Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment

Directions

Explain the functional areas that were focused on within these studies, such as marketing, human resources, social media, and web analytics.

Explain how these methods and visualization techniques were used and recommendations for future usage of these methods to assist with environmental scans that may lead to enhancements within the organizational strategic plans.

According to Ventana Research analysts (2012), "The top five sources of data tapped for predictive analytics also relate directly to revenue: customer (69%), marketing (67%), product (55%), sales (54%), and financial (51%)." They showed that the largest source of these data came from social media.

While this might be helpful, I would definitely recommend validating what you find with other types of external environmental scanning techniques as well. Other techniques I have found include PEST, SWOT, QUEST, Industry Analysis, and Competitor Analysis. Babatunde and Adebisi (2012) conducted a study using a few of these techniques and found that 29% of the variation in the market share was due to a variation in environmental scanning.

Babatunde, B. O., & Adebisi, A. O. Strategic Environmental Scanning and Organization Performance in a Competitive Business Environment.

Overview/Background.

Ventana Research, 2012. Predictive Analytics: Improving Performance by Making the Future More Visible [White paper].

One of the methods often being used for environmental scanning is through the use of Google Analytics. Use the library to research at least two case studies and/or articles in which Google Analytics, PEST, SWOT, or QUEST methods were used to perform an environmental scan and create a competitive advantage.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92319019

Have any Question?


Related Questions in Management Information System

Given a folder with images in it create an html page named

Given a folder with images in it, create an HTML page named index.html that contains links to each JPEG file in the directory as follows: Write a function that creates a string of the path to a directory Generatea thumbn ...

1 write a report at least 400 words on how to use data

1. Write a report (at least 400 words) on how to use data mining to help marketing managers specifically. Give a title to your report an interesting title to reflect the theme(s) of your report. You must use a specific b ...

The head of the it security department expressed her

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to pr ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Assignmentexercise facilities coordinator 1 the facilities

Assignment Exercise: Facilities Coordinator 1. The facilities coordinator is a critical role. Put yourself in the position of the facilities coordinator. 2. Determine and list the qualities you have that would make you a ...

Assignment purpose him professionals need to be able to

Assignment Purpose: HIM professionals need to be able to compare and understand different classification systems and understand the challenges of the ACO environment. Assignment Description: Part 1: Complete this mapping ...

Discussion question what do you perceive to be some of the

Discussion Question : What do you perceive to be some of the Modern Network Security Threats? How do today's Threats differ from threats 10 years ago? Post Requirements: Your post must use at least two (2) sources of inf ...

Project 6 policy review and recommendations

Project #6 Policy Review and Recommendations Presentation Instructions This is the final phase of the case study assignments. The primary purpose of this project is for you to demonstrate your understanding of the princi ...

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

Research the it security policy used by your university or

Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As