This paper “The security threats and their strategic implications” examines the security threats suffered by organizations that utilize social networking networks and the strategic implications they have on the particular organizations…
Download file to see previous pages...
Although the application of technology in different activities and practices in organizations is associated with a lot of benefits, there are also security threats that go hand in hand with it (Balogun and Hailey, 2004). This piece of work examines the security threats suffered by organizations that utilize social networking networks and the strategic implications they have on the particular organizations. The essay also tries to identify the means and approaches adopted by organizations in their effort to achieve strategic change using ICTs, the key issues associated with the approaches, and practical examples of effectiveness of the ICTs in bringing about strategic change through case examples, (Coca-Cola Company Ltd.). There is a lot of relevant literature from research undertaken in this field which can help us in the understanding of this topic more specifically the security threats associated with social network applications and their implications in organizations. According to Jenny (2010), social networking is a tool that has helped organizations meet their goals for instance through the establishment of business contacts. Jenny also names the four best social networking free applications as the Fishbowl, Flexamail, Tweetdeck, and Microsoft Silverlight 4 client for Facebook. Fishbowl is an application that helps in the integration of social networking with the computer desktop. Flexamail on the other hand allows for easy access of different social network sites like Facebook and Twitter while Tweetdeck.
...Download file to see next pagesRead More
It is argued that since each of these theoretical perspectives offer distinct views of the concept of security and deal with different sets of values, the concept of security cannot nor should be defined. Instead, the concept of security should remain flexible allowing for changes in the environment impacting issues of security.
It is a recent trend in social networking connecting people all from the world in one place. Giving them the ability to stay connected, communicate and share. It is cancel the boundaries of time, location and culture into one. For example, Facebook is considered to be one society with its own culture.
This paper critically evaluates two articles, i.e. the article written by David Chandler on the views of human security, and the article written by Taylor Owen as a response to the contentions of Chandler. This paper aims to explore and understand the ideologies on human security.
The paper's main objectives are (1) to comment on these provisions aimed at minimizing any form of security breach and (2) suggest potential improvements. MTSA 2002 was a radical improvement in security preparedness for America's maritime ports which, prior to 9/11, focused on navigation and safety issues such as dredging channels and environmental protection.
The rationale behind the theoretical postulates for the existence of a symbiotic relationship between organisational culture and the security environment at large is the basis of this paper. Thus the paper will focus on the essential elements and variables of organisational power structures, culture constructs, the extended security concerns of the management and the role that security plays against the backdrop of heightened worries about external threats.
This essay raises the question: what is the ethical dilemma associated to border security management and its implications to crime prevention strategies and in sustaining improve international relations of
The author of the paper claims that approaches that consider the formation of security aspects in a discursive manner provide new perspectives in analyzing environmental security discourses, as well as their transformative potential. Initially, it provides thorough investigations in the political process.
Rumors persist that many government officials continue to consider taking a critical, second look at the organizational composition of DHS. Does the DHS organization need a significant "redo." One of the goals for creating DHS was to improve the overall security/safety of the US critical infrastructure.
1). Therefore, security privatization refers to the offering of contracts to private firms to take up security obligations to supplement the security effort by the security forces of a nation. One of the major obligations of any government to
6 Pages(1500 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic The security threats and their strategic implications for FREE!