Rational expectations and Social media: Difference between pages
From ACT Wiki
(Difference between pages)
imported>Doug Williamson (Link with Adaptive expectations page.) |
imported>Doug Williamson (Add link.) |
||
Line 1: | Line 1: | ||
''Information technology''. | |||
Social media are platforms on mobile devices and other computers that host user-generated content and facilitate the development of online social networks. | |||
Examples include Facebook, LinkedIn, Twitter, TikTok, WeChat, Instagram and Tumblr. | |||
:<span style="color:#4B0082">'''''Social media - reputational risk'''''</span> | |||
:"If, on the other hand, [a] breach is not detected and unauthorised data transmission continues unchecked for several days, the impact of the breach is likely to be much more severe and could domino in either direction along the supply chain. | |||
:Sensitive data may be irrecoverable, while rumours percolating on social media may result in adverse media coverage that cannot be controlled. The result: serious damage to the company’s reputation." | |||
:''Cyber security: protecting your business and your clients - the Treasurer's Wiki.'' | |||
== See also == | == See also == | ||
* [[ | * [[CEO fraud]] | ||
* [[ | * [[Cyber attack]] | ||
* [[ | * [[Cyber security: protecting your business and your clients]] | ||
* [[ | * [[Financial engineering]] | ||
* [[Information technology]] | |||
* [[Platform]] | |||
* [[Reputational risk]] | |||
* [[Social engineering]] | |||
* [[Supply chain]] | |||
[[Category:The_business_context]] | |||
[[Category:Identify_and_assess_risks]] | |||
[[Category:Manage_risks]] | |||
[[Category:Risk_frameworks]] | |||
[[Category:Risk_reporting]] | |||
[[Category:Technology]] |
Revision as of 16:43, 25 November 2022
Information technology.
Social media are platforms on mobile devices and other computers that host user-generated content and facilitate the development of online social networks.
Examples include Facebook, LinkedIn, Twitter, TikTok, WeChat, Instagram and Tumblr.
- Social media - reputational risk
- "If, on the other hand, [a] breach is not detected and unauthorised data transmission continues unchecked for several days, the impact of the breach is likely to be much more severe and could domino in either direction along the supply chain.
- Sensitive data may be irrecoverable, while rumours percolating on social media may result in adverse media coverage that cannot be controlled. The result: serious damage to the company’s reputation."
- Cyber security: protecting your business and your clients - the Treasurer's Wiki.