Analyze the pros and cons for each given option

Assignment Help Management Information Sys
Reference no: EM131289059

Assignment

Our final theme is "Social Media at Work". The Case is "Shall We Fire Him for that Post?"

In the case, Susannah is faced with three options: 1) Ignore the comment, 2) Reprimand Kenton by writing him up and potentially suspending him, and 3) Firing him. Analyze the pros and cons for each option. What action should she take, and why? Prepare a 2 page answer to submit in BB.

Also, please consider the following points for discussion in class (no need to write answers for the points below - just think about the issues):

· Kenton had friended staff members from the other dealerships. Should you friend coworkers? Bosses? Customers?
· What about freedom of speech? Can you mention coworkers / customers on social media, or are they off-limits?
· Social media policy - what should they look like?
· Will attitudes toward social media change, as more and more millennials enter the workforce?

Attachment:- Facebook_Case_Study.pdf

Reference no: EM131289059

Questions Cloud

How can segmentation be used to develop a marketing plan : Discuss how strategic marketing fits into the overall strategic planning process of a health care organization. How can segmentation and targeting be used to develop a marketing plan for a health care organization?
How is loan-to-value ratio used in lending practices : Discuss methods a builder might use to assist with a home buyer's permanent financing.
Who benefits from a sale-and-leaseback deal and how : What is the risk involved in an unsubordinated leasehold mortgage, and how might protection from this risk be obtained?
Discuss main assumptions and limitations of the turbulence : Discuss the main assumptions and limitations of the turbulence-chemical interaction model employed, and the RANS modelling method in general, for the particular reacting flow.
Analyze the pros and cons for each given option : Analyze the pros and cons for each option. What action should she take, and why? Prepare a 2 page answer to submit in BB.
How does a shopping center utilize percentage leases : What part of the federal Fair Housing Act is applicable to an apartment project?
Describe a special purpose building : Compare and contrast two widely different types of commercial real estate loans that you had not previously had any experience discussed in this chapter?
Describe the function of the office of interstate land sales : List two ways a lender can be assured that release of construction money is delivered to the right contractor.
What type of work is covered in a land development loan : Describe the information normally found in a profit and loss statement; in an operating statement.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Show the differences between java and other languages

Differences between Java and other languages - What are the major differences between Java programming language and any other language? List and discuss three items.

  Assignment on destination presentation

Assignment on Destination Presentation

  Do you think that artificial intelligence ai scientists

do you think that artificial intelligence ai scientists will ever be able to design systems that apply common sense in

  Electronic health records

You are a primary care physican in alarge group practice that uses and an electronic health records.(EHR).At the beginning of each visit you view a dashboard to preventive care measures-likeflu vaccine,colon cancer screening, cholesterol tests,-th..

  The value of the bond is

The value of the Enterprise bonds if the interest is paid semiannually is $ -  The value of the Enterprise bonds if the interest is paid annually is $.

  Discuss the advantages of a database management

Discuss the advantages of a database management approach to the file processing approach? Give examples to illustrate your answer.

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Explain how it is possible for someone at minitrex to call

Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time this week that they had been called?

  How changing business environment has affected the decisions

Explain how the changing business environment has affected the decisions team members' organizations have made in their use of information technology.

  Explain the protocol in detail

Consider the following protocol (attached file): a. Explain the protocol in detail.b. Can you think of a possible attack on this protocol? Explain in detail how it can be done.

  Areas of technology risk management

What are the best practices in the areas of technology risk management

  Information systems explained in this answeri would like to

information systems explained in this answeri would like to know in detail the value that information systems is adds

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd