The Self-Fulfilling Prophecy Of Intelligent Automation

Today’s need for automation is real and is not going away. It is undeniable that the intelligent automation market is going through a rapid democratisation process and societies we live in are somehow more inclined to coexist with virtual cognitive workers. The end-goal of automation is no longer perceived as a Kafkaesque nightmare of unpredictable and uncompromising robots.

By Ralph Aboujaoude Diaz.

From automation that just “execute” (data centre automation to robotic process automation) to automation that “think” and “learn” (autonomics, cognitive computing and ultimately the holy grail of true artificial intelligence), the intelligent process automation market is growing at fast pace and in an orchestrated manner. This market is now projected to exceed $US40 billion by the year 2020. 

Three major indicators are, slowly but surely, reinforcing the belief that intelligent automation will be part of our future:

  • Near-confirmation of expectations due to increased knowledge and education of stakeholders (positively or negatively affecting the intention to use intelligent automation).
  • Substantial increase in adoption (driven by more industrialised, content-based and cost-effective deployment).
  • Perceived immediate and future usefulness (based on more compelling use cases, success stories and market trends).

The next-generation business ecosystem is naturally emerging due to a societal and technological shift towards more acceptance and usage of automation. The constant quest for more intelligent automation will be a promising and rewarding journey but without any doubt a tumultuous a complicated one…

Getting the right intelligent automation strategy supported by appropriate technologies will need proper thinking and planning. Will intelligent automation just serve specific purposes and contexts (running processes that require extensive “swivel-chair” access to multiple existing systems or increasing cognitive capabilities in targeted sub-processes) or will it be used to holistically and gradually transform the workforce environment across the organisation?

Building commitment from senior leadership towards large scale adoption of intelligent automation will be a long journey. Let’s be realistic here, there is still a long way before knowledge-based virtual workers can accurately start to gather unstructured data without pattern, process rules based on dynamic languages and ultimately make complex judgements. 

There is no doubt that in order to be successful and widely adopted, the intelligent automation journey should be considered as a strategic initiative. But how to convince and get the buy-in when benefit realisation plans are difficult to determine because too many variables are involved and unknown?

Overcoming cultural resistance to automation and managing the change will require planning, discipline, and effective communication. Don’t underestimate the business technophobia and operational fatigue that has been built up during the long and tedious IT and Business transformation years. Some form of IT literacy and skills will be required in order to assimilate and embed intelligent automation.

From an IT perspective, will IT functions feel that intelligent automation is another burdensome project that will stretch resources and create additional maintenance and support activities? 

In addition to key drivers such as end-to-end process optimisation, real-time data-driven insights or risk and compliance intelligence, cost reduction will remain the primary driver for investing in intelligent automation. It is evident for example that the targeted adoption of RPA will bring tangible cost reduction but how advanced intelligent automation as a whole will actually create business value and boost agility?

There will be non-negligible security concerns regarding the risk of the entire intelligent automation environment being vulnerable to internal or external data breaches and potential data manipulation. Now that intelligent automation is actually increasing the level of digitisation and networking, how to ensure that the intelligent automation environment is reliable, secured and cannot be tampered by intentional fraudulent cyber activities (accessing the robot controller to re-calibrate processing logic and sequences, altering master data or extracting data logs, etc.)

Significant co-investment between organisations and service providers for defining and aligning intelligent automation strategies will be the norm. Money will be spent on preparing business cases, running proof of concepts, determining how to scale up the pilot and defining target operating models. Offering large discounts, putting fees at risk and defining value-based revenue will be common practices. But one thing is sure is that intelligent automation tool providers will be the big winners!

There is no doubt that established service providers (the likes of IBM, Accenture, Cognizant, TCS, Wipro, etc.) have built extensive intelligent automation capabilities via accelerated development of proprietary technology (Watson, Holmes, Trizetto, ignio, etc.) or strategic alliances with mature off-the-shelf technology vendors (IPSoft, SyntBots, etc.). In addition to that, an HfS survey has revealed that almost half of organisations (buyers) want to roll out intelligent automation with their existing service providers. 

The unanswered question of resource reallocation mechanisms needs to be addressed in a holistic and procedural manner. Training future employees and re-training current ones will be a significant challenge. But how will the resource reallocation process will actually be executed and who will pay for it? Will it be easy to reallocate a resource to another existing function/ process by “augmenting” skills? Or convert an accounting data entry/ reconciliation person into a virtual agent calibrator or a data insight curator?

IDM:     Ralph Aboujaoude Diaz is Senior Manager, Risk Transformation Services, EY UK.

 

« How Easy Would It Be To Hack Your Business?
The Dilemma Of Predictive Policing »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

Coana

Coana

Coana helps software teams tackle the flood of alerts from traditional SCA tools. Using advanced reachability analysis, Coana cuts false alerts by over 80%, freeing up significant engineering time.