Reference no: EM13841628
Task
Team Data Analysis & Presentation
Purpose
The purpose of this task is for students to work in a team to investigate and evaluate a range of social media metrics and analytic approaches informing recommendations towards an organisation's social media strategy.
Learning Outcomes
The following learning outcomes are reinforced in the completion of this task: K1, K2, K4, S1, S2, A1 and A2.
Requirements
Students are required to work in a team of approximately 4 to 6 members. Each team will select an organisation (see list below), identify, evaluate and make recommendations regarding appropriate social media metrics, analytics tools, and potential data mining approaches.
Each team will be required to submit a written report presenting the analysis and findings in relation to recommended social intelligence approaches. Each team member is to write a section of the report (approximately 500 words per team member).
Each team will also be required to deliver approximately 10 minute oral presentation to the class, summarising the findings of their analysis and recommendations.
Analysis of metrics should take into account aspects like: definition, purpose, information generated, usefulness, benefits, shortcommings etc. Evaluation and recommendations should take into account the type of organisation, the social media presence of the organisation and the social media goals of the organisation etc.
Students may like to select from the following metrics and tools in relation to their selected organisation (or come up with their own selections as appropriate):
• metric measures e.g. number of followers or friends, number of posts, number of comments, number of comments per post, net promoter score, ROI
• social media analytics and monitoring tools e.g. Google Alerts
• social media mining tools e.g. Weka
Select one (1) from the following list of organisations: Monash University, Dell Computers, Pizza Hut, Ford Motor Company, Starbucks, Zappos, or another organisation as agreed upon with lecturer (permission from the lecturer must be granted before commencing work).
Academic Presentation:
Reports should be presented as a business style report, including title page, executive summary, table of contents, introduction, body encompassing analysis and discussion, conclusion, and references in accordance with:
• General Guide to Referencing: https://federation.edu.au/__data/assets/pdf_file/0015/164121/FedUniGeneral-Guide-to-Referencing-2014.pdf
• General Guide to Writing and Study Skills: https://federation.edu.au/__data/assets/pdf_file/0018/190044/2014-General-Guide-to-Writing-and-StudySkills.pdf
Provider database-ms access-open office database
: As you recall, data is a collection of facts (numbers, text, even audio and video files) that is processed into usable information. Much like a spreadsheet, a database is a collection of such facts that you can then slice and dice in various ways ..
|
What are the benefit of the siop protocol for native english
: What are the benefits of the SIOP protocol for native English speakers
|
Show the ppf-budget constraint-indifference curve
: Show the PPF-Budget Constraint-Indifference curve diagram for H and for F in this free trade equilibrium.
|
Determine the amount of liabilities
: Go to Yahoo Finance's Website, located at http://finance.yahoo.com/, to examine the balance sheet and income statement for Microsoft Corporation or a similar company. Examine the company's profit margin and total liability as it compares to the compa..
|
Evaluate a range of social media metrics
: The purpose of this task is for students to work in a team to investigate and evaluate a range of social media metrics and analytic approaches informing recommendations towards an organisation's social media strategy.
|
Oracle security guidelines
: Visit http://www.oracle.comand search for "Oracle Security Guidelines". Read articles at three of the links you find and summarize them.Remember to cite your references using APA format.
|
Medium access control methods
: Task 1: Both the CSMA/CD with Token bus medium access control methods can be used in real time systems. Which one is better suited for real time applications? Explain.
|
The consolidated ?nancial statements present fairly
: In our opinion, the consolidated ?nancial statements present fairly, in all material respects, the ?nancial position of R&R and its subsidiaries as of December 31, 2009, and the results of their operations and their cash ?ows for the ?scal year ended..
|
Specification of tables-attributes
: Handle costumes & accessories by using subtypes/supertypes, and show the ERD from all information we have gathered for the KCT. Your design should include a specification of tables, attributes, primary keys, foreign keys, data types, and null/not ..
|