Examine the risks and vulnerabilities to your employer

Assignment Help Management Information Sys
Reference no: EM132211997

Assignment : Social Media and Privacy Issues

Social networks afford individuals the venue and technology to connect with many " friends", both known and unknown. An individual's activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers.

This practice is more obvious on professional social network sites that identify the employee's employer, such as LinkedIn.

Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.

Write a four to five (4-5) page guidelines for accessing Web 2.0 sites that:

1. Select and describe three (3) social networking sites you are presenting in the context of cloud computing.

2. Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.

3. Summarize the mitigating strategies you would recommend to your CEO that affirm the organization's privacy and security practice among social network sites.

4. Suggest three (3) ways that your social network policy can protect your employer against:

a. identity theft

b. cybercrimes

c. abusive marketing

5. Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM132211997

Questions Cloud

Identify a real example of when one of the listed business : Identify a real example of when one of the listed business crimes from the list below was alleged to have been committed.
How iaas and paas trends in cloud computing will impact : Examine how IaaS and PaaS trends in cloud computing will impact enterprise security policies in the short and long term.
Identify three aspects of portfolio management : Determine the interconnectivity of each of the four IT business management domains as discussed in Chapter 2 of the Stenzel textbook on page 57.
How your proposal directly and indirectly impact aspects : After discussion with your mentor, name one financial aspect, one quality aspect, and one clinical aspect that need to be taken into account for developing.
Examine the risks and vulnerabilities to your employer : Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns.
Develop a stakeholder map for a health care organization : Using Exhibit 2-6 (page 63 in the text) as an example, develop a "stakeholder map" for a health care organization in your metropolitan area or state.
Speculation on outsourcing and offshoring opportunities : The Chief Executive Officer has given you sixty (60) days to deliver an information technology project plan in anticipation of the company merger.
What can you determine about the corporate culture from fact : What can you determine about the corporate culture from the fact that they waited this long to consider the development of an EPM system?
What future will look like for individual or organization : A vision statement provides a very specific description of what the future will look like for an individual or an organization.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze the platform that ial chose as an online portal

Identify the platform that IAL chose as an online portal and content management system, and describe the main reason(s) why IAL chose such a specific platform.

  Develop a full contingency plan for the organization

Develop a full contingency plan for the organization. Include all subordinate functions / sub plans, including BIA, IRP, DRP, and BCP efforts.

  Analyze the encryption protocols used in wireless networks

Assess how current encryption protocols have addressed the weaknesses of WEP and suggest the security advancements that are currently needed.

  Discuss the seven layers of the open system interconnection

Identify and discuss the seven layers of the Open System Interconnection (OSI) model and their importance on TCP/IP operation.

  Describe the golden rules of interface design

Suggest two (2) changes for each interface to achieve a more user-friendly design and justify your suggestion.

  Which type of system would you use to change a production

Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas infor..

  Student query- supply chain management

ABC car manufacturer is subject to caps on CO2 emissions and would like to assess whether or not it should invest in the technology necessary to make electric vehicles that would reduce the amount of CO2 produced by their vehicles.

  Describe why fat servers rather than fat clients

Provide a scenario in which the use of fat servers would be preferred over the use of fat clients. Describe why fat servers, rather than fat clients, should be used in your scenario.Compare the pros and cons of Intranets to those of the Internet f..

  Compare the dyb and gyb strategies in terms of ability

Compare the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals.

  What are protective barriers and what should they entail

What are protective barriers and what should they entail? What mitigation procedures can be used to ensure the resiliency of protective barriers?

  Examine two common agile coach failure modes

Examine two common agile coach failure modes. Provide at least two examples of these failure modes and speculate on where these failure modes come from.

  Create the disaster recovery plan for a small neighborhood

You have been asked to create the disaster recovery plan for a small neighborhood veterinary clinic. This clinic provides services for dogs and cats only. These services include office visits, surgery, hospitalization, and boarding. The clinic is ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd