Thursday, November 14, 2024

Study Planning & Exam Stretegy 1 for US CMA & CIA Students

 Study Planning & Exam Stretegy for US CMA & CIA students..


Unlock Success in Your US CMA / CIA Exams


Key to Success: Question Practice


Acquiring a firm grasp of required knowledge is crucial, but exam technique and revision strategy are equally vital.


Common Pitfalls to Avoid:


1. Not answering the question

2. Lack of understanding of underlying concepts

3. Simply writing numbers without analysis

4. Inadequate business sense

5. Ignoring question clues


Effective Exam Strategy:


1. Answer simple MCQs first; attempt all questions.. possible to attempt 35 to 40 MCQ in first hour.

2. Plan your approach; prioritize easiest questions.

3. Allocate time wisely; avoid overrunning.

4. Read requirements carefully; focus on key information.

5. Highlight key numbers and words; scribble notes.


Computational Questions:


1. Identify key numbers and information.

2. Jot down proformas and notes.

3. Plan your answer; allocate time.


Written (Essay) Questions:


1. Identify format and recipient.

2. Plan your answer; use titles and subtitles.

3. Address key areas; use formal or informal tone.


General Tips:


1. Spot easy marks; tackle independent parts first.

2. Practice questions under timed conditions.

3. Use GMSI resources: lectures, mock tests, audiovisual capsules.

4. Evaluate performance; focus on weak areas.


GMSI Support:


1. Tuesday (Fast Track Q. Mock Test)

2. Wednesday (Essay-Based Q. Mock Test)

3. Audiovisual Recorded Capsules with PDF Notes

4. Performance Evaluation Reports


Your Goal:


Attempt exam-standard questions confidently, to time, without supplementary help.


Practice Strategy:


1. Start with open-book help; gradually move to timed conditions.

2. Use retired exam questions; assess progress.

3. Identify areas for improvement.


Remember:


1. Attempt all questions.

2. Allocate time wisely.

3. Achieve 70% accuracy.


Best Wishes,


Prof. Mahaley

Head, GMSI Success, Mumbai

www.gmsisuccess.in

Tel 9773464206



Wednesday, November 13, 2024

How to crack MCQ section of CIA and US CMA Exam?

How to crack MCQ section of CIA and US CMA Exam?

CIA and US CMA students..must read this..


Key Takeaways:


1. Students struggle with interpreting and understanding questions.

2. Unfamiliarity with the scale and grading system.

3. Limited availability of proficient tutors familiar with CIA and CMA exams.

4. Dependence on Gleim, Becker, and Hock may not be enough.

5. Model questions on IIA and IMA websites are often routine and unhelpful.

6. Global authors and publishers' question banks may not adequately prepare students.


*Strategies to Overcome These Challenges:*


1. Acknowledge the presence of tricky, logical, and absurd questions (50% of exam papers).

2. Develop a different strategy to tackle these questions.

3. Focus on understanding the exam pattern, question types, and grading system.

4. Seek guidance from experienced tutors familiar with CIA and CMA exams.

5. Practice critical thinking, analytical skills, and problem-solving.

6. Encourage students to share and discuss challenging questions.


*Recommendations for Students and Tutors:*


1. Conduct workshops or webinars on exam strategy and question interpretation.

2. Create online forums or groups for students to share and discuss challenging questions.

3. Develop study materials focusing on critical thinking and logical reasoning.

4. Collaborate with experienced tutors to create customized study plans.

5. Encourage students to review and analyze their performance.


*GMSI Success Support:*


As a renowned institution, GMSI Success can:


1. Offer specialized coaching for CIA and CMA exams.

2. Provide access to experienced tutors familiar with the exams.

3. Develop customized study materials and practice questions.

4. Host workshops and webinars on exam strategy and question interpretation.


*Call to Action:*


Are you ready to take the challenge and develop a winning strategy for CIA and CMA exams?


Best regards,


Prof. Mahaley

Head, GMSI Success Mumbai

www.gmsisuccess.in

Tel 9773464206


In nutshell :


1. Identifies the challenges faced by CIA and CMA students.

2. Offers strategic recommendations for overcoming these challenges.

3. Highlights GMSI Success's expertise and support.

4. Encourages students and tutors to take action.

Sunday, August 2, 2020

Frameworks for tackling ethical dilemmas and evaluating the ethical considerations

Ethical Dilemmas in Business - [IMPORTANT TIPS] SmallBusiness.ng

If an organisation’s senior managers need to make strategic choices so that it can reach its targets, they will require control systems to guide it towards the intended destination. The risks that the organisation will face on that journey are numerous. A variety of control systems can be used to reduce those risks to an acceptable level, if not eliminate them. 
They include HR controls, whereby employees are properly trained and motivated to do the right things. They also include mission statements and corporate cultures and management styles. A  company’s internal code of conduct is another critical control system, but students must also understand the role of ethical codes in the management accountancy profession and how to use them to deal with the kinds of ethical dilemmas that many of them will inevitably face in their work.

There has been much academic discussion on how to formulate an ethical approach to solving such problems. This suggests that, if you want to determine whether a proposed course of action is ethical
or not, ask yourself how you’d feel if it were reported on the front page of this newspaper and became public knowledge. Would it cause you any embarrassment? Would it embarrass your employer or client, your family or friends, your fellow  professionals or the wider accounting community? If you think
it would, it may be that the plan is not ethical and needs to be reconsidered . Other useful frameworks include the “virtue test” (how would a virtuous person whom I look up to react in my situation?) and the so-called Biblical golden rule: do unto others as you would have them do unto you. Of particular relevance to management accountants is the social contract theory – ie, that accountants have a contract with society – given the emphasis that IFAC’s and CMA’s codes of ethics place on the duty of accountants to serve the public interest first and foremost. Again, this can be useful while assessing options in an ethical dilemma. When faced with any question on ethics, candidates should appreciate that any actions proposed to solve a dilemma must accord with the five fundamental principles laid down by CMA for the ethical conduct of its members and students. The principles – integrity, objectivity, confidentiality, professional behaviour and professional competence, and due care – are drawn from the IFAC code of ethics, which all accountancy bodies affiliated to IFAC use as the basis for their codes. An overall approach should first ensure that the solution is legal, bearing in mind all relevant regulations. Second, it should be in line with CMA’s fundamental ethical principles.

What is ethics?

Ethics is concerned with what society considers to be right or wrong. It therefore relates to standards of behaviour. At first this may appear to overlap with one purpose of law, in that law seeks to address behaviour of which society disapproves. However, ethical principles may be adopted that discourage behaviour that is undesirable but legal. For example, during the expenses scandal that arose in the UK in 2009 regarding claims for reimbursement by politicians, one politician responded to criticism by stating that she had done nothing illegal. This rather missed the point, as the general public may still regard legitimate expenses claims as inappropriate, and therefore unethical.

Ethics lacks the certainty usually provided by the law, as individuals may consider some things that are legal to be unethical. In turn, views on morality differ, so even when ethical principles are codified by professional bodies or commercial organisations, they may be regarded differently according to the moral principles of each individual.

Corporate codes of ethics

Corporate codes of ethics are published by private sector organisations in order to communicate their values and beliefs to stakeholders. These include:

  • customers, whose buying decisions may be influenced by ethical considerations
  • shareholders, whose investment decisions may be influenced by ethical factors
  • employees, who have to know the standards expected of them
  • suppliers, who need to understand the expectations of their customers and also that they will be treated ethically during the course of the commercial relationship
  • lobby groups, who may have specific interests in certain practices of the organisation
  • the community in which the organisation is situated, which may seek reassurance that the organisation will act in its interest as an employer and as a good ‘corporate citizen’.
  • Conflicts of interest arise from various sources. The accountant may be asked to:

    • take a decision on a matter in which the individual has a personal involvement, such as where the accountant has a family or personal relationship with the client
    • advise a company that is in direct competition with an existing client
    • support two clients who are in competition with one another.
    • Ethical dilemmas arise when the accountant has to consider two or more seemingly incompatible ethical obligations. For example:

      • he may be asked by a manager to remain silent about certain matters that would have an adverse impact on the financial accounts of an organisation, thereby testing the accountant’s loyalty to his manager on the one hand, and his responsibilities as a professional accountant on the other
      • he may consider that the policies of his employer are unethical and may find it difficult to reconcile personal values with those of the organisation
      • he may be advising a long-standing client who is also a personal friend, only to discover that one of the client’s family is behaving dishonestly, thereby playing the bond of friendship against the professional duty to give objective, truthful advice.


My suggested approach to answering questions on ethics comprises the following five steps:
1. Analyse the situation. Most ethics questions are presented as “A asks B to do C, which is in breach of D”. B will probably be you or someone who has come to you for advice and A will probably
be a senior manager or boss. You can take it that D is your institute’s ethical principles or some similar code of conduct that B should follow. As accountants, our codes of ethics always take precedence
over any corporate code that might apply to our status as an employee. There shouldn’t be a clash, but our professional codes come first if there is one.
2. Identify the ethical principles involved. Your main reference guide should be the code that governs your conduct as a CMA student and, hopefully, a future member. Most scenarios will cover a number of
ethical principles. Typically, these will involve confidentiality (are you being asked to disclose client information?), integrity (are you being asked to give false or misleading information?) or objectivity (are you under economic pressure from your boss or personal pressure from a friend or relative?)
3.  Identify the available courses of action. There will usually be more than one. Think widely – the more points you can make, the more marks you can earn, as long as your suggestions are practical.
4. Analyse the consequences of each option. Think clearly and logically about what the outcomes would be if you were to make the choices you have identified.
5.  Make your recommendation. If a report is called for, provide one. Even if it’s not specifically required, the report format can be a useful way to present your answer. And always remember the other golden rule: never recommend anything that will break the law or any of the fundamental
principles of CMA’s code of ethics

The IFAC Code offers a framework through which ethical dilemmas may be addressed.  When faced with ethical conflicts, the decision taker should consider:

  • the facts of the situation
  • the ethical principles involved
  • related fundamental principles
  • relevant internal procedures
  • the alternative courses of action
  • consequences of each alternative course of action.
  • Conclusions

    Ethics is not an easy subject but one that has become critically important in a business environment in which failure to adhere to proper standards can have a devastating effect on organisations, investors, suppliers, employees and, of course, customers. Looking back over the past 25 years, there have been several high-profile corporate scandals that have all involved the human ethical failings to some degree. They include Enron and WorldCom in the US, Parmalat in Italy and Maxwell Communications, Polly Peck and Barings Bank in the UK. Arguably, the revolution in information communications technology has meant that more people know about these issues, and more quickly than ever before, and that such events are nothing new. Perhaps this is one of the very reasons why professions must constantly reaffirm their commitment to ethical values and high standards of moral behaviour.

Sunday, July 12, 2020

What a Balanced Scorecard is......

7 Benefits of a Balanced Scorecard

A Balanced Scorecard—often abbreviated as “BSC”— is a strategy management framework that includes four perspectives of your strategy: Financial, Customer, Internal Process, and Learning and Growth.

You have a high-level goal in mind, which is your objective. The measures say, “How will I know that I’m achieving the objective?” (In other words, they allow you to see if you’re meeting your goals.) Then, the initiatives are put in place to answer the question, “What actions am I taking to accomplish the objective?” And finally, action items help delegate out small jobs that will allow you to complete your initiatives. Keep in mind, you may have multiple initiatives focused on improving your measures and achieving your objective. And, if your projects are not helping you improve in these areas, you may need to rethink your overall strategy.

There are many reasons why you should implement the Balanced Scorecard, but here is one way to look at it.

Your leadership team is responsible to some group of people: either stakeholders, shareholders, a board of directors, a council, citizens, etc. This depends entirely on the type of organization. In order to answer to this group, your team needs to ask two important backward- and forward-looking questions:

  1. How did we perform this past month, quarter, and year?
  2. How are we going to do next month, quarter, and year?

In order to answer these two broad questions, you need a management system that is able to look backward and forward (with leading and lagging indicators). You not only need to know today’s performance and measures and predict tomorrow’s performance, but you need to be able to demonstrate how your spending on strategic projects today will help you improve your impact in the future. The Balanced Scorecard is the closest management tool to a crystal ball as you will find.

The Balanced Scorecard is one of the best known strategy frameworks ever created. It's been used by thousands of organizations since the 1980s, when it was originally devised by Robert Kaplan and David Norton. It's also one of the first things you'll learn about on a business or management degree.

What is a balanced scorecard?

 

Here is an excerpt from the Kaplan and Norton book on The Balanced Scorecard:

 

“The balanced scorecard retains traditional financial measures. But financial measures tell the story of past events, an adequate story for industrial age companies for which investments in long-term capabilities and customer relationships were not critical for success. These financial measures are inadequate, however, for guiding and evaluating the journey that information age companies must make to create future value through investment in customers, suppliers, employees, processes, technology, and innovation.”

 

Simply put, The balanced scorecard is a fully integrated strategic management system. It is a way of measuring performance across an organization to monitor progress and set appropriate goals. It’s also a very effective tool in getting team members aligned. 

The Balanced Scorecard essentially calls for organizations to create a set of internal metrics that will help them to assess their business performance in 4 key areas (sometimes referred to as 'perspectives'):

Financial

Typical scorecard metrics might include cash flow, sales performance, operating income or return on equity.

Customer

With scorecard metrics such as: % of sales from new products, on-time delivery, net promoter score or share of wallet.

Internal Business Process

This would include measuring things such as: unit costs, cycle times, yield, error rates, etc.

Learning and Growth

Examples of metrics being: employee engagement scores, retention rates of high performing staff, skill increases of staff, etc.

Your ability to learn and grow will directly dictate your ability to better manage your internal processes. In turn, as your internal processes improve, this will have a positive impact on your customers as well as directly reducing your costs. The combined benefit of this lower cost/higher customer engagement in your product (essentially sales) will lead to your end goal, increased profit and financial return.

The Balanced Scorecard isn't really about distinct perspectives, it's about the layers of a pyramid. The pyramid when built up in the right order, leads to success. When implemented in this way, the Balanced Scorecard can be immensely powerful in helping your organization to:

  • Create a tangible road-map from the 'current state' to a more successful 'future state'.
  • Identify major roadblocks and areas where you lack the critical competencies to proceed to the next stage.
  • Articulate how your goals will directly help the organization to move upwards through the stages.
  • Prioritize business activities in the order they need to be tackled to allow the most rapid progression through the stages.
  • One of the most effective places where you can implement the balanced scorecard is in your strategic planning process. Arguably this is the first and most important step in full implementation of a Balanced Scorecard methodology, since it sets the foundation stones for everything that your organization will do going forward.
  • Regardless of which method you choose, you'll want to ensure that each of your perspectives has a good mix of Objectives (overall outcomes), Projects (specific things you're going to do) and KPIs (measures of success). You might find that your financial perspective has more KPIs than say your learning and growth perspective, and that's totally fine, but don't let any perspective be completely devoid of any of these types of goals!

Balanced Scorecard Foundation for Strategic Management of IS
Advantages of Balanced Scorecard within Your Business - Latest Quality

Sunday, June 28, 2020

System development life cycle (SDLC) for Organization's dynamic Growth

What is System Development Life Cycle?www.gmsisuccess.com

What is the Systems Development Life Cycle?

The system development life cycle is a long-term embedded concept in software engineering and in the world of Information Technology. A system is an information technology component (hardware, software, or a combination of the two). In software development, a component integrates with other software components to create a full-fledged system.
The  system development life cycle (SDLC), also commonly known as the application development lifecycle, is a multistep, iterative, and structured process that encompasses the activities of planning, analysis, designing, building, testing, deploying, and maintaining an information system. 
SDLC has been transformed to meet ever-changing needs in a complex atmosphere and under unique circumstances. When talking about an information system, we must recognize that it includes both hardware and software configurations, which is why the SDLC encompasses these two components and usually covers these 7 phases: planning, analysis, design, development, testing and integration, implementation, and maintenance. Additionally, it covers activities such as documentation and evaluation.

The essence of the system development life cycle is to deliver high-quality information systems that meet and/or exceed client expectations as they flow through pre-defined phases, within given timeframes and budget.

The system development life cycle is oftentimes confused with the software development lifecycle, but while they share remarkable similarities, the development of information systems is relatively more complex and robust in its overall architecture.

Given the complexity of the method, there are numerous methodologies out there that help manage and control the system development process. Among these methodologies, we can find Waterfall, Agile, rapid prototyping, incremental, and more.

The system development life cycle helps alleviate the complexity of developing a system information system from scratch, within a framework of structured phases that help shape the project and manage it easily.

It's important to have a system development life cycle in place because it helps transform an idea project into a functional and fully operational system. The SDLC, apart from covering the technical aspects of an information system’s development,also encompasses activities such as process and procedure development, change in management, user experience, policy development, impact, and conformity to security regulations.

Another important reason for leveraging a system development life cycle is to plan ahead of time and analyze the structured phases and goals of a specific software system project. Goal-oriented processes don’t follow a one-size-fits-all methodology; instead, they adapt and are  responsive to user needs, which is why it is important to have a well-defined plan to determine costs and staffing decisions, provide goals and deliverables, measure performance, and apply validation points at each phase of the life cycle to improve quality.

Main System Development Life Cycle Phases

As we covered before, the SDLC is used as a conceptual model that includes the procedures and policies necessary to develop or alter a system throughout a life cycle. The end result should be a high-quality system that meets or exceeds customer expectations and is within time and budget constraints. Generally, software development cycle presupposes 7 following steps:

  • Planning
  • Feasibility analysis
  • Product design
  • Coding
  • Implementation and Integration
  • Software Testing
  • Installation and Maintenance
  • 1. Planning

    It is the phase of brainstorming when specialists gather requirements and analyze all the aspects of a future software product. The developers should understand the clients’ requirements, namely, what exactly they want and what issues can occur in the development process. This stage involves communication between stakeholders, project team, and users.

    2. Feasibility analysis

    At this step, the project team defines the entire project in details and checks the project’s feasibility. The team divides the workflow into small tasks, so that developers, testers, designers, and project managers can evaluate their tasks. They define whether it’s feasible in terms such of cost, time, functioning, reliability etc.

  • 3. Software Design

    The software design is the major aspect of software development services cycle. Design should be creative and clear. It involves overall product design along with data structure and database design. Software designing uses many different strategies.

  • 4. Programming

    This is the critical phase of SDLC. A lot of brains work for coding and deliver the desired software. Usually, a company assigns a team of programmers for a particular project. The tasks are subdivided into sub-phases called Task Allocation, so every coder has their own task.

  • 5. Implementation and Integration

    Normally software contains a great number of programs, which require careful implementation and step-by-step integration of the software product. During this software stage, the project team checks whether the software product runs on various systems. In case of bugs, testers fix them.

    6. Software Testing

    After completing of coding, the software is sent to the testing department. The work of testers plays the crucial role for the quality of software and its performance. Quality Analysts test software using various test cases.  Before the launch, a product needs verification which includes software testing and debugging done by testers. When testing department ensured that software is error-free, it goes to the next stage.

  • 7. Installation and Maintenance

    Finally, the software is handed over to the clients to be installed on their devices. After the installation, if the client needs any modification, the product is to come under the maintenance process.

    The featured stages of software development procedure are followed by the majority of IT companies in order to provide high-quality services in the development of all sorts of software. SDLC can be shaped depending on the project requirements. Agile methodologies and Scrum offer the bigger amount of flexibility and cross-functional teams.


  • System Development Methodology

    There are numerous SDLC methodologies available and the real beauty in this sea of options lies in selecting the best System Development methodology for a unique project. Each system development methodology carries its characteristic set of pros and cons that must be weighed to assertively decide which one will yield the best results for an information system development project.

  • According to Techopedia, “various SDLC models have been created and can be implemented, including Waterfall, Rapid Prototyping, Incremental, Spiral, Fountain, Build and Fix, Synchronize and Stabilize, and Rapid Application Development (RAD)”. Next, we are going to list some of the most prominent SDLC methodologies available.

    • Waterfall: Known by many as the traditional methodology, Waterfall is a sequential and linear flow used to develop a system software application. In Waterfall, the process is outlined by a series of finite stages and each one must be fully completed before moving on to the next one. The Waterfall approach follows this order: requirements, design, execution, testing, and release.
  • Rapid application development (RAD): It is an adaptive approach that puts less emphasis on planning and more emphasis on an adaptive process. Oftentimes, prototypes are used in RAD to substitute design specifications. RAD is considered one of the most popular SDLC models for software that is driven by user interface requirements. From its origin, RAD was created as a response to the plan-driven Waterfall methodology that designs and builds things almost as structured as done with a building. RAD is all about fast prototyping and iterative delivery that falls into the parental category of Agile. 
  • Prototyping: This methodology creates prototypes of the software application to simulate the functioning aspects of a desired final product. Prototyping is mainly used to visualize components of the software solution to ensure the final product meets customer requirements.  There are several variants of prototyping but they are mainly categorized into throwaway and evolutionary. Throwaway prototyping creates a model that will eventually be discarded and evolutionary prototyping refers to a robust prototype that will be constantly refined to reach its final version. 
  • Spiral: The spiral methodology can be thought of as a combination of the Waterfall methodology and the prototyping methodology. It is typically the methodology of choice for large and complex projects because it uses the same stages as the Waterfall methodology but it separates them into planning, risk assessment, and prototype building.
  • Agile: The iterative and incremental methodology recognized for excellence, Agile is a framework that evolves through collaboration between teams. It is a dynamic and interactive methodology that works in sprints with a defined duration to produce lightweight deliverables that help reduce the time in which software is released. It advocates for adaptive planning, evolutionary development, early delivery, continuous improvement, and rapid and flexible responsiveness to changes.
  • Iterative and incremental: The iterative and incremental methodology is designed to overcome any fault or shortcoming of the Waterfall methodology. The iterative and incremental methodology begins with initial planning and ends with the deployment of the solution, with cyclic interaction in between. In essence, it develops a software application via iterative and repeated cycles that are performed incrementally so developers can learn from the development of previous portions of the software.
  • V model: This methodology is considered an extension of the Waterfall methodology, but instead of flowing down in a linear way, the steps are designed upward to form a V shape. In this methodology, the relationships between each phase of the development life cycle are associated with a testing phase. The horizontal and vertical axes display the time or project completeness (left to right) and abstraction level (coarsest-grain abstraction).

These methodologies can be combined to build a hybrid solution that better meets a specific project’s requirements. Usually, organizations rely on the expertise provided by System Analysts to decide and select the best methodology or combination of methodologies to use for a specific project. In the following section, we are going to explore the System Analyst role and how their valuable skill set has become a key component in the success of effective System Development Life Cycle projects.

SDLC- System Development Life Cycle | Systems development life ...

Tuesday, June 9, 2020

How Blockchain Works?

5 Ways Blockchain Technology Will Change the Way We Do Business
www.gmsisuccess.com

Blockchain, sometimes referred to as Distributed Ledger Technology (DLT), makes the history of any digital asset unalterable and transparent through the use of decentralization and cryptographic hashing.  

If you have been following banking, investing, or cryptocurrency over the last ten years, you may be familiar with “blockchain,” the record-keeping technology behind the Bitcoin network. And there’s a good chance that it only makes so much sense. In trying to learn more about blockchain, you've probably encountered a definition like this: “blockchain is a distributed, decentralized, public ledger."

“Blocks” on the blockchain are made up of digital pieces of information. Specifically, they have three parts:

  1. Blocks store information about transactions like the date, time, and dollar amount of your most recent purchase from Amazon. (NOTE: This Amazon example is for illustrative purchases; Amazon retail does not work on a blockchain principle as of this writing)
  2. Blocks store information about who is participating in transactions. A block for your splurge purchase from Amazon would record your name along with Amazon.com, Inc. (AMZN). Instead of using your actual name, your purchase is recorded without any identifying information using a unique “digital signature,” sort of like a username.
  3. Blocks store information that distinguishes them from other blocks. Much like you and I have names to distinguish us from one another, each block stores a unique code called a “hash” that allows us to tell it apart from every other block. Hashes are cryptographic codes created by special algorithms. Let’s say you made your splurge purchase on Amazon, but while it’s in transit, you decide you just can’t resist and need a second one. Even though the details of your new transaction would look nearly identical to your earlier purchase, we can still tell the blocks apart because of their unique codes.
A QUICK OVERVIEW
  1. Digital assets are distributed instead of copied or transferred.
  2. The asset is decentralized, allowing full real-time access.
  3. A transparent ledger of changes preserves integrity of the document, which creates trust in the asset.

