Discuss about the case given below

Assignment Help Management Information Sys
Reference no: EM131393400 , Length: 3

Read the Starbucks' case study. This case study uses Porter's Value Chain and Five Forces models and a SWOT (strengths-weaknesses-opportunities) analysis to develop strategic recommendations. On page 7 of the Starbuck's case study there are 10 recommendations.

Choose 3 of the recommendations and identify how IT could be used as part of the implementation of that recommendation. Research in the library how other companies have done something similar for each of your 3 recommendations. Your paper should be at least 3 pages, not counting the title and reference pages. The paper must include at least 3 references from peer-reviewed articles in academic journals. Make sure you have in-text citations and a reference page. You can include additional references from websites and books.

The rubric for this assignment can be viewed when clicking on the assignment link.
Use the resources below to help you with this week's assignment.

Read the following chapters in the textbook:

Chapter 6 - "Attracting Buyers with Search, Semantic, and Recommendation Technology" Chapter 6 - Attracting Buyers with Search, Semantic, and Recommendation Technology.pptx- This chapter discusses technology to make buying recommendations to customers. This technology may be applicable to the Starbucks' case and will be referenced again on the week five discussion board.

Chapter 7 - "Social Networking, Engagement, and Social Metrics" Chapter 7 - Social Networking, Engagement, and Social Metrics.pptx- This chapter discusses social networking technologies used by companies like Starbucks.

Chapter 8 - "Retail, E-commerce, and Mobile Commerce Technology" Chapter 8 - Retail, E-commerce, and Mobile Commerce Technology.pptx- This chapter discusses e-commerce and mobile technologies that enable companies like Starbucks to expand their reach in the marketplace.

Videos:

Creating Conversations in the Cloud discusses cloud computing and its use in marketing.

IT Business Value Video - This video discusses some strategic models that can be used to help identify how IT adds business value.

https://www.youtube.com/watch?v=ldYP9XBXBYs

Reference no: EM131393400

Questions Cloud

Discuss how each data source is relevant to the problem : Considering chosen topic Private Security, prepare a one (1 1/2) page paper in which you:Discuss what data you have collected or researched to indicate there is a problem.Include at least two (2) sources of data (charts, data, statistics, etc.)Discus..
Write a short essay that addresses diversity : A short essay that addresses diversity in the context of your topic, such as how your topic compares with at least one other culture. Important Note: You will need to provide some sources. This is a "compare-contrast" essay. "Compare" refers to..
Describe the process of performing a risk assessment : Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned wit..
Explain of how the two project outlines differ : As a project manager, you are going to prepare two project outlines for the development of a mobile application. One project outline uses a waterfall model, another uses an agile method.Prepare two project outlines using Microsoft® Project. Each ..
Discuss about the case given below : Choose 3 of the recommendations and identify how IT could be used as part of the implementation of that recommendation. Research in the library how other companies have done something similar for each of your 3 recommendations. Your paper should b..
Discuss about the post given below : Please take a position on whether or not manegerial groups are more likely to make better decisions than individual managers within the same organization. Provide support for your position.Suggest a scenario that illustrates when a manager should ..
Provide an analytical report on the importance of key player : Based on the context of singapore , provide an analytical report on the importance of the 4 key players in enhancing effective labour management relations , Provide example on how the aforementioned contribute to the competitive advantage of the n..
Discuss about the given scenario below : Scenario and Tasks You are required to collect and analyze data for the purpose of problem solving at your current workplace. If you cannot undertake this task, you may base your analysis on previous employment recollections where you have underta..
How fun it can be to learn different cultures : HRMN 302 6380:Mr. McWhorter distinguished great posture, eye contact, and kept a steady tone of voice throughout the whole presentation. Mr. McWhorter, interacts with the audience by connecting with them by using PowerPoint visuals of people we ma..

Reviews

Write a Review

Management Information Sys Questions & Answers

  A research the forms of data used in the system of your

a research the forms of data used in the system of your choice. this system could be your own health care organization

  Why it ethics are important not just to you personally

Discuss why IT ethics are important not just to you personally, but to the industry as a whole. Briefly describe viruses and malware. What security measures can be taken to reduce the risks of malicious software.

  What is the face validity of the survey

What is the face validity of the survey and What would you change to improve the quality of data collected? Explain your reasons

  How each is countered by a particular feature of ssl

Consider the following threats to Web security and describe (in detail) how each is countered by a particular feature of SSL: a. Brute-Force Cryptanalytic Attack: An exhaustive search of the key space for a conventional encryption algorithm. b. Repla..

  Supply chain management powerpointafter the initial report

supply chain management powerpointafter the initial report the owners of stone horse supply company john and michael

  Prepare the ethical dilemma matrix

Prepare the Ethical Dilemma matrix and include the following explanation-double-space your narrative-below the matrix: Why I chose the dilemma

  Explain the advantages and disadvantages of outsourcing

Explain the advantages and disadvantages of outsourcing. Describe how e-commerce begin and what made it successful

  What will social media look like in the future

Summarize each of the readings in the tables below.You may expand the table to accommodate your information.Write in complete sentences using proper grammar and mechanics.What Will Social Media Look Like in the Future.

  Analyze a company its business position and the attainment

analyze a company its business position and the attainment of a competitive advantage through the understanding and

  Describe the process of performing a risk assessment

Analyze the term "risk appetite". Then, suggest at least one (1) practical example in which it applies. Recommend the key method(s) for determining the risk appetite of the company. Describe the process of performing a risk assessment.

  Analysis and design of information systems development

CSE2ISD - Information Systems Development - Object-Oriented Analysis and Design for ISD - Apply object-oriented methodology for analysis and design of information systems development in a case study.

  Whitman and mattord states the hierarchical model

Whitman and Mattord states the hierarchical model in the sphere of information security have major levels of organizational work which consist of organizations that are non-profit or non-governmental that have influence over IT

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd