StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Social Networking in the Workplace - Assignment Example

Cite this document
Summary
This assignment "Social Networking in the Workplace" outlines the communication cost benefits, networking with other interrelated business units or customers, and how effective the personnel uses it in line with the organization's security, privacy, and ethics operations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful

Extract of sample "Social Networking in the Workplace"

Research Questions Name Course Lecturer Date 1 Social networking in the workplace i. How has social networking been of benefit to your organization? The question will try to answer the communication cost benefits, networking with other interrelated business unit or customers and how effective the personnel use it in line with the organization security, privacy and ethics operations. ii. Do you have specific policies and norms that guide the social networking usage in your workplace? Precisely, this will attempt to give the predetermined and planned decisions that facilitated the integration, monitoring and evaluation of social networking to deliver strategic goals. iii. Why did the management team integrate social networking and what have been their roles in its implementation and delivery? Mainly, this will seek for the purpose and delivery timeline coupled with strategic approach that ensures that the objectives and goals are fulfilled as planned. iv. How effective and responsive are the social networking security and privacy initiatives as articulated in the integrated plan? 1. Employee performance management i. What are the business goals that exist and shared by the IT team to achieve the goals at organizational level? The question will derive some specific, measurable, attainable, realistic and time-bound (SMART) goals that the IT workforce has adopted in their activities. ii. How does your organization’s recruitment, training and promotion strategies measures with the required security and privacy skills, requirements and competency in delivery of IT activities? This answers the overall approach to effective IT workforce. iii. What are the plans, structures and resources assigned to ensure that the IT workforce remain as effective as possible? The question will measure the organizational strategic approach to learning, improvement and development for ensuring business performance. iv. What aspects of activities, delivery and growth can be attributed directly to the IT workforce activities? Discussions and Findings Report Hardware security and privacy Security, ethics and privacy are increasing matters of concern in workplace. As noted from just co included group interview with an IT manager in a job consultant firm, most companies have adopted hardware that did not exist in some past decades. The integration of computers; laptops and desktops, CPUs and other databases is a common feature in ordinary office. From the reception desks to the C.E.O.’s computer facilitate most of the undertakings and activities. The hardware is accessible not only to the personnel in a workplace but also to their clients, consultants such as repair and maintenance people or any other unauthorized person. Computers are easily operated and data can be accessed by various people or carried through other hardware like USBs, and flash discs. This is a challenge that is approached through internal and external perspectives of companies operations and activities (Smith, Dinev & Xu, 2011). There are different data and information shared by an overarching organization for its operations. There is also other special information which is secured for specific departments and access controlled to restrain access by the other departments. Departments like IT, finance, human resource management and executive manage their information separately. The data is then accessed by specific people and shared across with definite restrictions. To ensure privacy and security, computer setting has been one of the measures taken by most companies to ensure that the data is not accessed and there is limited anxiety for the users about privacy. For instance, Richard indicated that their computers and monitors are set to log off after every 60 seconds and therefore it is hard for an employee to access the other employees’ data or access from other departments the information which was considered private. The external threats come from any other persons than the company’s personnel such as clients, consultants and facility maintenance. Technology advance and updated security is then ensured by permanent fixing of portable facilities such as computers, regulated entry and interference with company data. Variously, critical data is encrypted and a key is contained to specific people who owes the company loyalty or are accountable enough to be entrusted. Security measures involving both physical and electronic barriers promote security and ensure privacy. Client services point are also set in a dimension that they cannot interfere with company data at all by closed drawers, locked cabinets which are always behind the personnel at service points or behold a reachable position. In addition, critical information is restrained to some computers and offices like customer services. Policies and Ethics One of the strongest points identified in the primary data collection session was that security, ethics and privacy in a company are established through the set rules and policies. The IT department is sorely expected to gather, process, compute and manage data in an organization. It has an overarching policy which guides its activities and conduct with company’s data. One critical way to ensure this is orientation of the new members or worker which highly and in regard to privacy should comply. There are sanctions that are also communicated as the organization is also under some standards set by the sector, corporate institutions and government. As mentioned by the interviewee, data coverage and security is ensured through the government and legal perspective which are made known to all employee and demand compliance (Bélanger & Crossler, 2011). The established understanding within the organization forms as a culture which then maintains itself. In fact one area that was instead was that every employee is expected to show high levels of professionalism so as to be trustworthy that they care for their employers as well as their colleagues. The elements of personality and respect for others come in so that the relations between the members of the organization and the outsiders should be assured and continued. Furthermore the company has protocols on the specific gadgets and devices to use like work mobile phones which are then compatible with the company’s security system. Any other device that an employee may bring in is instantly noted