How Does Blockchain Work?


The whole point of using a blockchain is to let people — in particular, people who don't trust one another — share valuable data in a secure, tamperproof way.

Blockchain consists of three important concepts: blocks, nodes and miners.

How Blockchain Works

When a block stores new data it is added to the blockchain. Blockchain, as its name suggests, consists of multiple blocks strung together. In order for a block to be added to the blockchain, however, four things must happen:

  1. 1. A transaction must occur. Let’s continue with the example of your impulsive Amazon purchase. After hastily clicking through multiple checkout prompt, you go against your better judgment and make a purchase. As we discussed above, in many cases a block will group together potentially thousands of transactions, so your Amazon purchase will be packaged in the block along with other users' transaction information as well.
  2. 2. That transaction must be verified. After making that purchase, your transaction must be verified. With other public records of information, like the Securities Exchange Commission, Wikipedia, or your local library, there’s someone in charge of vetting new data entries. With blockchain, however, that job is left up to a network of computers. When you make your purchase from Amazon, that network of computers rushes to check that your transaction happened in the way you said it did. That is, they confirm the details of the purchase, including the transaction’s time, dollar amount, and participants. (More on how this happens in a second.)
  3. 3. That transaction must be stored in a block. After your transaction has been verified as accurate, it gets the green light. The transaction’s dollar amount, your digital signature, and Amazon’s digital signature are all stored in a block. There, the transaction will likely join hundreds, or thousands, of others like it.
  4. 4. That block must be given a hash. Not unlike an angel earning its wings, once all of a block’s transactions have been verified, it must be given a unique, identifying code called a hash. The block is also given the hash of the most recent block added to the blockchain. Once hashed, the block can be added to the blockchain.

Blockchain vs. Bitcoin

  1. The goal of blockchain is to allow digital information to be recorded and distributed, but not edited. That concept can be difficult to wrap our heads around without seeing the technology in action, so let’s take a look at how the earliest application of blockchain technology actually works.

    Blockchain technology was first outlined in 1991 by Stuart Haber and W. Scott Stornetta, two researchers who wanted to implement a system where document timestamps could not be tampered with. But it wasn’t until almost two decades later, with the launch of Bitcoin in January 2009, that blockchain had its first real-world application.

    The Bitcoin protocol is built on the blockchain. In a research paper introducing the digital currency, Bitcoin’s pseudonymous creator Satoshi Nakamoto referred to it as “a new electronic cash system that’s fully peer-to-peer, with no trusted third party.”

KEY TAKEAWAYS

    • Blockchain technology underlies cryptocurrency networks, and it may also be used in a wide variety of other applications as well.
    • Blockchain networks combine private key technology, distributed networks and shared ledgers.
    • Confirming and validating transactions is a crucial function of the blockchain for a cryptocurrency.
    Making sense of bitcoin and blockchain: PwC










Saturday, June 6, 2020

Progression of Data, from data to information to knowledge to insight to action

Data, information, content and knowledge: from input to value
Progression of Data, from data to information to knowledge to insight to action:

The Data-Information-Knowledge-Wisdom (DIKW) hierarchy, or pyramid, relates data, information, knowledge, and wisdom as four layers in a pyramid. Data is the foundation of the pyramid, information is the next layer, then knowledge, and, finally, wisdom is the apex. DIKW is a model or construct that has been used widely within Information Science and Knowledge Management. Some theoreticians in library and information science have used DIKW to offer an account of logico-conceptual constructions of interest to them, particularly concepts relating to knowledge and epistemology. In a separate realm, managers of information in business process settings have seen the DIKW model as having a role in the task meeting real world practical challenges involving information.


Data is conceived of as symbols or signs, representing stimuli or signals. Information is defined as data that are endowed with meaning and purpose. Knowledge is a fluid mix of framed experience, values, contextual information, expert insight and grounded intuition that provides an environment and framework for evaluating and incorporating new experiences and information. It originates and is applied in the minds of knowers. In organizations it often becomes embedded not only in documents and repositories but also in organizational routines, processes, practices and norms. Wisdom is the ability to increase effectiveness. Wisdom adds value, which requires the mental function that we call judgment. The ethical and aesthetic values that this implies are inherent to the actor and are unique and personal.
Knowledge Pyramid, Wisdom Hierarchy and Information Hierarchy are some of the names referring to the popular representation of the relationships between data, information, knowledge and wisdom in the Data, Information, Knowledge, Wisdom (DIKW) Pyramid.
Like other hierarchy models, the Knowledge Pyramid has rigidly set building blocks – data comes first, information is next, then knowledge follows and finally wisdom is on the top.
Each step up the pyramid answers questions about the initial data and adds value to it. The more questions we answer, the higher we move up the pyramid. In other words, the more we enrich our data with meaning and context, the more knowledge and insights we get out of it. At the top of the pyramid, we have turned the knowledge and insights into a learning experience that guides our actions.

The DIKW pyramid (Source: Soloviev, K., 2016). | Download ...



Information is the next building block of the DIKW Pyramid. This is data that has been “cleaned” of errors and further processed in a way that makes it easier to measure, visualize and analyze for a specific purpose.
Depending on this purpose, data processing can involve different operations such as combining different sets of data (aggregation), ensuring that the collected data is relevant and accurate (validation), etc. For example, we can organize our data in a way that exposes relationships between various seemingly disparate and disconnected data points. More specifically, we can analyze the Dow Jones index performance by creating a graph of data points for a particular period of time, based on the data at each day’s closing.
By asking relevant questions about ‘who’, ‘what’, ‘when’, ‘where’, etc., we can derive valuable information from the data and make it more useful for us.
But when we get to the question of  ‘how’, this is what makes the leap from information to Knowledge
“How” is the information, derived from the collected data, relevant to our goals? “How” are the pieces of this information connected to other pieces to add more meaning and value? And, maybe most importantly, “how” can we apply the information to achieve our goal?
When we don’t just view information as a description of collected facts, but also understand how to apply it to achieve our goals, we turn it into knowledge. This knowledge is often the edge that enterprises have over their competitors. As we uncover relationships that are not explicitly stated as information, we get deeper insights that take us higher up the DIKW pyramid.
But only when we use the knowledge and insights gained from the information to take proactive decisions, we can say that we have reached the final – ‘wisdom’ – step of the Knowledge Pyramid.

Wisdom

Wisdom is the top of the DIKW hierarchy and to get there, we must answer questions such as ‘why do something’ and ‘what is best’. In other words, wisdom is knowledge applied in action.
We can also say that, if data and information are like a look back to the past, knowledge and wisdom are associated with what we do now and what we want to achieve in the future.


Data

  1. information, often in the form of facts or figures obtained from experiments or surveys, used as a basis for making calculations or drawing conclusions
  2. information, for example, numbers, text, images, and sounds, in a form that is suitable for storage in or processing by a computer

Information

  1. definite knowledge acquired or supplied about something or somebody
  2. the collected facts and data about a particular subject
  3. a telephone service that supplies telephone numbers to the public on request.
  4. the communication of facts and knowledge
  5. computer data that has been organized and presented in a systematic fashion to clarify the underlying meaning
  6. a formal accusation of a crime brought by a prosecutor, as opposed to an indictment brought by a grand jury

Knowledge

  1. general awareness or possession of information, facts, ideas, truths, or principles
  2. clear awareness or explicit information, for example, of a situation or fact
  3. all the information, facts, truths, and principles learned throughout time
  4. familiarity or understanding gained through experience or study

Wisdom

  1. the knowledge and experience needed to make sensible decisions and judgments, or the good sense shown by the decisions and judgments made
  2. accumulated knowledge of life or in a particular sphere of activity that has been gained through experience
  3. an opinion that almost everyone seems to share or express
  4. ancient teachings or sayings
KM Pyramid Adaptation - DIKW pyramid - Wikipedia | Knowledge ...