This website uses cookies to ensure you have the best experience. Learn more

Ais Research Essay

1334 words - 6 pages

Nowadays, social media plays a big role in our life as ways we use to connect with others who may have different culture any time and place. Apart from using in our daily life for ease of communication, it can be used in other different purposes, for example, updating ourselves with new information, advertising and expressing our feeling. In the past, people might not be aware of how they could use social network in their businesses; they still got sticked with such old-fashioned ideas such as promoting their product by direct sales, advertising by fliers and broadcasting. As time goes by, people started to recognise about social network when it becomes more important, some businessmen ...view middle of the document...

Once companies interact with people in the social media through posting images, videos, comments and sharing which possibly make someone react to visit the companies’ websites and become customers, the brands are humanised. The brands will act more like people via social network which is benefits for themselves since most people like doing business with other people not companies. Moreover, the studies have also shown that the more social media followers the brands have, the more credibility for their brands.

One of the most important things is that social media decreases the costs of marketing immensely. Advertising on TV, radio generate and hoarding generate high cost and do not efficiently effect to the consumers’ decisions comparing with social media which the companies can inform and promoting freely with very low cost (sometimes costless) but the owners can see the result of the advertising right after they advertise. This also let people who have low budget be able to start the businesses by paying low cost for advertising so that they can see the trend of their businesses and increase the budget if they are successful.

Because the social media is mainly used as a communication channel, the companies and their customers can communicate with each others immediately in order to retain and develop the relationship. For example, if there is a customer complain about the service through Twitter, the company will have a chance to apologise publicly and immediately.

Social network can also lead the companies to the customer insights. Social media often give very useful information about what they are interested and how they behave; companies can learn those thing via social listening. They can track the users’ comments to see what people think about the brands.

In customers’ side, it is better for them to involved in the businesses within the social network so that they can be informed, choose and make decisions.

The customers will be informed with sufficient information from many sources in the social network such as the companies, and other customers’ feedbacks so that they will have enough information before making any decision.

In conclusion, business nowadays has changed so much due to the emerge of social network; companies have found easier ways to make their brands, survey customers’ preferences and satisfactions, response to customers quickly, create brand loyalties and advertise while the customers also benefit from that the companies can response to their expectations and they have opportunities to research and find the best fit products before decide to purchase.

https://articlewinter.wordpress.com/2013/04/23/how-social-media-changed-the-world/
http://soshable.com/social-media-market-research/
http://www.greenbookblog.org/2014/04/25/why-has-social-media-analytics-met-with-limited-success-in-market-research/
http://www.slideshare.net/DJHMA/role-of-social-media-in-modern-day-marketing-as-an-operation
...

Other Papers Like Ais Research

Ais Attacks Essay

788 words - 4 pages Attacks On AIS Introduction The more modern technology advances it appears vulnerabilities continuously exist in software used on networks. Hackers or automated information system (AIS) attackers gain access to system networks by manipulating those vulnerabilities. Attackers accomplish this by exploiting operating systems at the root level (Balga, Iftode, & Chen, 2008). Although there are protective measures available, businesses

Advance Ais Essay

3198 words - 13 pages T OPIC SEVEN Other AIS Development Approaches © 2012 UMT Advanced Accounting Information Systems 1 INTRODUCTION • We’ll also discuss how to hasten or improve the development process through: – Business process reengineering – Prototyping – Computer-aided software engineering (CASE) tools © 2012 UMT Advanced Accounting Information Systems 2 BUSINESS PROCESS REENGINEERING • Business process reengineering (BPR) is

History of Ais

2211 words - 9 pages modern AIS A modern AIS typically follows a multitier architecture separating the presentation to the user, application processing and data management in distinct layers. The presentation layer manages how the information is displayed to and viewed by functional users of the system (through mobile devices, web browsers or client application). The entire system is backed by a centralized database that stores all of the data. This can include

Ais - Nasdaq Data Breach

1401 words - 6 pages Running head: Business information breach - NASDAQ data breach Business information breach - NASDAQ data breach In 2011, NASDAQ Stock Market operations found "doubtful files" on its U.S. computer servers. There was no verification that the hackers entered or obtained customer information or that of parent corporation NASDAQ trading policies. The FBI along with exterior forensic associations helped carry out the investigation, despite the

Ais Sample Midterm

1009 words - 5 pages the computer auditing with computer-assisted auditing techniques (CAAT)? Auditing around the computer requires examining the inputs and outputs of a computerized AIS, but not the processing. With auditing around the computer, the computer is treated as a "black box" in which unknown functions are performed. The theory is that examination of inputs and outputs can provide assurance that data have been correctly processed. Auditing through

Home Work for Ais

767 words - 4 pages Monica Douglas-Edwards Week 2 Homework 1. How dose Miller fit the profile of the average fraud perpetrator? How does he differ? How did these characteristics make him difficult to detect? a. Miller fits the profile of the with collar criminal, he is a typical business person that has committed fraud. Throughout his career he has resorted to fraud. I really don’t see that he differ that much from the average white collar criminal, to

Ais 6756 Milestone 1

1155 words - 5 pages About Trinity Industries Trinity Industries, Inc. is an industrial company that owns a variety of businesses which provide products and services to the energy, transportation, chemical and construction sectors. The company through following segments: The Rail Group, The Construction Products Group, The Inland Barge Group, The Energy Equipment Group and The Railcar Leasing and Management Services Group. The Rail Group segment manufactures and

Ais Auditing Paper

1982 words - 8 pages that external auditors perform tests on reliability and accuracy by looking at a number of things in different areas of the IT and financial statements. The internal and external audit functions are different but both perform similar functions to the AIS. The external audit function benefits outside parties such as banks, other creditors, investors, government, and customers. If an external audit shows that a company is fraudulent or not as

Changing the Ais

2978 words - 12 pages Assignment 4: Changing the AIS Student: Peter M. Burke ACC564: Accounting Information Systems June 13, 2013 Factors contributing to the failure Whaley Foodservice Repairs hired Epicor to implement an Enterprise Resource Planning (ERP) system. The deal was signed in 2006, but after two years the project never materialized. Whaley finally sued Epicor for compensation of the cost they had incurred in trying to implement

Should Companies Be Held Liable for Successful Attacks on Their Ais by Outside Sources?

963 words - 4 pages Should Companies be Held Liable for Successful Attacks on Their AIS by Outside Sources? Julie Stoltz Keller School of Management Advanced Accounting Information Systems AC571ON Jeffrey Pullen November 14, 2011 Should Companies be Held Liable for Successful Attacks on Their AIS by Outside Sources? This is a question that has been asked many times over. There are many different opinions on the answer. My thought is that companies not

Case Studies 5.1 - 5.2 - 5.3 Ais 4081 Leadership Theory And Practice

903 words - 4 pages Laurie Baird Case Studies 5.1 - 5.2 - 5.3 AIS 4081 Leadership Theory and Practice February 6, 2013 Case 5.1 Questions: 1) According to the basic assumptions of situational leadership, where would you place the three managers in regard to levels of development in the SLII model? Rick Nakano - D4-level. "Seasoned workers with proven abilities and great devotion to a company would be identified as functioning at the D4 level

Related Essays

Changingthe Ais Essay

5494 words - 22 pages implement an accounting system properly. In Apollon Smyrnis (A Football Company) & Changing the AIS, I will research information related to a real-life accounting information system failure and best practices, as well as lessons learned from implementing the accounting system. In addition to information that I may find during my research, I will also use the following IBM article to complete the assignment: (http

Ais Chapter 1 Essay

2100 words - 9 pages be resold to customers. After preparing tables 1-2 and 1-3 and figures 1-1 and 1-2, Scott and Susan believe that they understand S&S well enough to begin shopping for an information system. Accounting Information Systems It has often been said that accounting is the language of business. If that is the case, then an accounting information system (AIS) is the intelligence – the information-providing vehicle- of that language. Accounting is a

Ais Attack Essay

1059 words - 5 pages 030 Although in many cases we see banks joining forces with law enforcement to fight cybercrime, online attackers are become increasingly organized and financial institutions may find themselves fighting even tougher battles. (Kitten, 2012) In one such case, here in Georgia, a man has pleaded guilty for the role he played in a $1.3 million phishing scheme that targeted customers of Chase, Bank of America, ADP and Branch Bank & Trust. In his

Ais Attacks Essay

1879 words - 8 pages Assignment 2: AIS Attacks and Failures: Who to Blame Prepared by: Houssem Aouididi Professor: Elias Konwufine Course: ACC 564 Date: 5/11/12 1. Accountability and responsibility: In order for me to take a position on whether a firm and its management team should or should not be held liable for losses sustained in a successful attack made on their AIS by outside sources. I need to present some facts to explain my reasoning behind my