Write and 8 to 10 page paper on the development methodology of social media websites

Write and 8 to 10 page paper on the development methodology of social media websites. The use of outside references (books, peer-reviewed journal articles, professional publications, media) is encouraged. Be sure to tie your paper to the concepts and readings covered in the course. Please address all of the questions at the end of the case in your paper. Please format your paper in APA 6th edition style and use at least 6 – 8 references.

Explain how and why e-marketers need to check the quality of research data gathered online

Explain how and why e-marketers need to check the quality of research data gathered online. Explain the three main sources of data that e-marketers use to address research problems.

Explain the three main sources of data that e-marketers use to address research problems

Explain the three main sources of data that e-marketers use to address research problems. and also  Explain the how and why e-marketers need to check the quality of research data gathered online.

 Describe the internet exchange process and the technological, social/cultural

Describe the internet exchange process and the technological, social/cultural, and legal context in which consumers participate in this process.

Explain why the internet is used as a contact method for primary research

Explain why the internet is used as a contact method for primary research and describe the main internet-based approaches to primary research. Describe the internet exchange process and the technological, social/cultural and legal context in which consumers participate in this process.

The companies that developed the vaccines and treatments in the Covid pandemic

The companies that developed the vaccines and treatments in the Covid pandemic provide very real-life, real-time examples of the questions of protecting patents as business assets while answering social responsibility concerns.

As the CEO of one of these companies, how would you respond to calls to share your company’s IP and under what circumstances? How would a Biblical worldview influence your decisions?

Consider, for example, the following:

Rowland, C., Rauhala E., & Berger, M. (2021, March 20). Drug companies defend vaccine monopolies in face of global outcry. The Washington Post.

A Hazard Vulnerability Analysis (HVA) is a systematic way to understand what your community

A Hazard Vulnerability Analysis (HVA) is a systematic way to understand what your community or agency is at risk for in terms of disasters.  It provides a way to prioritize resources that go toward mitigation.  In module 4, you received an HVA template to use for your agency in our fictional city. Download the link above the example.  It will take you to an editable copy. This template was developed by a hospital non-profit, so the categories of risks reflect what a hospital would typically plan for.  You may edit those categories to more readily reflect your agency.   (HVA) is a systematic way to understand what your community or agency is at risk for in terms of disasters.  It provides a way to prioritize resources that go toward mitigation.  In module 4, you received an HVA template to use for your agency in our fictional city. Download the link above the example.  It will take you to an editable copy. This template was developed by a hospital non-profit, so the categories of risks reflect what a hospital would typically plan for.  You may edit those categories to more readily reflect your agency.

Outline how businesses have protected themselves from cybersecurity threats

Outline how businesses have protected themselves from cybersecurity threats, and their impact on their working and competitiveness. Suggest a company (Google) that handled cybersecurity threats and developed mechanisms to maintain its working and competitiveness.

The paper should relate to some of the related concepts as specified in chapter 10, chapter extension 14, and the “Cybersecurity Portfolio.pdf” file attachment

Use the section title (outline) as follows:

· Describe cybersecurity in general.

· Describe how cybersecurity impacts business in general.

· Describe Google and its working/competitive environment. Anytime a company is described, make sure the company description provides details like its products, its history, etc. even if the company is widely known.

· Outline how Google is handling cybersecurity threats to maintain its working and competitiveness. Provide instances of threats encountered and steps undertaken that are properly referenced.

Inductive Discipline, Parental Expression of Disappointed Expectations, and Moral Identity in Adolescence

 

I am having a hard time summarizing the article “Inductive Discipline, Parental Expression of Disappointed Expectations, and Moral Identity in Adolescence” by Renee B. Patrick • John C. Gibbs. It is for a discussion post, and I can’t seem to shorten my summary.

Here’s an example of inductive reasoning. When someone hits you, you feel hurt. Therefore, when you hit someone else, that person must feel hurt, too. Even though you are not absolutely sure that is the case, induction allows you to draw a general conclusion with some confidence.

Rural sociology studies concerns of a global nature

Rural sociology studies concerns of a global nature including…

 

Rural sociology studies concerns of a global nature including village, community, caste class, dominant culture, politics and injustices with regards to resources.

Your reading discussed agarian societies in India facing famine and destruction of crops that sustain rural living both economically and daily consumption.

In this discussion reflect on how third world famine, genetic engineering and consuming more then we need impact those living in urban and suburban communities and spcifically in the U.S.