Uploaded on

Facebook's dilemma case

Facebook's dilemma case

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
431
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
14
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1.
  • 2. Dilemma
    Soraya Jean-francois 07-0677
    Nicole Perez
    10-0428
    Milton Hernandez
    10-0890
    Elvis Peña 10-0929
  • 3. Facebook is the one, if not the largest and most common and diverse Social Networking site in the world. It has a business, but at the same time family like approach which creates something different offered.
  • 4. Facebook’s Dilemma
    70% of the people that uses facebook is out of the U.S and its unlikely to do any purchase
    Facebook can decide on turning information from its customers into profits but this would mean violating customer privacy
    How can facebook turn customer intimacy around in such a way that people decide on sharing their information with facebook providers ?
  • 5. Case Review
    Facebook is a multimillionaire company operating since 2004
    Has a problem turning its services into profits
    facebook is the largest social networking site in the world followed by twitter
  • 6. What concept in this chapter are illustrated in this case?
  • 7. E-commerce, which includes messaging, photo-sharing, tagging, commenting on pictures, status, or other comments, and finally user-created applications.
  • 8. What is the role of e commerce and web 2.0 technologies in facebook’s widespread popularity?
  • 9. Web 2.0 a web applications that uses interactive information sharing, networking, and collaboration among users, offers many web-based applications, which provides profile users to get hands-on with the site.
  • 10. Describe the weakness of Facebook privacy policies and features. What people, organization, and technology factors have contributed to those weaknesses?
  • 11. -The Beacon Program, that tracks down facebook members that have purchased on their corporate sites and send this information to facebook’s friends involuntarily. This advertising service tracks down customers’ business behavior and updates it automatically on FaceBook without any user consent
    -The change or retention of information, deactivation ext. News Feed features on the website which makes user actions public by posting actions on their wall, such as profile updates, adding new friends, and adding new applications.
  • 12. Does Facebook have a viable business model? Explain your answer.
  • 13. Facebook counts with a great ability on profiling its users and targeting markets using every detail of hobbies, regions, interest, favorites, likes ext. Also through here people can catch up get in contact with old friends or meet new people, communicate with them trough various applications available for users such as messaging commenting adding and tagging pictures ext. Through this, people are able to see the updates of their profiles and use the applications on their pages. They have been able to introduce businesses approaches with pages were business upload pictures of their merchandises with the price being able to sell trough internet or buy credits to send gifts to your friends or for games. They sure have improved the whole concept of a private social page to a business.
  • 14. If you were responsible for coordinating Facebook’s advertising, How would you balance the desire to become increasingly profitable with the need to protect the privacy of your users?
  • 15. We would create a campaign focused on security and privacy for our users, and implement a series of options where you can hide things you don’t want anyone to see increase limited profile security and send emails informing users how to maximize their security, also create a call to attention where you can report a weird and dangerous user, as well as controlling the number of views a certain user sees another and send email to those to see if there is an explanation for this behavior and if not block him.