Kick Off Your Assignment for Just $10* Get Started
  • Subject Name : Management

SMIS-Security Concerns (Walmart USA) - Answer to Question 5

Social Media Information System

When Information Technology is used to distribute particular information, it paves the way for community-based operations. Also, it relates to a group of individuals having the same likes and dislikes (Obar et al., 2015). Moreover, SMIS is known to be an intersection of different areas of studies, like that of cognitive studies, social science, computer studies, management information system, sales and organization-based theories. It has been determined that organizations usually take an initiative to recruit employees to manage their existence in social networking sites as well as boost their commodities, create connections and handle their reputation on social networking sites. Hence, SMIS is implemented to distribute information to connections of a particular organization.

Organizations mostly make use of their social networking strategies to allocate duties and functions to their workforce. Walmart gives importance to the belief of their consumers, employees, suppliers as well as the ambassadors which they show towards the company (Zhang et al., 2018). They consider the concept of security to be more than a problem in terms of adherence to its rules and regulations.

Grandparent Scam

It is a type of fraud, in which the fraudster mostly makes a call to an individual and demonstrates that his or her closed ones are facing some kind of an issue, that is either he or she has been captured or has been prisoned (Kapoor et al., 2018). The fraudster claims himself to be a legal practitioner or the victim himself, who immediately demands a ransom. In such an act, the fraudster gives instructions to the person he is calling to buy a gift and provide the number on that particular card to the fraudster through that call only.

Walmart USA had taken several steps to resolve these security-related issues which will be discussed below:

1. Walmart declared that their card will only be applicable at their outlets or Sam’s association in USA, Puerto Rico and even virtually at the company’s websites among few others. Also, any legal body, revenue division or any other domestic police sector is not allowed to get any kind of compensation in terms of the gift coupons of Walmart (Thierer, 2015).

2. Any additional business organizations are not allowed to get compensation from that gift coupon, for example, the functionality invoices, hospitality invoices, loan amount or even the bailing amount.

3. Also, it is recommended to the customers not to make any kind of a transaction or even keep a track of their balances on any other website apart from the website of the Walmart company.

4. If a customer gets any fake call with regards to their closed ones being captured and demanding for their gift-coupon number, they should take an initiative to call their closed ones immediately and verify the same.

5. It is also recommended to believe in the identity of a caller very easily, as the fraudsters can easily play with the same.

6. Customers are recommended not to purchase a gift coupon if its packaging appears to be modified or even played with (Wamba et al., 2016). Any issues in terms of the gift coupon should be inquired from the employees of Walmart only.

7. It is recommended not to tap on any virtual advertisements or even web-pages offering cost-free gift coupons to the customers (Pasquier et al., 2018). This type of deal is usually considered to be a fraud.

8. Finally, if a customer determines himself to be a victim of the gift coupon fraud they should directly submit a declaration to the FTC (Federal Trade Commission).

Social Media Policy- Walmart

Walmart has a social media policy, that consists of different elements like avoidance of being harsh as well as to be genuine. Walmart is determined to create a setting at the place of work that will not allow any shameless, abusive, violence as well as discrimination activities in their organization (Wilcox et al., 2015). Also, they do not allow any kind of domination to be exercised on the employees, use of abusive languages or even body languages on the part of the employees. Moreover, the concerned organization will not accept any kind of activity that is against the ethics of the organization. Furthermore, the workforce of the company can share updates in various social networking sites and it is considered to be an excellent means of networking with the other people. But as per the social media policy of Walmart USA, the workforce should represent themselves virtually in a manner that is continuity with the norms and principles of the company. The demonstration of the behaviours depicted at the beginning of the paragraph is strictly against the social media policy of the company.

Walmart manages any inappropriate behaviour or even feedbacks in the following manner:

  • The concerned organization makes use of the process of free communication, wherein the employee in trouble can raise their problem to the management (Young et al., 2015). If the concerned employee finds his manager to be responsible for his condition, then he can raise the issue to the next level of management who was not the part of the problem faced by that particular employee.
  • The concerned organization has also implemented a help-service number at an international level with regards to the ethical conduct of its employees. This facility is provided to the employees of the organization throughout the time and every day of the week (Brown, 2016). Moreover, the facility can be accessed by the workforce in the majority of the local languages. The concerned help-service is run by employees who are not a part of the Walmart Company, any of their calls will remain unknown. In every condition, any security-related concerns can be stated as per the applicable law. In this context, the employee who has raised a concern will receive a token number from the help number along with an appointment to give a call back if it is necessary.

Furthermore, it has been determined the process of filing a declaration by the employees themselves is promoted in the Walmart company (Leuprecht et al., 2015). Also, this would be given immense importance and it is always taken into consideration in the course finding out suitable ethical behaviour related issues.

References for SMIS-Security Concerns

Brown, D. W. (2016). Social media policies for employers and employees: Regulatory and statutory considerations. Journal of Nursing Regulation, 6(4), 45-50. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/S2155825616310031

Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., & Nerur, S. (2018). Advances in social media research: Past, present and future. Information Systems

Frontiers, 20(3), 531-558. Retrieved from https://link.springer.com/article/10.1007/s10796-017-9810-y

Leuprecht, C., & Sokolsky, J. J. (2015). Defense Policy “Walmart Style” Canadian Lessons in “Not-So-Grand” Grand Strategy. Armed Forces & Society, 41(3), 541-562. Retrieved from https://journals.sagepub.com/doi/abs/10.1177/0095327X14536562

Obar, J. A., & Wildman, S. S. (2015). Social media definition and the governance challenge-an introduction to the special issue. Telecommunications policy, 39(9), 745-750. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2663153

Pasquier, V., & Wood, A. (2018). The power of social media as a labour campaigning tool: lessons from OUR Walmart and the Fight for 15. Retrieved from https://ora.ox.ac.uk/objects/uuid:dbe2486a-380c-4ace-8723-0bf6e8f49619

Thierer, A. D. (2015). The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Computers in Human Behavior, 65. https://doi.org/10.1016/j.chb.2016.05.080

Wamba, S. F., & Carter, L. (2016). Social media tools adoption and use by SMEs: An empirical study. In Social media and Networking: Concepts, methodologies, tools, and applications (pp. 791-806). IGI Global. Retrieved from https://www.igi-global.com/chapter/social-media-tools-adoption-and-use-by-smes/130396

Wilcox, H., & Bhattacharya, M. (2015). Countering social engineering through social media: An enterprise security perspective. In Computational Collective Intelligence (pp. 54-64). Springer, Cham. Retrieved from https://link.springer.com/chapter/10.1007/978-3-319-24306-1_6

Young, W., Russell, S. V., Robinson, C. A., & Barkemeyer, R. (2017). Can social media be a tool for reducing consumers’ food waste? A behaviour change experiment by a UK retailer. Resources, Conservation and Recycling, 117, 195-203. Retrieved from https://www.sciencedirect.com/science/article/pii/S0921344916303160

Zhang, Z., & Gupta, B. B. (2018). Social media security and trustworthiness: overview and new direction. Future Generation Computer Systems, 86, 914-925. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/S0167739X16303879.

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Management Assignment Help

Hey MAS, I need Assignment Sample of

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts

Highlights

  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free
  • Let's Start

Get
500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore All Assignment Samples

Request Callback

My Assignment Services- Whatsapp Get Best OffersOn WhatsApp

Get 500 Words FREE