The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 2 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Week 7 IT Paragraph One:
Three core functions of Business Intelligence (BI) are query, reporting, and analytics. Queries are one way to access a particular view of the data or to analyze what is happening or has happened. For operational BI, data is typically accessed or distributed via reports. Data mining and predictive analytic tools are used to find relationships that are hidden or not obvious, or to predict what is going to happen. For instance, data mining can identify correlations, such as which factors--a prospect’s income, education, age, last purchase amount, and so forth--were most closely related to a successful response in a marketing campaign.
Some data mining, predictive analytics and other analytical tools can be used directly by users, but some are too complex for them to understand and use. Knowing how to interpret and act on the results of queries, reports, or analytics depends on human expertise.
Â
Â
Paragraph Two:
CIOs undertake IT strategic planning on a yearly, quarterly, or monthly basis. A good IT planning process can help ensure that IT aligns, and stays aligned, within an organization. Because organizational goals change over time, it is not sufficient to develop a long-term IT strategy and not reexamine the strategy on a regular basis. For this reason, IT planning is an ongoing process.
The IT planning process results in a formal IT strategy or a re-assessment each year or each quarter of the existing portfolio of IT resources.
Â
Â
Paragraph Three:
Social media monitoring may be considered an integral component of social media strategies because it gives marketers the ability to discover public conversations about their brands and, if necessary, respond to posters directly or to their posts. Opponents of monitoring define it as spying and intolerable invasions of privacy.
Because of privacy scandals in 2010 surrounding Facebook and Google, the public in general is extremely sensitive to privacy. Privacy advocates were angered by the ‘outright spying’ There are also fears that the software will be used to spam customers with sales pitches and advertising, or be used by political parties to exert pressure or control.
Is it ethical for a company to engage in social media and email monitoring?
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly