You will write a research paper on an advanced or deeper study of a topic related to this course; you will determine the advanced topic.
Possible topics include:
The paper must be 7–10 pages in length, not including any tables, graphs, etc. A minimum of 6 accounting journal sources must be used, all of which have been published within the last 3 years. Current APA formatting is required.
Within the body of the paper, you must have a clear thesis statement and provide a good introduction with a clear overview of the contents of the paper. You must address all issues related to the topic, consider various viewpoints, and provide a proper analysis with an integrated biblical worldview. Ensure your transitions are clear between paragraphs, utilize headings throughout, and logically orient your topics. You must provide a solid conclusion that offers a summary of the issues presented in the paper and suggestions for futher study.
The paper must be completed in a Word document and your file should be named in the following format: [Lastname—Title of Assignment.doc]. For example, JoAnn Gilmore would name her Word file as follows: [Gilmore—Research Paper.doc].
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
It is believed that the number of people using various types of social media is rapidly
increasing all over the world. The most recent estimates suggest that more than 100,000
tweets are sent and received every minute of every day and that 684,478 articles are uploaded
on Facebook (Blank, 2022). In addition, every minute, 48 hours worth of films are posted to
YouTube, 47,000 applications are downloaded from app stores, and 3,600 photographs are
shared on Instagram (Blank, 2022).
In this context, it is projected that social media will have
a substantial impact on both the day-to-day operations of companies and the interpersonal
dynamics in the workplace. In this regard, employers are regarded as being critical for
appreciating not only the potential dangers that social media bring to the company but also
for analyzing the expected results and taking the necessary precautions for controlling the
risks that were previously mentioned.
In this regard, employers are critical for appreciating
the possible dangers that social media bring to the company. Studies have shown that in order
for a policy for social media to be effective, it must be a component not just of a general
management strategy but also of a strategy regarding human resources that has been well
prepared and recorded. It has been shown that, depending on the specifics of the situation,
businesses can be compelled to maintain not just one but two distinct copies of their policy
(John & James, 2014).
It should go without saying that any company or organization should have a well-
developed social-media person-utilization policy. This policy should provide workers with
guidance on how to utilize their personal social media accounts when they are working for
the company. Second, all businesses that have a presence on social media need to draft a
business usage policy for social media that has been given adequate consideration (John &
James, 2014). The regulations for the personal use of social media clarify, in essence, what
the employer expects of employees and potential contractors when they use their personal
social media accounts. This is usually enforced when the identities of the targeted employees
can be traced back to the business entity or when the content published by the staff refers to
or even implies information about a business entity, its workforce, directors, or even
shareholders, services, products, or even competitors. This is usually enforced when the
identities of the targeted employees can be traced back to the business entity. According to
John & James (2014), the concept that distinct rules apply to various social media platforms
is one that is misunderstood.
A company’s social media people and usage policy should be designed from the
ground up with corporate governance and the overall quality of the human resource
infrastructure in mind from the very beginning of the process. When a firm makes personal
use of social media, it demonstrates not just strong corporate governance but also a powerful
human resources infrastructure. Typically, this refers to significant pieces of paper, such as
the employment contract, as well as significant rules and procedures, such as:
Complaint handling procedures.
The implementation of anti-discrimination and equal opportunity policies.
Methods of both counseling and punitive action.
There are no tolerance policies in place for bullying, harassment, or violence in the
workplace.
Methods for the treatment of internal ailments
Guidelines for the use of e-mail and the internet • Guidelines for the protection of
confidential information
By referring other important papers in addition to the rules, it is feasible to drastically
minimize the personal-usage policy and focus on its core objective, which is to set guidelines
for what the workforce may and may not do. This is accomplished by reducing the amount of
time spent on the policy.
In point of fact, recognizing areas of uncertainty and incorporating newly acquired
knowledge into information that supports decision-making does not avoid the introduction of
risk. The majority of the time, there is a predominance of uncertainty, and the purpose of
every unexpected outcome is to emphasize this fact.
Even if it brings about unwelcome news,
which is always necessary, maintaining an alert as well as a realistic perspective on what is
going on is the reason for doing so. The knowledge at a certain moment allows for a better-
educated decision and is the reason for maintaining a realistic perspective on what is going
on. It should come as no surprise that a significant number of companies and individuals all
over the world make use of social media as a way of communication.
As a consequence of this, steps that are geared at enhancing risk management should
be implemented. Not only will this serve to increase the integrity of stakeholders, but it will
also transform credible instruments out of social media platforms (Oughton, 2013).
Enhancing intelligence through better risk management is a process that should be initiated
by the public sector. Increased usage of social networking by government bodies is
recommended in order to better communicate government actions.
The formation of
oversight agencies ought to be encouraged in order to foster the operation of social
networking sites. People’s performance will improve as a result of this, and the manner in
which the government does its business will also be advanced. These social networking
services need to be regulated in a way that promotes honesty, accountability, and high-quality
performance. A regulatory framework should be devised and put into place (John & James,
2014). The strategy ought to be based on doing a cost-benefit analysis of utilizing social
networking websites in the public sector.
Risk is a frequent term that refers to the combination of seriousness and
unpredictability that is associated with the utilization of a product or service. When it comes
to using social media, there is always the potential for something unpleasant to occur, which
is what is meant by the term “risk.” The usage of social media is typically associated with
concerns relating to one’s mental health, relationships, time management, and privacy
(Gonzalez, 2015).
A significant component of risk usage is the element of time risk. The
social media industry is concerned with activities that are addictive and eat up valuable time
with employees. This is due to the fact that the majority of individuals are so preoccupied
with their use of various social media platforms that they forget about their jobs.
The majority of employees spend the majority of their time on these sites, resulting in
a loss of productivity for the company as a whole as a direct result of this time risk. Studies
have shown that once a person develops an addiction to utilizing social media sites, the
majority of their time is spent on these platforms (Gonzalez, 2015).
Workers who continue to
use social networking sites while on the job run the danger of wasting the majority of their
productive time, which can lead to feelings of dissatisfaction. It is imperative that efficient
procedures be put into place in order to guarantee that employees will not squander their
precious time on these websites.
If you use social networking sites for an extended period of time, you run the risk of
developing a poor perception of yourself. An unfavorable picture of oneself is always
considered to be a potential psychological risk. It is logical that people who frequent social
networking sites would experience a decline in their morale and self-esteem, which would
contribute to the negative feelings they already have (John & James, 2014). Even while
connecting with others, participating in conversations, and exchanging information is the
primary goal of utilizing social media, users should always exercise extreme caution
regarding the content they post to their accounts. It should go without saying that content that
is submitted to social networking platforms will get a significant amount of exposure to other
people. What this means is that you are always vulnerable to criticism from other people
(John & James, 2014). If you keep using this understanding, you could find that it causes you
to experience more moments of concern and rage. When a sensitive person is subjected to
such negative signals, it has the potential to have an influence on their self-esteem as well as
their perspective of themselves, which can lead to psychological issues.
Platforms for social networking may also bring about unintended societal
consequences, such as an increase in people spending the majority of their time online rather
than meeting others in person. Because of this, the use of social media has been linked to the
death of at least one person. The worry that one may come off as archaic and naive is one of
the key drivers that could result in encounters of this kind (Gonzalez, 2015). There is a risk
that using social networking sites would make people feel less connected to their
communities.
In conclusion, regular usage of social networking sites might put users at risk
of having potentially sensitive personal information disclosed to other parties (Gonzalez,
2015). A potential breach of privacy may have occurred as a direct result of the loss of such
essential information.
Because of the exploitation of such knowledge, it is possible that those
who have nefarious purposes may be able to access and evaluate crucial information in
certain circumstances. The utilization of social networking platforms may create havoc within
an organization if there is not a suitable ethical standard in place to govern their use.
The most crucial regulation that corporate organizations need to develop is the
personal use framework, which describes how users will be able to access their own personal
accounts (Cross, 2014). Second, companies that already have a presence on social media
should build a social media business usage plan to help them better manage their actions and
the results they achieve in the workplace (Cross, 2014). This will assist them in improving
the long-term performance of their staff as well as setting expectations for those individuals.
A stand-alone policy should never be governed by anything other than the existing human
resource infrastructure and corporate governance (Cross, 2014). Implementing this policy
shouldn’t be done with the intention of exerting control over workers; rather, the objective
should be to mitigate the risks associated with the employees’ continuous usage of social
networking sites.
Additionally, organizations need to determine who is authorized to submit
information on various online platforms. This is due to the fact that some of these sites might
potentially be transformed into forums in which staff could discuss sensitive information, so
posing hazards to users’ privacy. According to Bobby & Gohar (2014), organizations ought to
be restricted in the information that they are permitted to disseminate on these platforms in
order to foster a sense of control while also enhancing the effectiveness of these
organizations.
Gohar & Bobby (2014) recommend developing a training program for
employees to use on social networking sites with the goal of increasing the amount of
specialized information that is posted on those platforms. In order to improve the level of
employee confidentiality, the training program should only cover topics related to internet
security and brand marketing.
When employing social media, it is essential to make use of a few of the successful
tactics in order to achieve a balance between professionalism and ethical standards. To begin,
before publishing anything on their own social networking sites, every employee should
always check in with their peers first (Frederic, 2014).
Consulting not only assists in the development of decision-making skills but also assists in the avoidance of any potential risks that may arise along the process. Second, it is always important to have an adequate monitoring system in place to guarantee that employees have effectively utilized the potential
offered by social networking sites (Frederic, 2014). Every organization should be prepared to
conduct routine reviews of its ethical standards in order to ensure the effective long-term
management of any potential risks that may be associated with the usage of social media.
In a nutshell, the process of identifying, evaluating, and mitigating risks can be
adversely affected by the use of social media by any type of organization. The increasing
number of employees who use social networking sites is evidence that these sites cause
employees to waste the majority of their time and have a detrimental influence on both
workplace relations and business operations.
According to research, employees should take
the time to identify any possible dangers posed by social media and take the appropriate
procedures to mitigate such risks. This should be done in the context of taking the time to
identify any potential threats posed by social media. Although the history of the company’s
social media policies has been positive, they have not contributed to an improvement in risk
management.
It is vital to have a general management policy in place in order to control any
problems that may arise as a result of using social media. It is possible for companies to make
investments in training their employees on how to make responsible use of social media
platforms in order to improve workplace cohesion and accountability. Last but not least,
companies should be ready to conduct frequent reviews of the rules, laws, and policies that
govern how their employees interact with one another while they are on the job.
Blank, G. (2022). Who Uses Social Media?. The SAGE Handbook of Social Media Research
Methods, 67.
Cross, M. (2014). Social media security: Leveraging social networking while mitigating risk.
Chicago: University of Chicago Press.
Frederic, G. R. (2014). Clinical Social Work in a Digital Environment: Ethical and Risk
Management Challenges. Retrieved from: link.springer.com/…/10.1007%2Fs106.
Gohar, F. K. & Bobby, S. (2014). Social media risks and benefits: A public sector
perspective. Social Science Computer Review, 32(5), 606-627.
Gonzalez, D. (2015). Managing online risk: Apps, mobile, and social media security.
Chicago: University of Chicago Press.
John C., & James Field. (2014). Managing the risks of social media. Human Resource
Management International Digest, 22(5) pp. 39 – 41. Retrieved from:
http://dx.doi.org/10.1108/HRMID-07-2014-0103
Oughton, D. (2013). Social and ethical aspects of radiation risk management. Amsterdam:
Elsevier Science
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more