Commercial Data Management (L6M7)


Module purpose
On completion of this module, learners will be able to assess the concept of big data and evaluate the impact of data integrity and cyber security on the procurement and supply function.

Module aim(s)
Until recently big data was seen as a technical issue that had to be addressed; however, organisations now view it as a business opportunity that can significantly contribute to competitive advantage and are now exploiting big data in all of its forms to discover facts that they did not know before. Given this propensity for data and the associated gathering and storage activity, supply chain cyber security is now a key requirement. This module is designed for procurement and supply leaders who require a clear knowledge of the concept of big data and of the impact of data integrity and cyber security.

Next steps
Joining a CIPS qualification programme means you will join the largest Institute in the world for those working in procurement and supply. You can join as a member online today. Once you've become a CIPS member you can book your examinations online.

    Learning outcomes

    1.0  Understand the concept of big data in the global supply chain

    1.1  Evaluate the term big data and the historic rise of its importance to the procurement and supply function

    • Transit from technical problem to business opportunity:
    • Increasing data volumes
    • Scalability crisis
    • Data storage capacity increases
    • CPU capacity, speed and intelligence
    • Falling cost of IT
    • The 3Vs
    • Volume
    • Velocity
    • Variety

    1.2  Evaluate the need for big data and the diversity of data sources and types

    • Require large volumes of highly detailed data
    • Use of Business Intelligence (BI) and analytics
    • Driving agility and innovation with big data
    • Sources of data:
    • Sensors
    • Devices
    • Third parties
    • Web applications
    • Social media
    • Types of data:
    • Real time vs. delayed
    • Unstructured (text and human language) vs. semi structured (XML, RSS feeds etc.)
    • Audio, video, other devices
    • Multi vs. single dimension
    • Streaming data

    2.0  Understand data integrity and its impact on procurement and supply

    2.1  Evaluate the requirement for integrity andconfidentiality of data

    • Data integrity vs. data security
    • Legal aspects such as:
    • The UK Data Protection Act
    • General Data Protection Regulation 2016 (GDPR)
    • EU Data Protection Directive
    • Responsible data handling
    • Non-disclosure agreements (NDA)
    • Intellectual property rights (IPR)
    • Information assurance and risk management for individuals and organisations
    • Physical integrity vs. logical integrity

    2.2  Assess the implications of data disruption on the organisation

    • Data-enabled business models
    • Data resilience strategies
    • Disruption tolerance networks
    • System redundancy

    2.3  Evaluate international laws and standards which govern data integrity and security

    • International laws such as:
    • UK Data Protection Act
    • Data Privacy Day (Council of Europe)
    • International standards such as:
    • ISO/PAS 28000:2007 (Supply Chain Standards)
    • ISO/IEC 27001:2013 and ISO/IEC 27002:2013 (Manage and protect information)
    • The Trusted Computing Group
    • The Payment Card Industry Data SecurityStandard

    3.0  Understand the impact of cyber security on procurement and supply

    3.1  Evaluate the term cyber security and its implications

    • Data security vs. data integrity
    • Supply Chain Cyber Security (SCCS)
    • Drivers for SCCS such as:
    • Cyber-terrorism
    • Malware
    • Data theft and the advanced persistent threat (APT)
    • Illegal access and changes to data
    • Vulnerabilities in software applications and networks discovered and exploited by malicious hackers
    • Counterfeit computer hardware
    • Typical activities for minimising SCCS risks such as:
    • Buying only from trusted vendors
    • Disconnecting critical machines from outsidenetworks
    • Educating users on the threats and protective measures they can take

    3.2 Assess data security technologies and their usage in the supply chain

    • Create completely secure system using a combination of software and hardware-based security
    • Software solutions:
    • Encrypt data to protect it from theft
    • Hacker could corrupt the data in order to make it unrecoverable, making the system unusable
    • Hardware solutions:
    • Can prevent read and write access to data and offer very strong protection against tampering and unauthorised access
    • Protects the operating system image and file system privileges from being tampered
    • Use strict and secure system administration policies:
    • Backups
    • Data masking
    • Data erasure

    View other modules

    Select a module below for more information:

     

    Choose three ELECTIVE module to make up the final 18 remaining credits.

    Page Loading
    Page Loading
    Page Loading
    Page Loading

    Searching...

    This may take up to 30 seconds