Powerpoint presentation on the use of personal social media

Assignment Help Basic Computer Science
Reference no: EM132378269

STRATEGIC PORTFOLIO MANAGEMENT

Often best practices in the workplace lag behind technology advances. Ethical principles and best practices must be constantly reviewed and deeply considered in the workplace. Social media have had a big impact particularly on the Digital Native (those born after 1980). In this assignment, you as a manager will need to remind the Digital Native to be mindful of their social media usage in the workplace and beyond.

SLP Assignment Expectations

You are the manager for a workgroup at your company. Prepare a PowerPoint presentation on the use of personal social media in the workplace and discuss posting about your firm on your personal social media site when away from work. Discuss the restrictions on the use of personal social networks by employees, security issues, and how posting on social media can impact the firm's image.

This should take 2 to 3 pages.

Reference no: EM132378269

Questions Cloud

Define key performance indicators and key risk indicators : Chapter 12 presented strategic planning and performance with Intuit. Define Key Performance Indicators (KPI) and Key Risk Indicators (KRI)?
Academically reviewed article on group cohesiveness : As a group, review 1 academically reviewed article on Group Cohesiveness. Develop a power presentation of the article.
Different stages for implementing information management : Discuss the different stages for implementing information management in order to move from general principles to specific applications.
System dynamics and multi-actor systems modeling : System dynamics, Multi-actor systems modeling, Complex adaptive systems modeling,
Powerpoint presentation on the use of personal social media : You are the manager for a workgroup at your company. Prepare a PowerPoint presentation on the use of personal social media in the workplace
Strategic portfolio management : Often best practices in the workplace lag behind technology advances. Ethical principles and best practices must be constantly reviewed
Information governance reference model diagram : In order to interpret the Information Governance Reference Model (IGRM) diagram.
IT Security Policy Enforcement and Monitoring : Explain the extent to which you believe an organization has the right to monitor user actions and traffic.
Controlling the assault of non-solicited pornography : Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act, 2003. Financial Services Modernization Act, 1999

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the net present value of the hiking

What is the net present value of the hiking trail to the City of Waco if the discount rate is 5%? According to your analysis, should the project be undertaken?

  Programmer defines the destructor

If the programmer defines the destructor, then good practice does not require? A.copy constructor B.

  How can you grow your ob skills in the workplace

How can you grow your OB skills in the workplace? Let's explore this as you respond to the following:

  Characteristics of new-updated business information system

What characteristics of the new or updated business information system would indicate that it is ready to move from development into production?

  Provide a cost-effective solution

Your company has been engaged to provide a cost-effective solution that would allow the new administrator to do the following:

  Design a simple normal not 3d electric wiring diagram for ho

Design a simple normal not 3D, electric wiring diagram for home with 3 bad room 1 master 2 medium  w/basement and garage, 2 bath, kitchen with electric oven and microwave  , laundry and AC with heat.

  Perform a brute-force attack with unknown iv

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext

  Encrypted password adminpass for remote telnet

Type the global configuration mode and line configuration mode commands that are required to secure the VTY lines 0 through 15 to use the local username

  What role end-users typically play in incident reporting

Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences?

  Describes the movement of inventory

Create a decision table that describes the movement of inventory and draw a decision tree that describes the merchandise inventory management process.

  Discuss the importance of hardening

Discuss the importance of "hardening" the PCS client workstations and servers. Make recommendations for operating system hardening options.

  Discuss financial ratio analysis

Identify two advantages and two disadvantages to using ratios in financial analysis. Be sure to cite your sources using APA

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd