Management

    Write a page for each letter that answer each of the questions below it. So, one page for part A and one for part B and one for part C each question below each letter must be answered I will check the paper by Turnitin.com A) Social Media and Marketing/Advertising 1) Describe a concrete example of social media marketing/advertising. (your response here…) 2) How have advertising changed throughout times as the medium used for advertising (newspaper, billboard, TV, internet, social media, etc.) has changed? (your response here…) 3) How is mobile marketing different from how marketing was done before (what is unique with mobile marketing?) (your response here…) B) Social Media and Businesses Models 1) What are some of the concerns or threats organizations face because of social media? Give three concrete examples. (your response here…) 2) Describe common threats to your own privacy due to use of internet, social media, and mobile computing. Give three concrete examples. (your response here…) 3) Describe what the “sharing economy” is. Give three concrete examples of businesses built around the “sharing economy” business model. (your response here…) C) Security Threats and Measures 1) Give three examples of potential security threats that you as companies or you as a private person might experience. Explain what the risk and potential consequences are. (your response here…) 2) For the three examples of security measures companies implement to prevent, prepare, insure, etc. themselves from potential security threats. Explain how the measures works. (your response here…) 3) For the three examples of security measures you can implement on your own laptop/smart phone to prevent, prepare, insure, etc. yourself from potential security threats. Explain how the measures works. (your response here…)
    Direct marketing is considered as sufficiently powerful tool on the way to promote products and services as a quantity of tools is diversified. It includes such directions as Internet marketing, Mobile marketing, Direct mail, Telemarketing, and Direct Response TV. Internet marketing, Mobile marketing, and Direct mail are subdivided into sections – email marketing, online display ads, social media sites, search, digital coupons; sms/mms, mobile banner ads, and fliers, promotional letters, circulars, catalogs respectively, enumerate Harris, Dennis (2007).
    Current communication channels are characterized by the extended set of communication tools that gives additional opportunities bot for producers and customers. On the contrary, hi-tech enhancements modified the nature of communication process between organizations and their customers – computerizing, the Web, wireless devices, various gadgets and others, explan Harris, Dennis (2007). Furthermore, a cut-throat competition among organizations provoked implementing the newest solutions from the stand point of production, communication, and service.
    It should be noted that during crisis – of the company or global one – such frames as social media have become a crucial part people’s activities. In this cyber world people are almost free to express their opinion, beliefs, ideas, and propositions. This digital perspective is assumed to utilize as market to improve the brand, organizational structure or lineups. The companies have an opportunity to grasp the main ideas of audience and analyze it, as consequence, implement certain initiatives in terms of adaptation to permanently changing consumer sentiments and market conjuncture.
    The most pressing issue from the perspective of customer is his secure and private activity in the Internet. A number of users are concerned about the probability that violators can review their transactions, personal information or hack debt or credit cards. In this linkage it should be noted that customers should feel safe on the conditions they operate in the frames of online business. To add some other angles of problematic, direct marketers are worried about the purchases made by children or unauthorized groups of people that touching the sphere of privacy policy, assert Harris, Dennis (2007).
    One of the methods to fool consumers is phishing aims at using false emails and fake websites in order to possess information and values. This problem has become a real threat on the way to cooperate with customers, individuals and business on the proper and regular basis. Direct marketers should provide effective measures to combat with such attacks.
    Furthermore, legislations are searching for the right solutions in the forms of regulations and laws. It should be highlighted that firm TRUSTe (www.truste.com) operates in the sphere of enhancing the level of privacy and security for their customers. To crown it all, the U.S. government provides some tips on protecting privacy, including (www.usa.gov./topics/family/privacy-protection/online.shtml).
    The privacy policy modifications allow selling targeted advertisements in more extensive way. It boosting the firm’s ability to propose more advance results of searching or supply individualized products and services for clients, notes Kang (2012). Taking into account the fact that Android devices amount nearly a half of smartphone market, Google, alongside with business entities, has an opportunity to explore the true nature of every Google user by means of Google’s Web sites – to see what a wide range of users perform on their gadgets including all the activities (browsing, downloading, uploading, 1creating, deleting, and others). Since 2012 Google has been tracking user’s inquiries whether word “cat” or “car” is typing it is obvious to analysts.
    It is obvious that companies earn a great amount of money making promotion, gathering data, optimizing their business, investing. The companies should thank consumers and data siloses.“People feel passionately but I think we’re missing a lot of the value of personal data because it’s stored in these different silos,” claimed Sir Tim.
    Location of data silos is a great issue for today as we have no access to them. Maybe, some groups of people or different communities may create a public fund in order to place these data siloses by means of joint financing. It’s a possible and optimal variant comparing with some individual data bases for every certain user or small group of users since the key item is a financing and rationality. Another variant is to conclude an agreement with the companies in order to have an access to data silos. This variant allows decreasing all the costs for purchase of modules and other organozation problems.

    Harris, L., Dennis, C. (2007). Marketing the E-Business. Routledge.
    Hern, A. (Oct. 8, 2014). Sir Tim Berners-Lee speaks out on data ownership.The Guardian. Retreived from http://www.theguardian.com/technology/2014/oct/08/sir-tim-berners-lee-speaks-out-on-data-ownership
    Kang, C. (Jan. 25, 2012). The Washington Post. Google sees profit in tracking users. Retrieved from http://www.washingtonpost.com/business/technology/google-sees-profit-in-tracking-users/2012/01/25/gIQAfDJVRQ_story.html

                                                                                                                                      Order Now