Create short and long-term dss-based strategies

Assignment Help Basic Computer Science
Reference no: EM133234715

Task - Create Short- and Long-Term DSS-Based Strategies

Scenario

Assume you are the CIO of a large company (such as a financial institution, a national fast-food franchise, a mobile phone service provider, or a sizeable Internet-based company) that is going through some industry changes (for example, fiscal or regulatory changes, new competition, new market forces, or changing technologies). Executives want to fully understand your customers to increase revenue growth from existing customers and acquire new customers.

Executives believe that by understanding your customers' demographics, spending habits, credit scores, and financial information, among other things, you can provide better customer service, market your products more effectively, create new products, and retain your customers.

Numerous technologies, solutions, and processes are available to help you obtain this information. Many new technologies, such as cloud computing, SaaS, mobile BI, and Big Data, have emerged in recent years.

Executive leaders have asked you to create short- and long-term strategies for implementing a set of DSS, BA, and AI solutions to achieve your goal of achieving a comprehensive view of your customers.

To finish this assignment, fictitious assumptions and details may be assumed or created. You may use application cases and examples from the textbook and elsewhere to supplement your discussions and examples.

Start planning a 4-professionally written document in which you:

1. Explain, using examples, how your comprehensive view of customer data can help your company solve three business problems.

2. Construct a justifiable short- and long-term strategy to achieve your goal of achieving a comprehensive view of customer data.

3. Explain, using examples, how you intend to use three implementation technologies to achieve the objectives of your short- and long-term strategies.

4. At least three credible, relevant, and appropriate sources should be used to back up your writing.

5. Cite each source on your list at least once in your assignment.

Reference no: EM133234715

Questions Cloud

Relating to network concepts : Relating to a Network Concepts course, considering the total number of IPv4 addresses is limited to 4,294,967,296 IPv4 addresses,
Cloud computing adoption in developing economies : Which of the following could be a major drawback to cloud computing adoption in developing economies with limited communication infrastructures?
Dealing with banking and security : Dealing with banking and security, there really is no leeway for breaches. When it comes to your bank, you expect security to be at its best.
Social engineering threats from inside-outside organization : Explain differences between social engineering threats from inside and outside an organization.
Create short and long-term dss-based strategies : Explain, using examples, how your comprehensive view of customer data can help your company solve three business problems.
Projects are usually assessed for three constraints : Projects are usually assessed for three constraints: cost, time and quality. A successful and efficient project is one that achieves its goals within the budget
Recursive algorithm-algorithm basic operation count : What does this algorithm return? Set up a recurrence relation for the algorithm's basic operation count and solve it.
Identify the variety of characteristics and physically : Identify the variety of characteristics, physically, psychologically (including different mental models people might have) and socially,
What is transaction processing systems : What is the Transaction Processing Systems (TPS)? Explain the concept of ACID properties.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sketch all eight of the 8-bit walsh sequences

Sketch the cross-correlation function (CCF) of the first and second sequences.

  Clustering problem

Imagine a Clustering problem where the educational researchers would like to find clusters of students (a group of students) who have similar correlation

  Why is the future of computing in the cloud

Analyzing a subject you find in this article. Why is the future of computing in the cloud? Consider the concept of fractional ownership.

  Business requirements document and a project plan

This assignment consists of two (2) sections: a business requirements document and a project plan.

  Think cloud would affect your existing policies

Discuss best practices for network backup and recovery and how do you think cloud would affect your existing policies?

  What is the difference between security and safety

What is risk management? What is Vulnerability assessment? What is the difference between security and safety?

  Does it matter if the tests we create fail at this stage

Add any further tests you feel are appropriate at this stage of the development, to form the basis of a set of tests to be used during future development. Does it matter if the tests we create fail at this stage?

  Design a database design a database using the following info

Design a Database Design a database using the following information. Using Microsoft Visio 2013, create a complete E-R Diagram in Crow's Foot notation (including entity names, attributes, primary keys and foreign keys) that can be implemented, and th..

  Determine the splits required to generate the full tree

Your task is to work out the complete tree, starting at the root node. At each split you should consider the alternatives and make the right choices, starting from the root

  Create a world with a right hand holding a toy ball

Create a world with a right hand (People) holding a toy ball (Sports). Have the fingers close to grasp the ball. Then, throw the ball into the air while opening the fingers of the hand. Finally, make the hand catch the ball as the hand recloses it..

  Emerging threats counterness

Describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use,

  Assess the key practices and improvement actions from the

q1. evaluate the key practices and improvement activities from the people capability maturity model and recommend the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd