Social media manager for a vendor management consultancy

Assignment Help Computer Network Security
Reference no: EM13727126

You are a social media manager for a vendor management consultancy. Your clients include well known financial institutions, banks, and insurance agencies. Despite the fact that these organizations can be conservative in their advertising approach, you have generated solid interest in the services of your consultancy along with multiple new client prospects. You have employed a variety of social media applications such as Facebook, Twitter and Pinterest. You are in the process of designing a new marketing campaign by using your favorite Web 2.0 tool Pinterest when you get a call from Mark, your buddy at the IT department. One of the pins you created for your company's Pinterest website, says Mark, has been pinned by MLC, a company known for shady financial practices and even money laundering. It seems MLC is trying to build a clean new reputation and enter the legitimate financial market. They would love to associate the name of their company with your own consultancy name and established reputation. Mark urges you to close the Pinterest account immediately. You hang up when Don, the manager of the sales department stops at your desk on the way to the new training about security issues related to social media. You had forgotten all about it. Should you go? Maybe the training will help you find a way to neutralize the attempts of MLC to involve the name of your company in their marketing campaign.

While considering your options, you get a call from your boss, the VP of marketing. He's been informed and troubled by the situation with MLC, and he wants you to handle it immediately.

What should you do? How can yo apply each step of the S2PS2 to generate viable solutions and solve the problem?


Consider the following questions:

Question: What is the problem? What are the main events?
Question: Who are the participants and the decision makers influencing the outcome?
Question: Why did the problem occur? What were the main factors contributing to the problem?
Question: Was there a turning point or defining moment during the course of events? Did this event make any specific solutions possible?
Question: What other possible solutions do you see? What evaluation models can you use?
Question: What solution will you implement? What kinds of rules or plans need to be put in place to facilitate the implementation of the solution?

Reference no: EM13727126

Questions Cloud

Describe the basic characteristics of currency hedging tools : Describe the basic characteristics of currency hedging tools: forwards, futures, swaps, options and more complex options (caps, floors, collars), as well as “natural hedges” on a corporation’s balance sheet.
Discuss the method of determining the fair value for forward : International business activities are inherently more attractive to large companies in mature markets than to small high growth US companies. True or false. Why or why not. Discuss the method of determining the “fair value” for forward, futures and o..
Manufacture of a wide range of consumer products : A Carlyle chemical is evaluating a new chemical compound used in the manufacture of a wide range of consumer products. The firm is concerned that inflation in the cost of raw materials will have an adverse effect on the projects cash flow. Specifical..
Social media manager for a vendor management consultancy : Question: What is the problem? What are the main events? Question: Who are the participants and the decision makers influencing the outcome?
How does a company product influence the process : How does a company's product influence the process of going international? How (if at all) does technology, such as the Internet, affect the process of going international?
What are some examples of hazard control methods : What are some examples of hazard control methods that are recommended in hazard prevention and reduction techniques. Do you feel that some of these methods are more important to use than others. Which do you believe reduces the possibility of a fu..
Type i and type ii virtualizations : Compare and contrast at least two (2) similarities and two (2) differences between Type I and Type II virtualizations. Using your comparison, choose either a Type I or Type II virtualization and determine a specific networking scenario in which yo..
What made the organization have an effective culture : What made the organization have an effective and ineffective organizaitonal culture. Why is it important to know the difference and impact it can have on your organization. Answer the question

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  Does the resulting scheme satisfy perfect secrecy

Consider the one time pad encryption scheme to encrypt a 1-bit message m with a 1-bit key k. Replace the XOR operation with another operation X. For which X(m,k) does the resulting scheme satisfy perfect secrecy?

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  Evaluate software solutions to security problems

Security is a major concern for many mission-critical applications.  The focus of the assignment is specifically on protocols that contain known vulnerabilities.

  Describe common security concerns inherent to wired

Describe common security concerns inherent to wired, wireless, and mobile networking.

  What firewall type or methodology or system would you

what firewall typemethodology or system would you recommend for a small 10-user it shop running windows systems

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Explain the major steps needed to preserve the integrity

Analyze the overall procedures for First Responder and Incident Handling, and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.

  Security and privacy in cloud computing

Prepare a report on the following scenario about security and privacy in cloud computing - Recently increased use of mobile devices and the growth of the Internet in current business practices have led to the provision of Cloud Computing

  Why will you choose a certain acquisition method

What tools listed in the text book are available and how do you plan to acquire the data? Why will you choose a certain acquisition method?

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd