SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Social Networks / Web 2.0,[object Object],Prepared by : Leo LisenBai,[object Object],ACC 626, Section 2,[object Object]
Brief Intro,[object Object],Marketing and CRM,[object Object],Internal Benefits,[object Object],Challenges and Drawbacks,[object Object],Security and Privacy Concerns,[object Object],Implementation – Overcome Challenges,[object Object],Closing Remarks,[object Object],Agenda,[object Object]
Web 1.0 vs. Web 2.0,[object Object],Importance,[object Object],Opportunities,[object Object],Brief Intro,[object Object]
Problems with traditional CRM mediums,[object Object],Power of Web 2.0 technologies,[object Object],Address problems, fast – Adidas,[object Object],Collaboration,[object Object],Superior customer experience and satisfaction,[object Object],CRM,[object Object]
Customized Marketing,[object Object],Brand Building,[object Object],Target,[object Object],Bank of America and ING Direct,[object Object],Marketing,[object Object]
Low cost, effective marketing for small firms,[object Object],Networking and employment opportunities for CAs,[object Object],CAs and CA firms,[object Object]
Hiring,[object Object],Innovation,[object Object],Productivity and efficiency,[object Object],Internal Benefits,[object Object]
Difficulty linking the effectiveness of social networks and increased profits,[object Object],Web 2.0 – Unknown waters for many companies – failure of Walmart,[object Object],Potential for negative customer experiences,[object Object],Insignificant improvements in learning and innovation,[object Object],Threatens management control,[object Object],Challenges and Drawbacks,[object Object]
Importance of keeping IT systemsecure and data private,[object Object],Increasing attacks on social networking sites,[object Object],Malicious apps on Facebook,[object Object],Unauthorized access to data,[object Object],Facebook,[object Object],Twitter,[object Object],Security and Privacy Issues,[object Object]
IT governance,[object Object],Monitoring,[object Object],Alignment between goals of the business and Web 2.0,[object Object],Detailed plan,[object Object],Dedication to maintenance,[object Object],Overcoming Challenges ,[object Object]
Significant Benefits,[object Object],Risks can be reasonably managed,[object Object],Unique opportunities in North America, as adoption rates are low,[object Object],Potential for increased revenue and profits,[object Object],Closing Remarks,[object Object]

Weitere ähnliche Inhalte

Ähnlich wie Social networks & web 2.0

Is Your Organization Ready for Web 2.0?
Is Your Organization Ready for Web 2.0?Is Your Organization Ready for Web 2.0?
Is Your Organization Ready for Web 2.0?Dennis D. McDonald
 
Web 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationWeb 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationRoss Dawson
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential InformationKim Jensen
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Simplify360
 
Getting the Most Out of Your Website
Getting the Most Out of Your WebsiteGetting the Most Out of Your Website
Getting the Most Out of Your WebsiteFrederick Faulkner IV
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfdotco
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Continuity and Resilience
 
Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Vanguard Visions
 
Telecomunicaciones eb dc
Telecomunicaciones eb dcTelecomunicaciones eb dc
Telecomunicaciones eb dcevaristo
 
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheq
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheqAq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheq
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheqevaristo
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Custom Software Solutions Provider USA: Top 10 Challenges to Mitigate
Custom Software Solutions Provider USA: Top 10 Challenges to MitigateCustom Software Solutions Provider USA: Top 10 Challenges to Mitigate
Custom Software Solutions Provider USA: Top 10 Challenges to MitigateWeblineIndia
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Emerging trend in information system and operation.ppt
Emerging trend in information system and operation.pptEmerging trend in information system and operation.ppt
Emerging trend in information system and operation.pptmQuangThanhT
 

Ähnlich wie Social networks & web 2.0 (20)

Is Your Organization Ready for Web 2.0?
Is Your Organization Ready for Web 2.0?Is Your Organization Ready for Web 2.0?
Is Your Organization Ready for Web 2.0?
 
Enterprises2.0
Enterprises2.0Enterprises2.0
Enterprises2.0
 
Topic outline Ebusiness
Topic outline EbusinessTopic outline Ebusiness
Topic outline Ebusiness
 
Web 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationWeb 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participation
 
1010 2011
1010   20111010   2011
1010 2011
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 
Crmtalk12
Crmtalk12Crmtalk12
Crmtalk12
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
Getting the Most Out of Your Website
Getting the Most Out of Your WebsiteGetting the Most Out of Your Website
Getting the Most Out of Your Website
 
Total FBO User Conference
Total FBO User ConferenceTotal FBO User Conference
Total FBO User Conference
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdf
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
 
Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13Managing Cloud Business Solutions Worksheets v2 Nov 13
Managing Cloud Business Solutions Worksheets v2 Nov 13
 
Telecomunicaciones eb dc
Telecomunicaciones eb dcTelecomunicaciones eb dc
Telecomunicaciones eb dc
 
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheq
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheqAq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheq
Aq4w8jb7v9 ialyvre=&expires=1282751370&aws accesskeyid=akiajljt267degkzdheq
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Custom Software Solutions Provider USA: Top 10 Challenges to Mitigate
Custom Software Solutions Provider USA: Top 10 Challenges to MitigateCustom Software Solutions Provider USA: Top 10 Challenges to Mitigate
Custom Software Solutions Provider USA: Top 10 Challenges to Mitigate
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Emerging trend in information system and operation.ppt
Emerging trend in information system and operation.pptEmerging trend in information system and operation.ppt
Emerging trend in information system and operation.ppt
 

Kürzlich hochgeladen

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 

Kürzlich hochgeladen (20)

201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 

Social networks & web 2.0

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.

Hinweis der Redaktion

  1. Hi class. My name is Leo Bai from Accounting 626, section 2. Today I’ll be presenting to you the implications of Social networks and Web 2.0 technologies to accountants, managers and corporate exectutives
  2. The agenda of the presentation will go as follows:I will first take you through a brief introduction on what Social networks and web 2.0 technologies are Then I will go into details about some of the specific benefits and unique opportunities being offered by Web 2.0Along with some challenges and drawbacks, major concerns over security and privacy, and ways to overcome these challenges
  3. With the invention of the internet, Web 1.0 was born. Under this framework, a company can set up a website on the internet, in order to distribute information to consumers, Such as company history, information about its product and service offerings and financial performance. Under Web 1.0, there is little or no interactions between the customers and the website. The flow of information is one way.They key difference between Web 2.0 and Web 1.0 is that communication of information is not one way anymore. Instead, communication is multiple ways, filled with user created data. I am sure many of you are familiar with social networking sites such as Facebook and Twitter. Social networks are essentially a product of Web 2.0 technologies.Web 2.0 is important in the sense that it offers opportunities similar to those offered when the internet was invented. Companies that can capitalize on the opportunies offered by Web 2.0 will be successful going into the futureThose that don’t recognize the importance of Web 2.0 may experience significant difficulties in the future.
  4. The existing CRM has many problems, because the flow of info usually occurs in a one-way format such as over the phone or face-to-face. Under this format, CRM doesn’t derive any added value besides solving customer’s problems. For example, imagine a scenario where a service representative is receiving an increasing number of calls related to a particular product. Under this scenario, the representative may or may not realize that the product has severe issues that should be addressed as soon as possible. Eventually, management may notice the problem from the records generated by the CRM system, and address it, but this will take some time.In this regard, Web 2.0 allows companies to address problems with its products a lot faster. For example, a forum can be set up and maintained by the company, where customers can openly express their thoughts on the strengths and weaknesses of the products.Adidas launched a shoe product that was affected by an issue of quality, but thanks to the use of social networks, this problem was quickly addressed. In return, Adidas gained respect and good reputation from the customers.Another key success factor to CRM is the ability address customer requests as fast as possible. Web 2.0 is especially effective here because under a collaborative environment, problem from one customer can be answered by another customer that has experienced the same problem before. And all of this can occur in off-business hours. So now not only are the customer requests addressed faster, the service representatives will also have more time to address other customer requests.
  5. The ability to advertise products and services will dictate the success of a companyIn this regard, Web 2.0 useful. The critical factor that determines the success or failure of a marketing campaign is whether or not the marketing campaign conveys the right messages for its intended audience. Under the traditional marketing methods such as TV or newspaper ads, a marketing campaign must assume a big, generic audience base and design the campaign to appeal to this audience base. The shortcomings associated are obvious: by assuming one generic audience, other smaller audience groups will be ignored and may not find the marketing messages appealing to their needs. Moreover, the campaign is based on assumptions of what would appeal to the generic audience, which may or may not be accurate in the first place. Under Web 2.0 however, a company can advertise for its products based on differing user needs and interests. For example, a company can gather critical information about its potential customers from Web 2.0 interface. Then based on the information gathered, the company can categorize its customers into diferent groups based on needs, and separately design marketing campaigns directed at the specific groups. In 2007, Target started a marking campaign on Facebook by creating a profile that covered the nuts and bolts of freshman’s jitters, and gave advice on a broad range of issues. The campaign was successful, resulting in increased sales and improved brand image.In terms of reshaping brand images, BoA and ING Direct have also adopted the social networks, to provide individualized help service and build consumer trust, which is critical to their successes
  6. Now I will briefly talk about the impact of social networks to CAs and CA firms. Accountants and accounting firms are limited by professional standards, which prohibit the aggressive advertising of their services. This is usually a bottleneck in terms of growth for smaller firms, because they lack a cost effective medium to effectively advertise their services.This bottleneck problem can be addressed by using Web 2.0, by establishing a presence in the community and raise awareness, in order to attract more clients.As for accountants, social networks provide an alternative method of expanding their networks and advertising themselves. For example, social networking sites such as LinkedIn provides accountants with the opportunity to easily connect with other accountants, facilitating networking or even employment opportunities.
  7. Web 2.0 also offers many benefits that can improve the internal operating efficiency of a company. In terms of hiring, 30 min interview, not enough information, information is limited. By use of social networks, hiring managers can acquire useful information that are otherwise not availableIn terms of innovation, An internal social network can serve as a channel for internal idea sharing which will spur innovative ideas in the process. Internal social network spur innovation from within, external social network can also result in innovation by taking in ideas that may not reside within the company.Adopt Web 2.0, employees can better collaborate on projects and share ideas quicker., and better collaboration on projects can result in faster project completions. Also useful is the fact that employees can voice their opinions about management or point out to current opreating inefficiencies, which will ultimately lead to increasing operating efficiency for the company as a whole
  8. Web 2.0 projects will meanspendings and budgets, which have to the approved by managers and executives. However, it can be difficult to build direct links between social networks and improved financial performance. Because financial performance can be affected by many factors and it is usually difficult to isolate the individual effect of social networksAnother challenge is that Web 2.0 usually represents unknown waters for many companies. Going back to the example of Target, Walmart also launched a similar campaign in 2007 in hopes of replicating Target’s success. However, the Walmart campaign ended in a disaster because they limited comments from users, which is against the core principle behind social networks. Another potential drawback of a Web 2.0 platform is that people have the freedom to express their opinions and experiences associated with a particular product, both positive and negative ones. Adidas was able to channel its negative energies into positive ones, but failures to address these negative exp can result in damaged brand image, which will have long term nega effects.Other factors that are slowing the adoption of Web 2.0 include arguments such as Web 2.0 does not improve learning and innovation as much as predicted. Or the notion that internal social networks where employees can freely voice their opinions is a threat to management control.
  9. In the implementation phase of Web 2.0, companies are mainly concerned over 2 areas, namely the security and privacy of their data. These are nonetheless very reasonable concerns, because a secure IT system is fundamental to the success of most companies and loss of private data may result in losses of competitive advantages or even lawsuits filed by the owners of the lost private dataIn terms of security, In 2008, an attack was launched through Facebook whereby an application prompts users to download seemingly legitimate programs that actually contain malicious adware. This is very troubling because these malicious programs can potentially paralyze a company’s IT system, and also because it seems like there are no stopping this, as these malicious apps are legitimate on the appearance.In terms of data privacy, both Facebook and Twitter had incidents where unauthorized outside parties gained access to the private data of users. To address the problem, government officials were involved and both Facebook and Twitter promised to close these loopholes. However, this doesn’t guarantee that future loopholes will not occur. For companies that have adopted these social networking sites for business, in the event of a data breach, unauthorized parties may now have access to sensitive inside information, financial data or even trade secrets.
  10. The security and privacy risks previously mentioned can be addressed or at least be effectively managed.With the correct IT governance, such as user guidelines, solid security, and data access and management policies, companies can reduce the security risks associated with Web 2.0 and decrease the likelihood of being attacked by malicious apps. Going back to the malicious app incident connected with Facebook, employees can be properly trained and instructed to follow good user guidelines that prohibit them from downloading random apps from Facebook unrelated to workOn top of IT governance, the company can also utilize monitoring tools to ensure that guidelines are being followed properly. For example, companies can adopt an innovative monitoring tool that takes regular screen shots that can be stored and watched later in video-like format. This tool can be very useful to monitor employee usage of the social networks in order to spot activities that are misuse or non-compliant with IT policies in placeMost importantly, web 2.0 implementations must be well planned out. The plan must be based on an alignment of goals between the overall business and Web 2.0. The plan should clearly document the procedures involved in the implementation of Web 2.0 along with clear timelines. Also, the social networks must be actively maintained after the initial adoption, to achieve maximum intended effects.
  11. To close the presentation, I would like to recommend the adoption of Web 2.0 in the workplace, as potential benefits can be significant and related risks are manageable.In addition, the low adoption rate in North America presents a unique opportunity for CAs and business leaders to seek early adoption of the Web 2.0 interfaces. Early adopters of Web 2.0 in North America may be able to reap the full benefits offered by Web 2.0, and translate these benefits into operating advantages and ultimately increased revenue and profits. Web 2.0 experts believe that Web 2.0 technologies and the internet are expected to be the medium over which businesses are expected to generate more revenue and become more profitable, I believe so as well.Thank you for listening