StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Policy and Social Media Use for Organization - Research Paper Example

Cite this document
Summary
The paper "Security Policy and Social Media Use for Organization" discusses that today, many companies, small and large, are strategically collaborating with social media to enhance their businesses. However, different risks emanate from the usage of social media by the organization…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Security Policy and Social Media Use for Organization
Read Text Preview

Extract of sample "Security Policy and Social Media Use for Organization"

Security Policy and Social Media use for Organization. Introduction It is undoubtedly evident that in the past one decade, companies and organizations have resorted to use social media to advertise their products and services as well as obtain information. Today, many companies, small and large, are strategically collaborating with social media to enhance their businesses (Efraim, Narasimha and Ting-Peng 203). Focusing on the urge to obtain information, organizations and companies may opt to collaborate with social networks in order to obtain vital information regarding their products and services from the public. In most occasions, people using social media tend to give their view concerning issues affecting their lives and this includes their views on various products and services offered by different organizations. Criticism and appraisals are mainly conveyed by persons using social media (Efraim, Narasimha and Ting-Peng 206). It is also evident that organizations use social media to advertise their products and services. Since social media acts as a platform through which people share and express ideas with their friends, once organizations advertise through such sites, users of the site socially spread information about the company to friends in a rapid manner (Efraim, Narasimha and Ting-Peng 206). However, as organizations are benefiting from collaboration with social media in carrying out their businesses, it is apparent that risks emerge, and which poses a great threat to businesses collapse. The fact that social media carries more information of all kinds minute after minute; there is a high likelihood of potential serious consequences that could emanate from vital and confidential information being unleashed to public. Studies have documented that nearly a quarter of employees use social media while at work. This has an implication that there is a high risk of vital information being leaked though networking sites (Daft and Marcic 175). Nevertheless, various policies can be used to mitigate these security risks. The following sections articulate on the possible policies. Mitigation measure/policies Creation of social media policies Organization need to create social media policies, including those that relate to privacy issues (Daft and Marcic 178). For example, financial institutions should raise privacy awareness among the employees as one of the communication strategies in implementing such policies. It is the mandate of a company to review its customer verification practices and continue to raise employee and customer awareness about the risks and consequences of disclosing sensitive information to a third party. Such awareness includes raising general awareness of best practices for privacy protection on social media and provision of guidance on how to use privacy controls on social media. When posting in any social media, employees and customers need to think before doing so. One should be concerned about the authenticity of information posting, whether that information is appropriate and reasonable, whether it is the personal opinion, whether to make it public, and if it is confidential (Efraim, Narasimha and Ting-Peng 215). This is crucial because the perception of information received by people in the social media varies from one person to another. Some information may be wrongly interpreted and may end up compromising data security and tarnishing corporate brand. In this regard, organizations ought to not only enumerate a comprehensive list of dos and don’ts, but also offer employees ethical guidelines and encourage responsible use of social media (Daft and Marcic 178). Employees thus need to be enlightened on the fact that their behavior can not only reflect their positive and negative aspects but also the brand they represent. Since internet usage lacks control of contents posted especially on social media, organizations advertising through these sites should develop a risk strategy (Lovett 319). This should involve performance of a risk assessment, whereby identification of legal, compliance, reputation and operational risks associated with advert materials on products and services posted on social media should be done. It is also advisable to review the content of information being posted on social media. This should be done to appropriately modify the content to ensure that organizations post only relevant information (Efraim, Narasimha and Ting-Peng 215). Organizations should also have a close monitoring of their advertisements posted on social media. This will enable them respond to any suspected risk swiftly before the situation worsens. When communicating or responding to messages through social media, organizations should ensure that they only respond to specific individuals and webpage to which they are attached in organizations official page. It is also worth noting that any formal business transaction should be conducted through work-related email and other official forms of communication like fax and post office addresses (Lovett 320). Desktop security When people have access to other people’s computer, they can steal confidential information and spread it via social network. In this regard, it is advisable to have desktop security, which contains password that locks computers when the user is not around. Mostly, password-protected screensaver is set to lock the computer after a given time. This ensures that even at times when the user forgets to lock the desktop, the screensaver comes after a short time and locks the desktop. Password security A minimum but strong password should be set by organizations (Efraim, Narasimha and Ting-Peng 215). Sensitive software and documents need to be secured by creating password especially in areas they are located in the computer. Organizations should also discourage password sharing or disclosing them to other people. This way, strangers can not be able to access such information without the consent of the user. Attackers can launch attacks against company’s information resources. Therefore, it is vital for organizations to educate their employees on the importance of the use authentication controls on organization’s information resources (Lovett 318). If attackers can gain access to such information, they can distribute it to various locations using social media. In other accounts, employees need to be advised on situations that risk information leaking to attackers through the internet especially through social media (Lovett 319). For example phishing is used by attackers by a way of sending messages and links to potential victims. Once one opens or clicks on such links, the attackers can easily obtain certain information from the IP address of the computer. Information retention management It is apparent that attackers target certain organization’s information for malicious use. In this regard, it is necessary for organizations to manage their data responsibly (Efraim, Narasimha and Ting-Peng 215). Sensitive information that is not required to be used by employees need to be retained by management. However, there should also be control of the information flowing to employees. There should be a back up of all organization’s information, which should be saved for archival and recovery purposes (Lovett 317). Therefore, it is necessary for organizations to educate their employees on the kind of information to post in the social media. This education may come in terms of training that could help employees make appropriate decisions when using social media and related policies. Organizations should also frequently assess their current record retention capabilities in order to effectively prepare for emergencies emanating from social media use. Improvement of employee relations Many organizations have policies restricting what employees can post on a social media site. However, it is argued that organizations that have poor employee relations falls a victim of negative publicity by their employees through postings done on various social media sites (Daft and Marcic 179). An example of such incidences is when an employee may post a question requiring his or her fellow employees to respond to it. This instigates negative comments concerning the boss. Since these employees have other friends sharing information and postings at different locations, that organization’s name may end up being tarnished. Therefore, it is crucial that employers establish and maintain good relations with employees to avoid such incidences. Use of human resource information systems (HRIS) HRIS can help reduce risks associated with usage of social media by organizations. HRIS involves the use of software to help cumulate employee’s data (Pattanayak 46). Information such as employee performance and duties assigned to them are also cumulated, and which, could help organizations identify appropriate training programs for their employees (Pattanayak 46). Through the use of HRIS, organizations should ensure that they have a record of employees responsible for handling social media communication at a given time. With this in place, employees are aware that they are held accountable for all transactions involving organizations business page on social media for that particular time. They would be precautious not to irresponsibly transmit irrelevant and sensitive information to other persons on the social media. In fact, in case of any risks deriving from a certain employee irresponsibly transmitting information that tarnishes organization’s brand, HRIS would help identify employee who was responsible for such transactions. Moreover, HRIS helps organizations identify weak areas of different employees and this can help identify appropriate training programs for employees (Pattanayak 46) handling social media transactions on behalf of the organization. It is argued that HRIS helps organizations in identifying appropriate recruitment and selection practices. In this regard, in case of any internal vacant position related to personnel to manage social media transactions, HRIS can help identify employees with precise qualifications for that particular post. Conclusion Today, many companies, small and large, are strategically collaborating with social media to enhance their businesses. However, different risks emanates from usage of social media by organization. To mitigate these risks, organizations should create social media policies. It is the mandate of a company to review its customer verification practices and continue to raise employee and customer awareness about the risks and consequences of disclosing sensitive information to a third party. Organizations advertising through these sites should develop a risk strategy. Organizations should also use desktop security and password security. This helps organizations avoid instances of attackers accessing sensitive information from organizations computers. Information retention should also be practiced by organizations. It is necessary for organizations to manage their data responsibly. Sensitive information that is not required to be used by employees need to be retained by the management and there should be a back-up of all organization’s information. It is also vital that organizations improve employee relations to avoid instances of employees posting negative aspects of their bosses and organization as a whole. HRIS can also help organizations deal with issues related to social media risks. Works cited: Efraim, Turban; Narasimha, Bolloju and Ting-Peng, Liang. Enterprise social networking: opportunities, adoption, and risk mitigation. Journal of Organizational Computing and Electronic Commerce, 21: 202–220, 2011. Daft, Richard and Marcic, Dorothy. Understanding management. Mason, Ohio: South-Western, 2012. Print. Lovett, John. Social media metrics secrets: do what you never thought possible with social media metrics. Indianapolis, Ind.: Wiley Pub., 2011. Print. Pattanayak, Biswajeet. Human resource management. New Delhi: Prentice-Hall of India, 2005. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Police and Social Media Use for Organization Research Paper”, n.d.)
Retrieved from https://studentshare.org/management/1453897-information-security-and-privacy-in-hris
(Security Police and Social Media Use for Organization Research Paper)
https://studentshare.org/management/1453897-information-security-and-privacy-in-hris.
“Security Police and Social Media Use for Organization Research Paper”, n.d. https://studentshare.org/management/1453897-information-security-and-privacy-in-hris.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Policy and Social Media Use for Organization

Information Assurance and Security - Social Media Power

The paper 'Information Assurance and Security - social media Power" analyzes how organizations can benefit from using social media by understanding the opinions of the customers on their performance.... Through using social media, organizations can demonstrate as well as develop the brand personality.... social media is considered as one of the most significant technological improvements, which empowers effective communication....
16 Pages (4000 words) Literature review

Policies and Regulations of Social Media

This paper ''Policies and Regulations of social media'' tells that With the help of websites or other Internet gateways, members of social networks can save their contact and data, because social network configuration has features that allow this to be done.... In this view, this study will analyze highlight Saudi Arabia's social media regulations and policies.... he thesis search aims alto asocial media policies and regulations in government organizations in Saudi Arabia, which is essential in ensuring effective adoption and usage of social media....
54 Pages (13500 words) Essay

Human Resources and how they are affected by social media/social networking

However, social media and social networking has increased the risks to privacy and security due to potential leaks of confidential formation; posed increased network security threats; and raised the potential of employees damaging the reputation of the employer, co-workers, and even clients.... There is a consensus among many HR professionals that social media and social networking presents immense opportunities to business and to HR departments if managed and regulated well in the workplace (Zielinski, 2012)....
12 Pages (3000 words) Term Paper

Critically assess the International Organisation structure to promote global security

Then, the explanation of the role of the international security organization towards the.... The stabilization of expectations about non-violent behaviour of others by the international organization in order to get them reciprocate by avoiding the use of force is explained. ... The trans-cultural security protects the different cultural groups against discrimination and humiliation by avoiding stereotyping through media, entertainment industry, and educational materials....
10 Pages (2500 words) Essay

Marketing Activities of Social Media

The paper "Marketing Activities of social media" defines key performance indicators for qualitative measurement of marketing activities of social media.... social media are essentially platforms for global connection and communication tool for people from all over the world.... The popularity of social media is immense and ever-growing considering the extremely low cost of social media usage and its user-friendly characteristic and flexibility this becomes a tool for global dispersal of information....
16 Pages (4000 words) Essay

Database Security Controls

As new software is present with innovative technology for a database, the risk to secure the data from malicious sources is also a prime concern of the administration and the IT Department of any organization (Natan, 2005; Loch & Carr, 1992).... However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time.... This paper also outlines the damage, the breach in the security in database can cause....
12 Pages (3000 words) Literature review

Strategies Used by Organizations to Enhance Security in their Social Network Pages

The paper has accessed security issues in social media and the strategies used by organizations to enhance security in their social network pages.... With respect to technology management, this research proposal seeks to assess security issues in social media and the strategies used by organizations to enhance security in their social network pages.... Research reports on security indicate that hacking attempts on social media are increasing at a high rate....
6 Pages (1500 words) Research Proposal

Social Media Policy

The paper "social media Policy" is a perfect example of a media assignment.... Post on social media platforms like Facebook cannot be considered private even though just a few people are supposed to the view the content.... The paper "social media Policy" is a perfect example of a media assignment.... Post on social media platforms like Facebook cannot be considered private even though just a few people are supposed to the view the content....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us