Analysis of Security in Social Media for Business Development
VerifiedAdded on 2021/02/19
|10
|2811
|22
Report
AI Summary
This report delves into the critical aspects of security within the context of social media for business operations. It begins with an overview of the Google Glass, analyzing its failure due to security and privacy concerns, and discussing potential strategies for firms. The report then transitions to the core topic of social media security, outlining the benefits and risks associated with its usage in business, exemplified by the case of Woolworths Group. It identifies key security issues such as ransomware attacks, hacked accounts, phishing, and password theft. The report proposes several security measures, including antivirus software, password management, access control, and the implementation of social media governance policies. Furthermore, it emphasizes the importance of employee education and the use of software for monitoring social media channels to mitigate risks and ensure a comprehensive social media governance plan. The report concludes by highlighting the significance of proactive risk management and the implementation of robust security protocols for businesses leveraging social media platforms.

Security In Social Media
Business
Business
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Introduction......................................................................................................................................1
Task A..............................................................................................................................................1
Overview of Google Glass..........................................................................................................1
Why did Google Glass failed?....................................................................................................1
Was the failure associated with system or technology management?........................................2
Strategies that might be used by firm..........................................................................................2
Task B..............................................................................................................................................3
Overview.....................................................................................................................................3
Security in the usage of social media business...........................................................................3
Security issues with social Media...............................................................................................3
Security Measures.......................................................................................................................4
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Introduction......................................................................................................................................1
Task A..............................................................................................................................................1
Overview of Google Glass..........................................................................................................1
Why did Google Glass failed?....................................................................................................1
Was the failure associated with system or technology management?........................................2
Strategies that might be used by firm..........................................................................................2
Task B..............................................................................................................................................3
Overview.....................................................................................................................................3
Security in the usage of social media business...........................................................................3
Security issues with social Media...............................................................................................3
Security Measures.......................................................................................................................4
Conclusion.......................................................................................................................................6
References........................................................................................................................................7

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
Technology refers to accumulation of skills, processes, methods and technique that is
being utilised within production of services or goods within attainment of objectives related with
scientific investigation (Alshare, Moqbel and Al-Garni, 2019). Basically, it denotes body of
knowledge related with creation of tools, carrying out actions as well as extraction of materials.
Sometimes failure or success of technology depends on the way individuals takes it but there
may also exists loopholes in them which leads to their failure. Security denotes protection of
digital information as well as IT assets against external, internal, accidental and malicious
threats. This report comprises of failure of technology and security within social media.
Task A
Overview of Google Glass
A brand of smart glasses which comprises of optical head mounted display and was
designed within form of eyeglasses is Google glass (The 20 Most Successful Technology
Failures of All Time, 2019). It was wearable, motion and voice controlled device that was
responsible for displaying information within the user's vision field. This is liable for rendering
augmented reality experience depending upon input given. In 2013 it was launched but was
ceased in 2015 for invasion of privacy.
Why did Google Glass failed?
Eye-catching experience is provided by Google glass, they have been illustrated below:
They have ability for taking photos along with videos and same is shared by making use
of Google Hangouts.
Search engines can be utilised through this along with data connection or Wi-Fi. It also
render support for video and voice calls.
They possess ability for answering to emails as well as text messages through the usage
of voice dictation (Benson and et. al, 2015).
Still more there are many benefits that were being provided by Google Glass but there
were certain major factors that lead to its failure. They are mentioned beneath:
Security & Health: Radiations will be emitted near to the brain and face which is not
good.
1
Technology refers to accumulation of skills, processes, methods and technique that is
being utilised within production of services or goods within attainment of objectives related with
scientific investigation (Alshare, Moqbel and Al-Garni, 2019). Basically, it denotes body of
knowledge related with creation of tools, carrying out actions as well as extraction of materials.
Sometimes failure or success of technology depends on the way individuals takes it but there
may also exists loopholes in them which leads to their failure. Security denotes protection of
digital information as well as IT assets against external, internal, accidental and malicious
threats. This report comprises of failure of technology and security within social media.
Task A
Overview of Google Glass
A brand of smart glasses which comprises of optical head mounted display and was
designed within form of eyeglasses is Google glass (The 20 Most Successful Technology
Failures of All Time, 2019). It was wearable, motion and voice controlled device that was
responsible for displaying information within the user's vision field. This is liable for rendering
augmented reality experience depending upon input given. In 2013 it was launched but was
ceased in 2015 for invasion of privacy.
Why did Google Glass failed?
Eye-catching experience is provided by Google glass, they have been illustrated below:
They have ability for taking photos along with videos and same is shared by making use
of Google Hangouts.
Search engines can be utilised through this along with data connection or Wi-Fi. It also
render support for video and voice calls.
They possess ability for answering to emails as well as text messages through the usage
of voice dictation (Benson and et. al, 2015).
Still more there are many benefits that were being provided by Google Glass but there
were certain major factors that lead to its failure. They are mentioned beneath:
Security & Health: Radiations will be emitted near to the brain and face which is not
good.
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Poor battery life: As per advertisement of Google, the glass can be used for a period of
one day but as per users it hardly worked fro three to around five hours (5 main reasons
why Google Glass failed, 2019).
Security concerns: There are certain privacy concerns as Google Glass possess abilities
for taking photos and recording them at any moment of time like a person who is next
will be captured on a device. This do not seems appropriate.
This was the reason for its failure as if footage gets into wrong hands then they can easily
exploit others. Due to this reason, it was prohibited within Cinemas of America, Casinos, bars
etc. This made Google to cease their product.
Was the failure associated with system or technology management?
The failure was much obvious as no one likes to get captured without their proper
knowledge. It is related with way in which technology was utilised, though it assisted in different
activities for which individual has to make use of their smart phones (Frost and Hamlin, 2017).
Along with this, prices at which it was offered was high and privacy was major concern. The
designing of their system was not apt as they did not took into consideration security aspects of
an individuals. Yes, it was the failure of system as well as management of technology as before
designing any product its rationale, usage, price and reason behind its development must be clear
so that by taking into consideration these aspects products or devices can be designed.
Strategies that might be used by firm.
The fact is that no one wants to get capture in devices of third person as each individual
have their own privacy. According to this point strategies must be formulated. Identical to smart
phones, Google could have thought about the rationale behind designing this gadgets. Like
within security agencies this will render impelling results as individual may not be aware about
the fact that are being captured but their movements are being recorded. Like if an individual is
working with security agency then through this people can be scanned and with the assistance of
google it can be identified that whether anyone is a criminal (Hajli and Lin, 2016).
The glass must have been designed as a normal which did not made them uncomfortable.
Other thing which can be taken into account is that there must be something by which camera
can be activated like if individual says “Take picture” then it should not be clicked as anyone can
be get captured but the wearer must have unique name so that it won't get activated by what other
says.
2
one day but as per users it hardly worked fro three to around five hours (5 main reasons
why Google Glass failed, 2019).
Security concerns: There are certain privacy concerns as Google Glass possess abilities
for taking photos and recording them at any moment of time like a person who is next
will be captured on a device. This do not seems appropriate.
This was the reason for its failure as if footage gets into wrong hands then they can easily
exploit others. Due to this reason, it was prohibited within Cinemas of America, Casinos, bars
etc. This made Google to cease their product.
Was the failure associated with system or technology management?
The failure was much obvious as no one likes to get captured without their proper
knowledge. It is related with way in which technology was utilised, though it assisted in different
activities for which individual has to make use of their smart phones (Frost and Hamlin, 2017).
Along with this, prices at which it was offered was high and privacy was major concern. The
designing of their system was not apt as they did not took into consideration security aspects of
an individuals. Yes, it was the failure of system as well as management of technology as before
designing any product its rationale, usage, price and reason behind its development must be clear
so that by taking into consideration these aspects products or devices can be designed.
Strategies that might be used by firm.
The fact is that no one wants to get capture in devices of third person as each individual
have their own privacy. According to this point strategies must be formulated. Identical to smart
phones, Google could have thought about the rationale behind designing this gadgets. Like
within security agencies this will render impelling results as individual may not be aware about
the fact that are being captured but their movements are being recorded. Like if an individual is
working with security agency then through this people can be scanned and with the assistance of
google it can be identified that whether anyone is a criminal (Hajli and Lin, 2016).
The glass must have been designed as a normal which did not made them uncomfortable.
Other thing which can be taken into account is that there must be something by which camera
can be activated like if individual says “Take picture” then it should not be clicked as anyone can
be get captured but the wearer must have unique name so that it won't get activated by what other
says.
2

Task B
Overview
Security is defined as a process that related with sequence of techniques which are being
utilised for protection as well as authentication against theft related with sensitive information
and data within firms. For this purpose, users' login as well as passwords are being used for
verification (Ilvonen, Jussila and Kärkkäinen, 2015). Social media is defined as a process of
communication in between people where they are liable for creation as well as sharing of ideas
along with information by the usage of virtual networks and communities. An example of
Woolworths Group has been taken to understand this concept. It is a food retailer and are
specialised within operations of supermarkets along with engagement within other products.
Security in the usage of social media business
Social media renders wide range of benefits to their users or businesses but if it is not
being used in an appropriate manner or their competitors have get access to their accounts then it
can be misused. This might lead to hamper image of firm. In this context Woolworths Group,
needs to understand each and every aspect of social media as well as security facets related with
this. Social media possess crucial risk for firms and as per CIO Insights, worldwide security
breach can grow, from $3 billion to $6 trillion from 2015 to 2021 respectively (7 Social Media
Security Issues Your Business Faces, 2018). Here, social media is a channel for cyber criminals.
Security issues with social Media
There are wide range of security risks that are associated with social media. Woolworths
Group also makes use of different social media platforms through which they can make their
customers aware about there services and what offers they are giving to them. The reason behind
this is that people are addicted to social media and most of the time, they make its use. This acts
as a major asset for attracting customers towards services that are being offered (Laudon and
Traver, 2016). But there exist certain security issues with this, they are depicted below:
Ransomware & Virus Attacks: It denotes wide range of malicious software which
blocks access to computer system until some amount is being paid. For an instance
WannaCry was a global attack. With respect to Woolworths Group, an intruder can have
access to details from social media about manager and fake mail can be sent which might
3
Overview
Security is defined as a process that related with sequence of techniques which are being
utilised for protection as well as authentication against theft related with sensitive information
and data within firms. For this purpose, users' login as well as passwords are being used for
verification (Ilvonen, Jussila and Kärkkäinen, 2015). Social media is defined as a process of
communication in between people where they are liable for creation as well as sharing of ideas
along with information by the usage of virtual networks and communities. An example of
Woolworths Group has been taken to understand this concept. It is a food retailer and are
specialised within operations of supermarkets along with engagement within other products.
Security in the usage of social media business
Social media renders wide range of benefits to their users or businesses but if it is not
being used in an appropriate manner or their competitors have get access to their accounts then it
can be misused. This might lead to hamper image of firm. In this context Woolworths Group,
needs to understand each and every aspect of social media as well as security facets related with
this. Social media possess crucial risk for firms and as per CIO Insights, worldwide security
breach can grow, from $3 billion to $6 trillion from 2015 to 2021 respectively (7 Social Media
Security Issues Your Business Faces, 2018). Here, social media is a channel for cyber criminals.
Security issues with social Media
There are wide range of security risks that are associated with social media. Woolworths
Group also makes use of different social media platforms through which they can make their
customers aware about there services and what offers they are giving to them. The reason behind
this is that people are addicted to social media and most of the time, they make its use. This acts
as a major asset for attracting customers towards services that are being offered (Laudon and
Traver, 2016). But there exist certain security issues with this, they are depicted below:
Ransomware & Virus Attacks: It denotes wide range of malicious software which
blocks access to computer system until some amount is being paid. For an instance
WannaCry was a global attack. With respect to Woolworths Group, an intruder can have
access to details from social media about manager and fake mail can be sent which might
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

contain some links. As the email appears to be precise so people or followers may click
on it and have ransomware on their systems.
Hacked accounts: When intruder have access to system through DNS spoofing, social
engineering or any other way then there is higher possibility for higher security attacks
such as shared data user, ransomware or brand impersonation (Ma and et. al, 2019).
