What are the key methods of identity development

Assignment Help Computer Engineering
Reference no: EM132404041

Assignment: Competency: This competency will allow you to demonstrate your ability to conduct research into how a digital footprint is created by looking at your own personal and professional life to determine your digital identity. In addition, you will be able to examine how an organization's digital footprint impacts their overall success.

Instructions: You are working for a local department store in the Operations Department. You notice that their business practices and use of technology are not up to date. One day while working, you are having a discussion about technology and identity formation with your supervisor. Your supervisor continues to explain that individuals and organizations have digital identities that are formed and impacted through various methods. Your supervisor continues, saying, "They can develop or change through social media, positive or negative press, word of mouth, and so on."

You begin to understand that the digital footprint of a business or organization can greatly impact their

success or failure due to many factors, including the rapid dissemination of information that can occur digitally.

Your supervisor, through the course of the discussion, acknowledges that you are very fluent in the area of digital identity and asks you to conduct research and create a visual presentation explaining how digital identity is formed for both individuals and organizations. Your supervisor says, "This visual presentation will be presented to not only me, but company stakeholders and your coworkers in order to help them understand how identity is formed, and how to best maximize digital identity to contribute to the overall success of our store."

Your supervisor continues, saying, "From this presentation, decision makers will be able to work on identity management and can then implement digital strategies in order to maintain or improve the store's identity. In the end, this is intended to help increase exposure to the store, enhance the customer base, and the overall success of the store. The visual representation should be interactive
and informative and can be presented in any visual format that you choose."

For this research and presentation, you are to reflect upon and address the following topics:

1. What are the key methods of identity development? Consider available technology, socioeconomic status, generational issues, access to technological resources, etc.

2. Explain how technology and digital forums can aid in identity formation.

• Consider available technology, socioeconomic status, generational issues, access to technological resources, etc.

• Are there differences between identity development in the digital world and in the physical world?

• As technology improves and changes, what are some things that individuals and organizations do to impact change and development in the digital age?

• How can individuals change the course of action for organizations and their digital footprint?

3. How is the digital identity of your store in the above scenario formulated, and what impact might that identity have on the overall success of the store?

Reference no: EM132404041

Questions Cloud

Economic recovery for the insurance company : Dr. Joe because he serves an underserved community in eastern Oklahoma, resulting in low economic recovery for the insurance company.
Should employee vacation pay be recorded in the period : Should employee vacation pay be recorded in the period during which the vacation privilege is earned or during the period in which the vacation is taken?
Calculate cost of goods available for sale : Calculate cost of goods available for sale. Calculate the Cost of Goods Sold under the LIFO assumptions. Calculate the value of Ending Inventory.
Query databases using SQL : Query databases using SQL - Complex SQL Queries - The SQL statements for each query, which should be copied from your SQLite3 Command Line and pasted.
What are the key methods of identity development : What are the key methods of identity development? Consider available technology, socioeconomic status, generational issues, access to technological resources.
In the state of california this is not allowed : Maurice is 18 years old and he lives in Mexico and he is allowed to date a Nikki who is 14 years old under Mexican law.
Sword like proprietary estoppel : Why promissory estoppel has been considered as an independent cause of action (a sword) after the High Court's decision in Waltons Store but in NSW
Describe an instance where government has taken some action : On the discussion forum, describe an instance where a government has taken some action the result of which is influence on commerce. Minimum 300 words.
What is the revised depreciation expense for 2017 : Wildhorse Co. bought equipment for $130000 on January 1, 2016. Wildhorse estimated the useful life to be 10 years with no salvage value.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd