Apply Operational CRM

Assignment content

  1.     So far, you have investigated the 3 types of CRM and how they relate to customer relationships and value. Hopefully, you can begin to envision yourself becoming an expert in CRM. 

    In this assignment, you focus on the exciting developments of marketing automation, sales force automation, and surveys service automation. 

    Assignment Instructions

    1. Review the Assignment Deliverables section below. You will need this information to pick an appropriate company from the Case Report Resources (below), University Library, or the Internet.
    2. Choose a company from the Case Report Resources, University Library, or the Internet that is appropriate for the assignment deliverables. Not all cases may provide all the explicit details you are seeking. You may need to assume information. Please make a note in your assignment indicating the information that is assumed.
    3. Imagine that you are an IS or IT manager for the company you chose. Write a case report with 700 to 1050 words that includes the requirements listed under Assignment Deliverables. 
    4. Assignment Deliverables
      Include the following:
    • Describe what the case is about, give the important elements of the history of the situation, and specify the key problem or issue of the case, e.g. what decision has to be made by which manager. This is your introduction
    • Examine how the company used the practice of operational Customer Relationship Management (CRM) to customer-facing processes of marketing automation, sales force automation and surveys service automation.
    • Analyze how the CRM helped or can help the company with the following:
    • Marketing Automation
    • Sales Force Automation
    • Survey Service Automation
    • Include the most important information from the case in your conclusion.
    • Include a reference to the case and cite the reference in APA format.

Paper 9

As in the case with any other large IT investment, the success in Big Data analytics depends on a number of factors. The figure 9.4 on page 520 of your recommended textbook shows a graphical depiction of the most critical success factors of Big Data Analytics according to Watson (2012).

Assignment: Mention the most critical success factors for Big Data Analytics (Watson, Sharda, & Schrader, 2012), then describe them briefly.

Discussion 14

 Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber-attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.  

Configuring a DSLAM and DCHP

 

In this graded practice you will add and configure a DSLAM (Digital  Subscriber Line Access Multiplexer) and configure a small network using  this DSLAM.  You will connect a router to the DSLAM and configure DCHP  via a router.  

A DSLAM (Digital Subscriber Line Access Multiplexer) is a network  device that receives signals from multiple customer Digital Subscriber  Line (DSL) connections and puts them onto a single Ethernet connection.

Disuccsiond

How is probability theory used in computer science?  Find at least one example and explain it.

Discussion should be at least 250 words

Wk 2 – Legal, Ethical, and Privacy Issues in the Cyber Domain [due Mon]

 

NON-PROFITS

  1. The CIO of the organization you chose read your letter and would like to meet with you to discuss the legal, ethical, and privacy issues governing the cyber domain and directly impacting the organization. 

    Research the legal, ethical, and privacy issues as they relate to your chosen organization and the broader cyber domain.
    Using Microsoft® PowerPoint®, prepare a 12- to 14-slide, media-rich presentation for the CIO that includes the following:

    • Title slide
    • At least 2 fundamental U.S. laws that impact the organization and the cyber domain
    • At least 3 compliance laws and regulations governing the cyber domain and impacting the organization
    • At least 4 organizational security issues
    • At least 3 security technologies used to comply with laws and that support ethics in information security for the organization
    • Include citations as necessary in APA format.