SlideShare a Scribd company logo
1 of 7
Running Head: GROUP DECISION MAKING PROCESS
Group Decision Making Process: Security Company
Name:
Institutional Affiliation:
Date of Submission
Group Decision Making Process 1
Group Decision Making Process
Group decision making is a process whereby individuals collectively arrive at a choice
from available alternatives. Everyone affected by the decision contributes to the outcome of the
choice. The main aim of this form of decision making process is to enhance group cohesion and
practice of democracy. More so, group decisions are more polar and tend to be effective unlike
individual based decisions which could bring forth conflicts of interests. Under normal
procedures, there are policies which cannot be affected by decisions. These policies form the
fundamental basis of any decision to be implemented.
Under normal circumstance social media will remain to be protected. Networking sites
like Twitter and Facebook communicate to a large number of people. The network is not just for
college students but a wider age gap that appreciates internet as a means of communication. In
this case, firms should consider how to modify their policies that will be acceptable by everyone.
Use of technology in various organizations is growing at a rapid stage. This requires a policy
which ensures guidance with concerns to the using of social networking tools while in the
working environment. However, they should consider innovation is on a rapid space thus needed
to take advantage of that to develop quality and safe channels in future. Social networking policy
applies specifically when users of social networking sites try to advance their suspicious ways
with the intention of keeping the private life of other people in danger.
 The general requirements include the following
 Workers should consider protecting confidential information of their customers every
time. Confidential information includes the use of social networking tools by the client.
This would help retain sensitive information intact.
Group Decision Making Process 2
 Workers of the social networking company should be courteous and professional every
time especially times when they represent the organization. This may include use of
social networking tools to argue in favour of the organization. They should also not make
any defamatory remarks about their clients.
 Workers of the social networking company should be careful when making
advertisements over their organization. This may include statements made through emails
or personal sites concerning the social networking company.
 Workers working in the social networking company should seek advice before
performing any activity. In case they require clarifications, they should inquire from their
superiors who understand better. Concerns should be raised concerning the use of the
social networking tools.
Use of social networking tools while at the company
Use of social networking tools by workers will be subject to identified guidelines:
i. Workers should utilize social networking tools in conjunction with the how they conduct
their business
ii. Workers should not use social networking tools for personal interest except during the
time they are not in office during work time.
iii. Workers should not use social networking tools for activities not related to their job
description.
iv. Workers should not use social discuss policies of the company or practices within the
company with a third party without clearing with the management concerned. Workers
Group Decision Making Process 3
may discuss practices of the organization with a prospective client but using a private
channel.
v. Workers should not use social networking tools while distributing chain letters.
The company has the rights of monitoring, accessing, retrieving, reading and disclosing
communication by the worker with or without notice to the worker. Accordingly, they should not
be given any rights of privacy in using the social networking tools on facilities that the company
uses. The firm however, will not be obligated in ensuring against authorized access to the use of
social networking sites.
Advertising
1. Workers normally advertise their properties using social networking tool should abide by
the provision as contained in the License Law. The rules give the code of ethics
surrounding the working environment.
2. Workers will comply with the requirements of the Federal especially when using social
networking tools in transmitting messages in electronic form.
3. Workers will avoid using deceptive key words or some devices in driving traffic while at
the internet site.
Collection of information
1. Workers should not collect information connected to the clients through use of social
networking tools unless they information the client or informing consumers over the issue
at hand.
Group Decision Making Process 4
Emailing
1. Workers should follow the set provisions in the federal act after amending the policy
2. Workers should follow provisions given in the federal Act after amending the policy
3. Workers should ensure that they check clearly any information they send or post via the
social networking site the targeted customer.
4. Workers should print the information posted in the social networking site to validate the
legality of the information in case it interferes with the comfort of people.
Blogging
1. Workers should engage in blogging in relation to the information of their company. They
need to follow policies and procedures given by the code of ethics of the company.
2. In a case the workers want to establish a blog, and then they should consult with their
management to higher an expertise to perform such activity.
Copyright and protected information
1. Workers should not copy received information through the social networking tools
without consent from the author. In a case permission is granted with conditions, they
should adhere to the conditions given.
2. Workers should recognize that the firm owns copyright to organizational information as
contained in the web site. Copy of the information for other use not related to the
company would require consent from the management.
Group Decision Making Process 5
Policy changes
The company has the rights of changing, modifying or amending the given policy in any manner
accepted by the authorities.
Group Decision Making Flowchart
Group Decision Making Process 6
References
Beesley, C. (2014). How to Craft a Social Media Policy for Your Small Business. Retrieved June
20, 2014, from http://www.sba.gov/community/blogs/how-craft-social-media-policy-
your-small-business
Government of Canada. (2014). CONSTITUTION ACT, 1982. Retrieved June 20, 2014, from
http://laws-lois.justice.gc.ca/eng/Const/page-15.html
Hoang, D. (2009). Social Media Policies and Procedures . Retrieved June 20, 2014, from
http://www.danielhoang.com/2009/02/21/social-media-policies-and-procedures/
SSS, REALTORS. (n.d.). SOCIAL MEDIA POLICY. Retrieved June 20, 2014, from
http://www.illinoisrealtor.org/sites/illinoisrealtor.org/files/Legal/socialmediapolicy.pdf

More Related Content

What's hot

Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Dave Shannon
 
Workshop 2 - generic social media policy
Workshop 2 - generic social media policyWorkshop 2 - generic social media policy
Workshop 2 - generic social media policyJustin Barrie
 
Case 2.2 : Facebook It's About the Money
Case 2.2 : Facebook It's About the MoneyCase 2.2 : Facebook It's About the Money
Case 2.2 : Facebook It's About the MoneyAya Wan Idris
 
Social networking
Social networkingSocial networking
Social networkingavernkm
 
Case 2 facebook it's about the money 2
Case 2 facebook it's about the money 2Case 2 facebook it's about the money 2
Case 2 facebook it's about the money 2dyadelm
 
Facebook presentation
Facebook presentationFacebook presentation
Facebook presentationhaniffenn
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
Social Media
Social MediaSocial Media
Social MediaJ.L+C.L
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSchleighS
 
Infraworks social media policy v1.0
Infraworks social media policy v1.0Infraworks social media policy v1.0
Infraworks social media policy v1.0Garry Pepper
 
Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?Support Solutions & Invest In Prevention
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Social media
Social mediaSocial media
Social mediaSheila A
 
Assignment modified
Assignment modifiedAssignment modified
Assignment modifiedpj0143
 
Social Media for Internal Communications
Social Media for Internal CommunicationsSocial Media for Internal Communications
Social Media for Internal CommunicationsJeremy Plotnick
 

What's hot (20)

Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Workshop 2 - generic social media policy
Workshop 2 - generic social media policyWorkshop 2 - generic social media policy
Workshop 2 - generic social media policy
 
Generic social media policy
Generic social media policyGeneric social media policy
Generic social media policy
 
Case 2.2 : Facebook It's About the Money
Case 2.2 : Facebook It's About the MoneyCase 2.2 : Facebook It's About the Money
Case 2.2 : Facebook It's About the Money
 
Presentation: Social Media & HR
Presentation: Social Media & HRPresentation: Social Media & HR
Presentation: Social Media & HR
 
Social networking
Social networkingSocial networking
Social networking
 
Case 2 facebook it's about the money 2
Case 2 facebook it's about the money 2Case 2 facebook it's about the money 2
Case 2 facebook it's about the money 2
 
Facebook presentation
Facebook presentationFacebook presentation
Facebook presentation
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Social Media
Social MediaSocial Media
Social Media
 
Social media- Kate
Social media- KateSocial media- Kate
Social media- Kate
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security Presentation
 
Infraworks social media policy v1.0
Infraworks social media policy v1.0Infraworks social media policy v1.0
Infraworks social media policy v1.0
 
Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?Why is social media important in engaging staff & empowering vulnerable people?
Why is social media important in engaging staff & empowering vulnerable people?
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social media
Social mediaSocial media
Social media
 
Metro Social Media Policy
Metro Social Media PolicyMetro Social Media Policy
Metro Social Media Policy
 
Assignment modified
Assignment modifiedAssignment modified
Assignment modified
 
Social Media for Internal Communications
Social Media for Internal CommunicationsSocial Media for Internal Communications
Social Media for Internal Communications
 

Viewers also liked

Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Bud Siddhisena
 
Investing in-renewables
Investing in-renewablesInvesting in-renewables
Investing in-renewablesMauro Bassotti
 
how to be friends with Search Engine ( SEO training by DGhanma ) Introduction
how to be friends with Search Engine ( SEO training by DGhanma ) Introductionhow to be friends with Search Engine ( SEO training by DGhanma ) Introduction
how to be friends with Search Engine ( SEO training by DGhanma ) IntroductionDeeb Ghanma
 
Partner Community Office Hours (May 6, 2015)
Partner Community Office Hours (May 6, 2015)Partner Community Office Hours (May 6, 2015)
Partner Community Office Hours (May 6, 2015)Salesforce Partners
 
Costa Concordia: March 2012
Costa Concordia: March 2012Costa Concordia: March 2012
Costa Concordia: March 2012Vijaya Prasad
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalBeantsingh
 
Fire wall
Fire wallFire wall
Fire wallICTU
 
Presentation yoga secrets
Presentation yoga secretsPresentation yoga secrets
Presentation yoga secretsYogaSecrets
 
Civil Rights News, Photos and Videos
Civil Rights News, Photos and VideosCivil Rights News, Photos and Videos
Civil Rights News, Photos and Videosaccidentaldeity33
 
Mobile websites and mass communication media.
Mobile websites and mass communication media.Mobile websites and mass communication media.
Mobile websites and mass communication media.Arun Agrawal
 
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...Eyal Doron
 

Viewers also liked (17)

Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)Virtualization, The future of computing (archived)
Virtualization, The future of computing (archived)
 
Investing in-renewables
Investing in-renewablesInvesting in-renewables
Investing in-renewables
 
Tailieu.vncty.com dt22
Tailieu.vncty.com   dt22Tailieu.vncty.com   dt22
Tailieu.vncty.com dt22
 
how to be friends with Search Engine ( SEO training by DGhanma ) Introduction
how to be friends with Search Engine ( SEO training by DGhanma ) Introductionhow to be friends with Search Engine ( SEO training by DGhanma ) Introduction
how to be friends with Search Engine ( SEO training by DGhanma ) Introduction
 
Partner Community Office Hours (May 6, 2015)
Partner Community Office Hours (May 6, 2015)Partner Community Office Hours (May 6, 2015)
Partner Community Office Hours (May 6, 2015)
 
Costa Concordia: March 2012
Costa Concordia: March 2012Costa Concordia: March 2012
Costa Concordia: March 2012
 
Computer Networks By Beant Singh Duggal
Computer Networks By Beant Singh DuggalComputer Networks By Beant Singh Duggal
Computer Networks By Beant Singh Duggal
 
Fire wall
Fire wallFire wall
Fire wall
 
Presentation yoga secrets
Presentation yoga secretsPresentation yoga secrets
Presentation yoga secrets
 
Christmas 2005 -2006
Christmas  2005 -2006Christmas  2005 -2006
Christmas 2005 -2006
 
Civil Rights News, Photos and Videos
Civil Rights News, Photos and VideosCivil Rights News, Photos and Videos
Civil Rights News, Photos and Videos
 
Inheritance tax in spain
Inheritance tax in spainInheritance tax in spain
Inheritance tax in spain
 
[UX Project] C-Saw
[UX Project] C-Saw[UX Project] C-Saw
[UX Project] C-Saw
 
Mobile websites and mass communication media.
Mobile websites and mass communication media.Mobile websites and mass communication media.
Mobile websites and mass communication media.
 
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
Client protocol connectivity flow in Exchange 2013/2007 coexistence | Introdu...
 
Kontakt fizyczny
Kontakt fizycznyKontakt fizyczny
Kontakt fizyczny
 
Routine style by Duardox
Routine style by DuardoxRoutine style by Duardox
Routine style by Duardox
 

Similar to Order #32788581

Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work PlacePepovski Darko
 
Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Barbara Richman, SPHR
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Oasis Solutions Group
 
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxSOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxwhitneyleman54422
 
Social Media at Work Place Training Manual
Social Media at Work Place Training ManualSocial Media at Work Place Training Manual
Social Media at Work Place Training ManualLaura Lee
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarNICSA
 
RegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policyRegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policyBlane Warrene
 
Compliance Webinar Feb 2012
Compliance Webinar Feb 2012Compliance Webinar Feb 2012
Compliance Webinar Feb 2012Kevin Condon
 
Legal matters in social media
Legal matters in social mediaLegal matters in social media
Legal matters in social mediaIshmeet Bedi
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & EmployeesJohn Theriault
 
Social Media Policy Template
Social Media Policy TemplateSocial Media Policy Template
Social Media Policy TemplateEric Schwartzman
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace AlphaStaff
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media Rockstar
 

Similar to Order #32788581 (20)

Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10Memphis Business Journal. Social Media Policies. Published 8.20.10
Memphis Business Journal. Social Media Policies. Published 8.20.10
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business
 
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxSOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
 
Social Media at Work Place Training Manual
Social Media at Work Place Training ManualSocial Media at Work Place Training Manual
Social Media at Work Place Training Manual
 
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxRunning head COMPANY Facebook Department of Defense (DoD) Ready1.docx
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docx
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Social Web Policy Guide
Social Web Policy GuideSocial Web Policy Guide
Social Web Policy Guide
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
RegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policyRegEd Social Media Basics Webinar Series - the social media policy
RegEd Social Media Basics Webinar Series - the social media policy
 
Compliance Webinar Feb 2012
Compliance Webinar Feb 2012Compliance Webinar Feb 2012
Compliance Webinar Feb 2012
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Legal matters in social media
Legal matters in social mediaLegal matters in social media
Legal matters in social media
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & Employees
 
Social Media Policy Template
Social Media Policy TemplateSocial Media Policy Template
Social Media Policy Template
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
Social media in the workplace
Social media in the workplace Social media in the workplace
Social media in the workplace
 
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
Social Media and the Law with Andrew Rosenman, partner, Mayer Brown Law Firm ...
 

More from gracyatpassessays (9)

Order 31645285
Order 31645285Order 31645285
Order 31645285
 
Order 31614197
Order 31614197Order 31614197
Order 31614197
 
Order 26626243
Order 26626243Order 26626243
Order 26626243
 
Order 25448245
Order 25448245Order 25448245
Order 25448245
 
Order 25142695
Order 25142695Order 25142695
Order 25142695
 
Order 25142651
Order 25142651Order 25142651
Order 25142651
 
Order #31088901
Order #31088901Order #31088901
Order #31088901
 
Order #29836407
Order #29836407Order #29836407
Order #29836407
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Order #32788581

  • 1. Running Head: GROUP DECISION MAKING PROCESS Group Decision Making Process: Security Company Name: Institutional Affiliation: Date of Submission
  • 2. Group Decision Making Process 1 Group Decision Making Process Group decision making is a process whereby individuals collectively arrive at a choice from available alternatives. Everyone affected by the decision contributes to the outcome of the choice. The main aim of this form of decision making process is to enhance group cohesion and practice of democracy. More so, group decisions are more polar and tend to be effective unlike individual based decisions which could bring forth conflicts of interests. Under normal procedures, there are policies which cannot be affected by decisions. These policies form the fundamental basis of any decision to be implemented. Under normal circumstance social media will remain to be protected. Networking sites like Twitter and Facebook communicate to a large number of people. The network is not just for college students but a wider age gap that appreciates internet as a means of communication. In this case, firms should consider how to modify their policies that will be acceptable by everyone. Use of technology in various organizations is growing at a rapid stage. This requires a policy which ensures guidance with concerns to the using of social networking tools while in the working environment. However, they should consider innovation is on a rapid space thus needed to take advantage of that to develop quality and safe channels in future. Social networking policy applies specifically when users of social networking sites try to advance their suspicious ways with the intention of keeping the private life of other people in danger.  The general requirements include the following  Workers should consider protecting confidential information of their customers every time. Confidential information includes the use of social networking tools by the client. This would help retain sensitive information intact.
  • 3. Group Decision Making Process 2  Workers of the social networking company should be courteous and professional every time especially times when they represent the organization. This may include use of social networking tools to argue in favour of the organization. They should also not make any defamatory remarks about their clients.  Workers of the social networking company should be careful when making advertisements over their organization. This may include statements made through emails or personal sites concerning the social networking company.  Workers working in the social networking company should seek advice before performing any activity. In case they require clarifications, they should inquire from their superiors who understand better. Concerns should be raised concerning the use of the social networking tools. Use of social networking tools while at the company Use of social networking tools by workers will be subject to identified guidelines: i. Workers should utilize social networking tools in conjunction with the how they conduct their business ii. Workers should not use social networking tools for personal interest except during the time they are not in office during work time. iii. Workers should not use social networking tools for activities not related to their job description. iv. Workers should not use social discuss policies of the company or practices within the company with a third party without clearing with the management concerned. Workers
  • 4. Group Decision Making Process 3 may discuss practices of the organization with a prospective client but using a private channel. v. Workers should not use social networking tools while distributing chain letters. The company has the rights of monitoring, accessing, retrieving, reading and disclosing communication by the worker with or without notice to the worker. Accordingly, they should not be given any rights of privacy in using the social networking tools on facilities that the company uses. The firm however, will not be obligated in ensuring against authorized access to the use of social networking sites. Advertising 1. Workers normally advertise their properties using social networking tool should abide by the provision as contained in the License Law. The rules give the code of ethics surrounding the working environment. 2. Workers will comply with the requirements of the Federal especially when using social networking tools in transmitting messages in electronic form. 3. Workers will avoid using deceptive key words or some devices in driving traffic while at the internet site. Collection of information 1. Workers should not collect information connected to the clients through use of social networking tools unless they information the client or informing consumers over the issue at hand.
  • 5. Group Decision Making Process 4 Emailing 1. Workers should follow the set provisions in the federal act after amending the policy 2. Workers should follow provisions given in the federal Act after amending the policy 3. Workers should ensure that they check clearly any information they send or post via the social networking site the targeted customer. 4. Workers should print the information posted in the social networking site to validate the legality of the information in case it interferes with the comfort of people. Blogging 1. Workers should engage in blogging in relation to the information of their company. They need to follow policies and procedures given by the code of ethics of the company. 2. In a case the workers want to establish a blog, and then they should consult with their management to higher an expertise to perform such activity. Copyright and protected information 1. Workers should not copy received information through the social networking tools without consent from the author. In a case permission is granted with conditions, they should adhere to the conditions given. 2. Workers should recognize that the firm owns copyright to organizational information as contained in the web site. Copy of the information for other use not related to the company would require consent from the management.
  • 6. Group Decision Making Process 5 Policy changes The company has the rights of changing, modifying or amending the given policy in any manner accepted by the authorities. Group Decision Making Flowchart
  • 7. Group Decision Making Process 6 References Beesley, C. (2014). How to Craft a Social Media Policy for Your Small Business. Retrieved June 20, 2014, from http://www.sba.gov/community/blogs/how-craft-social-media-policy- your-small-business Government of Canada. (2014). CONSTITUTION ACT, 1982. Retrieved June 20, 2014, from http://laws-lois.justice.gc.ca/eng/Const/page-15.html Hoang, D. (2009). Social Media Policies and Procedures . Retrieved June 20, 2014, from http://www.danielhoang.com/2009/02/21/social-media-policies-and-procedures/ SSS, REALTORS. (n.d.). SOCIAL MEDIA POLICY. Retrieved June 20, 2014, from http://www.illinoisrealtor.org/sites/illinoisrealtor.org/files/Legal/socialmediapolicy.pdf