Reference no: EM131433929
Computer Essentials Unit V Research Report
Conduct research using the CSU Online Library to find at least two articles on a company that heavily uses electronic media and e-mail. You may need to visit the company's website policy page or other sources, in addition to the library article, in order to provide a complete response to the points listed below. For example, using the search terms "Starbucks social media campaign" in an internet search engine such as Google.com, Yahoo.com, or Bing.com will return results of several articles discussing Starbucks' use of social media. Searching for "Starbucks security breach" returns several articles discussing vulnerabilities and electronic security challenges the company has faced. Additionally, if you visit the Starbucks website, they have a link to their privacy policy on the bottom of the page. Write a report of your findings that is at least three pages in length in a Word document to address the following
- Briefly introduce the company you have chosen to research.
- Summarize the two articles you found in the CSU Online Library.
- Describe how these companies are using electronic media and e-mail
o Are they using electronic media and e-mail in their daily operations, media campaigns, customer relations, or other ways? Are any of their uses groundbreaking or novel?
o What types of media are they using? Who is their audience?
o How do they mitigate and respond to security threats in using electronic media and e-mail? What about security issues faced by their customers?
Your paper must use APA style guidelines and include a title, abstract, and reference page. Be sure to list all sources in the reference page and use in-text citations where appropriate. The title, abstract, and reference pages are not included in the required minimum page length.
What is the most important aspect of community policing
: As a backlash, the professional model, which reflects a "we are the experts and you are not" attitude, alienated the police from the public. Problems and crime kept growing, and people wanted to be more involved in their communities. Therefore, co..
|
What is the value of supply chains
: Create your own personal supply chain in graph form. Consider both who supplies you and who you supply. You may use the Excel spreadsheet tool provided in this week's lesson or develop your chart using other software such as PowerPoint, Word or Proje..
|
How are prices determined under perfect competition
: How are prices determined under perfect competition? Think about a firm that you have done business with recently. To what industry does this firm belong? For example, McDonald's is a firm in the fast food industry.
|
The toy industry is very fickle and innovation is critical
: The toy industry is very fickle and innovation is critical. Sales for January 2017 showed only a 3% rise over January 2016 leaving the company managers concerned about meeting projected sales targets for 2017. increase sales unrelated to NASA toys b..
|
Briefly introduce the company you have chosen to research
: Briefly introduce the company you have chosen to research. Summarize the two articles you found in the CSU Online Library. Describe how these companies are using electronic media and e-mail
|
Discuss about the cost of the prevention strategy
: You have been working at the Wayne County probation office for approximately 6 months now. Your supervisor has given you your 6-month employment evaluation, which was excellent. As a result, your supervisor has informed you that he is to choose on..
|
How elastic the demand for a product is
: Characteristics that Determine Elasticity, presents 4 characteristics that determine how elastic the demand for a product is. List each of these. For each one explain and write a separate paragraph for each.
|
Explain critical requirements of audit for your organization
: Identify critical requirements of audit for your chosen organization and explain why you consider them to be critical requirements. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organizatio..
|
Transform an organization from batch-and-queue material
: Apply this method as an analog to the methods that the authors of The Lean Turnaround present to transform an organization from batch-and-queue material and information processing (conventional management) to flow (TPS/Lean management)
|