Briefly introduce the company you have chosen to research

Assignment Help Management Information Sys
Reference no: EM131433929

Computer Essentials Unit V Research Report

Conduct research using the CSU Online Library to find at least two articles on a company that heavily uses electronic media and e-mail. You may need to visit the company's website policy page or other sources, in addition to the library article, in order to provide a complete response to the points listed below. For example, using the search terms "Starbucks social media campaign" in an internet search engine such as Google.com, Yahoo.com, or Bing.com will return results of several articles discussing Starbucks' use of social media. Searching for "Starbucks security breach" returns several articles discussing vulnerabilities and electronic security challenges the company has faced. Additionally, if you visit the Starbucks website, they have a link to their privacy policy on the bottom of the page. Write a report of your findings that is at least three pages in length in a Word document to address the following

- Briefly introduce the company you have chosen to research.
- Summarize the two articles you found in the CSU Online Library.
- Describe how these companies are using electronic media and e-mail

o Are they using electronic media and e-mail in their daily operations, media campaigns, customer relations, or other ways? Are any of their uses groundbreaking or novel?

o What types of media are they using? Who is their audience?

o How do they mitigate and respond to security threats in using electronic media and e-mail? What about security issues faced by their customers?

Your paper must use APA style guidelines and include a title, abstract, and reference page. Be sure to list all sources in the reference page and use in-text citations where appropriate. The title, abstract, and reference pages are not included in the required minimum page length.

Reference no: EM131433929

Questions Cloud

What is the most important aspect of community policing : As a backlash, the professional model, which reflects a "we are the experts and you are not" attitude, alienated the police from the public. Problems and crime kept growing, and people wanted to be more involved in their communities. Therefore, co..
What is the value of supply chains : Create your own personal supply chain in graph form. Consider both who supplies you and who you supply. You may use the Excel spreadsheet tool provided in this week's lesson or develop your chart using other software such as PowerPoint, Word or Proje..
How are prices determined under perfect competition : How are prices determined under perfect competition? Think about a firm that you have done business with recently. To what industry does this firm belong? For example, McDonald's is a firm in the fast food industry.
The toy industry is very fickle and innovation is critical : The toy industry is very fickle and innovation is critical. Sales for January 2017 showed only a 3% rise over January 2016 leaving the company managers concerned about meeting projected sales targets for 2017.  increase sales unrelated to NASA toys b..
Briefly introduce the company you have chosen to research : Briefly introduce the company you have chosen to research. Summarize the two articles you found in the CSU Online Library. Describe how these companies are using electronic media and e-mail
Discuss about the cost of the prevention strategy : You have been working at the Wayne County probation office for approximately 6 months now. Your supervisor has given you your 6-month employment evaluation, which was excellent. As a result, your supervisor has informed you that he is to choose on..
How elastic the demand for a product is : Characteristics that Determine Elasticity, presents 4 characteristics that determine how elastic the demand for a product is. List each of these. For each one explain and write a separate paragraph for each.
Explain critical requirements of audit for your organization : Identify critical requirements of audit for your chosen organization and explain why you consider them to be critical requirements. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organizatio..
Transform an organization from batch-and-queue material : Apply this method as an analog to the methods that the authors of The Lean Turnaround present to transform an organization from batch-and-queue material and information processing (conventional management) to flow (TPS/Lean management)

Reviews

Write a Review

Management Information Sys Questions & Answers

  Find necessary equipment from vendors to upgrade computers

The department store needs you to upgrade the four computers. Find the necessary equipment from online vendors to upgrade the computers.

  Search web for the leading providers of rfid technologies

Search the Web for the leading providers of RFID technologies. What companies did you find? Does one seem to stand out above the rest? If so, which is it?

  Differentiate between security policies and standards

Describe and differentiate between security policies, standards, and guidelines. Discuss how these security policies, standards, and guidelines will be used in your semester project.

  Develop a statement of work for the project

Develop a statement of work for the project, using the format of (1) background, (2) task, (3) objectives, (4) approach, and (5) input source.Next, create a Work Breakdown Structure for the project. What are the key steps, including work packages,..

  Analyze current european and united states industry standard

Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea.

  Which of six major functional areas apply to this network

Apply the concept of Cisco Enterprise Architecture to the new network design. Which of the six major functional areas apply to this network? Draw a diagram similar to the figure in the textbook in Chapter 3 that illustrates the use of the Cisco En..

  Is typesdifferenciate the differente types of information

is typesdifferenciate the differente types of information systems including the rea model analize the relationship

  Supply chain challenges for nestlewhat do you think are the

supply chain challenges for nestlewhat do you think are the top 3 challenges the supply chain function faces in a

  The key characteristics of a good network storage backup

Describe the following for your manager: The key characteristics of a good network storage backup policy Of the various data recovery solutions available, which would best fit your data recovery needs?

  Comparing the communication strategies of the facebook pages

Comparison Report. Write a 3 to 4 page report comparing the communication strategies of the Facebook pages of two of the following companies: McDonald's, Burger King, J C Penney, Kohl's

  What design option would best suit the needs of organization

What is the best technology to deploy to quickly detect and take action on a DoS attack once it starts - What design option would best suit the needs of the organization

  Human factor in technologywhat is understand by the human

human factor in technologywhat is understand by the human factor and why is this important in considering the impact of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd