Verified Document

Risks Exposed To Organizations By Essay

93). The threats and risks of social media abuse and use must be minimized by the policy. The social media policy must be specific to the culture and facility of the organization. In order to limit the personal use of social-media networks, a sound social-networking policy is required to be established by firms. Background

More than five hundred million users have access to Facebook since it graduated from its college roots. Whereas, connecting job seekers and employers to each other was the purpose of LinkedIn, but now it has more than seventy five million members, its scope has got broadened. On Twitter, tweeting is the main thing to do by everybody. More than twenty five percent of employees were revealed to change the settings of their computers in their workplace circumventing the policies of employee communication, in accordance to a recent Cisco study (Lyncheski & Et.al, 2010, pp. 32).

Almost 1 and a half of all employees under the age of thirty and at the age of thirty, on employer time, have visited social media sites for meaningless interactive digital games for more than an hour per day, in accordance to Cisco, which is one of the leading network providers of the United States. Almost one third of them claimed that they were granted permission to do so, whereas, a policy governing social media usage and access was acquired by five employers only, in accordance to the information compiled by Cisco. Beyond any reasonable expectations, the use of new media is going to increase, and in comparison, any time soon the employees' access to social media will not going to wane.

Body

Support for Claim

Fifty one percent of chief financial officers were interviewed in a recent study which was conducted by Accountemps....

During business hours, the waste of time by employees through navigating sites for personal use, like, Twitter and Facebook. They also expressed that the use of social media by employees might result in unprofessional behavior of the employees as they might leak confidential information of the company which can pose great risks for their firms.
Every retaliation, discrimination or unlawful harassment law can be violated by social-media usage. The inappropriate use of social media can violate any local and state laws, like, GINA, ADEA, PDA, ADAAA, and EEO. Common examples of violations include, a supervisor blogging national-origin or racial-related slurs related to an employee, or in a provocative pose on a Facebook page the tagging of an intoxicated coworker (Brice & Et.al, 2010, pp. 13).

Alternative or Opposing Views

Opportunities for success are continuously out-looked by firms in the current economic environment. To promote their firms and to reach customers, the social media networking is considered as beneficial by many of the organizations. In accordance to a survey, out of ten financial executive three of them consider that inappropriate use of social media sites can enhance the customer service of the organization. The benefits of online marketing are realized by an increasing number of executive in order to maintain a competitive position in the market.

A value in use of social media sites, like, Twitter and Facebook, by employees is driven by most of the executives for purposes of the business for connecting with the target audiences and providing them services or for promoting a product (CPA Practice Management Forum 7.1, 2011, pp. 15). To quickly address the service issues and to communicate with the customers directly,

Sources used in this document:
Alternative or Opposing Views

Opportunities for success are continuously out-looked by firms in the current economic environment. To promote their firms and to reach customers, the social media networking is considered as beneficial by many of the organizations. In accordance to a survey, out of ten financial executive three of them consider that inappropriate use of social media sites can enhance the customer service of the organization. The benefits of online marketing are realized by an increasing number of executive in order to maintain a competitive position in the market.

A value in use of social media sites, like, Twitter and Facebook, by employees is driven by most of the executives for purposes of the business for connecting with the target audiences and providing them services or for promoting a product (CPA Practice Management Forum 7.1, 2011, pp. 15). To quickly address the service issues and to communicate with the customers directly,
Cite this Document:
Copy Bibliography Citation

Related Documents

Asbestos Workforce Health Risks Workforce Health Risks
Words: 2011 Length: 6 Document Type: Research Paper

ASBESTOS Workforce Health Risks WORKFORCE HEALTH RISKS AND REPUTATIONAL DAMAGE LINKED TO ASBESTOS IN COMPANY BUILDINGS. Usage of Asbestos Asbestos: A Long-Term Process Risks of Asbestos Asbestosis Lung Cancer Pulmonary Hypertension Mesothelioma Effects on Your Heart Best Way to Communicate with Public Ways to make people secure Prevent Inhaling Asbestos Measures to Reduce the Effects of Already Exposed Asbestos Methods to Keep Premises Secure With increased awareness and technological advancement across the globe, workforce rights have gained significant importance. All the companies have become conscious about

Information Systems Outsourcing Advantage and Risks There
Words: 2721 Length: 10 Document Type: Research Paper

Information Systems Outsourcing Advantage and Risks There appears to be some confusion and trepidation about the use of outsourcing for Information Systems in today's organizations. While some advocate for the use of IS outsourcing still others state claims that it is not an effective or efficient organizational practice. The objective of the research contained in this study is to determine the effectiveness and efficiency of information systems outsourcing practices. The significance of the

Business Risks -- Overview of the Risk
Words: 2459 Length: 8 Document Type: Essay

Business Risks -- Overview of the Risk Environment There are various types of business risks in the business environment, and these risks, of course, can differ from environment to environment depending on the type of business or organization. The severity and category of the risk also depends on the largeness of the organization and on various other factors, such as location, personality of employer, quantity of employees employed, and so forth

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Occupational Health, Safety Risks, and Hazards Identified in a Student...
Words: 8588 Length: 30 Document Type: Essay

NEBOSH Unit D According to the Health and Safety Executive (HSE), the cost of workplace injuries and disease is in excess of $20 billion dollars per year. Obviously, these figures are alarming and would suggest that Occupational Health and Safety (OHS) should be a top priority for management. However, a survey from 2011 revealed that many companies have no written OHS policy and nearly half have no formalized occupational health and

Demands That Emergency Workers Are Exposed to
Words: 2651 Length: 8 Document Type: Research Paper

Demands That Emergency Workers Are Exposed To In this day and age, where no one is safe and emergency situations arise all the time, the people behind keeping the peace intact play a very important role. In recent studies it has been observed that emergency workers go through immense pressure and stress, which if gone undiagnosed can lead to major psychological problems. In this paper we will discuss at length the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now