StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Strategies Used by Organizations to Enhance Security in their Social Network Pages - Research Proposal Example

Cite this document
Summary
The paper “Strategies Used by Organizations to Enhance Security in their Social Network Pages” is a breathtaking variant of research proposal on information technology. Technology management is a process that entails directing, planning, control, coordinating the establishment and the implementation of the technological abilities to achieve and shape the operational and strategic goals…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful

Extract of sample "Strategies Used by Organizations to Enhance Security in their Social Network Pages"

Technology Management Proposal to Apply for PHD Research topic chosen: An investigation of the strategies used by organizations in order to enhance security in their social network pages. Abstract Technology management is a process that entails directing, planning, control as well as coordinating the establishment as well as the implementation of the technological abilities to achieve and shape operational and strategic goals of an institution. In this proposal a review of technology management using past literature is done with an aim of exploring how technology management applications and methodologies have developed over time. The paper has accessed security issues in social media and the strategies used by organizations to enhance security in their social network pages. Information will be collected using both the primary and secondary data collection tools. The data acquired will be analyzed using statistical methods such as SPSS and AMOS. The information will be aimed at indicating future growth for the technology management by addressing the issues of security in social network. Introduction Technology management entails planning, controlling and coordinating, and directing the development as well as the implementation of all the technological capabilities deemed to help shape as well as achieve the operational and planned objectives of any organization (Rosenberg, 1994; Coombs, 1994; Pavitt 1987; Chen et al, 2002). Furthermore, according to Tushman, and O’Reilly, 1997 technology management involves identifying key technology as well as its related areas for development, planning for the growth of technology capabilities; determine whether to pursue self-development, founding organization mechanisms for coordinating and directing the growth of technology capabilities as well as the designing the policy measures required for controls (Pavitt, 1987; Ashok, and Banerjee, 2003.) Typically, technology aim at fulfilling the management requirements of a particular set of technologies in a domain as well as an inter- domain relationship and also in developing the implementation strategies as per the available present technologies, resources, socio economic environment as well as future markets (Drejer, 1997; Dangelmaier et al. 1999). As a result of this, the technology management has become a vital subject and this has made the technology development community developing a number of applications as well as methodologies for both the practical applications and academic research (Kropsu-Vehkapera et al. 2009; Akoka and Comyn-Wattiau, 1996). Moreover, technology management has attracted significant efforts to explore its concepts, systems, theories, nature, architectures, tools, frameworks, functions, tools as well as real implementations so as to be able to demonstrate technology management applications and their methodologies (Wang, 1993; Coombs, 1994; Pavitt, 1987). With respect to technology management, this research proposal seeks to assess security issues in social media and the strategies used by organizations to enhance security in their social network pages. Research questions This paper seeks to answer the following research questions: Investigation of security issues in social networking Analysis of the strategies used by the organizations to enhance security in their social network pages. Problem statement In the contemporary world, security in social networks has become a major issue of concern. These sites are highly targeted by hackers who offer chances to access large quantities of both organizational and personal information. Research reports on security indicate that hacking attempts on social media are increasing at a high rate. Various methods have been proposed in trying to help solve these security issues but full solutions have not been attained yet, and thus there is need for organizations employing these tools to come up with a comprehensive security strategy. It is against this backdrop that the researcher seeks to explore this area further. It is hoped that the observations made will contribute significantly to the existing knowledge in the field. Objectives From this study, the researcher aims at realizing the following objectives To examine the security issues in social media To analyze how organizations are implementing comprehensive security strategies with an aim of mitigating the problem in question. Significance This research will be of great significance to individuals and organizations in Saudi Arabia among others who come across it across the world. It is apparent, in the modern world; most organizations are employing social media as a tool of advertising their products and services. However, this has been affected greatly by security problems whereby hackers have taken advantage of accessing organizational information and using it for their own benefits. Furthermore, these hackers add ads to the organization social media pages which as a result affect the organization’s image greatly. Some organizations have also been reported to have lost millions of dollars and potential customers due to insecurity problems in social media. To make sure that this problem is solved, organizations require enough knowledge on the effective strategies to use to enhance security on their social network pages which will be provided by this research. Most important is the increased knowledge and understanding in the area of social network and security the researcher will gain. This will help the researcher come up with the right conclusions and recommendations that will be of great help. Further the research will help other researchers who would want to research more on the field of technology management and in particular on the topic of management of social networks to enhance security. Literature review According to Fowler et al. (2009), social media has tremendously gained popularity for both individual as well as organizational use. Apparently, social media is a huge target for hackers that offer the opening to access organizational information and personal information in large quantities. The recently done reports on security indicate that hacking attempts on social media are on the increase (Joy, 2009). In addition, the reports also suggest that the businesses using the tools need to enforce comprehensive security strategy. However, the challenge has been how organizations can influence positive effects of the emerging tools while ensuring that the organizations are not exposed to unacceptable risks. Studies indicate that addressing potential effects on the social network bandwidth as well as giving the relevant training to employees as well as ensuring proper awareness of the social media security issues have not been achieved yet and as a result insecurity is on the rise (Davenport, 1993; Fowler et al. 2009). In addition, employees can leak much regulated information to the social media (Scott, 2009). This information can be accessed by hackers through infecting the network with spiteful codes that enable them connect to the web 2.0 platforms for example twitter and attack them with phishing expeditions, viruses, Trojan horses as well as spam (Scott, 2009; Joy, 2009). Once the information is accessed it is spread to other blogs and trade all over the world. As a result the organization is exposed and this poses a threat to its operations (Baccarini and Archer, 2001). These threats are supported by the flexibility of the web architecture which enables compromise as well as exploitation. It is apparent that social media upsurges the organizations security risks. For instance, social networking sites which include Wikipedia, YouTube, craigslist, Facebook and certain web services like Gmail as well as eBay make it possible for users to interact through podcasts, blogs , RSS feeds as well as other technologies (Fowler et al. 2009; AI-Habaibeh, 2002). These sites have greatly attracted large numbers of visitors and these make them attractive to also hackers who achieve the through by authentication hacking. Many organizations are trying to employ content control mechanisms to safeguard their networks as well as ensure maximum productivity (Burton, 1997; Walsham, 1993). There has been a problem however in trying to realize potential solutions (Scott, 2009; Arch-int, et al. 2003). According to past studies, blocking of social media sites in an attempt to enhance security has had negative effects (Walid, 2011). It is evident that by employing this strategy, the employees circumvent the security controls by use of a variety of means hence exposing the organizations to much more risks (Laudon and Laudon, 2002). This is a result of not training and informing the employees of the risks linked to their actions. The studies indicate that many breaches in the organizations are as a result of negligence and naivety of the employees (Walid, 2011; Dawood, 1996). Methodology Data collection in this research will mainly be from primary and secondary sources. The primary data will entail administering questionnaires to the employees of the National Co. for Cooperative insurance as well as the United Saudi Commercial Bank to investigate the strategies they use to enhance security in their social network pages. Moreover, the researcher will also carry out an interview on the top management of these organizations to acquire more information on security issues of the social network pages. On the other hand, secondary data collection will entail a review of the existing books, journals and publications on technology management will be done. In addition the strategies used by