Reference no: EM132387259
Discussion-1 with 100 words and a reference
Social media business has increased and is being embraced by most organization from both the public and the private scectors. This is because the use of social media to do business enable the organization to promptly respond to the customers' demands, engage with the customers, enhanced the use of technology in the organization and is also an effective way to optimize and measure success through the customer feedbacks (Mutuku, 2018). The use of social media has enabled the organizations to attain new customers, provide services effectively and deliver vital information to the customers
The increased use of the mobile gadgets in the market for computing has paused a security threat to the organization. This calls for the urgent need to manage the information in the social media to meet the business needs. There are various management strategies which have evolved over time. This includes the strategy of leaving the information where it is, use of reporting, use of information as a reuse strategy, management of information for the purpose of accountability, use of broadcast systems as a way of managing information and also the information management strategy which is based on monitoring (Thomas, 2018). Use of the management strategies for business should be encouraged as it has a lot of benefits such as improved services to customers, increased information access and also enhance business decision making. Managing information will prevent the business from various risks such as information loss and access by UN authorized personnel's.
The course has helped me appreciate the use of social media in business as it can result to unlimited opportunities for the business. However, the use of social media requires some thought as well as planning to avoid risking the business. Proper and careful utilization of the online technology which are advancing daily will help in boosting the business profile, and promote the business brand (Welch, 2018). Thus social media use has its share of benefits as well as challenges which should all be considered before implementing a decision
References
Mutuku, C. (2018). Advantages and Disadvantages of Using Social Networks in Business. Munich, Germany: GRIN Verlag.
Thomas, M. (2018). FT Guide to Social Media Strategy. Upper Saddle River, NJ: FT Press.
Welch, D. (2018). Social Media Marketing 2019: Secret Strategies to Become an Influencer of Millions on Instagram, YouTube, Twitter, and Facebook While Advertising Your Personal Brand in 2018 and Beyond. Social Media Marketing 2019.
Discussion-2 with 100 words and a reference
From the information governance subject, I learned about the threats and potential attacks of an organization in a broadway. From this, I learned how to control the data and the information of an organization. Organizations should view the Principles as a map for any road that is securely winding through an operational and legal minefield that has always existed but has recently become much more treacherous. An organization that doesn't adhere to the Principles is teetering on the edge of the minefield (Smallwood, 2014). A well reasoned and validly documented retention policy leaves little room with regard to any negative speculation relevant to the deposition of a document. It will stand when tested on the anvil of judicial review.
E-discovery is defined as the pretrial legal process used to describe the method by which parties will obtain and review electronically stored information. The 2006 Federal Rules of Civil Procedure (FRCP) served to place electronically stored information (ESI) on equal footing with paper documents in the eyes of the court. Automation is a key factor to help to set you up for success in the new world of records management (Smallwood, 2014). We can create automated processes and train artificial intelligence-driven applications to help keep control of the chaos. The cyberattack is a good attack launched from 1 or more computers towards another computer, multiple computer systems or networks. Cyber assaults can be broken straight down into two broad sorts: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer's data and perhaps gain admin privileges on it.
References
Smallwood, R. F. (2014). Information Governance: Concepts, Strategies, and Best Practices. Wiley. ISBN: 9781118218303.