Social media manager for a vendor management consultancy

Assignment Help Computer Network Security
Reference no: EM13727126

You are a social media manager for a vendor management consultancy. Your clients include well known financial institutions, banks, and insurance agencies. Despite the fact that these organizations can be conservative in their advertising approach, you have generated solid interest in the services of your consultancy along with multiple new client prospects. You have employed a variety of social media applications such as Facebook, Twitter and Pinterest. You are in the process of designing a new marketing campaign by using your favorite Web 2.0 tool Pinterest when you get a call from Mark, your buddy at the IT department. One of the pins you created for your company's Pinterest website, says Mark, has been pinned by MLC, a company known for shady financial practices and even money laundering. It seems MLC is trying to build a clean new reputation and enter the legitimate financial market. They would love to associate the name of their company with your own consultancy name and established reputation. Mark urges you to close the Pinterest account immediately. You hang up when Don, the manager of the sales department stops at your desk on the way to the new training about security issues related to social media. You had forgotten all about it. Should you go? Maybe the training will help you find a way to neutralize the attempts of MLC to involve the name of your company in their marketing campaign.

While considering your options, you get a call from your boss, the VP of marketing. He's been informed and troubled by the situation with MLC, and he wants you to handle it immediately.

What should you do? How can yo apply each step of the S2PS2 to generate viable solutions and solve the problem?


Consider the following questions:

Question: What is the problem? What are the main events?
Question: Who are the participants and the decision makers influencing the outcome?
Question: Why did the problem occur? What were the main factors contributing to the problem?
Question: Was there a turning point or defining moment during the course of events? Did this event make any specific solutions possible?
Question: What other possible solutions do you see? What evaluation models can you use?
Question: What solution will you implement? What kinds of rules or plans need to be put in place to facilitate the implementation of the solution?

Reference no: EM13727126

Questions Cloud

Describe the basic characteristics of currency hedging tools : Describe the basic characteristics of currency hedging tools: forwards, futures, swaps, options and more complex options (caps, floors, collars), as well as “natural hedges” on a corporation’s balance sheet.
Discuss the method of determining the fair value for forward : International business activities are inherently more attractive to large companies in mature markets than to small high growth US companies. True or false. Why or why not. Discuss the method of determining the “fair value” for forward, futures and o..
Manufacture of a wide range of consumer products : A Carlyle chemical is evaluating a new chemical compound used in the manufacture of a wide range of consumer products. The firm is concerned that inflation in the cost of raw materials will have an adverse effect on the projects cash flow. Specifical..
Social media manager for a vendor management consultancy : Question: What is the problem? What are the main events? Question: Who are the participants and the decision makers influencing the outcome?
How does a company product influence the process : How does a company's product influence the process of going international? How (if at all) does technology, such as the Internet, affect the process of going international?
What are some examples of hazard control methods : What are some examples of hazard control methods that are recommended in hazard prevention and reduction techniques. Do you feel that some of these methods are more important to use than others. Which do you believe reduces the possibility of a fu..
Type i and type ii virtualizations : Compare and contrast at least two (2) similarities and two (2) differences between Type I and Type II virtualizations. Using your comparison, choose either a Type I or Type II virtualization and determine a specific networking scenario in which yo..
What made the organization have an effective culture : What made the organization have an effective and ineffective organizaitonal culture. Why is it important to know the difference and impact it can have on your organization. Answer the question

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd