Sei sulla pagina 1di 3

Infosys- Case Study

Case: Who is interested in your Social Network updates?


I.

II.

III.

IV.

Facts of the Case


Generally, it is more than two thirds of the worlds online population
use social network like Facebook, My space and Twitter to stay in
touch with friends.
This social network became more popular than email in 2008.
66.8 % of internet users access member communities
Businesses flock to social networking for the purpose of harvesting
consumer sentiments for use in guiding product or service
development.
Companies like Alterian, Radiano, Attensity, Visible Technologies,
Conversion, and Nielsen Online provide social media monitoring
system for businesses and organizations.
Monitoring social media can focus: on brand reputation
management, public relations and market research
Problem Identification
Online Social network users are being unaware that their personal
information, data and personal messages are being harvested by
different internet companies for the sake of their product and
services development.
Alternative Courses of Actions
A. Improving Privacy Setting Interfaces
B. ______________________________
Evaluation of Alternative Courses of Actions
Solution A:
Improving Privacy Setting and Interfaces
Strengths:
This will enable the online Social Network Users (OSNs) know
exactly which personal details are visible to other users and then
change their privacy settings accordingly.
This will use an easy and effective interface so that OSNs of any
kind can access the privacy setting with reduced effort and
accurately
The improved interface enables OSNs to change privacy settings for
a specific attribute by simply clicking on buttons located near the
specific attribute
The use of user friendly interface of social networking can help
users to be more aware of the social networking threats

Weaknesses

Due to world of technology advancement, there is still no 100%


assurance for privacy settings because there are internet
experts that can hack any information and data of anyone
involved in a social media network.
There is a need for a lot of further studies to produce a 100%
anti-hacking systems
High system development Cost

Opportunities

Online Social Network users loyalty


- Users are looking forward for an on-going relationship
with the social media application they are using if they
are at ease that their information, data and messages
are safe and secured.
Fast growth of the trusted social media application
- This will make way to Social Network operators to
expand their business because of the trust of the
users.

Threats

Server error
- Since this is a program based application there is a
tendency for system crash and maintenance.

Solution B:
SWOT-

________________________________

V.

Recommendations

Remove unnecessary Personal Information


- We recommend the Social Network Users to review
the details they have included in their social media
accounts and remove extraneous information about
themselves, friends and relatives.
Remove installed untrusted third party Applications
- It is recommended that social Network users should
not install unnecessary applications on their accounts.

Potrebbero piacerti anche