Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 管理學院企業管理專班(Global MBA)
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48473
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor曹承礎(Seng-Cho Chou)
dc.contributor.authorArthur Hengen
dc.contributor.author邢增耀zh_TW
dc.date.accessioned2021-06-15T06:58:15Z-
dc.date.available2011-02-20
dc.date.copyright2011-02-20
dc.date.issued2011
dc.date.submitted2011-01-27
dc.identifier.citation1. Andersen Consulting & Purdue University (1999). Policy Framework for Interpreting Risk in eCommerce Security
2. Antonson, Wendels (2008). Corporate Social Media - Facilitating Better and Faster Change Management
3. Aven, Renn (2010). Risk, Governance and Society. Springer
4. Babson Executive Education (2010). Cisco: Social Media/Web 2.0
5. Bader N. (2010). Enterprise 2.0: Integrating Web 2.0 into Organizational Business Structure
6. Boudreaux C. (2009). Analysis of Social Media Policies: Lessons and Best Practices. Retrieved December 1, 2010, from http://socialmediagovernance.com
7. Boudreaux C. (2009). Empowerment with Accountability: Social Media Governance in the Enterprise. Retrieved December 1, 2010, from http://socialmediagovernance.com
8. Bressler J. (2009). Social media must include a workplace policy. Retrieved December 1, 2010, from http://ceoworld.biz/ceo/2009/05/05/social-media-use-must-include-a-workplace-policy
9. Burson-Marsteller (2010). The Global Social Media Check-up. Retrieved December 1, 2010, from http://www.burson-marsteller.com
10. Casualty Actuarial Society (2003). Overview of Enterprise Risk Management
11. CIO Council (2009). Guidelines for Secure Use of Social Media by Federal Departments and Agencies
12. Cisco Systems (2010). Cisco Introduces Customer Collaboration Software to Help Businesses Track and Respond to Social Media Interactions. Retrieved December 1, 2010, from http://investor.cisco.com/releasedetail.cfm?ReleaseID=526651
13. Cisco Systems (2010). Cisco Social Media Playbook: Best Practice Sharing. Retrieved December 1, 2010, from http://socialmedia.cisco.com
14. Cisco Systems (2010). Cisco Social Media Policy, Guidelines and FAQs. Retrieved December 1, 2010, from http://socialmedia.cisco.com
15. Cisco Systems (2010). Need for Social Middleware. Retrieved December 1, 2010, from http://blog.socialware.com/2010/01/15/new-cisco-report-need-for-social-middleware
16. Cisco Systems (2010). Social Media: Cultivate Collaboration and Innovation. Retrieved December 1, 2010, from http://www.cisco.com/en/US/services/ps2961/ps2664/CiscoServicesSocialMediaWhitePaper.pdf
17. Clifford S. (2009). Video prank at Domino's taints brand. Retrieved December 1, 2010, from http://query.nytimes.com/gst/fullpage.html?res=9A04E4DD173FF935A25757C0A96F9C8B63
18. Collier M. (2009). Social Media Mavens - An Interview with Kodak's Tom Hoehn. Retrieved December 1, 2010, from http://moblogsmoproblems.blogspot.com/2009/07/social-media-mavens-interview-with_29.html
19. COSO (2004). Guidance on Enterprise Risk Management. COSO website http://www.coso.org
20. Dangson, Fauscette, Mahowald (2009). The State of Social Business: 2009 Survey Results. IDC website http://www.idc.com
21. Deloitte (2009). 2009 Ethics & Workplace Survey results. Retrieved December 1, 2010, from http://www.slideshare.net/opinionwatch/social-networking-and-reputational-risk-in-the-workplace-deloitte-survey-july-09
22. Dreyer L., White L. (2009). Social Media, Risk, and Policies for Associations. Retrieved December 1, 2010, from http://www.socialfish.org/wp-content/downloads/socialfish-policies-whitepaper.pdf
23. Ellis K. (2010). The Growing Risks of Social Media. Retrieved December 1, 2010, from http://www.insurancejournal.com/news/national/2010/07/12/111494.htm
24. eMarketer (2010). Few Companies Have Policy for Employee Use of Social Networks. eMarketer website http://www.emarketer.com
25. eMarketer (2010). Social Media Increases Small-Business Exposure. eMarketer website http://www.emarketer.com
26. Fertik, Thompson (2010). Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier. AMACOM
27. Frey, Rudloff (2010). Social Media and the Impact on Marketing Communication
28. Government of South Australia (2007). DECS Risk Management Framework. Retrieved December 1, 2010, from http://www.decs.sa.gov.au
29. Government of South Australia (2010). An Internal Guide to Policy Making in DECS. Retrieved December 1, 2010, from http://www.decs.sa.gov.au
30. Guel M. (2007). The SANS Policy Primer. Retrieved December 1, 2010, from http://www.sans.org/security-resources/policies
31. Hofer-Shall Z. (2010). The Forrester Wave: Listening Platforms, Q3 2010. Retrieved December 1, 2010, from http://blogs.forrester.com/zach_hofer_shall/10-07-12-forrester_wave_listening_platforms_q3_2010
32. Hrdinova, Helbig, Peters (2010). Design Social Media Policy for Government: Eight Essential Elements. Retrieved December 1, 2010, from http://www.ctg.albany.edu/publications/guides/social_media_policy/social_media_policy.pdf
33. International Organization for Standardization (2009). ISO 31000:2009, Risk Management - Principles and Guidelines
34. ISACA (2010). An Introduction to the Business Model for Information Security. ISACA website http://www.isaca.org
35. ISACA (2010). Social Media: Business Benefits and Security, Governance and Assurance Perspectives. ISACA website http://www.isaca.org
36. ISACA (2010). Top Five Social Media Risks for Business. ISACA website http://www.isaca.org
37. Jackson Lewis (2010). Whitepaper on Social Media Use by Employees. Retrieved December 1, 2010, from http://www.workplaceprivacyreport.com/2010/03/articles/social-networking-1/whitepaper-on-social-media-use-by-employees
38. Jaffee J. (n.d). Tim McIntyre's response to Domino's. Retrieved December 1, 2010, from http://www.flipthefunnelnow.com/tim-mcintyres-response-to-dominos/
39. Kichatov, Mihajlovski (2010). Social Media as a Promotional Tool - a Comparison between Political Parties and Companies
40. Kim C. (2010). How To Operationalize Social Media – Cisco Style. Retrieved December 1, 2010, from http://cindykimblog.wordpress.com/2010/09/14/how-to-operationalize-social-media-cisco-style
41. Kodak (2010). Social media tips. Retrieved December 1, 2010, from http://www.kodak.com/US/en/corp/ourCompany/index.jhtml?CID=go&idhbx=followus
42. KPMG (2001). Enterprise Risk Management - An emerging model for building shareholder value. Retrieved December 1, 2010, from http://www.kpmg.com.au/aci/docs/ent-risk-mgt.pdf
43. Lazzarotti J. (2010). Social Media and the Workplace: Managing the Risks. Retrieved December 1, 2010, from http://www.jacksonlewis.com
44. Li, Bernoff (2008). Groundswell: Winning in a World Transformed by Social Technologies. Harvard Business School Press
45. Mabry E. (2010). Engaging Audiences: An Analysis of Social Media Usage in Advertising
46. Mangold, Faulds (2009). Social media: The new hybrid element of the promotion mix
47. McAfee (2010). Web 2.0 A Complex Balancing Act. Retrieved December 1, 2010, from http://newsroom.mcafee.com/images/10039/Web2report.pdf
48. National Service-Learning Clearinghouse (2008). Social Media & Web 2.0 Basics. Retrieved December 1, 2010, from http://www.servicelearning.org/filemanager/download/marketing_101/Social_Media_and_Web_2.0_FS.pdf
