Social media manager for a vendor management consultancy

Assignment Help Computer Network Security
Reference no: EM13727126

You are a social media manager for a vendor management consultancy. Your clients include well known financial institutions, banks, and insurance agencies. Despite the fact that these organizations can be conservative in their advertising approach, you have generated solid interest in the services of your consultancy along with multiple new client prospects. You have employed a variety of social media applications such as Facebook, Twitter and Pinterest. You are in the process of designing a new marketing campaign by using your favorite Web 2.0 tool Pinterest when you get a call from Mark, your buddy at the IT department. One of the pins you created for your company's Pinterest website, says Mark, has been pinned by MLC, a company known for shady financial practices and even money laundering. It seems MLC is trying to build a clean new reputation and enter the legitimate financial market. They would love to associate the name of their company with your own consultancy name and established reputation. Mark urges you to close the Pinterest account immediately. You hang up when Don, the manager of the sales department stops at your desk on the way to the new training about security issues related to social media. You had forgotten all about it. Should you go? Maybe the training will help you find a way to neutralize the attempts of MLC to involve the name of your company in their marketing campaign.

While considering your options, you get a call from your boss, the VP of marketing. He's been informed and troubled by the situation with MLC, and he wants you to handle it immediately.

What should you do? How can yo apply each step of the S2PS2 to generate viable solutions and solve the problem?


Consider the following questions:

Question: What is the problem? What are the main events?
Question: Who are the participants and the decision makers influencing the outcome?
Question: Why did the problem occur? What were the main factors contributing to the problem?
Question: Was there a turning point or defining moment during the course of events? Did this event make any specific solutions possible?
Question: What other possible solutions do you see? What evaluation models can you use?
Question: What solution will you implement? What kinds of rules or plans need to be put in place to facilitate the implementation of the solution?

Reference no: EM13727126

Questions Cloud

Describe the basic characteristics of currency hedging tools : Describe the basic characteristics of currency hedging tools: forwards, futures, swaps, options and more complex options (caps, floors, collars), as well as “natural hedges” on a corporation’s balance sheet.
Discuss the method of determining the fair value for forward : International business activities are inherently more attractive to large companies in mature markets than to small high growth US companies. True or false. Why or why not. Discuss the method of determining the “fair value” for forward, futures and o..
Manufacture of a wide range of consumer products : A Carlyle chemical is evaluating a new chemical compound used in the manufacture of a wide range of consumer products. The firm is concerned that inflation in the cost of raw materials will have an adverse effect on the projects cash flow. Specifical..
Social media manager for a vendor management consultancy : Question: What is the problem? What are the main events? Question: Who are the participants and the decision makers influencing the outcome?
How does a company product influence the process : How does a company's product influence the process of going international? How (if at all) does technology, such as the Internet, affect the process of going international?
What are some examples of hazard control methods : What are some examples of hazard control methods that are recommended in hazard prevention and reduction techniques. Do you feel that some of these methods are more important to use than others. Which do you believe reduces the possibility of a fu..
Type i and type ii virtualizations : Compare and contrast at least two (2) similarities and two (2) differences between Type I and Type II virtualizations. Using your comparison, choose either a Type I or Type II virtualization and determine a specific networking scenario in which yo..
What made the organization have an effective culture : What made the organization have an effective and ineffective organizaitonal culture. Why is it important to know the difference and impact it can have on your organization. Answer the question

Reviews

Write a Review

Computer Network Security Questions & Answers

  Application to input a character string

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  Xyz company xyz a mid-sized corporation is in the middle of

company xyz a mid-sized corporation is in the middle of satisfying their regulatory compliance needs. the manager of

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Explain primary tasks high-level investigation processes

Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  Implement the cipher as a class

Implement the cipher as a class which implements the provided interface.

  What is the entropy of the plaintext message

A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.

  Please type a three- to five-page 800 to 1200 words paper

please type a three- to five-page 800 to 1200 words paper. using apa style assess the importance of developing a

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Describe routing attacks

Briefly describe what routing attacks are. Provide two examples, highlighting their main characteristics. Can you explain what are routing attacks and show the main characteristics of this attacks.

  Protecting intellectual property rights in software

Explain the reason of each of these approaches and explain how each of them can be used to protect property rights in software. Please include any experiences you have had with these methods.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd