4
3
40% have big data.
Larger organisations
are more likely to have
already adopted it, as
are financial services
and manufacturing
organisations.
82% say it will give them a competitive advantage
Just 1% say no departments in their organisations want
access to business & analytical tools.
Nearly 80% agree that big data is
underused.
44% say that big data
users in their organisation
are frustrated that IT
departments have control
over big data. 23% disagree
that big data projects
outside of IT are a data
security risk.
Nearly 50% say big data has been more expensive
than expected.
Almost 60% are aware that some
departments within their
organisation complain that the
big data tools aren’t as good as
they would like.
Only 16% are prepared to say their
big data tools are of high quality.
Nearly 50% agree that the Board do
not regard big data as important.
61% say info gathered from big data is
difficult to action.
We're moving into an era of big data, where more information is captured in ever-finer detail from
ever-more sources which means our decision-making is bound to improve. Doesn’t it?
We interviewed 100 ITDMs from organisations with 1000 or more employees to find out.
At 41% budget is the most common reason why
organisations are not currently using big data.
At 34% budget is also the most common reason
preventing the IT department from providing
high quality big data analysis.
33% say departments
have rolled out a big
data project without IT
support, but this raises
issue of data security.
Most departments are unlikely
to have access to all of the
tools that they would like, or
need, to analyse it.
65% agree that
big data requests
made by other
departments are
not possible due
to budget.
Most organisations have general
data analysis tools, but there are
issues with these tools. 45% are
aware of departments that
complain about issues with
quality of data.
A further 44%
intending to do it
within 3 years.
82% agree big data will
become common and
many departments are
keen to have access to
big data.

Weitere ähnliche Inhalte

Was ist angesagt?

Consumer centric healthcare workshop
Consumer centric healthcare workshopConsumer centric healthcare workshop
Consumer centric healthcare workshopLeo Barella
 
Future of Patient Data Berlin - 18 April 2018
Future of Patient Data   Berlin - 18 April 2018Future of Patient Data   Berlin - 18 April 2018
Future of Patient Data Berlin - 18 April 2018Future Agenda
 
We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020Matthew Doyle
 
HIMSS Analytics® - 17 Technologies Shaping Hospital Purchases in 2016
HIMSS Analytics®  - 17 Technologies Shaping Hospital Purchases in 2016HIMSS Analytics®  - 17 Technologies Shaping Hospital Purchases in 2016
HIMSS Analytics® - 17 Technologies Shaping Hospital Purchases in 2016HIMSS Analytics
 
IDC Government Insights - Open Government Initiative Survey
IDC Government Insights - Open Government Initiative SurveyIDC Government Insights - Open Government Initiative Survey
IDC Government Insights - Open Government Initiative SurveyAri Herzog
 
Future of patient data project overview
Future of patient data   project overviewFuture of patient data   project overview
Future of patient data project overviewFuture Agenda
 
AI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AIAI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AISkyl.ai
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
Data Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare PracticesData Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare PracticesData Dynamics Inc
 
OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915Ravi Sripada
 
Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018Anand Deshpande
 
Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Ben B
 
Industry Uses of HHS Data
Industry Uses of HHS DataIndustry Uses of HHS Data
Industry Uses of HHS DataDavid Portnoy
 
Pharma’s journey towards the multichannel rep
Pharma’s journey towards the multichannel repPharma’s journey towards the multichannel rep
Pharma’s journey towards the multichannel repAcross Health
 
Big Data Analytics government healthcare
Big Data Analytics government healthcareBig Data Analytics government healthcare
Big Data Analytics government healthcareData Science Thailand
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyPaul Gulbin
 

Was ist angesagt? (20)

Consumer centric healthcare workshop
Consumer centric healthcare workshopConsumer centric healthcare workshop
Consumer centric healthcare workshop
 
Future of Patient Data Berlin - 18 April 2018
Future of Patient Data   Berlin - 18 April 2018Future of Patient Data   Berlin - 18 April 2018
Future of Patient Data Berlin - 18 April 2018
 
We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020
 
HIMSS Analytics® - 17 Technologies Shaping Hospital Purchases in 2016
HIMSS Analytics®  - 17 Technologies Shaping Hospital Purchases in 2016HIMSS Analytics®  - 17 Technologies Shaping Hospital Purchases in 2016
HIMSS Analytics® - 17 Technologies Shaping Hospital Purchases in 2016
 
IDC Government Insights - Open Government Initiative Survey
IDC Government Insights - Open Government Initiative SurveyIDC Government Insights - Open Government Initiative Survey
IDC Government Insights - Open Government Initiative Survey
 
Future of patient data project overview
Future of patient data   project overviewFuture of patient data   project overview
Future of patient data project overview
 
AI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AIAI in Quality Control: How to do visual inspection with AI
AI in Quality Control: How to do visual inspection with AI
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Data Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare PracticesData Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare Practices
 
OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915OPY-150702_BigData_Healthcare_070915
OPY-150702_BigData_Healthcare_070915
 
Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018
 
Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016Encrypting User Data in the NHS 2016
Encrypting User Data in the NHS 2016
 
Industry Uses of HHS Data
Industry Uses of HHS DataIndustry Uses of HHS Data
Industry Uses of HHS Data
 
Sensotrend for MyData2019
Sensotrend for MyData2019Sensotrend for MyData2019
Sensotrend for MyData2019
 
Pharma’s journey towards the multichannel rep
Pharma’s journey towards the multichannel repPharma’s journey towards the multichannel rep
Pharma’s journey towards the multichannel rep
 
Big Data Analytics government healthcare
Big Data Analytics government healthcareBig Data Analytics government healthcare
Big Data Analytics government healthcare
 
DevOps for Database 2015 Survey Infographic
DevOps for Database 2015 Survey InfographicDevOps for Database 2015 Survey Infographic
DevOps for Database 2015 Survey Infographic
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences July
 
Infographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimensionInfographic: Third-Party Risks: The cyber dimension
Infographic: Third-Party Risks: The cyber dimension
 

Ähnlich wie Vanson Bourne Infographic: Big Data

Vanson Bourne Research Report: Big Data
Vanson Bourne Research Report: Big DataVanson Bourne Research Report: Big Data
Vanson Bourne Research Report: Big DataVanson Bourne
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of DataKim Cook
 
Survey Results Age Of Unbounded Data June 03 10
Survey Results Age Of Unbounded Data June 03 10Survey Results Age Of Unbounded Data June 03 10
Survey Results Age Of Unbounded Data June 03 10nhaque
 
It's all about big data
It's all about big dataIt's all about big data
It's all about big dataYuxin Tu, PhD
 
The hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-PacificThe hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-PacificThe Economist Media Businesses
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingCognizant
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryEmisor Digital
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded dataMoxie Insight
 
Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...
Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...
Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...DATAVERSITY
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingGov BizCouncil
 
Data Integrity Trends
Data Integrity TrendsData Integrity Trends
Data Integrity TrendsPrecisely
 
Finding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in AsiaFinding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in AsiaThe Economist Media Businesses
 
Making the Leap: Exploring the Push for Cloud Adoption
Making the Leap: Exploring the Push for Cloud AdoptionMaking the Leap: Exploring the Push for Cloud Adoption
Making the Leap: Exploring the Push for Cloud AdoptionGov BizCouncil
 
Big Data Usage Survey
Big Data Usage SurveyBig Data Usage Survey
Big Data Usage SurveyAnil Chopra
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Melissa Luongo
 

Ähnlich wie Vanson Bourne Infographic: Big Data (20)

Vanson Bourne Research Report: Big Data
Vanson Bourne Research Report: Big DataVanson Bourne Research Report: Big Data
Vanson Bourne Research Report: Big Data
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
White Paper: The Age of Data
White Paper: The Age of DataWhite Paper: The Age of Data
White Paper: The Age of Data
 
Survey Results Age Of Unbounded Data June 03 10
Survey Results Age Of Unbounded Data June 03 10Survey Results Age Of Unbounded Data June 03 10
Survey Results Age Of Unbounded Data June 03 10
 
It's all about big data
It's all about big dataIt's all about big data
It's all about big data
 
The hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-PacificThe hype and the hope: The road to big data adoption in Asia-Pacific
The hype and the hope: The road to big data adoption in Asia-Pacific
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
 
Decision making article
Decision making articleDecision making article
Decision making article
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summary
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Survey results: The age of unbounded data
Survey results: The age of unbounded dataSurvey results: The age of unbounded data
Survey results: The age of unbounded data
 
Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...
Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...
Lead Your Data Revolution - How to Build a Foundation of Trust and Data Gover...
 
Envisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information SharingEnvisioning IC ITE: The Next Generation of Information Sharing
Envisioning IC ITE: The Next Generation of Information Sharing
 
Data Integrity Trends
Data Integrity TrendsData Integrity Trends
Data Integrity Trends
 
Finding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in AsiaFinding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in Asia
 
Making the Leap: Exploring the Push for Cloud Adoption
Making the Leap: Exploring the Push for Cloud AdoptionMaking the Leap: Exploring the Push for Cloud Adoption
Making the Leap: Exploring the Push for Cloud Adoption
 
Big Data Usage Survey
Big Data Usage SurveyBig Data Usage Survey
Big Data Usage Survey
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
MTBiz February 2014
MTBiz February 2014MTBiz February 2014
MTBiz February 2014
 

Mehr von Vanson Bourne

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne
 
Vanson Bourne Key Findings: Wearable Tech
Vanson Bourne Key Findings: Wearable Tech Vanson Bourne Key Findings: Wearable Tech
Vanson Bourne Key Findings: Wearable Tech Vanson Bourne
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesVanson Bourne
 
Vanson Bourne Data Summary: Shadow IT - BDMs
Vanson Bourne Data Summary: Shadow IT - BDMsVanson Bourne Data Summary: Shadow IT - BDMs
Vanson Bourne Data Summary: Shadow IT - BDMsVanson Bourne
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne
 
Vanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA TechnologiesVanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA TechnologiesVanson Bourne
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne
 
Vanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley PartnersVanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley PartnersVanson Bourne
 
Vanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success FactorsVanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success FactorsVanson Bourne
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne
 
Vanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech MarketingVanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech MarketingVanson Bourne
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne
 

Mehr von Vanson Bourne (20)

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable Tech
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable Tech
 
Vanson Bourne Key Findings: Wearable Tech
Vanson Bourne Key Findings: Wearable Tech Vanson Bourne Key Findings: Wearable Tech
Vanson Bourne Key Findings: Wearable Tech
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents Infographic
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast Slides
 
Vanson Bourne Data Summary: Shadow IT - BDMs
Vanson Bourne Data Summary: Shadow IT - BDMsVanson Bourne Data Summary: Shadow IT - BDMs
Vanson Bourne Data Summary: Shadow IT - BDMs
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
 
Vanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA TechnologiesVanson Bourne Case Study: CA Technologies
Vanson Bourne Case Study: CA Technologies
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBM
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress Software
 
Vanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley PartnersVanson Bourne Case Study: Spreckley Partners
Vanson Bourne Case Study: Spreckley Partners
 
Vanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success FactorsVanson Bourne Case Study: Success Factors
Vanson Bourne Case Study: Success Factors
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter Novelli
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile Strategy
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market Research
 
Vanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech MarketingVanson Bourne Full Research Report: Directions in Tech Marketing
Vanson Bourne Full Research Report: Directions in Tech Marketing
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech Marketing
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT Security
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Vanson Bourne Infographic: Big Data

  • 1. 36% say big data insights are not reliable. Rising to 53% for data users themselves. Survey conducted in April 2015 by Vanson Bourne. Respondents were 100 ITDMs from organisations with 1000 or more employees. BIG DATA IS GREAT BIG DATA COST IS A BARRIER UNDER-UTILISED LACK OF TRUST WHO HAS CONTROL? TOOLS FAIL THE TEST 1 2 1 6 5 2 4 3 6 5 4 3 40% have big data. Larger organisations are more likely to have already adopted it, as are financial services and manufacturing organisations. 82% say it will give them a competitive advantage Just 1% say no departments in their organisations want access to business & analytical tools. Nearly 80% agree that big data is underused. 44% say that big data users in their organisation are frustrated that IT departments have control over big data. 23% disagree that big data projects outside of IT are a data security risk. Nearly 50% say big data has been more expensive than expected. Almost 60% are aware that some departments within their organisation complain that the big data tools aren’t as good as they would like. Only 16% are prepared to say their big data tools are of high quality. Nearly 50% agree that the Board do not regard big data as important. 61% say info gathered from big data is difficult to action. We're moving into an era of big data, where more information is captured in ever-finer detail from ever-more sources which means our decision-making is bound to improve. Doesn’t it? We interviewed 100 ITDMs from organisations with 1000 or more employees to find out. At 41% budget is the most common reason why organisations are not currently using big data. At 34% budget is also the most common reason preventing the IT department from providing high quality big data analysis. 33% say departments have rolled out a big data project without IT support, but this raises issue of data security. Most departments are unlikely to have access to all of the tools that they would like, or need, to analyse it. 65% agree that big data requests made by other departments are not possible due to budget. Most organisations have general data analysis tools, but there are issues with these tools. 45% are aware of departments that complain about issues with quality of data. A further 44% intending to do it within 3 years. 82% agree big data will become common and many departments are keen to have access to big data.