Main
Log in

Guy Cranswick

info@ibrs.com.au

Guy Cranswick was an IBRS advisor between 2002 - 2017 who covered Google (Apps and Search), broadband/NBN, Web 2.0 technology, government and channel strategy, including areas of business productivity. Guy had worked in the UK and France as Strategy Manager for Initiative Media and director of European operations for Modem Media (Poppe Tyson), the first online marketing and development company. In Australia, Guy was Senior Analyst at both Jupiter Communications and GartnerG2 covering online technologies and strategy in Asia-Pacific. He has published analytical articles in business and technology media, including the AFR, and was the winner of the Australian Institute of Management 2003 essay prize on the topic of corporate communications.

Conclusion: Proficiency in financial analysis and concepts is critical for management. Assessment of an organisation’s skills establishes the requirements necessary to raise abilities. The financial maturity model can assist with the process of setting those requirements.


Register to read more...


Conclusion: moving to an activity based working (ABW) environment is a complex multifactor project. Organisations can take stock of their readiness to approach activity based working by using the maturity model. The model will assist in developing the planning criteria required for any ABW strategy.


Register to read more...


Conclusion: the key factor in the selection of a CRM vendor should be the duration in which the product will be in service. The time in service period could be up to a seven year horizon and therefore durability is a critical condition in order to make a selection. This recommendation counts equally for vendor abilities as it does for an organisation’s requirements.


Register to read more...


Conclusion: ITIL Change Management is insufficient for CRM Governance – an organisational change is needed. As with all complex management jobs, governance for CRM projects should be divided into sets and subsets. By dividing the tasks it is easier to view each set or phase. By combining them into larger groups and modules it is feasible to gain an overview of how the parts fit together.


Register to read more...


Conclusion: Some organisations succeed at innovation better than others. To do so requires insight and an ability to understand how an organisation can function differently.

Innovation requires fresh thinking and different approaches. It demands attention on the value chain and business process in order to develop alternatives that will solve old issues.


Register to read more...


Conclusion: Big Data and the promise of unlocking greater revenues and better productivity is perceived as the next technology wave. No barrier exists for any business of any size accessing Big Data solutions.


Register to read more...


Conclusion: Productivity is one of management’s major objectives. This is generally understood but not always executed. As an enabler of organisational functions and productivity, IT needs a precise understanding of the concept in order to fulfil organisational productivity.


Register to read more...


Conclusion: Financial models provide insights and support better understanding. Using the right model depends on a thorough knowledge of its output and what it means. A powerful and valid model must have currency outside IT.


Register to read more...


Conclusion: There are several established models which have been used to evaluate technology investments. Some models are applied to assess the value of technology in use within an organisation.

Organisations can select a model for a particular need; however it is fundamental that the assumptions and the factors that construct the model are realistic and clearly understood. Furthermore, the models should be comprehended by other departments within an organisation, such as finance. A model that is only applied within, and solely has merit for IT is generally not an altogether useful tool. The outputs and the inferences drawn from these outputs may not convince other parties if the tool is not compatible to cross-department interpretation.


Register to read more...


Conclusion: The IBRS technology investment model only assesses costs. It shows costs in net present value terms and can also compare those costs with a typical total cost of ownership calculation. It does not measure so-called benefits or other intangible features of a product. Its principal aim is to reveal what an investment will cost over its duration and to do that as thoroughly as all the data available will allow. In addition the model can be customised and work with different data sets.


Register to read more...


In the News

AMP does maths on infosec shortage - ITnews - 18th June 2018

Cyber security and risk advisor at analyst firm IBRS, James Turner, said the cyber skills shortage was prompting a wider rethink around the domain in terms of resourcing for the last few years....
Read More...

How Australia must use the PageUp data breach to become stronger - AFR - 18th June 2018

PageUp People, a successful Australian software-as-a-service vendor, has been the victim of a crime , with a data breach that could be extremely damaging for its prospects . There are two lessons...
Read More...

The three cyber security challenges Australian businesses can't ignore - AFR - 6 May 2018

Australian businesses currently face a cyber security triple threat that has nothing to do with warding off hackers. Rather there are three new regulatory forces impacting specific points of the...
Read More...

OAIC report reveals 63 data breach notifications in first six weeks of NDB scheme - AFR - 11 April 2018

More than 60 data breaches have been reported in the first six weeks of the country's new Notifiable Data Breach (NDB) scheme, with healthcare providers making up almost a quarter of the mandatory...
Read More...

New data breach notification scheme will be a barometer for business maturity - AFR -12 March 2018

Do not mistake cyber security for being merely a technical discussion about IT problems to be fixed. Cyber security is now, and always has been, purely a response to risk. The risks have changed...
Read More...

Subscribe to IBRS Updates

Invalid Input
Invalid Input
Please enter a valid email address
Please enter your mobile phone number
Invalid Input

Get in-context advice from our experts about your most pressing issues or areas of interest

Make an Inquiry

Sitemap

Already a subscriber?

Login to read your premium content.

        Forgot your password?
Recently Viewed Articles