For this assignment, you will discuss what you have learned in Unit III and Unit IV by creating a 12-slide PowerPoint presentation that addresses the case studies below. Based on your readi
For this assignment, you will discuss what you have learned in Unit III and Unit IV by creating a 12-slide PowerPoint presentation that addresses the case studies below.
Based on your reading of the case study “Is Business Ready for Wearable Computers?” on page 181 of the textbook, address the prompts below.
- Discuss at least three examples of wearable technology.
- Discuss how wearable technology could change the way the company you work for or a company you are familiar with conducts business, and provide an example.
- Discuss at least one advantage and one disadvantage to wearable technology.
- Discuss how business intelligence (BI) systems are used for reporting and data analytics.
Based on your reading of the case study “How Reliable Is Big Data?” on page 246-248 of the textbook, address the prompts below.
- Explain the term big data in your own words.
- Discuss how the music service Spotify used big data to better serve its customers.
- Discuss how New York City used big data to reduce crime rates.
- Discuss at least one ethical or security issue that big data can pose to individuals.
Based on your reading of the case study “Google, Apple, and Facebook Battle for Your Internet Experience” on page 290-292 of the textbook, address the prompts below.
- Explain what is meant by mobile technology.
- Discuss how telecommunications and mobile technology networks are vital to companies and how they are fundamentally changing organizational strategies.
- Discuss the mobile strategy used by Google, Apple, and Facebook.
- Discuss at least two challenges posed by the Internet and networking.
Based on your reading of the case study “How Secure Is the Cloud?” on page 324 of the textbook, address the prompts below.
- Discuss at least two security threats to cloud data.
- What should companies do to protect cloud data?
- Discuss why both the company and the cloud vendor are responsible for security.
- Discuss at least one security control that companies can use to increase security.
- Explain why data management has a tremendous impact on an organization’s survival.
In formatting your PowerPoint presentation, do not use the question-and-answer format; instead, use bullets, graphs, and/or charts in your slides to identify important points, and then discuss those points in the speaker notes of each slide.
Your PowerPoint presentation must be at at least 12 slides in length (not counting the title and reference slides). You are required to use a minimum of three peer-reviewed, academic sources that are no more than 5 years old (one may be your textbook). All sources used, including the textbook, must be referenced; all paraphrased material must have accompanying in-text citations.
Laudon, K. C., & Laudon, J. P. (2019). Management Information Systems (16th Edition). Pearson Education (US). https://online.vitalsource.com/books/9780135192047
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
,
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
,
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
,
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.