What are the key methods of identity development

Assignment Help Computer Engineering
Reference no: EM132404041

Assignment: Competency: This competency will allow you to demonstrate your ability to conduct research into how a digital footprint is created by looking at your own personal and professional life to determine your digital identity. In addition, you will be able to examine how an organization's digital footprint impacts their overall success.

Instructions: You are working for a local department store in the Operations Department. You notice that their business practices and use of technology are not up to date. One day while working, you are having a discussion about technology and identity formation with your supervisor. Your supervisor continues to explain that individuals and organizations have digital identities that are formed and impacted through various methods. Your supervisor continues, saying, "They can develop or change through social media, positive or negative press, word of mouth, and so on."

You begin to understand that the digital footprint of a business or organization can greatly impact their

success or failure due to many factors, including the rapid dissemination of information that can occur digitally.

Your supervisor, through the course of the discussion, acknowledges that you are very fluent in the area of digital identity and asks you to conduct research and create a visual presentation explaining how digital identity is formed for both individuals and organizations. Your supervisor says, "This visual presentation will be presented to not only me, but company stakeholders and your coworkers in order to help them understand how identity is formed, and how to best maximize digital identity to contribute to the overall success of our store."

Your supervisor continues, saying, "From this presentation, decision makers will be able to work on identity management and can then implement digital strategies in order to maintain or improve the store's identity. In the end, this is intended to help increase exposure to the store, enhance the customer base, and the overall success of the store. The visual representation should be interactive
and informative and can be presented in any visual format that you choose."

For this research and presentation, you are to reflect upon and address the following topics:

1. What are the key methods of identity development? Consider available technology, socioeconomic status, generational issues, access to technological resources, etc.

2. Explain how technology and digital forums can aid in identity formation.

• Consider available technology, socioeconomic status, generational issues, access to technological resources, etc.

• Are there differences between identity development in the digital world and in the physical world?

• As technology improves and changes, what are some things that individuals and organizations do to impact change and development in the digital age?

• How can individuals change the course of action for organizations and their digital footprint?

3. How is the digital identity of your store in the above scenario formulated, and what impact might that identity have on the overall success of the store?

Reference no: EM132404041

Questions Cloud

Economic recovery for the insurance company : Dr. Joe because he serves an underserved community in eastern Oklahoma, resulting in low economic recovery for the insurance company.
Should employee vacation pay be recorded in the period : Should employee vacation pay be recorded in the period during which the vacation privilege is earned or during the period in which the vacation is taken?
Calculate cost of goods available for sale : Calculate cost of goods available for sale. Calculate the Cost of Goods Sold under the LIFO assumptions. Calculate the value of Ending Inventory.
Query databases using SQL : Query databases using SQL - Complex SQL Queries - The SQL statements for each query, which should be copied from your SQLite3 Command Line and pasted.
What are the key methods of identity development : What are the key methods of identity development? Consider available technology, socioeconomic status, generational issues, access to technological resources.
In the state of california this is not allowed : Maurice is 18 years old and he lives in Mexico and he is allowed to date a Nikki who is 14 years old under Mexican law.
Sword like proprietary estoppel : Why promissory estoppel has been considered as an independent cause of action (a sword) after the High Court's decision in Waltons Store but in NSW
Describe an instance where government has taken some action : On the discussion forum, describe an instance where a government has taken some action the result of which is influence on commerce. Minimum 300 words.
What is the revised depreciation expense for 2017 : Wildhorse Co. bought equipment for $130000 on January 1, 2016. Wildhorse estimated the useful life to be 10 years with no salvage value.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why a yes-instance of q gets turned into a yes-instance of d

Show that D is in NP by briefly explaining how to quickly verify a solution to it. Explain why a yes-instance of Q gets turned into a yes-instance of D.

  How you do or could use telcom and network security

Prepare and submit a one page, double-spaced, APA style paper explaining how you do or could use telcom and network security in your current or upcoming career.

  Which references cause a page fault

A computer has a page size of 1024 words, 132 virtual pages and only 6 page frames.

  Write a java application that accepts a bar code

Write a Java application that accepts a bar code as a command line parameter and prints out the ZIP code.

  How can you access the given variables in your program

Suppose you use a class Clock with private instance variables hours and minutes. How can you access these variables in your program?

  Recognize the factors other than price an organization

identify the factors other than price an organization must consider when evaluating whether to build or buy a software

  What is the channel capacity

Plot the capacity of an additive white Gaussian noise channel with a bandwidth of W = 3000 Hz as a function of PI No for values of PI No between -20 dB.

  Create video presentation that explains your project concept

Create a video presentation that explains your project concept, basic design, final testing, AND a demonstration of the working project.

  Distinguish between diffusion and confusion

Define a product cipher and list the two classes of product ciphers. Distinguish between diffusion and confusion.

  Explain how system shall recover from attacks and failures

Discuss how the system shall recover from attacks, failures, and accidents. Discuss how the system will address User Account Management and related security improvements.

  Determine the choice of direction for a particular problem

Identify and list all factors that determine the choice of direction for a particular problem.

  Create appropriate constructors

Create appropriate constructors, getters and setters and appropriate override of toString() method.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd