Are you entirely comfortable with information that appears

Assignment Help Management Information Sys
Reference no: EM131313478

Online self-audit email

Conduct an online self-audit and answer the questions in an "email" to your instructor. Write the email in the Word document.

Links for materials:

1. https://knowledgeenthusiast.com/2013/02/17/tools-personal-brand-online-reputation/

2. https://www.forbes.com/sites/susanadams/2013/03/14/6-steps-to-managing-your-online-reputation/#5d55524cc1ac

Module Paper

1. Conduct an online audit of yourself.

a. Search Google, Bing, and Yahoo.

i. If you have a Google account, search both logged in and logged out.

b. Search Facebook, LinkedIn, and Twitter.

c. Use at least 3 of the tools identified in the articles assigned for reading in this module.

2. Are you entirely comfortable with the information that appears? Will you use features such as Google Alerts? Why or why not?

3. Based on what you found in the audit, what actions can you take to remove unsuitable or irrelevant content? Can you remove it yourself by making changes to online profiles? If the information is on someone else's site, can you contact that person and ask for it to be removed?

4. What are three steps you can take to set up a professional presence online?

5. Review the privacy settings on your social networking profiles. What changes can you make to protect your information?

6. Summarize your answers in a proper and professional email addressed to your instructor in the space below.

TO:Nancy Martin

CC:

Subject:online self audit

Dear Dr. Nancy,

Reference no: EM131313478

Questions Cloud

Members to be from the investment community : Is it a good idea for PCOAB members to be from the investment community? Why or why not?
How reduced information costs in turn lower transaction cost : How do "Reduced information costs in turn lower transaction costs, thereby facilitating price discovery and enhancing market liquidity"?
Responsible for the success of the project : He explained further that, as manager, he was responsible for the success of the project, and so everyone would be equally to blame for the failure of the project.
Rewrite the longest common substring code as a class : Write a program that uses a brute force technique to find the longest common substring. Use the Timing class to compare the brute force method with the dynamic programming method. Use the program from Exercise 1 for your dynamic programming soluti..
Are you entirely comfortable with information that appears : Are you entirely comfortable with the information that appears? Will you use features such as Google Alerts? Why or why not? What are three steps you can take to set up a professional presence online?
What are information costs associated with financial assets : What are the information costs associated with financial assets?- Why do you think that for innovative financial products price discovery and liquidity could become impaired?
Interpret the implications of unethical behavior : Assume you are an instructor presenting an unethical case study to your graduate students. Develop a PowerPoint presentation on the person/business of your choice.
Which of the heuristics tendencies described : Think about the hundreds of decisions you made this week. Which of the heuristics (mental shortcuts) or tendencies described in Chapter 8 did you employ? Provide at least 3 examples.
Distinguish investment management from financial management : What distinguishes investment management from financial management?- What is the role of a discount rate in decision-making?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the important facts that you need to emphasize

Create a list that contains all the criteria that you and your team members have identified together. Then, from the list, select a set of criteria that your team will use to determine the viability of solutions. Explain each solution in reasonabl..

  Describe the difference between a vulnerability and threat

Describe the difference between a vulnerability and threat - Firewall vulnerability is explained in a structured manner in this response. The answer includes references used.

  Evaluate interface design models

Building an interface can be broken down into the phases of design and development. Analyze the activities that take place in both phases, and explain why certain activities should be included in design but not in development.

  Describe the key initiatives currently underway at ach

Identify and analyze at least four digital payment concerns Centervale Apparel might want to consider in light of what you have learned from NACHA.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Write a research report on ms dynamics erp systems

Microsoft Dynamics is a collection of popular ERP system used by many organizations. Dynamics offer five primary products, each includes one or more model.

  How a fence register is used for relocating a user program

What are some other modes of access that users might want to apply to code or data, in addition to the common read, write, and execute permission? If two users share access to a segment, they must do so by the same name. Must their protection rig..

  Describe about supply chain strategy

Supply Chain Strategy: Arizona Public Service Company - Explain how the supply chain strategy supports the overall strategy

  Examine the classifications of security controls

Examine the classifications of security controls (physical, administrative, and technical) and the types of security controls (preventive, detective, and corrective). Explain how these different types of controls are used to enforce security polic..

  Define and describe bell-lapadula and clark-wilson

Provide a description of the selected organization and touch points where data and databases exist to secure and guarantee integrity. Define and describe Bell-LaPadula and Clark-Wilson, and choose at least 1 other security model of your choice to de..

  Discuss how your selected strategy can be used in planning

Discuss how your selected strategy can be used in the planning (what do we need to do?) and programming (how will we do it?) phases of budget preparation to identify less costly solutions for implementing technical, operational, and management con..

  Define data and define information

Define data. Define information. Describe what knowledge is and how it is used to create technology systems.How does an information system increase a company's competitive position

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd