1. OVERVIEWSocial networks afford individuals the venue and technology to connect with many “friends,” both known and unknown. An individual’s activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social networking sites that identify the employee’s employer, such as LinkedIn.Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and to provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.REQUIREMENTSWrite 4–5 pages of guidelines for accessing social networking sites. Include the following:
    • Select and describe three social networking sites you are presenting in the context of cloud computing.
    • Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.
    • Summarize the mitigating strategies you would recommend to your CEO that affirm the organization’s privacy and security practice among social networking sites.
    • Suggest three ways that your social network policy can protect your employer against:
      • Identity theft.
      • Cybercrimes.
      • Abusive marketing.
    • Go to Strayer University Online Library to find at least three quality resources for this assignment. At least one must be from a professional journal in the IT field. Note: Wikipedia and similar websites do not qualify as quality resources.
    • Determine the security risks of social media to organizations and strategies to mitigate them.
    This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Get This Assignment Help Now (30% Discount Code “Law81cglUKdb”)

Social Media and Privacy Issues
Order Now on customessaymasters.com