National Co. for cooperative insurance as well as the United Saudi Commercial Bank in order to enhance security in their social network pages will be assessed to help derive a conclusion. Further data will be obtained from the websites of these organizations as well as the reports made by these organizations. Data collected will be analyzed using statistical methods which include SPSS and AMOS. Timeline of the project Activity Time Data collection One weeks Data analysis Two weeks Data interpretation Two weeks Report preparation One week References Arch-int, S. and Batanov, D.N. 2003. Development of industrial information systems on the Web using business components. Computers in Industry, vol. 50, pp. 231–250. Ashok, S., and Banerjee, R., 2003. Optimal cool storage capacity for load management. Energy, vol. 28, pp. 115–126. Baccarini, D., Archer, R., 2001. The risk ranking of projects: a methodology. International Journal of Project Management, vol. 19, pp. 139–145 Laudon, K.C., and Laudon, J.P. 2002. Essential of Management Information Systems, 5th ed. New Jersey: Prentice Hall Inc. Kropsu-Vehkapera, H., Haapasalo, H. & Rusanen, J-P. 2009. Analysis of Technology Management Functions in Finnish High Tech Companies. The Open Management Journal, vol. 2, pp. 1–10. Chen, Z.L., Li, S., Tirupati, D., 2002, A scenario-based stochastic programming approach for technology and capacity planning. Computers & Operations Research, vol. 29, pp. 781–806 Drejer, A., 1997. The discipline of management of technology, based on considerations related to technology. Technovation, vol. 17, pp. 253–265 Dangelmaier, W., Kress, S., Wenski, R. 1999. TelCow: telework under the co-ordination of a workflow management system. Information and Software Technology, vol. 41, pp. 341–353. Dawood, N.N. 1996. A strategy of knowledge elicitation for developing an integrated bidding/ production management expert system for the precise industry. Advances in Engineering Software Akoka, J., and Comyn-Wattiau, I. 1996. A knowledge-based system for auditing computer and management information systems. Expert Systems with Applications, vol. 11, pp. 361–375. AI-Habaibeh, A., Zorriassatine, F., Gindy, N. 2002. Comprehensive experimental evaluation of a systematic approach for cost effective and rapid design of condition monitoring systems using Taguchi’s method. Journal of Materials Technology, vol. 124, pp. 372–38 Davenport, T. H., 1993, Process Innovation: Reengineering Work through Information Technology. Boston: Harvard Business School Press. Tushman, L. M. and O’Reilly, C., A. 1997. Winning through Innovation: A Practical Guide to Leading Organizational Change and Renewal. Boston: Harvard Business School Press. Burton E. Swanson, P., and Neil C., R. 1997. The Organizing Vision in Information Systems Innovation. Organization Science, vol. 8, no. 5 Coombs, R. 1994. Technology and Business Strategy. Cambridge: Cambridge University press Coombs, R. and Richards, A. 1991. Technologies, Products and Firms Strategies Part 1-a Framework for Analysis. Cambridge: Cambridge University press Pavitt, K. 1987. On the Nature of Technology. Brighton. SPRU: University of Sussex. Rosenberg, N. 1994. Exploring the Black Box: Technology and Economics. Cambridge, UK: Cambridge University Press Walsham, G. 1993. Interpreting Information Systems for Organizations. New York: Wiley and sons Wang, H., 1993 Technology management in a dual world. International Journal of Technology Management, vol. 8, pp. 108–120 Task Force on Management of Technology. 1987. Management of Technology: The Hidden Competitive Advantage. Washington: National Academy Press. Walid, H., 2011, Security 360: blocking access to social networking sites does NOT improve IT security performance, retrieved on September, 14, 2011, http://community.telustalksbusiness.com/blogs/talk_business/2011/06/30/security-360-blocking-access-to-social-networking-sites-does-not-improve-it-security-performance Scott C., 2009, Corporations Need Security for Social Networking Apps, retrieved on September 14, 2011 Joy M. C., 2009, Sophos reveals need for increased security for social networking Sites, retrieved on September 14, 2011, Fowler, J. H.; Dawes, C.T, Christakis, N.A, (2009), Model of Genetic Variation in Human Social Networks. Proceedings of the National Academy of Sciences 106 (6) Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Strategies Used by Organizations to Enhance Security in their Social N Research Proposal, n.d.)
Strategies Used by Organizations to Enhance Security in their Social N Research Proposal. https://studentshare.org/information-technology/2035655-technology-mangement-proposal-to-apply-fro-phd
(Strategies Used by Organizations to Enhance Security in Their Social N Research Proposal)
Strategies Used by Organizations to Enhance Security in Their Social N Research Proposal. https://studentshare.org/information-technology/2035655-technology-mangement-proposal-to-apply-fro-phd.
“Strategies Used by Organizations to Enhance Security in Their Social N Research Proposal”. https://studentshare.org/information-technology/2035655-technology-mangement-proposal-to-apply-fro-phd.
  • Cited: 0 times

