Premium Essay

Personal Social Media Audit

In:

Submitted By leojai
Words 1507
Pages 7
Assessment 1 – Personal Social Media Audit
Student Name: KA CHUN CHEUNG
Student Number: S3276462

The 7 days diary recorded the social media and applications I have been used between 17 of March to 23 of March. There are few applications have high frequency that I using that, such as Facebook, Wechat, instagram, whatsapp and weibo.

During 7 days period of recording, I discover that every morning after I wake up, I will spend some time on bed to go some social micro blog and network on the bed and the duration usually less that 30minutes. After that, I will use some mobile social apps like chatting tools such wechat, whatsapp during the day when I am free. The frequency that I use chatting tools actually is 24/7 standby, I will try to reply ASAP if I am still awake and not busy at that time, so the duration of use the chatting tools is short but frequency is high.

When I look at the table, I was quite surprise, I find out actually I am quite addicted to the social networks. Since everyday I will check the social network media at least one time. I think this is because I want to catch up and knows what is going on in my friend circle. Such as Facebook, it was a good web that can look on others updates of statuses, photos, videos and profiles. It was an easy way and convenient way to interact and get connection with your friend circle. The microblog like weibo I found out that I use that a lot, it’s was a famous social microblogs in china just like twitter. It provides me a easy access to read and share articles, and communications with other users. For the chatting tools such as whatsapp and wechat, I use it very often to keep connection with my friend and family. It was convenience and you can contact people over the worldwide and its free-charge. Now, I don’t need pay for the long distance phone call fees to my parents or friends, because wechat can

Similar Documents

Premium Essay

Marcom

...for examples, nutritional supplements, skin care products, cosmetics, personal care products, and household cleaning products. However, Amway also sells other products such as jewelry and accessories, fragrances, and home appliances on behalf of other companies by Crocodile, B.U.M., Calvin Klein, and Philips (Amway, 2012). The headquarters of Amway is located at Ada, Michigan, US. Amway operates in more than 80 countries across the Americas, Europe, Asia, and Africa (Amway, 2012). 1.1 Objectives of audit the marketing communication used The objectives of audit the marketing communication tools that used by Amway is to analyze the ability and effectiveness of the tools, to examine the messages and contents used to target the audiences are correct, to understand whether the tools are under control, and to identify which tools are most effective to used by Amway to target its audiences. 2.0 Marketing communication used Marketing communication is a process of creating messages and dialogues of product offerings to the target audiences (Keller, 2001; Kitchen and Burgmann, 2010). Amway uses a range of marketing communication tools such as advertising, sponsorship, public relations, and social media to promote and advertise its brand and products to its target audiences and existing customers in the global market. 2.1 Advertising Advertising is a form of impersonal paid communication through mass media to transmit the advertisements to its target audiences (Summers et al...

Words: 2052 - Pages: 9

Free Essay

Hey Y'All

...Appendices: Chelsey Woods Resume . . . . . . . . 1 Policies, procedures, goals, and feedback packet . . . . 2 Internship Final Report . . . . . . . . 3 Chamber Communications Audit . . . . . . 4 Calhoun County Travel Brochures . . . . . . 5 Summer Movies in the Park Series Mock Advertisements . . . 6 Chamber Website FAQ Update . . . . . . . 7 Internship Final Report Calhoun County Chamber of Commerce Chelsey Woods My internship took place at the Calhoun County Chamber of Commerce in Anniston, Alabama from January 12-April 22, 2015. The marketing internship was under the supervision of Emily Duncan, the Public Relations Coordinator. The Chamber designed this internship position to expand the marketing skills of a college student as well as lead the student to other opportunities for growth. My time at the Chamber was spent preparing and presenting a communications audit, assisting with community events, attending Chamber meetings and events, and job shadowing leading marketing professionals in the Anniston/Oxford area. Copies of projects that were completed during my internship can be found in the appendices of this report. This report will include my job duties, the nature of relationships I built within the Chamber, and the application and expansion of skills acquired from Jacksonville State University. The tasks assigned to me during the internship were designed to broaden my understanding and application of marketing principles and theories. This internship...

Words: 5957 - Pages: 24

Premium Essay

Corporate Security

...Corporate Security involves prevention, detection, response, monitoring and review measures to reduce perceived risks to acceptable levels. These measures need to be uniform and continuous in domains such as Social/Personal, Computer/Network and Physical. 1. Information domains Understanding corporate security is about understanding what the key assets in the company are. Today, the key asset is often information. But information alone is not enough, knowledge of how to use valuable information is needed to provide a competitive edge. The value of information may depend on being secret and accurate. Information can take many forms, hence methods of securing information are various. Instead of dividing information into categories based on content, consider analysing threats to information (and hence its protection) on categories based on methods of processing / storing. Three "information domains" are defined: Physical: Traditionally information is "written down", stored somewhere (e.g. a box, safe, diskette, or computer). Classical security concentrates on physical protection: buildings, server rooms, access controls etc. Social/Personal: Successful organisations realise the value of their personnel, the knowledge they hold in their heads and the capabiliy to use that knowledge to corporate advantage. Logical or Network: Information is also stored on computers and accessed via networks. Documents can be stored "somewhere on the net" that users...

Words: 1853 - Pages: 8

Premium Essay

Professional Integrity

...transactions calls for the individual parties to give due diligence to upholding of ethical behaviour. Ethics, generally defined as the norms of conduct that extricate between unacceptable and acceptable conduct, plays a crucial role in decision-making and to facilitate business transactions efficiently (Brecher, 2013). By being ethical, one is able to obtain a personal advantage, approval and inner benefit given the fact that, virtue serves as its own reward. This is usually the case when faced with two conflicting issues or alternative causes of action that have far reaching consequences both to the individual and the firm that he or she represents. During the two years that I served as an auditor for KPMG, there are several ethical decisions that I encountered. The firm provides wide services that range from audit, tax and advisory services to its clients. Given the fact that the company deals with these three distinct services, occasionally potential areas of conflict occurred when dealing with small corporate clients. The threats that often arose were that of self-review and management threat. The fact that KPMG dealt with non-audit services threatened the independence of the firm in some instances. Another ethical decision that often arose was that bordered on the issue of financial interest in a client. I clearly recall an instance whereby a client had offered to give me a portion of the shares in a company that he was establishing. At the same time, KPMG had entered into a contractual...

Words: 864 - Pages: 4

Premium Essay

Patient Privacy Violations

...Introduction Social media has promoted communication. It has gathered people from all over the world to interact electronically without any movement. Social media tools such as LinkedIn, Facebook, Blogs and Twitter have enabled people to exchange information irrespective of where the person is located. Despite its advantages, social media may negatively affect healthcare because the healthcare providers are supposed to maintain confidentiality on patient’s personal information and medical history. The healthcare providers are supposed to comply with HIPAA privacy and security rule while using social media in order to evade lawsuits as a result of disclosing patient’s information on social media platforms. Based on Rienton (2013) examples, it...

Words: 2367 - Pages: 10

Free Essay

Est 1 Task 2

...(Choice of 3 Colors), black shoes (No logos, or additional colors visible). Company to provide slacks and polo shirts. Visible body piercings are not allowed, except for earrings. Hair must be clean and well kept. Hair Coloring must de natural hues. Visible tattoos must be covered by clothing or by other means. b.Attendance: All employees are to work their scheduled shifts. If you are going be absent or late for work, you must notify your supervisor at least two hours before the start of your scheduled shift. c.Mobile Devices: Personal electronics such as cell phones, tablets, laptops may not be used while at work, unless required for work purposes. Mobile devices may be used during breaks and before and after shifts just not in public areas. d.Internet: All company computers that have internet access are to be used for official company business only. Employees may not use the internet for personal use, i.e. social media. 2.Company X has an extensive training program to make sure that its employees understand what is required of them during their employment. These trainings happen on frequent bases. Three specific Components for an ethics training program. a.Frequency of Trainings: The Training of ethics will occur when any employee is hired. This will then be followed up with quarterly department trainings. b.Who will conduct trainings: The Initial training when hired will be conducted by the Human Resource Manager. The quarterly trainings...

Words: 597 - Pages: 3

Premium Essay

Corporate Communication

...1. Introduction 3 2. Corporate communication, Corporate objectives & Branding 4 3. Internal Communication 7 4. External Communication 9 5. Corporate communication Strategies 11 6. Conclusion 13 7. References 14 Introduction Future of an organization will depend on how it is viewed by its key stake holders such as shareholders, customer, investors & employees. It has become one of the core objectives to building, maintaining & protecting the reputation of the company by the corporate communicators, considering the globalization & current financial down turn. Further corporate communication can be consider as a strategic...

Words: 2068 - Pages: 9

Premium Essay

Information Security Policy

...WATERWORLD WATERPARKS Information Security Policy Version 1.0 Revision 191 Approved by John Smothson Published DATE March 23, 2011 CONFIDENTIAL/SENSITIVE INFORMATION This document is the property of WATERWORLD WATERPARKS. It contains information that is proprietary, confidential, sensitive or otherwise restricted from disclosure. If you are not an authorized recipient, please return this document to WATERWORLD WATERPARKS, Attention: IT Director. Dissemination, distribution, copying or use of this document in whole or in part by anyone other than the intended recipient is strictly prohibited without prior written permission of WATERWORLD WATERPARKS Executive Management. Revision History Changes | Approved By | Date | Initial Publication | John Smothson | 3-23-2011 | | | | | | | | | | | | | | | | | | | | | | | | | | | | Table of Contents 1 Introduction and Scope 8 1.1 Introduction 8 1.2 Payment Card Industry (PCI) Compliance 8 1.3 Scope of Compliance 8 2 Policy Roles and Responsibilities 10 2.1 Policy Applicability 10 2.2 Information Technology Manager 10 2.3 Information Technology Department 11 2.4 System Administrators 12 2.5 Users – Employees, Contractors, and Vendors 12 2.6 Human Resource Responsibilities 12 2.6.1 Information Security Policy Distribution 13 2.6.2 Information Security Awareness Training 13 2.6.3 Background Checks 13 3 IT Change Control Policy 15 3.1 Policy Applicability and Overview 15 3.2 Change Request Submittal...

Words: 28277 - Pages: 114

Premium Essay

Business Ethics

...12, 2011                                                                               Global businesses can sometimes be difficult due to the different cultures. Not all cultures carry the same value, law and ethical standard. Nike is an international brand that has many retail accounts in over 160 countries. Being an international company can cause business ethical and legal issues. Integrity is important and sometimes a challenge when a corporation must respond to criticism or hold back on certain company details. Nike dealt with criticism from right activist, media, and face labor rights violations.  However, over a period of time and after making some important adjustments; Nike is working on improving its company image.   Nike used traditional advertising methods to broadcast its product. Nike public relations tactics dealt with the wage policy, visiting campuses on universities, personal letters, corporate responsibility and using celebrities as spoke person for its product.  Nike launch campaigns regarding child labor, low and non- existent wages. Nike believes that the U.S dollars were meaningless because the cost of living was different in other countries. Nike held press conferences for newspaper staff at colleges.  These were ways for Nike to make proactive efforts to address the concerns of activists protesting against their products.  Nike made a few mistakes in handling the negative publicity. Three mistakes that Nike made in handling the negative...

Words: 1086 - Pages: 5

Free Essay

Ethics Compliance Paper

...400 store locations (Lowe’s Companies, Inc, 2010). The following will discuss their code of ethics, compliance with SEC regulations, and an evaluation of the company’s financial status. Code of Ethics The Lowes Company has a policy of adhering to a stick code of business conduct and ethics which are designed by a series of people on the Board of Directors which are not employed by the Lowes Company. The ethical behaviors required by the Lowes Company are to be followed by all employees of the Lowe’s Company both internal and external employees (Lowes, 2010). The rules of the policy include: compliance with laws, and regulations, conflict of interest, fair dealing, corporate opportunities and loyalty, confidential information, social networking media and collaborative networking technologies, payments to governmental officials or other persons, importance of accurate books and records and adherence to system of internal control to financial reporting , protection and proper use of company assets, public company reporting , insider trading, intellectual property, employee relations, compliance with code, amendment, modification, and...

Words: 1745 - Pages: 7

Premium Essay

Managing Meetings

...Banks National Sales Manager, NM Pty Ltd Margaret Donovan (Minute taker) Personal Assistant to National Sales Manager Eli Chintz Human Resources Manager Adriana Barker Social Media Consultant Ron Weasley Finance Manager Meeting format What format have you chosen for this meeting and why? The meeting format chosen is a face-to-face meeting which will include three of the four individuals who work at Head Office as well as Adriana Barker, Social Media Consultant who works off-site. Ron Weasley is currently located in the company’s secondary office undertaking a financial audit and video-conferencing will be utilized to ensure he can be part of this important discussion. We chose this format to allow for ease of small group discussion in order to maximize collaboration and come to the best possible team decision regarding the site for the 2015 business retreat. In order to facilitate the discussion and still achieve specific outcomes, a structured agenda was used which also allowed time for general discussion. Invitation What format did you use for your invitation and why did you choose this format? The meeting format chosen is a face-to-face meeting which will include three of the four individuals who work at Head Office as well as Adriana Barker, Social Media Consultant who works off-site. Ron Weasley is currently located in the company’s secondary office undertaking a financial audit and video-conferencing will be utilized to ensure he can be part of this...

Words: 1097 - Pages: 5

Free Essay

Nkf Case Analysis

...1 Introduction 1.1 Overview This case study revolves around the “non-profit” i.e. Corporate Philanthropic organization known as National Kidney Foundation (NKF) which aims to give aid to needy kidney patients. It relies largely on donations to fund the organization’s most direct way of helping the patients which is to set up dialysis centers. Across its development as an organization, NKF has also adopted other forms of helping needy kidney patients albeit in more indirect ways. NKF has set up many social initiatives and garnered Corporate Philanthropic actions by other organizations. These initiatives are funded by the public’s donations. 1.2 Underlying major issues In this case study, a noteworthy major issue is (1) the appropriateness of the strategies which NKF had adopted in order to raise funds. Other major issues include whether the money donated to NKF has been spent appropriately by the organization. These expenditures include employee salary, infrastructure maintenance (e.g. building facilities), business trip fees (e.g. travelling and accommodations). Hence, this also brings up another issue of whether (2) a more than necessary proportion of the donations have been spent on the luxury of the staff members and their self-interests rather than to serve the cause of helping kidney patients and if (3) the staff members are being overpaid for their contribution to the organization. All these issues mentioned will be highlighted and analyzed in greater detail later...

Words: 2532 - Pages: 11

Premium Essay

Security Policy

............3 4. DOCUMENTED DATA SECURITY POLICY.................................4 1. POLICY STATEMENT It shall be the responsibility of the I.T. Department to provide adequate protection and confidentiality of all corporate data and software systems, whether held centrally, on local storage media, or remotely, to ensure the continued availability of data and programs to all authorized members of staff, and to ensure the integrity of all data and configuration controls. Summary of Main Security Policies 1.1. Confidentiality of all data is to be maintained through discretionary and mandatory access controls, and wherever possible these access controls should meet with C2 class security functionality. 1.2. Access to data on all laptop computers is to be secured through encryption or other means, to provide confidentiality of data in the event of loss or theft of equipment. 1.3. The use of unauthorized software is prohibited. In the event of unauthorized software being discovered it will be removed from the workstation immediately. 1.4. Data may only be transferred for the purposes determined in the corporate data- protection policy. 1.5. All disk drives and removable media from external sources must be virus checked before they are used within the corporation. 1.6. Passwords must consist of a mixture of at least 8 alphanumeric characters, and must be changed every 60 days and must be unique. 1.7. The physical security of computer equipment will conform to recognized...

Words: 1364 - Pages: 6

Premium Essay

Breach Hippa

...HIPAA- How To Avoid Data Breach? How do data breaches occur? • we suspect our information system has been • targeted and patient information exposed. After one a laptop and other portable device is lost or stolen. • We did a rapid assessment to mitigation of damage and is and define scope of the incident we discovered following facts: – – – – data are not encrypted laptop are not protected by password Information of patients are exposed. No log file exist What are consequences of these breaches ? A data security breach can have devastating consequences for healthcare organizations as well as patients or clients What are our strategies to prevent theses breaches • We must be in compliance with the final HIPAA Omnibus Rule through following : – Administrative safeguards – Physical safeguards – Technical safeguards What is HIPAA? • HIPAA: Health Insurance Portability and Accountability Act • It was passed by Congress in 1996 • broadly applicable to the health care industry • intended to address security for both electronic and physical patient records • standardizing electronic exchange of administrative & financial data in health care system • It includes requirements for: • Transfer and continuation of health insurance coverage • Reducing healthcare fraud and waste – The protection and confidential handling of protected health information (PHI) What is a breach? – A breach is an impermissible use or disclosure that compromises the security or privacy of PHI and poses...

Words: 3265 - Pages: 14

Free Essay

Employment at Will

...Employment-At-Will Doctrine Kimbla Gordon Eaton LEG/500 October 31, 2013 Professor James P. Laurie III, Esq. Employment-At-Will Doctrine This paper will include a summary of the Employment-at-will Doctrine. As a review for understanding the paper will evaluate eight scenarios facing the writer as the new Chief Operating Officer (COO) of a medium size establishment. Additionally, the COO will make a recommendation to institute a whistleblower policy giving three essential components of the policy. Finally, the COO will give her rationale for each of the components chosen for the whistleblower policy. Summary of the Employment-At-Will Doctrine Employers have a right to terminate its relationship with any of its employees at any time. The essence of the employment-at-will doctrine gives employees this privilege. When there is not retaliatory or discriminatory reason which links the employer’s decision to the termination of one of or all of its employees the employer is exercising a lawful and permissible right. Furthermore, Title VII which is the Civil Rights Act of 1964, gives employers a guideline by which to follow to avoid discriminatory dismissals of employees (Halbert & Ingulli, 2012). Though terminating employees is the right of the employer with or without cause for the dismissal, it could be very costly to the employer if the termination is not handled appropriately. Employers have to consider union and non-union employees...

Words: 1414 - Pages: 6