Phishing & Brand Impersonation: It comprises of formulation of website that seems
identical to customers who are targetted. Here, the intruder aims at convincing that
website is real so that person's details can be revealed. For an instance, for defaming
Woolworths Group third person can pretend to be them (similar to identity theft).
Stolen Passwords: It is one of the most costly security issue when passwords are being
stolen. If an intruder is successful in this then it will lead to create a major drawback for
Woolworths Group and revert to the accounts as they were in their original state.
Uncontrolled User Access: Credentials are shared among consultants, agencies and
social media managers which is not an appropriate practice with respect to security.
Connected Apps: Firms possess the applications that are related with social media
accounts. This becomes critical to understand security practices associated with this.
Certain risks have been illustrated above and shows that they possess great threat to firm,
this means that firm like Woolworths Group need to have strong policies as well as practices
through which they can eliminate such threats.
Security Measures
In context of Woolworths Group, with respect to social media accounts certain security
measures have been provided below:
The foremost step that can be taken by IT department of Woolworths Group is to have
antivirus software as well as carry out updates as required (Mathur, 2019).
Personal accounts must not be linked with business account as if any of the profile is
being hacked or intruder get access then it won't be difficult to enter within the other
account which may pose threat.
Governance process of Woolworths Group needs to have a discovery system for
identification of counterfeit accounts. If something like this is identified then it must be
provided to Legal department to initialise cease as well as desist procedures.
4
on it and have ransomware on their systems.
Hacked accounts: When intruder have access to system through DNS spoofing, social
engineering or any other way then there is higher possibility for higher security attacks
such as shared data user, ransomware or brand impersonation (Ma and et. al, 2019).
Phishing & Brand Impersonation: It comprises of formulation of website that seems
identical to customers who are targetted. Here, the intruder aims at convincing that
website is real so that person's details can be revealed. For an instance, for defaming
Woolworths Group third person can pretend to be them (similar to identity theft).
Stolen Passwords: It is one of the most costly security issue when passwords are being
stolen. If an intruder is successful in this then it will lead to create a major drawback for
Woolworths Group and revert to the accounts as they were in their original state.
Uncontrolled User Access: Credentials are shared among consultants, agencies and
social media managers which is not an appropriate practice with respect to security.
Connected Apps: Firms possess the applications that are related with social media
accounts. This becomes critical to understand security practices associated with this.
Certain risks have been illustrated above and shows that they possess great threat to firm,
this means that firm like Woolworths Group need to have strong policies as well as practices
through which they can eliminate such threats.
Security Measures
In context of Woolworths Group, with respect to social media accounts certain security
measures have been provided below:
The foremost step that can be taken by IT department of Woolworths Group is to have
antivirus software as well as carry out updates as required (Mathur, 2019).
Personal accounts must not be linked with business account as if any of the profile is
being hacked or intruder get access then it won't be difficult to enter within the other
account which may pose threat.
Governance process of Woolworths Group needs to have a discovery system for
identification of counterfeit accounts. If something like this is identified then it must be
provided to Legal department to initialise cease as well as desist procedures.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Maximum persons are making use of same passwords for their account for years, this
denotes that password needs to be changed so that it won't become easy to have access
(Soomro, Shah and Ahmed, 2016).
Password system must be utilised by which access can be granted as per designation and
their requirement with respect to their responsibilities. This will lead to maintaining
integrity within credentials along with maintaining their control.
Governance policies of Woolworths Group needs to ensure that employees do not
connect apps to social account which are not authenticated by governance teams.
A system must be formulated by Woolworths Group for having approvals for their social
media posts. For an instance, Z-burger has gone through some crisis when marketing
contractor posted inappropriately in Twitter post about a journalist. This post was not
seen by anyone and it was published. This led to something horrified but if there would
have been some systems then it can be avoided.
Woolworths Group needs to designate an individual who will be responsible for their
social presence so that risks associated with this can be mitigated. Along with this, person
must be completely aware about the social media policies, presence must be monitored
and publishing access must be determined.
It is not practically possible to monitor the social media channels 24*7 but by the usage
of software it is possible. ZeroFox can be used by Woolworths Group which will
automatically alert security risks involved with this. If anything malicious links or
offensive contents are being posted then there will be alert for this (8 Social Media
Security Tips to Mitigate Risks, 2019).
Certain security measures with respect to social media have been illustrated above but
still then employee education plays a crucial role. For this, diligent and complete training must
be provided to employees who possess access to social media accounts. Strict guidelines must be
formulated with respect to what they have to do and what not. For an instance, they should not
click on ads, share passwords, engagement within suspicious posts, usage of social media via
Wi-Fi systems.
5
denotes that password needs to be changed so that it won't become easy to have access
(Soomro, Shah and Ahmed, 2016).
Password system must be utilised by which access can be granted as per designation and
their requirement with respect to their responsibilities. This will lead to maintaining
integrity within credentials along with maintaining their control.
Governance policies of Woolworths Group needs to ensure that employees do not
connect apps to social account which are not authenticated by governance teams.
A system must be formulated by Woolworths Group for having approvals for their social
media posts. For an instance, Z-burger has gone through some crisis when marketing
contractor posted inappropriately in Twitter post about a journalist. This post was not
seen by anyone and it was published. This led to something horrified but if there would
have been some systems then it can be avoided.
Woolworths Group needs to designate an individual who will be responsible for their
social presence so that risks associated with this can be mitigated. Along with this, person
must be completely aware about the social media policies, presence must be monitored
and publishing access must be determined.
It is not practically possible to monitor the social media channels 24*7 but by the usage
of software it is possible. ZeroFox can be used by Woolworths Group which will
automatically alert security risks involved with this. If anything malicious links or
offensive contents are being posted then there will be alert for this (8 Social Media
Security Tips to Mitigate Risks, 2019).
Certain security measures with respect to social media have been illustrated above but
still then employee education plays a crucial role. For this, diligent and complete training must
be provided to employees who possess access to social media accounts. Strict guidelines must be
formulated with respect to what they have to do and what not. For an instance, they should not
click on ads, share passwords, engagement within suspicious posts, usage of social media via
Wi-Fi systems.
5

Social media acts as an efficacious as well as profitable method for engaging customers
as well as development of communities when risks are determined, alleviated, managed and are
monitored as a all-inclusive social media governance plan (Zhao and Zhao, 2015).
Conclusion
From above, it has been observed that technology plays crucial role while delivery of
services. But the ways in which it is being utilised makes a difference either it can be used for
making roles and responsibilities smoother or for illegal activities for defaming someone else/
having competitive edge. Along with this, there comes a requirement for security as there are
certain risks associated with this which needs appropriate monitoring and solutions. While
making use of social media, businesses need to ensure that what they are posting and doing on
their channels along with what all activities are being carried out by others on them. This might
lead them to identify the problems which they might have in future.
6
as well as development of communities when risks are determined, alleviated, managed and are
monitored as a all-inclusive social media governance plan (Zhao and Zhao, 2015).
Conclusion
From above, it has been observed that technology plays crucial role while delivery of
services. But the ways in which it is being utilised makes a difference either it can be used for
making roles and responsibilities smoother or for illegal activities for defaming someone else/
having competitive edge. Along with this, there comes a requirement for security as there are
certain risks associated with this which needs appropriate monitoring and solutions. While
making use of social media, businesses need to ensure that what they are posting and doing on
their channels along with what all activities are being carried out by others on them. This might
lead them to identify the problems which they might have in future.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Books & Journals
Alshare, K. A., Moqbel, M. and Al-Garni, M. A ., 2019. The impact of trust, security, and
privacy on individual's use of the internet for online shopping and social media: a multi-
cultural study. International Journal of Mobile Communications, 17(5), pp.513-536.
Benson, V. and et. al, 2015. The role of security notices and online consumer behaviour: An
empirical study of social networking users. International Journal of Human-Computer
Studies, 80, pp.36-44.
Frost, J. and Hamlin, A., 2017. INTERNET SECURITY AND PRIVACY THREATS, AS
PERCEIVED BY AMERICAN AND INTERNATIONAL BUSINESS
STUDENTS. Global Journal of Business Disciplines, 1(1), p.36.
Hajli, N. and Lin, X., 2016. Exploring the security of information sharing on social networking
sites: The role of perceived control of information. Journal of Business Ethics, 133(1),
pp.111-123.
Ilvonen, I., Jussila, J. J. and Kärkkäinen, H., 2015. Towards a business-driven process model for
knowledge security risk management: Making sense of knowledge risks. International
Journal of Knowledge Management (IJKM), 11(4), pp.1-18.
Laudon, K. C. and Traver, C. G., 2016. E-commerce: business, technology, society.
Ma, S. and et. al, 2019. Exploring information security education on social media use. Aslib
Journal of Information Management.
Mathur, M., 2019. Where is the Security Blanket? Developing Social Media Marketing
Capability as a Shield from Perceived Cybersecurity Risk. Journal of Promotion
Management, 25(2), pp.200-224.
Soomro, Z. A., Shah, M. H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information
Management, 36(2), pp.215-225.
Zhao, J. and Zhao, S. Y., 2015. Security and vulnerability assessment of social media sites: An
exploratory study. Journal of Education for Business, 90(8), pp.458-466.
Online
The 20 Most Successful Technology Failures of All Time. 2019. [Online]. Available through:
<https://time.com/4704250/most-successful-technology-tech-failures-gadgets-flops-
bombs-fails/>.
5 main reasons why Google Glass failed. 2019. [Online]. Available through:
<https://betanews.com/2015/01/19/5-main-reasons-why-google-glass-failed/>.
7 Social Media Security Issues Your Business Faces. 2018. [Online]. Available through:
<https://www.business2community.com/cybersecurity/7-social-media-security-issues-
business-faces-02024378>.
8 Social Media Security Tips to Mitigate Risks. 2019. [Online]. Available through:
<https://blog.hootsuite.com/social-media-security-for-business/>.
7
Books & Journals
Alshare, K. A., Moqbel, M. and Al-Garni, M. A ., 2019. The impact of trust, security, and
privacy on individual's use of the internet for online shopping and social media: a multi-
cultural study. International Journal of Mobile Communications, 17(5), pp.513-536.
Benson, V. and et. al, 2015. The role of security notices and online consumer behaviour: An
empirical study of social networking users. International Journal of Human-Computer
Studies, 80, pp.36-44.
Frost, J. and Hamlin, A., 2017. INTERNET SECURITY AND PRIVACY THREATS, AS
PERCEIVED BY AMERICAN AND INTERNATIONAL BUSINESS
STUDENTS. Global Journal of Business Disciplines, 1(1), p.36.
Hajli, N. and Lin, X., 2016. Exploring the security of information sharing on social networking
sites: The role of perceived control of information. Journal of Business Ethics, 133(1),
pp.111-123.
Ilvonen, I., Jussila, J. J. and Kärkkäinen, H., 2015. Towards a business-driven process model for
knowledge security risk management: Making sense of knowledge risks. International
Journal of Knowledge Management (IJKM), 11(4), pp.1-18.
Laudon, K. C. and Traver, C. G., 2016. E-commerce: business, technology, society.
Ma, S. and et. al, 2019. Exploring information security education on social media use. Aslib
Journal of Information Management.
Mathur, M., 2019. Where is the Security Blanket? Developing Social Media Marketing
Capability as a Shield from Perceived Cybersecurity Risk. Journal of Promotion
Management, 25(2), pp.200-224.
Soomro, Z. A., Shah, M. H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information
Management, 36(2), pp.215-225.
Zhao, J. and Zhao, S. Y., 2015. Security and vulnerability assessment of social media sites: An
exploratory study. Journal of Education for Business, 90(8), pp.458-466.
Online
The 20 Most Successful Technology Failures of All Time. 2019. [Online]. Available through:
<https://time.com/4704250/most-successful-technology-tech-failures-gadgets-flops-
bombs-fails/>.
5 main reasons why Google Glass failed. 2019. [Online]. Available through:
<https://betanews.com/2015/01/19/5-main-reasons-why-google-glass-failed/>.
7 Social Media Security Issues Your Business Faces. 2018. [Online]. Available through:
<https://www.business2community.com/cybersecurity/7-social-media-security-issues-
business-faces-02024378>.
8 Social Media Security Tips to Mitigate Risks. 2019. [Online]. Available through:
<https://blog.hootsuite.com/social-media-security-for-business/>.
7
1 out of 10

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.