Social Technology And Security Cincom Systems, A Essay

PAGES
2
WORDS
697
Cite

Social Technology and Security Cincom Systems, a privately-held enterprise software company who is very active on Facebook, LinkedIn, Twitter and has an extensive blog network relies on social media sites to share customer success stories and the latest updates on events the company is participating in. Cincom has six different product divisions, each offering a different type of enterprise software, ranging from Customer Relationship Management (CRM), and Enterprise Resource Planning (ERP) to advanced product and sales configuration systems as well. The latest information on employee accomplishments and a continual stream of updates on new products dominate the social networking sites, while the website is used for communicating the unique value proposition of the six different divisions.

The website is also used for providing product overviews and presentations given at conference, along with the biographies of the senior executives. Cincom's executives are all over 50 years of age, with several over 60. The website and social media reflects a more business-like focus and also shows executives at times golfing and out at sales...

...

Cincom does little to extend their message to other age groups, as the majority of companies who are customers have senior executives at the same age or older of their senior management teams. Their social media strategies tend to be self-congratulatory with plenty of pictures of their events and content that is meant for executives and senior management. Their content management strategy driving the social media sites is oriented more towards manufacturing executives and Chief Information officers (CIOs) that are more concerned about unifying their enterprise software strategies across a wide variety of systems and platforms. Content regarding management and leadership is inspirationally oriented and more attuned to those that manage larger organizations, as are the videos and experts that Cincom offers guest editorials to. Companies often rely on social media to project their image to the outside world, tending to align their content to how they ideally see themselves over what they can do for customers (Diffley, Kearns, Bennett, Kawalek, 2011). Cincom tends to this with their…

Sources Used in Documents:

References

Diffley, S., Kearns, J., Bennett, W., & Kawalek, P. (2011). Consumer behaviour in social networking sites: Implications for marketers. Irish Journal of Management, 30(2), 47-65.

Heirati, N., O'Cass, A., & Ngo, L.V. (2013). The contingent value of marketing and social networking capabilities in firm performance. Journal of Strategic Marketing, 21(1), 82.


Cite this Document:

"Social Technology And Security Cincom Systems A" (2013, April 06) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/social-technology-and-security-cincom-systems-88996

"Social Technology And Security Cincom Systems A" 06 April 2013. Web.18 April. 2024. <
https://www.paperdue.com/essay/social-technology-and-security-cincom-systems-88996>

"Social Technology And Security Cincom Systems A", 06 April 2013, Accessed.18 April. 2024,
https://www.paperdue.com/essay/social-technology-and-security-cincom-systems-88996

Related Documents

These are the two most powerful factors that anchor the Force Field Model analysis of the enterprise software industry. With the driving and restraining forces in continual interaction and at times conflict, productivity shifts drastically across the continuums of industries based on the impact of driving and restraining forces (Paquin, Koplyay, 2007). Cincom is being affected by the disruptive driving forces of CAPEX and OPEX most severely as competitors are

The exponential growth of the Internet has also served as the catalyst for the growth of highly collaborative, interactive forums and platforms on which Delphi-like brainstorming can be accomplished (Decker, Wagner, Scholz, 2005). Conversely many of the external relationships companies have and that are essential to understanding how the strategic planning process will impact an organization lend themselves to quantification. An example of this level of quantification of external

In conclusion the Interpreter role would need to define the extent, interaction and depth of internal and external forces as exemplified by the growing acceptance of the SaaS platform by enterprise software purchasers. The competitive threat of SaaS would also need to be kept in context as well, as SaaS has the limitations of a lack of security as it is entirely stored on the Internet, and also has

This is one of the greatest limitations of this technology. A second major disadvantage of RDBMS-based systems is their lack of support for image- and spatial-based databases that include Computer-Aided Design (CAD) drawings, 3D rendering and model-based data. Their table-based structure is inefficient in defining the attributes of these data types and lacks the necessary data tagging and data types to manage imaging and CAD-based design files and data