An enterprise has developed a new digital strategy to improve fraud detection. Which of the following is MOST important to consider when updating the information architecture?
A. The business use cases supporting the digital strategy
B. Changes to the legacy business and data architectures
C. The history of fraud incidents and their root causes
D. Resource constraints related to implementing the digital strategy
A. The business use cases supporting the digital strategy
B. Changes to the legacy business and data architectures
C. The history of fraud incidents and their root causes
D. Resource constraints related to implementing the digital strategy