Browsing by Author "Van Wyk, Jana"
Now showing 1 - 1 of 1
Results Per Page
Sort Options
- ItemMitigating significant risks pertaining to the implementation of cognitive computing(Stellenbosch : Stellenbosch University, 2017-03) Van Wyk, Jana; Rudman, Riaan J.; Stellenbosch University. Faculty of Economic and Management Sciences. School of Accountancy.ENGLISH SUMMARY : Cognitive computing is recognised as the third era in the evolution of computing. This era is driven by the exponential growth in data, advances in enabling technologies and enterprise’s need to realise significant business value from data resources. The capabilities of cognitive computing creates significant and immediate opportunities for enterprises. The problem is that management are implementing cognitive computing systems without understanding the technology or the risks the enterprise are exposed. The aim of the research is therefore to identify and mitigate significant risks pertaining to the implementation of cognitive computing. The research aims to investigate cognitive computing, identify significant risks and recommend safeguards to mitigate these risks. A literature review was performed to provide a theoretical foundation for the research and focussed on cognitive computing, corporate governance, IT governance, data protection and the use of control frameworks to achieve effective governance. COBIT 5 was selected as the most appropriate control framework to identify significant risk. In order to identify the risks the core components of a cognitive computing system were identified and classified into specific phases based on their function within the cognitive computing system The research found that a cognitive computing system consists of consist of twelve core components and four phases The core components include: unstructured, semi-structured and structured data; data access, metadata, feature extraction, natural language processing and deep learning; corpus and advances analytics; and hypothesis generation and scoring, and machine learning. Based on the understanding of the core components, COBIT 5 was used to identify significant risks. Significant risks were identified at a strategic and operational or technological level. Risks at a strategic level involved inadequate governance and management, as well as insufficient human skills and resource management. Significant risks at an operational or technological level comprised of cost, privacy, security, scalability, integration, interoperability, veracity, ownership and life cycle risks. The research proceeded to formulate appropriate internal control techniques to mitigate the significant risks identified. The internal control techniques include establishing a cognitive computing strategies and policies, implementing human skills and resource controls, data controls, infrastructure controls, supplier controls and life cycle controls. The final product of the findings is a risk matrix, which maps the relevant core components with the significant risk which they introduce and a risk control matrix which maps the risk to the control technique which mitigates the risk.