請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48473完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 曹承礎(Seng-Cho Chou) | |
| dc.contributor.author | Arthur Heng | en |
| dc.contributor.author | 邢增耀 | zh_TW |
| dc.date.accessioned | 2021-06-15T06:58:15Z | - |
| dc.date.available | 2011-02-20 | |
| dc.date.copyright | 2011-02-20 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-01-27 | |
| dc.identifier.citation | 1. Andersen Consulting & Purdue University (1999). Policy Framework for Interpreting Risk in eCommerce Security
2. Antonson, Wendels (2008). Corporate Social Media - Facilitating Better and Faster Change Management 3. Aven, Renn (2010). Risk, Governance and Society. Springer 4. Babson Executive Education (2010). Cisco: Social Media/Web 2.0 5. Bader N. (2010). Enterprise 2.0: Integrating Web 2.0 into Organizational Business Structure 6. Boudreaux C. (2009). Analysis of Social Media Policies: Lessons and Best Practices. Retrieved December 1, 2010, from http://socialmediagovernance.com 7. Boudreaux C. (2009). Empowerment with Accountability: Social Media Governance in the Enterprise. Retrieved December 1, 2010, from http://socialmediagovernance.com 8. Bressler J. (2009). Social media must include a workplace policy. Retrieved December 1, 2010, from http://ceoworld.biz/ceo/2009/05/05/social-media-use-must-include-a-workplace-policy 9. Burson-Marsteller (2010). The Global Social Media Check-up. Retrieved December 1, 2010, from http://www.burson-marsteller.com 10. Casualty Actuarial Society (2003). Overview of Enterprise Risk Management 11. CIO Council (2009). Guidelines for Secure Use of Social Media by Federal Departments and Agencies 12. Cisco Systems (2010). Cisco Introduces Customer Collaboration Software to Help Businesses Track and Respond to Social Media Interactions. Retrieved December 1, 2010, from http://investor.cisco.com/releasedetail.cfm?ReleaseID=526651 13. Cisco Systems (2010). Cisco Social Media Playbook: Best Practice Sharing. Retrieved December 1, 2010, from http://socialmedia.cisco.com 14. Cisco Systems (2010). Cisco Social Media Policy, Guidelines and FAQs. Retrieved December 1, 2010, from http://socialmedia.cisco.com 15. Cisco Systems (2010). Need for Social Middleware. Retrieved December 1, 2010, from http://blog.socialware.com/2010/01/15/new-cisco-report-need-for-social-middleware 16. Cisco Systems (2010). Social Media: Cultivate Collaboration and Innovation. Retrieved December 1, 2010, from http://www.cisco.com/en/US/services/ps2961/ps2664/CiscoServicesSocialMediaWhitePaper.pdf 17. Clifford S. (2009). Video prank at Domino's taints brand. Retrieved December 1, 2010, from http://query.nytimes.com/gst/fullpage.html?res=9A04E4DD173FF935A25757C0A96F9C8B63 18. Collier M. (2009). Social Media Mavens - An Interview with Kodak's Tom Hoehn. Retrieved December 1, 2010, from http://moblogsmoproblems.blogspot.com/2009/07/social-media-mavens-interview-with_29.html 19. COSO (2004). Guidance on Enterprise Risk Management. COSO website http://www.coso.org 20. Dangson, Fauscette, Mahowald (2009). The State of Social Business: 2009 Survey Results. IDC website http://www.idc.com 21. Deloitte (2009). 2009 Ethics & Workplace Survey results. Retrieved December 1, 2010, from http://www.slideshare.net/opinionwatch/social-networking-and-reputational-risk-in-the-workplace-deloitte-survey-july-09 22. Dreyer L., White L. (2009). Social Media, Risk, and Policies for Associations. Retrieved December 1, 2010, from http://www.socialfish.org/wp-content/downloads/socialfish-policies-whitepaper.pdf 23. Ellis K. (2010). The Growing Risks of Social Media. Retrieved December 1, 2010, from http://www.insurancejournal.com/news/national/2010/07/12/111494.htm 24. eMarketer (2010). Few Companies Have Policy for Employee Use of Social Networks. eMarketer website http://www.emarketer.com 25. eMarketer (2010). Social Media Increases Small-Business Exposure. eMarketer website http://www.emarketer.com 26. Fertik, Thompson (2010). Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier. AMACOM 27. Frey, Rudloff (2010). Social Media and the Impact on Marketing Communication 28. Government of South Australia (2007). DECS Risk Management Framework. Retrieved December 1, 2010, from http://www.decs.sa.gov.au 29. Government of South Australia (2010). An Internal Guide to Policy Making in DECS. Retrieved December 1, 2010, from http://www.decs.sa.gov.au 30. Guel M. (2007). The SANS Policy Primer. Retrieved December 1, 2010, from http://www.sans.org/security-resources/policies 31. Hofer-Shall Z. (2010). The Forrester Wave: Listening Platforms, Q3 2010. Retrieved December 1, 2010, from http://blogs.forrester.com/zach_hofer_shall/10-07-12-forrester_wave_listening_platforms_q3_2010 32. Hrdinova, Helbig, Peters (2010). Design Social Media Policy for Government: Eight Essential Elements. Retrieved December 1, 2010, from http://www.ctg.albany.edu/publications/guides/social_media_policy/social_media_policy.pdf 33. International Organization for Standardization (2009). ISO 31000:2009, Risk Management - Principles and Guidelines 34. ISACA (2010). An Introduction to the Business Model for Information Security. ISACA website http://www.isaca.org 35. ISACA (2010). Social Media: Business Benefits and Security, Governance and Assurance Perspectives. ISACA website http://www.isaca.org 36. ISACA (2010). Top Five Social Media Risks for Business. ISACA website http://www.isaca.org 37. Jackson Lewis (2010). Whitepaper on Social Media Use by Employees. Retrieved December 1, 2010, from http://www.workplaceprivacyreport.com/2010/03/articles/social-networking-1/whitepaper-on-social-media-use-by-employees 38. Jaffee J. (n.d). Tim McIntyre's response to Domino's. Retrieved December 1, 2010, from http://www.flipthefunnelnow.com/tim-mcintyres-response-to-dominos/ 39. Kichatov, Mihajlovski (2010). Social Media as a Promotional Tool - a Comparison between Political Parties and Companies 40. Kim C. (2010). How To Operationalize Social Media – Cisco Style. Retrieved December 1, 2010, from http://cindykimblog.wordpress.com/2010/09/14/how-to-operationalize-social-media-cisco-style 41. Kodak (2010). Social media tips. Retrieved December 1, 2010, from http://www.kodak.com/US/en/corp/ourCompany/index.jhtml?CID=go&idhbx=followus 42. KPMG (2001). Enterprise Risk Management - An emerging model for building shareholder value. Retrieved December 1, 2010, from http://www.kpmg.com.au/aci/docs/ent-risk-mgt.pdf 43. Lazzarotti J. (2010). Social Media and the Workplace: Managing the Risks. Retrieved December 1, 2010, from http://www.jacksonlewis.com 44. Li, Bernoff (2008). Groundswell: Winning in a World Transformed by Social Technologies. Harvard Business School Press 45. Mabry E. (2010). Engaging Audiences: An Analysis of Social Media Usage in Advertising 46. Mangold, Faulds (2009). Social media: The new hybrid element of the promotion mix 47. McAfee (2010). Web 2.0 A Complex Balancing Act. Retrieved December 1, 2010, from http://newsroom.mcafee.com/images/10039/Web2report.pdf 48. National Service-Learning Clearinghouse (2008). Social Media & Web 2.0 Basics. Retrieved December 1, 2010, from http://www.servicelearning.org/filemanager/download/marketing_101/Social_Media_and_Web_2.0_FS.pdf 49. Office of the Auditor General Manitoba (2003). A guide to policy development. OAG Manitoba website http://www.oag.mb.ca 50. O'Neill I. (2010). Social Media, Cisco Systems, and LaSandra Brill. Retrieved December 1, 2010, from http://www.inbound-marketing-automation.ca/blog/2010/09/15/social-media-marketing-expert-4/ 51. Panda Security (2010). 1st Annual Social Media Risk Index for Small to Medium Sized Businesses. Retrieved December 1, 2010, from http://press.pandasecurity.com/usa/wp-content/uploads/2010/09/1st-Annual-Social-Media-Risk-Index.pdf 52. Purdy G. (2008). How to bring your ERM Framework into line with ISO 31000 53. Rees, Bandyopadhyay, Spafford (2003). PFIRES: A Policy Framework for Information Security 54. RIMS (2010). Legal Liability for Published Content. Retrieved December 1, 2010, from http://www.rmmag.com/MGTemplate.cfm?Section=RMMagazine&NavMenuID=128&template=/Magazine/DisplayMagazines.cfm&MGPreview=1&Volume=57&IssueID=349&AID=4179&ShowArticle=1 55. RIMS (2010). The New Wild West. Retrieved December 1, 2010, from http://www.rmmagazine.com/MGTemplate.cfm?Section=MagArchive&NavMenuID=304&template=/Magazine/DisplayMagazines.cfm&Archive=1&IssueID=339&AID=3977&Volume=56&ShowArticle=1 56. Ross J. (2009). A Corporate Guide for Social Media. Retrieved December 1, 2010, from http://www.forbes.com/2009/06/30/social-media-guidelines-intelligent-technology-oreilly.html 57. Russell Herder & Ethos Business Law (2009). Embracing the Opportunities, Averting the Risks. Retrieved December 1, 2010, from http://www.russellherder.com/SocialMediaResearch/TCHRA_Resources/RHP_089_WhitePaper.pdf 58. SANS Institute (2005). What makes a good security policy and why is one necessary? SANS website http://www.sans.org 59. Schaffer N. (2010). Why Your Company Needs a Social Media Policy and 14 Corporate Social Media Policy Examples. Retrieved December 1, 2010, from http://windmillnetworking.com/2010/08/19/why-your-company-needs-a-social-media-policy-and-14-corporate-social-media-policy-examples/ 60. Solis B. & JESS3 (2010). The Conversation Prism. Retrieved December 1, 2010, from http://www.theconversationprism.com 61. Sowetan (2010). Online antics are no joke. Retrieved December 1, 2010, from http://www.sowetanlive.co.za/incoming/2010/08/03/online-antics-are-no-joke 62. The Institute of Internal Auditors (n.d). Applying COSO's Enterprise Risk Management Integrated Framework. Retrieved December 1, 2010, from http://www.theiia.org/guidance/additional-resources/coso-related-resources 63. University of Pretoria (2010). Policy life cycle summary 64. Wong J. (2009). Drafting Trouble-Free Social Media Policies. Retrieved December 1, 2010, from http://www.law.com/jsp/lawtechnologynews/PubArticleLTN.jsp?id=1202431410095 | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48473 | - |
| dc.description.abstract | Social media is certainly the talk of the day; the popularity of social media has grown exponentially in the past five years. As an easily accessible, real time updated and ever present form of communication, opinions delivered through this channel can have near instantaneous effects on anything and anyone, since word of mouth has never travelled nor scaled this quickly compared to any other traditional mediums in history. As such, many businesses have turned to social media as a cost effective means to market their business and spread their brand’s message. Businesses however need to be wary of the potential negative effects that social media could bring to the reputation of the organization. To this end, companies need to understand that how to manage social media risks.
