Beruflich Dokumente
Kultur Dokumente
Table of Content
page
Abstract 3
Introduction 4
1.1 Understanding the platform risks 7
Facebook 7
Twitter 8
LinkedIn 8
E-mail 8
1|Page
II Processes 18
3.1 Identify the risks of the social media, as well as the opportunities 19
2|Page
An approximation to
the risk factor of social networks
Recognizes the power and importance of social networks for companies
The present study approximates the risk factor of social networks, recognizes the power
and importance of social networks for companies in all industries. At the same time, it
helps identify and explore many of the possible negative consequences posed by social
An effective risk management capacity of social networks can provide ideas for life and
make a difference in the business results offered by companies. Social media platforms
and applications have been rapidly implemented by most organizations during the last
decade.
New ways of using social networks emerge weekly and new social media tools seem to
reach the market with the same frequency. Other risks may arise due to the specific
situation of a company and the use of social businesses, highlighting the need for
management efforts.
Introduction
3|Page
Social media platforms such as Facebook, Twitter and LinkedIn have become
minimal presence in social networks, social networks can trigger a wide variety
of risks for the company. The risks are as varied as an unauthorized publication,
is ultimately discouraged.
Social media platforms and applications have been rapidly implemented by most
organizations during the last decade. New ways of using social networks emerge
weekly and new social media tools seem to reach the market with the same
frequency.
blogs, video sharing sites like YouTube, social networks like Facebook,
microblogging tools such as Twitter, rating / review sites, wikis (knowledge base
websites that allow several authors edit and edit simultaneously create), and
crowdsourcing, among others. This medium takes advantage of the power of the
Internet, web 2.0 and mobile technologies to facilitate the creation, exchange,
• customer relationship
• management,
• marketing and
4|Page
• corporate communications for many companies.
The number of social network users worldwide increased from 1.47 billion to
1.73 billion; around 25 percent of the world's population. The global audience of
networks. The most important thing is the use of social networks by companies
around the world. Among Fortune 500 companies, 77 percent now have active
processes, connecting people with people, people with information and data with
information.
In the financial services industry, other ways in which social networks have value
include:
• Corporate communications
• Service
• Resolution of complaints
5|Page
provide opportunities for product development teams to obtain early information
from groups of potential buyers about new product plans, from marketing to test
messages, and for companies to educate and inform customers about the uses
connect with their customers and others, they are also creating a completely new
set of potential risks for companies to monitor. The following social media risks
should be considered:
• Compliance violations
• loss of reputation
• Financial disclosures.
6|Page
• Effects on human resources.
• loss of security
• Competition risk.
• Brand Abduction
The problem here is the fact that traditional risk management policies and
risks. market.
Those risks are considerable. Financial institutions have had to close social
networks; Other companies have suffered damage to the brand due to the power
recognizes the power and importance of social networks for companies in all
industries. At the same time, it helps identify and explore many of the potential,
7|Page
social networks can provide ideas for life and make a difference in the business
Social media risks vary by platform from enabling corporate spying with
Blurring the boundaries between business and personal lives, those photos of
you having too much fun can be far more than just embarrassing. Employers
reputations can be harmed too if your behavior runs counter to high profile
corporate campaigns and messaging mean a good corporate soy is able to piece
8|Page
The urge to share new nuggets of information instantly can be overwhelming but
outsider. Spies working for a security consultancy were able to predict that a
company would file for bankruptcy based on employee Tweets about budget
cut. And there is also just plain fraud: stock markets crashed after a hacker
fraudulently used the Associated Press Twitter account to post fake news of a
to disclose confidential customer lists but are doing so unless they are careful
about revealing their contacts. Employees need to vet contacts with care and
understand how much information they are sharing. Corporate spies have
even worked out when divisions are in trouble because people are touting for
work on LinkedIn.
We all know about the obvious risk of communicating sensitive information over
email, but emails today is sent with an ever-increasing number of weblinks and
embedded malware. It has become distressingly easy for hackers and spies to
links, not just via Facebook but also in your own inbox.
9|Page
People who use social networks to publish false news about the performance of
a company, and then take advantage of the increase in the price of the
shares? Or the stories of criminals who have used personal information posted
by people on their social media pages to get answers to security questions and,
therefore, gain access to their bank accounts? Also, evidence of the fact that, for
One problem is that much of the press coverage focuses on aspects of brand risk
or reputation of the use of social networks. But reputational risk is only one
among many types of social network risks, and in some cases, they can hide or
hide other types of risks under a single brand value and reputation label. It is
the risks of social networks, they probably do not have a broad enough approach
management, which can often be the weakest link. One of the risks is not being
open enough to social networks but knowing their role in business and culture. I
still hear stories of industry executives who don't take social media seriously,
which is simply a "nice to have". But it has great power. This can be negative,
10 | P a g e
given the speed with which the problems spread in social networks. But it can
articles, etc. Customer and customer demographics are among the factors that
The use of social media may expose companies to numerous business ricks, most
• Fraud
11 | P a g e
The cases of high-profile hackers who represent themselves as organizations or
quickly in a world where Line and wireless. These cases have had serious
Press published a false story about a White House bombing that caused the Dow
activities. The risks of social media fraud increase dramatically due to the
every year. It is an activity that has been made easier in many ways by the growth
of social networks
customer list, but in effect it is. Employees who post on Facebook® or tweet
about an interesting job they are doing may not mean any harm; but a good
12 | P a g e
corporate spy could gather several such data to develop advanced information
about the product of a company that is still in the R&D stage. In one case, the
spies who worked for a security consultancy could predict that a company would
declare bankruptcy based on employee tweets about budget cuts and the fact
that the vice president of operations was looking for work at LinkedIn®. The irony
here is that in some cases LinkedIn® is the only social networking site that banks
Users of social media platforms such as Facebook® often send links to each
other; Links to videos, music, it has become distressingly easy for hackers and
ad. Such malware can cause a variety of pranks, including attracting people to
13 | P a g e
In other cases, phishing schemes that look like legitimate messages from a social
media company cause users to reveal their password. Many people use the same
password for several accounts, which could mean that someone now has a
• Privacy violations.
information from six million users, such as email addresses and phone
numbers. The violation meant that any company that was using Facebook® to
promote their business could have publicly shared their customers' information.
called "data scraping." This is a method to track the activities of people online
and collect personal data from their use of social networking sites and online
sites. In some cases, this is done by research companies that then sell the data
to other companies.
2.1 The components of the effective management of the risk of the social
media.
14 | P a g e
Faced with the risks of social networks and these organizational
in all governance processes and systems. These become the value catalysts to
realize the full potential of a social media strategy. The three main components
I. Governance.
way. Although the general principles of governance are applied in the field of
social networks as with other corporate strategies, some specific differences and
15 | P a g e
permutations in several areas must be taken into account, including the need to
effectively coordinate functions and the need for procedures of well-defined crisis
exposed functions.
social media.
The risks arising from the use of social networks in a corporate environment
expose many different functions and groups to risks, from the fulfillment of
provides an idea not only of the reporting lines, but also what role each function
16 | P a g e
can play in the identification, evaluation and management of particular types of
reputation risk, while the legal and audit departments would be responsible for
mitigate reputation and business risks. “We occupy a very large real estate
property in the field of social networks, covering all our business units. So, from
strategy.” Larger organizations should ensure that the different units do not
Creating an acceptable use policy for employees (as well as, potentially,
contractors and vendors ; when it comes to social networks does not imply
starting with a blank page, but rather based on existing policies that cover
social media activity and help provide strong guidelines and examples of
17 | P a g e
However, among the policies that banks must distrust is how to reconcile the
financial institution. UU., Is that the bank does not interact with customers (yet)
channels. This executive said: "It is vital that banks consider the many risks,
to talking about risk tolerance levels. For example, they establish trade limits or,
if they are operating in a country where there are disturbances, they will
establish a level of tolerance for employee safety and when they should withdraw
them.
Similarly, companies must define their risk tolerances for social networks. For
public and make many people talk about their brand, that is an opportunity that
carries a greater degree of risk; People who don't know the company very well
is about what kind of information you feel comfortable sharing the company on
18 | P a g e
that could also expose information to competitors? In general, it is important for
for making the final decisions on the risks of social networks, managing the risks
and handling any crisis that may arise. From the risk owner down in the
escalation such that, if a risk indicator appears, everyone knows exactly how the
that must be addressed. To plan such an occurrence, companies need what the
executive terms of banking social networks, "an operational model for crisis
Two things are especially important in these cases, says this executive. First, for
written and previously approved by public relations and the legal department,
so that the answers can be made quickly by approved people who are notified of
19 | P a g e
an incident. Second, for cases where previously approved responses are not
enough, it is vital.
II. PROCESSES
Effective social media risk management processes protect operations and brand
monitoring of social media risks. Companies are already aware of the importance
management and reporting of risks. However, such processes will often look
somewhat different in the world of social networks, partly due to the always
Processes:
20 | P a g e
Adjusting operating for proactive social media risk assessment and
3.1 Identify the risks of the social media, as well as the opportunities.
Social media risks must be accurately identified in all categories, for example,
discussion of this document. That is, identifying risks properly requires knowing
what the company's risk tolerance levels are for different activities. It means
being familiar with policies to fully understand what the company's attitudes
are. And it means understanding the roles and responsibilities to bring together
given the known strengths and weaknesses of risk in your institution's social
networks, what could be done in the form of new products, services, product
reach customers in new ways? Risk management, after all, is not about
21 | P a g e
suppressing profit-generating activities, but rather about properly directing
those activities.
