...Privacy and security at the digital age: The innovation of Business in the online world Over the past decade the world has solely relied upon technology and its transformation throughout the years allowing for the revolution of social media to completely change how everyone communicates especially for businesses, allowing them to extend out and provide large opportunities for themselves. According to ISACA (2010), through the use of social media, it allows businesses to gain serious advantages through research and evaluation of their competition, their consumers, and the market. This enables them to not only help develop them to be on top of their issues, but using it as a tool for enhancing a better relational experience with employees and customers. For businesses to be successful with their organisations or products, social media is the key to their communication with their stakeholders through privacy and security, where it strongly impacts business to improve, but can be considered also to be a big risk where that barrier can be invaded, which can cause legal and ethical issues. Privacy and security are known to be the most important issues surrounding social media and the innovation of businesses today. Although it may be argued that users voluntarily sign away their privacy by using these social media when creating accounts and putting their personal data online, it is not clear how consent actually works in these situations (Custers et al. 2014). But overall privacy...
Words: 1757 - Pages: 8
...Guidelines for Secure Use of Social Media by Federal Departments and Agencies Information Security and Identity Management Committee (ISIMC) Network and Infrastructure Security Subcommittee (NISSC) Web 2.0 Security Working Group (W20SWG) Version 1.0 September 2009 This document is publicly releasable Intended Audience This document is intended as guidance for any federal agency that uses social media services to collaborate and communicate among employees, partners, other federal agencies, and the public. Note: The Federal CIO Council does not endorse the use or imply preference for any vendor commercial products or services mentioned in this document. Guidelines for Secure Use of Social Media by Federal Departments and Agencies Page 2 TABLE OF CONTENTS INTENDED AUDIENCE............................................................................................................................................2 REVISION HISTORY ................................................................................................................................................4 ACKNOWLEDGEMENTS ........................................................................................................................................5 EXECUTIVE SUMMARY .........................................................................................................................................6 RISKS ......................................................
Words: 7347 - Pages: 30
...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Terry L Green THIS FORM MUST BE COMPLETELY FILLED IN Please Follow These Procedures: If requested by your mentor, use an assignment cover sheet as the first page of the word processor file. The assignment header should include the Learner’s last name, first initial, course code, dash, and assignment number (DoeJXXX0000-1) justified to the left and the page number justified to the right. Keep a Photocopy or Electronic Copy of Your Assignments: You may need to re-submit assignments if your mentor has indicated that you may or must do so. Academic Integrity: All work submitted in each course must be the Learner’s own. This includes all assignments, exams, term papers, and other projects required by the faculty mentor. The known submission of another person’s work represented as that of the Learner’s without properly citing the source of the work will be considered plagiarism and will result in an unsatisfactory grade for the work submitted or for the entire course, and may result in academic dismissal. | | BTM8102-8 | Kris Iyer, PhD | | | Business Research Methodology | GreenTBTM8102-2 | | | <Add Learner comments here> ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- <Faculty comments here> ...
Words: 2699 - Pages: 11
...Introduction Social media has promoted communication. It has gathered people from all over the world to interact electronically without any movement. Social media tools such as LinkedIn, Facebook, Blogs and Twitter have enabled people to exchange information irrespective of where the person is located. Despite its advantages, social media may negatively affect healthcare because the healthcare providers are supposed to maintain confidentiality on patient’s personal information and medical history. The healthcare providers are supposed to comply with HIPAA privacy and security rule while using social media in order to evade lawsuits as a result of disclosing patient’s information on social media platforms. Based on Rienton (2013) examples, it...
Words: 2367 - Pages: 10
...Social Media and Business Social media has always been a threat to not only security but also reputation of a business. Employees today have access to all kinds of social network sites to include Facebook, Myspace, Twitter, Instagram, online blogs, and many more. These sites are easily accessible to the user from their computer, tablets, and cellphones through various types of applications. Through my research I was able to find a trend in users using these media outputs to accidently leak information unintentionally and even intentionally. I found that any business can be susceptible to having data leaked and reputations tarnished from employees not handling social media correctly. I will cover this area of expertise, technology involved, future trends, security issues, some businesses involved, regulatory issues that arise, what business can do to handle social media, and global implications. When you consider what technology is being used most users will think of physical equipment. While this is the case that is the access medium that is used when thinking of social networking. Social media can be accessed in various ways to include your home computer, office computer if they allow you to view such sites, tablets, and your phone that could not be regulated depending on if it is a company phone. These access mediums must be regulated and users educated on the proper use of these devices. There are different types of online technologies that can be used to access social...
Words: 3437 - Pages: 14
...Thesis Statement With the recent school shootings happening and evidence of the perpetrators posting comments online thru social media, the government should be focusing on applying laws requiring companies to use artificial intelligence agents to help identify persons of interest and allow local law enforcement, along with the companies, to monitor these agents. Annotated Bibliography Dulek, R., Motes, W., & Hilton, C. (1997), Executive Perceptions of Superior and Subordinate Information Control: Practice versus Ethics. Journal of Business Ethics Vol. 16, pgs.1175-1184 This entry examines the ethical practices of leaders in a business and their employees involving information control within a business. Specifically it examines whether these executives know if control is being performed and if they deem it ethical. The statement “…executives are generally drawn to those command activities they deem to be "proper and right." but shy away from those that are iniquitous.” R. Dulek has authored six books and publishes more than forty journal articles. He is currently...
Words: 1878 - Pages: 8
...Social Networks and their impact on Availability, Confidentiality and Integrity Musa Ramadhani Davenport University IAAS 667 - Legal and Ethical Security Topics Deanne Cranford-Wesley Table of Contents Abstract 3 Introduction 4 Problem Statement 7 Literature Review 8 Findings 11 Military Families 12 Identifying your social media users 16 Common myths about Social Media 17 Data leakage and non-disclosure 17 Social Media Squatting 18 A new generation of hackers 18 The high cost of inaction 19 Harm to brand reputation 19 Lost productivity 19 Strains on bandwidth 20 Implementing effective Practices 20 Recommendations 21 Creating an Account 21 General Recommendations 22 Conclusion 26 References 28 Abstract Social networking sites spread information faster than any other media. Over 50% of people learn about breaking news on social media. 65% of traditional media reporters and editors use sites like Facebook and LinkedIn for story research, and 52% use Twitter. Social networking sites are the top news source for 27.8% of Americans, ranking close to newspapers (28.8%) and above radio (18.8%) and other print publications (6%). Twitter and YouTube users reported the July 20, 2012 Aurora, CO theater shooting before news crews could arrive on the scene, and the Red Cross urged witnesses to tell family members they were safe via social media outlets. In the same breath one could argue that social media enables...
Words: 6827 - Pages: 28
...experience, develop a set of guidelines that you would offer to others to help ensure global project success. You should focus a larger part of your discussion on this area. I am most interested in hearing about your guidelines for project success based on your experience in the project. Conclusion – brief summary of entire paper Chris Gunderson All, Despite a couple of technical difficulties I felt like the meeting was a real success via Skype. My big takeaways were that of the five key contributors to the meeting none of us is really deeply using the "traditional" social media in our current environments. Shad and Kerry both had some intriguing suggestions in Cisco Web Social and Submittal Exchange respectively - both sound like they have a lot of value to PM. There were some definite advantages to using Facebook as a marketing or PR tool but overall it seems like security concerns and its basic functionality may limit its uses for day-to-day project management. Thanks everyone for taking the time to dial in today. I look forward to hearing your takes on today's meeting. Gundy ME Overall I think the meeting went pretty good. I apologize for being slow getting people on the call. Maybe a lesson learned? I was also getting alot of distortion and cutting out on the call. Just...
Words: 1481 - Pages: 6
...International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 ISSN 2250-3153 1 Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks WorawitBinden*, MaheedeenJormae**, ZakariaZain***, Jamaludin Ibrahim**** worawit.inter@gmail.com*, maheedeen@gmail.com**, zakariazain13@gmail.com***, jamal55@gmail.com**** Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia ABSTRACT-Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media interactivity features on the exposure of personal data of average Internet user and present techniques to implement information security awareness to minimize overexposure on OSNs. Index Terms-Online Social Networking, Information Security Awareness, Social Network Interactivity Features I. INTRODUCTION nformation is vital to communication and a critical resource for performing work in organizations. It is also important to individuals, and therefore the need to proper manage it well, is growing rapidly. Protecting data is as important as protecting cash as it is asset – and requires just as much care and planning. Now more than ever, people need...
Words: 4473 - Pages: 18
...Social Media in E-Commerce June 12, 2011 COMM/470 Krystal Hall Introduction The presentation by team C last week was a PowerPoint presentation on communication consultants. The slides in the presentation show support of the new technology for e-commerce businesses and how the team- oriented projects become more effective and efficient. The executives viewing the presentation thought it was a success and would now like to proceed with launching an e-commerce unit. In this paper the team will discuss how social media tools can distribute messages to consumers and the clients. The team will analyze the best tools to use in specific situations and the ethical values behind them. The analysis will include security and privacy issues. The credibility and the reputation will be in the analysis also. Social Media in E-Commerce When using social media one should be aware of the ethical issues that surround it. Social tools help to relay messages to consumers and clients. Companies are able to communicate in various types of social communication. Not all social tools are appropriate for every business transaction or communication. Developing the knowledge of choosing the right one will benefit the company and help to increase the profits. There are many issues to observe when using social media and a business together. Identity theft is one of the biggest concerns for the consumer. Making sure that the site is secure will ease the customer who is already hesitant about...
Words: 1760 - Pages: 8
... Health Care Communication Methods Paper Today, many options of communication are available to make contact with others. Methods of communication include traditional avenues included making a person to person telephone call, writing a letter and sending it through the United States Postal Service, or conducting a face-to-face encounter. Because of the development of technology, we have more available options of communication, such as e-mail, facsimiles, texting, and social media. Each option has advantages and disadvantages; some are informal and others are formal. Every situation must be considered regarding the choice of the form of communication to be used; this is the same whether it is personal or business. This paper will concentrate on the communication methods available to an administrator of a nursing home and how the choices can affect the privacy and security of protected information. This situation is a very delicate issue; the livelihood of patients is threatened with change and uncertainty, which many cannot understand. Some of the patients have local family who can assist in the process and help the patient; others do have local family rendering a more difficult process regarding the transition. The administrator must choose the most efficient and professional method of communication for each individual case. The definition of health communication according to Du Pre (2005) is, “The way we seek, process, and share health...
Words: 1456 - Pages: 6
...selected a Cyber Security topic because it is a big concern for me how my information (the data) is stored online. This is a topic that everybody worries about because nobody knows where the cloud is or who has access to it. It seems to me that every week there are new headlines about hackers bringing an organization to its knees by doing things such as stolen funds, bad publicity, and embarrassing revelations that are on the front page news. Then I ask myself, how can we protect ourselves from these issues? I guess the best protection is for both ends to implement plans and procedures or maybe the best way to demonstrate the needs for those procedures is to perform a Cyber Security audit and implement the resulting recommendations. Moreover, work in conjunction with IT departments can ensure that implementing the resulting recommendations will make both sides of the social media communication more secure. Like most criminals, hackers look for easy targets. If your media has simple security issues that are easy to exploit, hackers will dive right in. If your infrastructure is strong on your end, hackers will become frustrated and move on to the next easy mark. Furthermore, in these days it is almost impossible to be in an online business with an organization that does not collect or hold personal identifying information like names, addresses, Social Security numbers, credit card numbers, or other account numbers. So, how comprehensive is Cyber Security if it cannot...
Words: 2159 - Pages: 9
...MU13BHA08 Communication During a Crisis Situation Given the scenario, today as the director of a regional Emergency Management Office, the phone begun to ring more than usual. I had started receiving official reports that the public water supplies of several towns in the area have become contaminated with a life-threatening biological agent. Contingency plans must be addressed within the organization, and with the public without creating a panic. This paper will cover development of a communication plan, and what the communication plan should include. This paper will also cover topics regarding potential advantages, and challenges with communication, communication with the public, and private sector, message mapping, the use of social media, and how media might be used with today’s modern technology. If carefully designed, communication plan can save precious time when an emergency occurs and enable leaders and spokespersons to focus on particulars of the emergency at hand, and the quality, accuracy, and speed of their responses. To show the context of messaging as part of the overall plan, the following describes what a comprehensive communication plan should include. • Describe and designate staff roles and responsibilities for different emergency scenarios • Designate who is accountable for leading the response • Designate who is responsible for implementing various actions • Designate who needs to be consulted during the process • Designate who needs to be informed...
Words: 1417 - Pages: 6
...Strategic Communications Can social media become a platform for social commerce? American Express Case Study: Applying social media analytics to evaluate Link, Like, Love Overview American Express® launched several successful online initiatives that monetize the unique features of social media, such as Location Services check-ins for discounts with Foursquare (Sync, Explore, Save) and discounts through Facebook® (Link, Like, Love). Here’s how the Facebook Link, Like, Love program works. You link your American Express card to your Facebook account. Then American Express delivers deals and offers based on your Facebook activity, pages you like and share, as well as the activities of your Facebook friends. See something you love? With just one click, the discount is attached to your account. When you make the related transaction with your Amex card within a specific time period, the discount is credited to your account. It’s “Groupon without the Coupon,” making it easy for users to redeem offers. And there is no cost or risk to users if they choose not to take advantage of the offer. The promotion offers customers a seamless way to earn rewards for using their Amex card. Lessons from American Express’ Link, Like, Love • Design your social media presence with the customer in mind. Create a seamless user experience that drives conversion. • Design your program to exploit features unique to social media such as social networks, viral advocacy, and scalability...
Words: 3807 - Pages: 16
...Communications Coordinator As the Communications Coordinator for the Cobbs National Drug Manufacturer (CNDM) there is rising concern around recent events from the media exposure on the adverse effects one of our nationally advertised medications has had on the Chief-of-Police. According to Athena du Pre, PhD, “Lack of communication can lead to duplicated efforts, costly (and sometimes life-threatening) delays, frustration, and wasted time” (Du Pre, 2005, p. 289) and our goal is to maintain open communication. Today’s meeting will help identify several ways to deliver our message. Today’s meeting will help to brainstorm communication methods regarding the negative publicity surrounding the event with the Chief-of-Police. Today’s meeting will help decide how to address the issue with the public while minimizing any additional loss to the company and how to communicate the ideas without violating HIPAA, Health Insurance Portability and Accountability Act, guidelines. Advantages and disadvantages of communication methods First, we will discuss advantages and disadvantages of using traditional media to distribute our message. Traditional media covers how the majority of the public access health care information. Magazines, newspapers, radio, and television are the outlets for traditional media. The message we need to communicate to the public would reach a large audience through these four avenues. This is an advantage regarding the recent events. Use of the four outlets will...
Words: 1197 - Pages: 5