Risks Exposed To Organizations By Essay

PAGES
4
WORDS
1160
Cite

93). The threats and risks of social media abuse and use must be minimized by the policy. The social media policy must be specific to the culture and facility of the organization. In order to limit the personal use of social-media networks, a sound social-networking policy is required to be established by firms. Background

More than five hundred million users have access to Facebook since it graduated from its college roots. Whereas, connecting job seekers and employers to each other was the purpose of LinkedIn, but now it has more than seventy five million members, its scope has got broadened. On Twitter, tweeting is the main thing to do by everybody. More than twenty five percent of employees were revealed to change the settings of their computers in their workplace circumventing the policies of employee communication, in accordance to a recent Cisco study (Lyncheski & Et.al, 2010, pp. 32).

Almost 1 and a half of all employees under the age of thirty and at the age of thirty, on employer time, have visited social media sites for meaningless interactive digital games for more than an hour per day, in accordance to Cisco, which is one of the leading network providers of the United States. Almost one third of them claimed that they were granted permission to do so, whereas, a policy governing social media usage and access was acquired by five employers only, in accordance to the information compiled by Cisco. Beyond any reasonable expectations, the use of new media is going to increase, and in comparison, any time soon the employees' access to social media will not going to wane.

Body

Support for Claim

Fifty one percent of chief financial officers were interviewed in a recent study which was conducted by Accountemps....

...

During business hours, the waste of time by employees through navigating sites for personal use, like, Twitter and Facebook. They also expressed that the use of social media by employees might result in unprofessional behavior of the employees as they might leak confidential information of the company which can pose great risks for their firms.
Every retaliation, discrimination or unlawful harassment law can be violated by social-media usage. The inappropriate use of social media can violate any local and state laws, like, GINA, ADEA, PDA, ADAAA, and EEO. Common examples of violations include, a supervisor blogging national-origin or racial-related slurs related to an employee, or in a provocative pose on a Facebook page the tagging of an intoxicated coworker (Brice & Et.al, 2010, pp. 13).

Alternative or Opposing Views

Opportunities for success are continuously out-looked by firms in the current economic environment. To promote their firms and to reach customers, the social media networking is considered as beneficial by many of the organizations. In accordance to a survey, out of ten financial executive three of them consider that inappropriate use of social media sites can enhance the customer service of the organization. The benefits of online marketing are realized by an increasing number of executive in order to maintain a competitive position in the market.

A value in use of social media sites, like, Twitter and Facebook, by employees is driven by most of the executives for purposes of the business for connecting with the target audiences and providing them services or for promoting a product (CPA Practice Management Forum 7.1, 2011, pp. 15). To quickly address the service issues and to communicate with the customers directly,

Sources Used in Documents:

Alternative or Opposing Views

Opportunities for success are continuously out-looked by firms in the current economic environment. To promote their firms and to reach customers, the social media networking is considered as beneficial by many of the organizations. In accordance to a survey, out of ten financial executive three of them consider that inappropriate use of social media sites can enhance the customer service of the organization. The benefits of online marketing are realized by an increasing number of executive in order to maintain a competitive position in the market.

A value in use of social media sites, like, Twitter and Facebook, by employees is driven by most of the executives for purposes of the business for connecting with the target audiences and providing them services or for promoting a product (CPA Practice Management Forum 7.1, 2011, pp. 15). To quickly address the service issues and to communicate with the customers directly,


Cite this Document:

"Risks Exposed To Organizations By" (2013, August 03) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/risks-exposed-to-organizations-by-93945

"Risks Exposed To Organizations By" 03 August 2013. Web.20 April. 2024. <
https://www.paperdue.com/essay/risks-exposed-to-organizations-by-93945>

"Risks Exposed To Organizations By", 03 August 2013, Accessed.20 April. 2024,
https://www.paperdue.com/essay/risks-exposed-to-organizations-by-93945

Related Documents
Risk Assessment in the Past
PAGES 15 WORDS 5965

It is also quite possible to use the file system's security characteristics or features in order to protect accessibility to the device management application itself. Then unauthorized users will not be in a position to read the application file, and they will not be able to run the application and have to attempt to guess a legitimate logon password in each of the step providing an extra layer of

Risk Management in Hedge Funds A research of how dissimilar hedge fund managers identify and achieve risk The most vital lesson in expressions of Hedge Fund Management comes from the inadequate name of this kind of alternative investment that is an alternative: The notion that all methodical risks are differentiated away is not really applicable here, with the Hedge Fund returns, in realism, representing a mixture of superior administration of market

Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information

Risk Management The video game industry forms a significant part of the leading companies worldwide currently. The huge diffusion of the internet and associated information technologies over the recent years has raised the need of increased security. Advancement in technology consequently leads to the advancement of video games as well as associated security risks. Some of the common threats and vulnerabilities involving this industry include: misuse by human, hacking, fraud,

Risk Management Plan for Exxon Mobil A risk management process is a systematic application of management policies for the purpose of identifying, analyzing, evaluating and mitigating any possible risks within an organization. The following paper focuses on formulation of risk management plan for Exxon Mobil, one of the world's most renowned oil and gas companies. The risks would be identified and selected applicable to this firm and after their evaluation, a

Risk Assessment Program
PAGES 13 WORDS 3310

Risk Assessment Program Over the last several years, many small and medium sized businesses have been turning to cloud computing as a way of storing, retrieving and accessing vital information. This is when a third party provider will offer firms with these services at a fraction of the cost of traditional IT departments. Moreover, there is unlimited storage capacity and firms can readily protect themselves against vulnerabilities at a particular site.