{"title":"政策与违规的故事","authors":"Neha Singh, Tanya Mittal, Manish Gupta","doi":"10.4018/978-1-7998-9020-1.ch086","DOIUrl":null,"url":null,"abstract":"While the use of social media offers great opportunities to interact with customers and business partners, there are significant risks associated with this technology if a clear strategy has not been defined to address both the risks and the benefits that come along with it. The best approach for an organization to effectively utilize the benefits of this technology is to engage all relevant stakeholders and establish a strategy that addresses the pertinent issues. The organization needs to have in place relevant policies so as to be able to achieve it. To be able to identify the most frequent risks and their source, we captured breach data from various sources. In the chapter, we analyzed that the most important source of risk that can occur due to use of social media for a company is from its own workforce and an employee might find various ways of doing so.","PeriodicalId":302726,"journal":{"name":"Research Anthology on Strategies for Using Social Media as a Service and Tool in Business","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Tale of Policies and Breaches\",\"authors\":\"Neha Singh, Tanya Mittal, Manish Gupta\",\"doi\":\"10.4018/978-1-7998-9020-1.ch086\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While the use of social media offers great opportunities to interact with customers and business partners, there are significant risks associated with this technology if a clear strategy has not been defined to address both the risks and the benefits that come along with it. The best approach for an organization to effectively utilize the benefits of this technology is to engage all relevant stakeholders and establish a strategy that addresses the pertinent issues. The organization needs to have in place relevant policies so as to be able to achieve it. To be able to identify the most frequent risks and their source, we captured breach data from various sources. In the chapter, we analyzed that the most important source of risk that can occur due to use of social media for a company is from its own workforce and an employee might find various ways of doing so.\",\"PeriodicalId\":302726,\"journal\":{\"name\":\"Research Anthology on Strategies for Using Social Media as a Service and Tool in Business\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Research Anthology on Strategies for Using Social Media as a Service and Tool in Business\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-7998-9020-1.ch086\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Research Anthology on Strategies for Using Social Media as a Service and Tool in Business","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-9020-1.ch086","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
While the use of social media offers great opportunities to interact with customers and business partners, there are significant risks associated with this technology if a clear strategy has not been defined to address both the risks and the benefits that come along with it. The best approach for an organization to effectively utilize the benefits of this technology is to engage all relevant stakeholders and establish a strategy that addresses the pertinent issues. The organization needs to have in place relevant policies so as to be able to achieve it. To be able to identify the most frequent risks and their source, we captured breach data from various sources. In the chapter, we analyzed that the most important source of risk that can occur due to use of social media for a company is from its own workforce and an employee might find various ways of doing so.