However, there is little academic research carried out which examines how exactly businesses can manage social media risks, in terms of a framework or methodology. This research paper thus seeks to delve into the establishment of a viable framework for social media risk management, in an attempt to provide proper guidance and understanding to companies on the processes involved in the mitigation of social media risks. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T06:58:15Z (GMT). No. of bitstreams: 1 ntu-100-R98749052-1.pdf: 2178035 bytes, checksum: 9b86a6c7215483f2426f6c5742542a11 (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | Chapter 1: Introduction 1
1.1 Background and Motivation 1 1.2 Research Purpose and Problem Statement 5 1.3 Organization of the Paper 6 Chapter 2: Literature Review 7 2.1 What Is Social Media? 7 2.1.1 Social Media vs. Social Networking 12 2.2 Social Media in Business 12 2.2.1 Paradigm Shift in Communication 13 2.2.2 Understanding the Business Objectives for Social Media Usage 16 2.2.3 Substantial Investment in Social Media Use 19 2.3 The Risks of Social Media for Business 23 2.4 Examples of Social Media Disasters 29 2.5 Addressing The Risks of Social Media for Business 31 2.6 How Can A Social Media Policy Help? 33 2.7 Slow Implementation of Social Media Policies 36 2.8 Business Model for Information Security (BMIS) 40 2.8.1 Structure of the BMIS Model 40 2.9 Policy Framework for Interpreting Risk in E-Commerce Security (PFIRES) 45 2.9.1 The PFIRES Life Cycle 46 2.9.2 PFIRES Phases and Sub-steps 47 2.10 ISO 31000:2009 Risk Management Principles & Guidelines 51 2.10.1 Introduction to ISO 31000 52 2.10.2 Stages of the ISO 31000 Framework 53 2.11 COSO Enterprise Risk Management (ERM) Integrated Framework 61 2.11.1 Structure of the COSO ERM Framework 62 2.11.2 Key Implementation Factors for the COSO ERM Framework 65 Chapter 3: Research Methodology 68 3.1 Research Design 68 3.2 Research Structure 70 3.3 Research Limitations 71 Chapter 4: Developing Social Media Policy Best Practices 73 4.1 Case Study 1: Kodak’s Social Media Policy 74 4.1.1 Key Findings from Kodak’s Case Study 80 4.2 Case Study 2: CISCO’s Social Media Policy 81 4.2.1 Key Findings from CISCO’s Case Study 86 4.3 Case Study 3: SocialFish’s Social Media Policy Guidelines 87 4.3.1 Key Learnings from SocialFish’s Case Study 88 4.4 Proposing a Set of Social Media Policy Best Practices 92 Chapter 5: Data Analysis 97 5.1 Analysis of BMIS’s Applicability to Social Media Risk Management 97 5.1.1 Analyzing the elements of BMIS 98 5.2 Analysis of PFIRE’s Applicability to Social Media Risk Management 101 5.2.1 Analyzing the elements of PFIRES 101 5.3 Analysis of ISO 31000’s Applicability to Social Media Risk Management 105 5.3.1 Analyzing the elements of ISO 31000 105 5.4 Analysis of COSO ERM’s Applicability to Social Media Risk Management 108 5.4.1 Analyzing the elements of COSO’s ERM Framework 109 5.5 Proposing an Unified Framework for Social Media Risk Management 110 5.6 Mapping the Proposed Framework with Social Media Best Practices Set 119 5.7 Applying the Proposed Framework 121 Chapter 6: Conclusion and Discussion 124 6.1 Conclusion 124 6.2 Discussion 126 References 127 | |
| dc.language.iso | en | |
| dc.subject | 社群媒體 | zh_TW |
| dc.subject | social media | en |
| dc.title | 企業社群媒體政策制定之整合方針 | zh_TW |
| dc.title | An Integrated Approach for Formulation of Enterprise Social Media Policy | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-1 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 謝冠雄(Edward Hsieh),陳鴻基(Houn-Gee Chen) | |
| dc.subject.keyword | 社群媒體, | zh_TW |
| dc.subject.keyword | social media, | en |
| dc.relation.page | 133 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2011-01-27 | |
| dc.contributor.author-college | 管理學院 | zh_TW |
| dc.contributor.author-dept | 企業管理碩士專班 | zh_TW |
| 顯示於系所單位: | 管理學院企業管理專班(Global MBA) | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-100-1.pdf 未授權公開取用 | 2.13 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