Attention to early warning signs that indicate something might go wrong. The
attention to sites like LinkedIn®, while legal could be monitoring email traffic to
However, in each case, what is consistent is that the companies are identifying,
evaluating and managing the risk and then reporting this to a social media risk
manager that consolidates the information, scales any problem and effectively
audits the process. Used by the various functions. The risk manager works to
ensure that the groups are monitoring the activities with the correct frequency
and that the data and reports they provide are of high quality.
22 | P a g e
Top management should receive the appropriate information with the
problems that can lead to increased commercial risk. For example, if you receive
500 tweets on a particular topic, those people cannot know each other, so it is
an indication of a real problem that you can then quickly solve. With tweets, you
can also identify a general geographic area, which also helps identify where the
problem is occurring.
positive or negative and in what context, for example, the attention to the
customer, product quality and inform. In this way, reputational risks can be
23 | P a g e
employee from saying something on social media that violates a particular
regulation.
You can use business support platforms and manage social media channels:
• Monitor the content of social networks to protect the value of the brand
information.
• Quick search of all captured content, which supports legal and discovery
queries.
regulations.
The ability to stop the risky activity of social networks before it becomes a
problem is an important feature, for example, let's say a customer sends you a
tweet with a problem with your business credit card, and you respond and
say that if you have problems with your credit card, call this number, that tweet
will be locked and redirected to monitoring. In this way, a bank knows if the
24 | P a g e
A key objective of effective risk management is to reduce the likelihood of risks
also mean transferring part or all of the risk to another party. This could mean
If companies have adequately analyzed where the risks are, what are the
indicators and what is the level of risk tolerance, that should provide a solid
25 | P a g e
Several tools are now available that allow companies to extract data through
social media platforms and search for particular types of information. Web
crawlers, mentioned above, can extract data from users of social networks.
III. SYSTEMS
primarily about improving data management and analysis and the use of new
risks. Large amounts of data are now on social media platforms, so companies
social media risks. Effective use technologies to improve data management and
Several tools are now available that allow companies to extract data through
social media platforms and search for particular types of information. Web
crawlers, mentioned above, can extract data from users of social networks. Data
26 | P a g e
mining and analysis can turn the apparent randomness and chaos of millions of
business strategists.
While trackers and other tools collect information or extract it, text analysis
Social media regulations and technologies present new challenges for data
complicated by the fact that social networks generally rely on third-party cloud
applications, which means that a company cannot control the security of those
applications.
When data has been extracted, analyzed, organized and stored effectively, this
allows companies to report more effectively and in a timely manner. The most
panel, which helps management analyze the factors and see where the
27 | P a g e
This important financial institution had a sophisticated monitoring capacity for
to adapt his risk management approach in light of his passage to social networks.
cultural change.
One of the critical points to remember about risk management is that, despite
managed. In the words of a social media banking executive. Mitigating the risks
28 | P a g e
of social networks is not just about technology. You can install as many firewalls
as you want, but people should still know the risks and understand their role in
mitigating them.
Consequently, one of the key factors that distinguishes the best social media risk
managers from their peers is their commitment to create and instill a risk-aware
networks and what each individual should do to help manage those risks. It is
also important to carry out more detailed tacit knowledge and training
29 | P a g e
• Be responsible for their performance.
from an appropriately integrated operational model that links the legal function
(for the interpretation and guidance of regulation), compliance (for the design
and implementation of the program), the operational risk (for adequate control
internal / external audit (as a third line of defense and testing) and technology
(for automation and prevention controls that reduce human error ). The effective
management of all these moving parts does not happen overnight or as a single
with the risks of social networks. A story told by one of our respondents is a
persist, at least for a while, when it comes to social networks and leadership
to have a comprehensive view of the risks of social networks, their impacts and
30 | P a g e
their ability to be mitigated or controlled. A framework for effective performance
31 | P a g e
• The most important and most difficult aspect of controlling social networks
critical for any company that wants to take social networks seriously:
listen to what people tell them and what they say about them. It is very
important to have the ability to analyze who says what and then be able
gain more value from a social media strategy, companies must institute
32 | P a g e
References and Bibliography
• Zeng, Daniel. Social Media Analytics and Intelligence. December 30, 2010.
IEE
• Tran, Linh. Social Media and Project Management. Monday, 29, June 2015.
33 | P a g e