49. Office of the Auditor General Manitoba (2003). A guide to policy development. OAG Manitoba website http://www.oag.mb.ca
50. O'Neill I. (2010). Social Media, Cisco Systems, and LaSandra Brill. Retrieved December 1, 2010, from http://www.inbound-marketing-automation.ca/blog/2010/09/15/social-media-marketing-expert-4/
51. Panda Security (2010). 1st Annual Social Media Risk Index for Small to Medium Sized Businesses. Retrieved December 1, 2010, from http://press.pandasecurity.com/usa/wp-content/uploads/2010/09/1st-Annual-Social-Media-Risk-Index.pdf
52. Purdy G. (2008). How to bring your ERM Framework into line with ISO 31000
53. Rees, Bandyopadhyay, Spafford (2003). PFIRES: A Policy Framework for Information Security
54. RIMS (2010). Legal Liability for Published Content. Retrieved December 1, 2010, from http://www.rmmag.com/MGTemplate.cfm?Section=RMMagazine&NavMenuID=128&template=/Magazine/DisplayMagazines.cfm&MGPreview=1&Volume=57&IssueID=349&AID=4179&ShowArticle=1
55. RIMS (2010). The New Wild West. Retrieved December 1, 2010, from http://www.rmmagazine.com/MGTemplate.cfm?Section=MagArchive&NavMenuID=304&template=/Magazine/DisplayMagazines.cfm&Archive=1&IssueID=339&AID=3977&Volume=56&ShowArticle=1
56. Ross J. (2009). A Corporate Guide for Social Media. Retrieved December 1, 2010, from http://www.forbes.com/2009/06/30/social-media-guidelines-intelligent-technology-oreilly.html
57. Russell Herder & Ethos Business Law (2009). Embracing the Opportunities, Averting the Risks. Retrieved December 1, 2010, from http://www.russellherder.com/SocialMediaResearch/TCHRA_Resources/RHP_089_WhitePaper.pdf
58. SANS Institute (2005). What makes a good security policy and why is one necessary? SANS website http://www.sans.org
59. Schaffer N. (2010). Why Your Company Needs a Social Media Policy and 14 Corporate Social Media Policy Examples. Retrieved December 1, 2010, from http://windmillnetworking.com/2010/08/19/why-your-company-needs-a-social-media-policy-and-14-corporate-social-media-policy-examples/
60. Solis B. & JESS3 (2010). The Conversation Prism. Retrieved December 1, 2010, from http://www.theconversationprism.com
61. Sowetan (2010). Online antics are no joke. Retrieved December 1, 2010, from http://www.sowetanlive.co.za/incoming/2010/08/03/online-antics-are-no-joke
62. The Institute of Internal Auditors (n.d). Applying COSO's Enterprise Risk Management Integrated Framework. Retrieved December 1, 2010, from http://www.theiia.org/guidance/additional-resources/coso-related-resources
63. University of Pretoria (2010). Policy life cycle summary
64. Wong J. (2009). Drafting Trouble-Free Social Media Policies. Retrieved December 1, 2010, from http://www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202431410095
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48473-
dc.description.abstractSocial media is certainly the talk of the day; the popularity of social media has grown exponentially in the past five years. As an easily accessible, real time updated and ever present form of communication, opinions delivered through this channel can have near instantaneous effects on anything and anyone, since word of mouth has never travelled nor scaled this quickly compared to any other traditional mediums in history. As such, many businesses have turned to social media as a cost effective means to market their business and spread their brand’s message. Businesses however need to be wary of the potential negative effects that social media could bring to the reputation of the organization. To this end, companies need to understand that how to manage social media risks.
However, there is little academic research carried out which examines how exactly businesses can manage social media risks, in terms of a framework or methodology. This research paper thus seeks to delve into the establishment of a viable framework for social media risk management, in an attempt to provide proper guidance and understanding to companies on the processes involved in the mitigation of social media risks.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T06:58:15Z (GMT). No. of bitstreams: 1
ntu-100-R98749052-1.pdf: 2178035 bytes, checksum: 9b86a6c7215483f2426f6c5742542a11 (MD5)
Previous issue date: 2011
en
dc.description.tableofcontentsChapter 1: Introduction 1
1.1 Background and Motivation 1
1.2 Research Purpose and Problem Statement 5
1.3 Organization of the Paper 6
Chapter 2: Literature Review 7
2.1 What Is Social Media? 7
2.1.1 Social Media vs. Social Networking 12
2.2 Social Media in Business 12
2.2.1 Paradigm Shift in Communication 13
2.2.2 Understanding the Business Objectives for Social Media Usage 16
2.2.3 Substantial Investment in Social Media Use 19
2.3 The Risks of Social Media for Business 23
2.4 Examples of Social Media Disasters 29
2.5 Addressing The Risks of Social Media for Business 31
2.6 How Can A Social Media Policy Help? 33
2.7 Slow Implementation of Social Media Policies 36
2.8 Business Model for Information Security (BMIS) 40
2.8.1 Structure of the BMIS Model 40
2.9 Policy Framework for Interpreting Risk in E-Commerce Security (PFIRES) 45
2.9.1 The PFIRES Life Cycle 46
2.9.2 PFIRES Phases and Sub-steps 47
2.10 ISO 31000:2009 Risk Management Principles & Guidelines 51
2.10.1 Introduction to ISO 31000 52
2.10.2 Stages of the ISO 31000 Framework 53
2.11 COSO Enterprise Risk Management (ERM) Integrated Framework 61
2.11.1 Structure of the COSO ERM Framework 62
2.11.2 Key Implementation Factors for the COSO ERM Framework 65
Chapter 3: Research Methodology 68
3.1 Research Design 68
3.2 Research Structure 70
3.3 Research Limitations 71
Chapter 4: Developing Social Media Policy Best Practices 73
4.1 Case Study 1: Kodak’s Social Media Policy 74
4.1.1 Key Findings from Kodak’s Case Study 80
4.2 Case Study 2: CISCO’s Social Media Policy 81
4.2.1 Key Findings from CISCO’s Case Study 86
4.3 Case Study 3: SocialFish’s Social Media Policy Guidelines 87
4.3.1 Key Learnings from SocialFish’s Case Study 88
4.4 Proposing a Set of Social Media Policy Best Practices 92
Chapter 5: Data Analysis 97
5.1 Analysis of BMIS’s Applicability to Social Media Risk Management 97
5.1.1 Analyzing the elements of BMIS 98
5.2 Analysis of PFIRE’s Applicability to Social Media Risk Management 101
5.2.1 Analyzing the elements of PFIRES 101
5.3 Analysis of ISO 31000’s Applicability to Social Media Risk Management 105
5.3.1 Analyzing the elements of ISO 31000 105
5.4 Analysis of COSO ERM’s Applicability to Social Media Risk Management 108
5.4.1 Analyzing the elements of COSO’s ERM Framework 109
5.5 Proposing an Unified Framework for Social Media Risk Management 110
5.6 Mapping the Proposed Framework with Social Media Best Practices Set 119
5.7 Applying the Proposed Framework 121
Chapter 6: Conclusion and Discussion 124
6.1 Conclusion 124
6.2 Discussion 126
References 127
dc.language.isoen
dc.subject社群媒體zh_TW
dc.subjectsocial mediaen
dc.title企業社群媒體政策制定之整合方針zh_TW
dc.titleAn Integrated Approach for Formulation of Enterprise Social Media Policyen
dc.typeThesis
dc.date.schoolyear99-1
dc.description.degree碩士
dc.contributor.oralexamcommittee謝冠雄(Edward Hsieh),陳鴻基(Houn-Gee Chen)
dc.subject.keyword社群媒體,zh_TW
dc.subject.keywordsocial media,en
dc.relation.page133
dc.rights.note有償授權
dc.date.accepted2011-01-27
dc.contributor.author-college管理學院zh_TW
dc.contributor.author-dept企業管理碩士專班zh_TW
顯示於系所單位:管理學院企業管理專班(Global MBA)

文件中的檔案:
檔案 大小格式 
ntu-100-1.pdf
  未授權公開取用
2.13 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved