You are on page 1of 2

IT1720

Social Media organization to target a specific audience—based on demographics


and other factors—to increase the percentage of their target
Social Networking Platforms audience that is exposed to its content.
• Earned Media - refers to the media exposure an organization gets
• Social media are web-based communication channels and tools through press and social media mentions, positive online ratings
that enable people to interact with each other by creating online and reviews, tweets and retweets, reposts (or “shares”),
communities where they can share information, ideas, messages, recommendations, and so on. Earned social media traffic enables
and other content, including images, audio, and video. an organization to reach more people without any additional cost.
• A social networking platform creates an online community of The volume of earned media is also a factor in determining how
Internet users that enables members to break down barriers high an organization ranks in Google’s search engine.
created by time, distance, and cultural differences. • Viral Marketing - an approach to social media marketing that
• Social networking platforms allow people to interact with others encourages individuals to pass along a marketing message to
online by sharing opinions, insights, information, interests, and others, thus creating the potential for exponential growth in the
experiences. message’s exposure and influence as one person tells two people,
• Members of an online social network may use the platform to each of those two people tells two or three more people, and so on.
interact with friends, family members, colleagues. They may The goal of a viral marketing campaign is to create a buzz about a
interact with the people they already know to develop new personal product or idea that spreads wide and fast.
and professional relationships.
• Popular social networking websites include Facebook, Twitter, Social Media in the Hiring Process
YouTube, and LinkedIn.
• Employers use social media to research job candidates.
Business Applications of Social Media • Employers can and do look at the social networking profiles of job
candidates when making hiring decisions.
Social media marketing involves the use of social networks to inform, • Companies may reject candidates who post information about their
promote, and communicate the benefits of products and services. The two drinking or drug use habits or those who post provocative or
(2) primary objectives of social media marketers are raising brand inappropriate photos.
awareness and driving traffic to a website to increase product sales. • Candidates are also sometimes rejected due to postings containing
Organizations may employ one or more social media marketing strategies, discriminatory remarks relating to race, gender, and religion or
including the following: because of postings that reveal confidential information from
• Organic Media Marketing - employs tools provided by or tailored previous employers.
for a particular social media platform to build a social community • Employers can legally reject a job applicant based on the contents
and interact with it by sharing posts and responding to customer of the individual’s social networking profile as long as the company
comments on the organization’s blog and social media accounts. is not violating federal or state discrimination laws. For example, an
Organizations may elect to pay to use a third-party app, such as employer cannot legally screen applicants based on race or
Hootsuite, to manage and schedule posts to multiple social media ethnicity.
profiles on Facebook, LinkedIn, Instagram, and Twitter. • Job seeking candidates should review their presence on social
• Paid Media Marketing- involves paying a third party to broadcast media and remove photos and postings that portray them in a
an organization’s display ads or sponsored messages to social potentially negative light. Many job seekers delete their social
media users. An organization can acquire paid social media traffic media accounts altogether because they know employers check
through social media ads on Facebook, LinkedIn, Twitter, YouTube, such sites.
and many other social media marketing channels. It enables an
08 Handout 1 *Property of STI
 student.feedback@sti.edu Page 1 of 2
IT1720
Social Shopping Platforms malicious, or otherwise offensive to an individual or group of
individuals causing substantial emotional distress.
• A social shopping platform brings shoppers and sellers together • Cyberstalking - is a subcategory of cyberabuse that consists of a
in a social networking environment in which members can share long-term pattern of unwanted, persistent pursuit and intrusive
information and make recommendations while shopping online. behavior (involving the use of an electronic communications device)
Thus, these sites combine two (2) highly popular online activities— that is directed by one person against another and that causes fear
shopping and social networking. and distress in the victim. Cyberstalking can be a serious problem
• Social shopping Website members can typically build their own for victims, terrifying them, and causing mental anguish. It is not
pages to collect information and photos about items in which they unusual for cyberstalking to escalate into abusive or excessive
are interested. phone calls, threatening or obscene mail, trespassing, vandalism,
• On many social shopping Websites, users can offer opinions on physical stalking, and even physical assault.
other members’ purchases or potential purchases. • Encounters with Sexual Predators: Sexual predators use online
• Social shopping platforms generate revenue through retailer communications to establish trust and confidence in their victims,
advertising. Retailers can purchase member data and comments who typically are adolescents, by introducing talk of sex and then
via some social shopping platforms to find out what consumers like arranging to meet youth in person for sexual encounters. Some
and don’t like and what they are looking for in items sold by the social networking Websites have been criticized for not doing
retailer. enough to protect minors from encounters with sexual predators.
• Uploading of inappropriate material: Most social networking
Social Networking Ethical Issues platforms have terms of use agreements, a privacy policy, or a
content code of conduct that summarizes key legal aspects
Some common ethical issues that arise for members of social networking regarding the use of the platform. Typically, the terms state that the
platforms are online abuse, harassment, stalking, cyberbullying, encounters platform has the right to delete material and terminate user
with sexual predators, the uploading of inappropriate material, and the accounts that violate its policies. These policies can be difficult to
participation of employees in social networking. enforce. Inappropriate material posted online includes
nonconsensual posts that include intimate photos or videos of
• Cyberbullying - the harassment, torment, humiliation, or people without their permission; such posts are often referred to as
threatening of one minor by another minor or group of minors via “revenge porn.” This type of content is often uploaded by ex-
the Internet or cell phone. Cyberbullying is more common among partners with an intention to shame, embarrass, and/or harass their
females and among 15- 16-year-olds. Cyberbullying has former partner.
sometimes become so intense that some children have committed • Employee Participation on Social Media Networks:
suicide as a result. Organizations should put in place a social media policy to avoid
• Cyberabuse - any form of mistreatment or lack of care, both legal issues and set clear guidelines and expectations for
physical and mental, based on the use of an electronic employees. With a policy in place, employees can feel empowered
communications device that causes harm and distress to others. to exercise creativity and express their opinions without concern
Cyberabuse encompasses both cyberharassment and that what they are sharing on social media could negatively impact
cyberstalking, a broad spectrum of behaviors wherein someone their career.
acts in a way that causes harm and distress to others. Instances of
cyberabuse are not always clear.
• Cyberharassment - a form of cyberabuse in which the abusive References:
Reynolds, G. (2019). Ethics in information technology (5th ed.). Course technology: Cengage
behavior, which involves the use of an electronic communications Learning
device, is degrading, humiliating, hurtful, insulting, intimidating, Sexual Predators (n.d.). Citing sources. Retrieved from https://www.purdue.edu

08 Handout 1 *Property of STI


 student.feedback@sti.edu Page 2 of 2

You might also like