Using MIS (9th Edition)
Using MIS (9th Edition)
9th Edition
ISBN: 9780134106786
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8.8, Problem 8.7ARQ

Explanation of Solution

Two source of SM risk:

The two source of social media risk is as follows:

  • Managing the risk of Employee Communication
  • Managing the risk of Inappropriate Content

Managing the risk of Employee Communication:

The organization should take it to develop and advertise a social media policy, which means this policy is used to helps to protect the organization name and also rights and responsibilities of employees must be defined.

Managing the risk of Inappropriate Content:

The organization must take care of inappropriate content before engaging in social media. User-generated content (UGC) which is nothing but create a fake content about the organization in social media site.

Social media policy:

Social media policy is nothing but how an organization and its employees should connect themselves via online. This policy document helps to protect the organization brand reputation and also defines the employee’s responsibilities and rights.

Summary of Intel’s guiding principles:

Intel Corporation has initiated employee-trusting social media policies, policies that is used to change as the company gains more experience with employee written SM. There are three key points of Intel policy:

  • Disclose:
    • Employees must use real name and employer ie. Be transparent to everyone in the organization.
    • Be fake and truthful to the organization.
    • Don’t change your originality, be yourself in an organization
  • Protect:
    • Don’t criticize the competition to others.
    • Avoid telling secrets to others.
    • Don’t overshare.
  • Use common sense:
    • Employee must make their contribution worthwhile.
    • Don’t respond to every criticism or inflame.
    • Accept mistakes.

Social media mistake:

“The British actor Rowan Atkinson (Mr. Bean) was died at 62 after car crush - July, 2017” was tweet in FOX BREAKING NEWS.

  • But in reality he was alive. When the user click the link it was directs to a video, which play 2 seconds and tell to the watchers to click on a Facebook link to continue viewing, according to the report...

Blurred answer
Students have asked these similar questions
D. S. Malik, Data Structures Using C++, 2nd Edition, 2010
Methods (Ch6) - Review 1. (The MyRoot method) Below is a manual implementation of the Math.sqrt() method in Java. There are two methods, method #1 which calculates the square root for positive integers, and method #2, which calculates the square root of positive doubles (also works for integers). public class SquareRoot { public static void main(String[] args) { } // implement a loop of your choice here // Method that calculates the square root of integer variables public static double myRoot(int number) { double root; root=number/2; double root old; do { root old root; root (root_old+number/root_old)/2; } while (Math.abs(root_old-root)>1.8E-6); return root; } // Method that calculates the square root of double variables public static double myRoot(double number) { double root; root number/2; double root_old; do { root old root; root (root_old+number/root_old)/2; while (Math.abs (root_old-root)>1.0E-6); return root; } } Program-it-Yourself: In the main method, create a program that…
I would like to know the main features about the following 3 key concepts:1. Backup Domain Controller (BDC)2. Access Control List (ACL)3. Dynamic Memory
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education