IT's Role in Managing Social Media

By Cunningham, Patrick | Information Management, September/October 2011 | Go to article overview

IT's Role in Managing Social Media

Cunningham, Patrick, Information Management

Tweets on Twitter, statuses on Facebook, and videos on YouTube ... social media's impact is significant upon the enterprise. IT sits in the middle of the whirlwind. This article will explore:

* The role of IT in securing and making available the social media galaxy

* Social media when made available as an enterprise's official presence, when utilized personally by employees or customers, and when utilized within the enterprise

As of January 10,2011:

* Facebook had more than 500 million active users emphasizing that its draw is hard to resist for most enterprises.

* Twitter claimed 175 million users and 95 million daily tweets.

* YouTube had 2 billion views a day.

These statistics represent the thousand-pound gorillas of social media sites. Many organizations are placing significant value upon these types of social media sites as a means to connect to customers and deliver content to employees and shareholders. Most are gravitating to these major players, placing their own presence in the social media world with the largest communities. Some organizations find social media so valuable, they bring variants of the more popular sites into their own intranets.

The shift of social media to the mainstream means that IT must adapt. In the past, social media sites were often blocked as attractive nuisances and time wasters, but for the many enterprises now embracing social media for marketing purposes and for distribution of content, access to these sites must be provided to employees. This creates two major concerns for IT: 1 ) protecting the organization from external and internal information security threats and 2) controlling bandwidth usage to maintain quality of service.

Providing Information Security

The role of IT, relative to information security is two-fold:

1. Defending the organization from threats outside the organization

2. Preventing the deliberate or inadvertent release of confidential information from within the organization

Protecting the organization from an external threat is a standard part of the mission of information security. The tools the organization uses to monitor threats and counter malware will generally be applied to threats originating from social media. Intrusion detection systems, antivirus software, and firewall logging can be utilized to counter any threats from social media sites.

Organizations can also utilize web filtering tools to limit or block access to social media sites or elements of those sites. Generally, mainstream social media sites have comprehensive security controls and robust security infrastructures. However, the scale of these sites increases the threat surface and opportunities for attackers to compromise the site or elements of the site, including content and applications associated with the site.

The threat from an organization's employees is focused on the release of confidential information, although information posted by employees about themselves can be utilized by an adversary to identify key employees to target with phishing or social engineering attacks. Employees can unknowingly release confidential information. It may be commonplace for them to discuss confidential information in the office and, as a result, casually post information about their work to Facebook or Linkedln.

In 2009, several bloggers mined public profiles on the Linkedln social networking site and pulled together a feature set for the then-unreleased Windows Mobile 7 operating system for smart phones. The feature set was based upon information that employees of several companies had posted to their profiles. In several cases, the information was not public, and one employee posted an internal code name for an unreleased product on his public profile.

Systems that monitor network traffic for keywords, product code words, or security classification phrases can assist in identifying inappropriate postings being made from within the organization to social media sites. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Cite this article

Cited article

Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited article

IT's Role in Managing Social Media


Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25,

    New feature

    It is estimated that 1 in 10 people have dyslexia, and in an effort to make Questia easier to use for those people, we have added a new choice of font to the Reader. That font is called OpenDyslexic, and has been designed to help with some of the symptoms of dyslexia. For more information on this font, please visit

    To use OpenDyslexic, choose it from the Typeface list in Font settings.

    OK, got it!

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search


    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.