the development of advanced IT technologies and popularity of smart phone

Research topic outline

Research objective

The research topic is about to investigate the privacy issues and concerns in IT security and safety in the online marketing sector. The research question is ‘what are the privacy problems and issues in online marketing businesses and why are these issues critical for the safety of online marketing businesses?’.

 

Online marketing businesses have experienced rapid growth and development during recent ten years due to the development of advanced IT technologies and popularity of smart phone. The general online marketing approaches include social media sites marketing, newsletters, and search engine history marketing. All these approaches need to collect and store customers’ personal information and exchange and communicate relevant marketing information to customers. For example, it involves collecting and saving users’ searching history and then provides relevant advertisements; or it keeps users in mail list and sends regular newsletters. Thus, the IT privacy has become a critical issue for companies in this sector in their daily operation and management. Previous literatures indicated that the government has pay more attention on IT privacy in the online marketing sector, and a single privacy problem such as stealing customers’ personal information could lead to millions loss for a company (de Bakker, Boonstra, & Wortmann, 2010). It is critical and relevant to my internship because it relates to my company’s future development and business sustainability. Without sufficient experience in doing network development and customer data management, this important area of interest is a gap in my knowledge.

 

The outline of the research topic will be:

  • A brief review of ethical business decision and social responsibility concepts
  • The importance of demonstrating social responsibility to all stakeholders of a company
  • IT privacy issues and problems in online marketing business
  • Protecting the company’s network against viruses, malware, and other Internet-based threats
  • Maintaining robust IT security without impeding (de Bakker et al., 2010)
  • Maintaining simplicity and cost-effectiveness solutions for IT security (Jun, Qiuzhen, & Qingguo, 2011)
  • Business decision on the use of customers’ data
  • Network solutions
  • Cisco IOS security solutions such as Cisco IOS firewall, IPS, and Dynamic Multipoint VPN (DMVPN) services (Dubois, Heymans, Mayer, & Matulevičius, 2010).

What We Offer:
• On-time delivery guarantee
• PhD-level professionals
• Automatic plagiarism check
• 100% money-back guarantee
• 100% Privacy and Confidentiality
• High Quality custom-written papers

find the cost of your paper

Make plots for comparing the Crank-Nicolson scheme with the Forward and Backward Euler schemes in the same test problem as in Exercise 8.12.

1.It is recommended to do Exercise 8.12 prior to the present one. Here we look at the same population growth model N (t) = rN(t), N(0) = N0. The time….

analyze the organizational behavior of your current or former employer.

In this assignment, you will analyze the organizational behavior of your current or former employer. Describe how the following areas influence the organizational behavior in a negative or positive manner:….

Discuss the use of non-compete agreements for entry-level and low paid employees and use the decision-making process to come up with a solution for employers  who require non-compete agreements for entry-level workers.

https://www.huffpost.com/entry/jimmy-johns-non-compete_n_5978180?1413230622= Read this article and Discuss the use of non-compete agreements for entry-level and low paid employees and use the decision-making process to come up with a solution for employers  who….