and an administrator notified to block any data access. Ethics become interchangeable where in case there is a data that one views from other; it is only through the general agreement between the parties involved and in accordance to the company’s policy. The company’s policies are never enough and in particular when other members outside the company are involved. The legal system determines the cases between firms and clients which might occur due to mishandling of information that is critical for instance a company leaking private information to unauthorized person. The standards set by IT sectors are incorporated in various companies’ information expansion and storage. These further guides the people involved from the managers, employees and clients and reduce misunderstanding in handling, transfer and use of personal or firm data. Standards and policies do not ultimately promote threat or restrain use, but an understanding of concepts of data care that is desirable. Social networking and Privacy Social networking has been adopted variously by different organization and is accruing benefits in the current and future trends of adoption and usage. In most cases, not all companies have taken the use of social media platform positively due to an idea of time wastage and possibility of exposing critical information of the organization. However, the trends are changing and employees are increasingly being allowed to access their social site for referrals activities as well as raising awareness of the companies’ services, products and human resource needs. Companies are also opening their own accounts and assigning specific administrators and personnel to carry out their business goals. Others as indicated by the interviewee have adopted social networking as part and parcel of functionalities. Specifically, those companies that deal with recruitment of workers have accesses the profiles of people and identified links through Facebook and LinkedIn to access the best and specified personnel (Grobauer, Walloschek & Stocker, 2011). Motivation is very critical for gaining referrals and creating more networks. As indicated, it s possible for people who are in certain profession to indentify other with similar interests and form a good talent pools. People feel secure to entrust their information to others who appear as possible network for career development and other social benefits. Other companies can promote their culture by popularity of social networking which may boost their products and services. However, there requires more and stringent measures to be taken within social networking use to avoid unbecoming outcomes. One of such concerns is interference with people privacy or getting their data to third parties. However, when it comes to some approaches like job recommendation and connection, there are fewer strings attached to general personal information since much has to do with general personal and professional life. On the other hand, when employees are dealing with dissemination of company information to the relevant clients and customers such as in law and business sectors, there are regulations dealing with manufacture details, operations procedures or connection with security access to databases. The IT department must set regulations to the extent of information released and shared to limit over-use, piracy or exposure of critical data. Employees must also not use the company name, brand or logos for personal or extended relations benefit. This is restricted through policy and security that incorporated in corporate videos, photos and other logos. Generally, the social networking platforms have their terms and conditions which are applied and accepted before hosting data and intellectual products which encompasses company’s data. Training and monitoring of privacy As Karjoth, Schunter & Waidner (2003 argues, security, ethics and privacy are flexible and be controlled. For instance as indicated during the interview, the company stopped working with some organizations that were not ethical or which did not deal well with their clients. At recruitment, the HR personnel ensure those situations that are not good for a person are ruled out to avoid their exposure to misappropriation. Employee can do the right job as per their responsibility which is identifiable at recruitment stage. Ethics when doing virtual business are ensured through selling companies through necessary limits and through accredited number of groups. It is also expected that the managers and employees carry out their functions with ethical conduct. One of values upheld in ethics is to tell the truth, not to promise anything that is unattainable and raise expectations that are realistic for the company and to the clients. The organizational structure for monitoring is very important for ascertaining security, ethics and privacy. In the interview case, the head office personnel were identified to travel throughout with various managers in subsidiary companies to ensure that the policies are followed, permission gained in the right manner and goals and objectives maintained. The company conducts monthly and annual reviews and this includes the IT department, receptionist to C.E.O. Negotiations skills for instance for sales persons are very critical for they play a major role in ensuring the extent to which the company or client information is shared or disseminated. This is calls for highly training, updating and control of personnel to ensure that the data is shared in the right way and through the required formal channels that ensure that the company-client relationship remains intact. References Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1042. Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding cloud computing vulnerabilities. Security & privacy, IEEE, 9(2), 50-57. Karjoth, G., Schunter, M., & Waidner, M. (2003, January). Platform for enterprise privacy practices: Privacy-enabled management of customer data. In Privacy Enhancing Technologies (pp. 69-84). Springer Berlin Heidelberg. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS quarterly, 35(4), 989-1016. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Social Networking in the Workplace Assignment Example | Topics and Well Written Essays - 1750 words, n.d.)
Social Networking in the Workplace Assignment Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/social-science/2050180-social-networking-in-the-workplace
(Social Networking in the Workplace Assignment Example | Topics and Well Written Essays - 1750 Words)
Social Networking in the Workplace Assignment Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/social-science/2050180-social-networking-in-the-workplace.
“Social Networking in the Workplace Assignment Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/social-science/2050180-social-networking-in-the-workplace.
  • Cited: 0 times

CHECK THESE SAMPLES OF Social Networking in the Workplace

The Application Simple Wash

The application that was defined on the website consists of a specific program which is designed to pour through large amounts of social networking data as a means of targeting social networking data that potential employers might find offensive and helping the user to remove this content prior to this ever being an eventuality (Jones, 2011).... Accordingly, this necessarily assumes two factors, the first of these is that the social networking user would necessarily have information that would be viewed negatively by a potential employer and the second of which is that they would be familiar with the service that the app can provide and seek to utilize it (Parker, 2013)....
7 Pages (1750 words) Essay

Spending Too Much Time on Personal Devices Lead to Distractions in Office

The use of personal devices at work can also lead to severe accidents at the workplace.... Such cases speak strongly in favor of putting a complete ban on the use of personal devices at the workplace.... This paper includes a discussion on some of the ways these devices and social networking websites lead to distractions in offices.... Impact of Social Networks The impact of using social networking websites, such as, Facebook or Twitter in offices is also not positive on the efficiency and attention of...
4 Pages (1000 words) Research Paper

A Potential Issue of the Facebook and Twitter Activities

Many people are very particular about not discussing business issues outside the workplace.... “Five workers fired for complaining about their jobs on Facebook will go back to work after the National Labor Relations Board ruled in their favor, affirming workers can safely vent their frustrations about the workplace on social networks” (Forbes, 2011).... There is a very insignificant population of people that know the use of computer and internet and yet don't use the social media websites....
5 Pages (1250 words) Research Paper

Problems related to information management

In that context, information literacy could be deemed to be a central aspect of managing information at the workplace.... A lack of information literacy and improper information management at the workplace could hamper productivity in multiple ways (Milner 4).... It would certainly not be wrong to say that many a times shoddy information management gives way to faulty decisions, misunderstandings and confusions at the workplace.... Hence, there is no denying the fact that a lack of awareness mostly underlies the information management related issues at the workplace....
2 Pages (500 words) Essay

Companys Social Networking Policies

It analyses the importance of technology within the workplace and how it can be exploited for higher growth.... We also understand the importance of technology within the workplace and how it can be exploited for higher growth....  This essay discusses the company's social networking policies.... nbsp;  Company's social networking PoliciesIt has always been our policy to support and provide the workforce with the best workplace experience that motivates them for optimal work performance....
1 Pages (250 words) Assignment

Role of Practice Perspectives in Organizations

Today, inclusion of social networking applications like Facebook and Twitter in an organization's computers is helpful in facilitating online interactions between a company's staff, customers, and other stakeholders.... Through practice Role of Practice Perspectives in Organizations In theory, practice perspective helps in ascertaining the level of commitment and motivation harbored by personnel within a workplace.... Through practice perspective approaches, leaders and managers within an organization can objectively evaluate and understand the depth and breadth of challenges associated with change within a workplace....
1 Pages (250 words) Essay

Impact of Social Networking on Career Progression

Quite understandably, these people are looking towards social networking with all the hope and wish that this online social networking will help them with their career progression.... Launched in May 2003, it is a business orientated social networking site (Goetchius, pp.... Quite understandably, these people are looking towards social networking with all the hope and wish that this online social networking will help them with their career progression....
6 Pages (1500 words) Assignment

A Key Element to the Success of THB

hellip; The author states that other parameter of interest shall include how the company deals with the management of information, factors that inhibit the use of advanced information systems, the importance of social networking, Consideration made by THB confectionery prior to the adoption of social networking, recommendations, and conclusion.... Another parameter of interest shall include how the company deals with the management of information, factors that inhibit the use of advanced information systems, the importance of social networking, Consideration made by THB confectionery prior to the adoption of social networking, recommendations, and conclusion....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us