CHECK THESE SAMPLES OF Strategies Used by Organizations to Enhance Security in their Social Network Pages

Organizational communication strategies

There is a specific scenario where one hacked into our websites and social pages and posted misleading information to our clients... However, this majorly benefits the knowledge driven organizations where a majority of workers advanced in technology.... The outcome will be used to make adjustments.... Traditional communication methods like memos, e-mails, letters and meetings will still be used as the company seeks means to effect its internal and external communication methods....
10 Pages (2500 words) Essay

Do Social Networks Encourage Sports Participation

A social network service is constituted of each user (often represented through a profile), the individual's social links, and some additional services.... Most social network services are web-based and provide an online form of interaction among the users through the Internet.... What is more, through social networking sites like Facebook or Goolge+, organizations can create their own group, where interested people follow the company and see different news and promotions1 every day, when simply checking their social feeds....
38 Pages (9500 words) Dissertation

Security Risks Arising from Social Networking

This dissertation "Security Risks Arising from social Networking" basically explores the security risks associated with social networking to individuals and organizations, and the possible technical and administrative safety measures.... social media platforms are known to offer important business advantages to companies and organizations but at the same time, they are well-known security risks to individuals and institutions.... People must establish and enforce good social media usage policies in order to mitigate these security risks and still enjoy the benefits of social media organizations....
36 Pages (9000 words) Dissertation

Vulnerabilities of Networks and Internet

The good practice of info- security in the preservation of data and its role in effective network management.... Technology, manufacturers and the government work hand in hand to fortify the network structure and further enhance network security management.... Prevention plays an important role in network securityThe Practice of Information Security ... nformation security or info-security main goal is to keep information on a network safe and secured....
7 Pages (1750 words) Essay

Cyber Security as the Process of Different Security Measures

Other hackers are simply vandals and thrill-seekers, commonly involved or responsible for ruining websites and web pages.... This essay analyzes that Cyber security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... Cyber security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops.... This essay discusses that national security, economic vitality, and daily life of individuals vastly depend on safe, resilient, and stable cyberspace....
6 Pages (1500 words) Essay

The Security of Networking

It is essential that firms make a substantial investment in network security in order to safeguard their exclusive information from hackers, as well as other delinquents.... Information center operators, network administrators, need to appreciate the fundamentals of security to arrange safe and administer systems.... Information center operators, network administrators, and other information The article covers the basics of protected networking systems, including firewalls, network topology, and safety protocols....
12 Pages (3000 words) Essay

Hospitality Information Technology in InterContinental Hotels Group

It is applied in a responsive way, fit for application and adjustment in any device that may be used by a customer.... oreover, the site allows for integration with social media.... The organization's website has an established connection to social media, with links to Twitter, Facebook, LinkedIn, and YouTube on the first interface page.... This enables customers to follow links from the organization's website to such social media accounts and back to the site....
11 Pages (2750 words) Case Study

Social Media as a Necessary Evil in Todays Business Operation

ocial media has been instrumental in allowing online communities to actively participate in posting and vetting information as opposed to the era of static web pages.... The paper "social Media as a Necessary Evil in Today's Business Operation" examines why social media is indispensable in modern business.... social media is the employment of internet-connected programs built on the ideas to allow the establishment and converse of user-produced content....
12 Pages (3000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us