Describe how the given companies are using electronic media

Assignment Help Management Information Sys
Reference no: EM131434030

Assignment: Computer Essentials Research Report

Conduct research using the CSU Online Library to find at least two articles on a company that heavily uses electronic media and e-mail. You may need to visit the company's website policy page or other sources, in addition to the library article, in order to provide a complete response to the points listed below. For example, using the search terms "Starbucks social media campaign" in an internet search engine such as Google.com, Yahoo.com, or Bing.com will return results of several articles discussing Starbucks' use of social media. Searching for "Starbucks security breach" returns several articles discussing vulnerabilities and electronic security challenges the company has faced. Additionally, if you visit the Starbucks website, they have a link to their privacy policy on the bottom of the page. Write a report of your findings that is at least three pages in length in a Word document to address the following:

Briefly introduce the company you have chosen to research.

- Summarize the two articles you found in the CSU Online Library.
- Describe how these companies are using electronic media and e-mail.

o Are they using electronic media and e-mail in their daily operations, media campaigns, customer relations, or other ways? Are any of their uses groundbreaking or novel?

o What types of media are they using? Who is their audience?

o How do they mitigate and respond to security threats in using electronic media and e-mail? What about security issues faced by their customers?

Your paper must use APA style guidelines and include a title, abstract, and reference page. Be sure to list all sources in the reference page and use in-text citations where appropriate. The title, abstract, and reference pages are not included in the required minimum page length.

Reference no: EM131434030

Questions Cloud

Demand curves that inelastic and elastic : Define Elasticity and provide a graphical representation of demand curves that inelastic and elastic.
Different degrees of price discrimination used differently : What is Price Discrimination? How are the different degrees of Price Discrimination used differently?
Change in a firm total fixed cost of production : Explain why a change in a firm's total fixed cost of production will shift its average total cost curve, but not its marginal cost curve.
Dealer bank credits the dealer account : The Federal Reserve purchases $10 million in U.S. Treasury bonds from a bond dealer, and the dealer's bank credits the dealer's account. The required reserve ratio is 15%, and the bank typically lends any excess reserves immediately.
Describe how the given companies are using electronic media : Summarize the two articles you found in the CSU Online Library. Describe how these companies are using electronic media and e-mail. What types of media are they using? Who is their audience?
Explain inconsistencybetween customer satisfaction scores : A reputable hospital has high quality ratings from patient satisfaction surveys but is still losing market share. For many years, health care organizations, as well as traditional businesses, have been frustrated that high customer satisfaction sc..
How the film you select reflects that reason : Early Asian American filmmakers made films for a number of reasons - Describe one of those reasons and show how the film you select reflects that reason.
What caused the recent financial crisis : What caused the recent financial crisis and what do you think should be done to prevent it recurring in the future?" The essay should be more than 1450 words.
Dealer bank credits the dealer account : The Federal Reserve purchases $10 million in U.S. Treasury bonds from a bond dealer, and the dealer's bank credits the dealer's account. The required reserve ratio is 15%, and the bank typically lends any excess reserves immediately.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Technical evaluation methodology information

Select one of the security technologies you identified in either P1 or P2. Research and evaluate its capabilities, costs, maintenance requirements, flexibility, and feasibility for implementation. Use the technical evaluation methodology informatio..

  Articles on health information security

Articles on Health Information Security - The solution shows three articles with brief abstract and links about the security of health information.

  How it might relate to your everyday life

describe, in your own words, why the issue is important to you and how it might relate to your everyday life and Describe how you feel about the issue

  Determine sequence that will minimize total completion time

Six jobs are to be processed through a two-step operation. - Determine a sequence that will minimize the total completion time for these jobs. Illustrate graphically.

  How it has transformed current business practices

Think of an organization or industry that you are familiar with. Name at least one recent change in technology, and describe how it has transformed current business practices

  Converting from fahrenheit to celsius

Converting from Fahrenheit to Celsius

  How the hackers are able to hack into computers

Choose one of the five categories and conduct an Internet search to find out how common your chosen group is and how the hackers are able to hack into computers.

  What is groupthink and how can it be avoided

What is groupthink, and how can it be avoided? Why are team decisions reached by consensus generally better than those reached by majority rule?

  Benefits of computers without risking harms to social good

In what ways do these enhanced capacities have the potential to benefit and harm the social good?

  Discussion - creating objects

Write a 200- to 300-word short-answer response to the following: Using the example of your choice (i.e, a car, a bicycle, a puppy), explain how you would structure an object based on its attributes and behaviors

  Explain how the system could be verified as operational

Describe the series of malicious events that led up to the incident. Identify who needs to be notified based on the type and severity of the incident. Outline how the incident could be contained.

  Global operations management sample questiona why is

global operations management sample questiona. why is effective operations management vital for a global

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd