StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Socical computing - Essay Example

Cite this document
Summary
There have been rapid advancements in information and communication technology, which has seen information management become an integral tool for the success of organizations. Most organizations realize that information is an important asset, and should be captured, shared and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Socical computing
Read Text Preview

Extract of sample "Socical computing"

Download file to see previous pages

on management tool is social computing, which is the social aspect of interaction of people via computer systems and networks such as the internet, and encompasses a number of internet-based applications such as email, blogs, instant messaging, social book marking, social networking service, wikis, and polls (Dasgupta, 2010). Social computing has been identified to add value to the organization in a number of by enabling the management and development of business information assets (Tredinnick, 2006, pp. 228-234). Social computing tools such as wikis, blogs, and social networking sites offer a solution to information management related issues due to the inherent networking nature, which allows users to find, explore, and solve organizational problems.

Moreover, social computing provides a platform for developing or improving on employee networks and permits participation (Ropes, 2010), which can lead to better employ performance, hence improved organizational performance. Furthermore, social computing can lead to more innovation, better staff abilities, and increase staff efficiency if competently employed as a powerful information management tool. This paper seeks to discuss and critically analyse the benefits, potential disadvantages and challenges of using social computing as an information management tool in the organization, and its future prospects.

The advantages that this paper will focus on include enhanced customer relations, contributions to product development and innovation, increased productivity and efficiency, and general impact on employee information sharing and turnover levels. The disadvantages will be focusing on related security and privacy risks, loss of brand loyalty and fragmentation and cluttering of information. The critical analysis of social computing is, therefore, limited to the aspects of social computing that entail the various ways through which it influences information management in the organization.

Such aspects include social

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Socical computing Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Socical computing Essay Example | Topics and Well Written Essays - 3000 words. Retrieved from https://studentshare.org/management/1639566-socical-computing
(Socical Computing Essay Example | Topics and Well Written Essays - 3000 Words)
Socical Computing Essay Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/management/1639566-socical-computing.
“Socical Computing Essay Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/management/1639566-socical-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Socical computing

Social and Legal Aspects of Computing

(Names) (Institution) (Tutor) (Date) Question 1 This study is about safety of personal details against illegitimate use, storage, damage, exposure or interference.... It is always essential for the people, who are charged with the responsibility of keeping personal details of others to ensure that the information is secure, reliable, and up to date and free of any interruptions that may result to decline in value or make them unworthy for the purpose it was intended for (Andrea & Deborah 2011)....
6 Pages (1500 words) Assignment

Comparing Individual and Social Financial Motivations in Energy Conservation

The purpose of the article is to present research findings on the effects of financial incentives on energy conservation.... The researcher carried out the study on domestic electricity consumers in Stanford.... The researchers were testing the impacts of financial incentive on… Project's researchers also wanted to establish the relationship between energy conservation and the social class of the respondent....
2 Pages (500 words) Assignment

Social Computing

The paper ''Social computing'' tells that an educated society works to create awareness among the citizens of the world related to nature, history, geography, and the latest technologies.... o create awareness among the general public regarding sustainable energy, wildlife protection, harmless sophisticated technology....
1 Pages (250 words) Essay

Information Security Strategy for Jashoppers Core Business

This service provides a way of encryption of information on transit so as to protect it from unintended recipients.... Should a hacker have access to encrypted information, they will not be able to read or manipulate the data in any way (Warren… Information security strategy is a plan that is supposed to follow a given program in order to mitigate risks while at the same time complying with contractual, statutory, legal, and internal organization requirements (Krag, 2009)....
3 Pages (750 words) Case Study

Comparing social behavior between fresh H2O dolphins and salt H2O Dolphins

They live and move in groups while in the wild, in many cases doing group activities together.... Various studies have shown that social behavior of freshwater dolphin and salty water dolphins do not differ much.... hellip; This paper shall focus on analysis and discussion of social behaviors of the pink river dolphin (Inia geoffrensis), which is a fresh water dolphin and the dusky dolphin (Lagenorhynchus obscurus) [The author notes The work also shows that their social behavior is also demonstrated through dolphin human relations behaviors]....
5 Pages (1250 words) Lab Report

Social Computing Guidelines for Heavy Machine Enterprise Co

can formulate… The online discourses using social computing should be able to empower the responsible professionals of the company to create helpful innovations, globally.... Accoringly, the company should emphasize that social computing can contribute largely towards the growth of an individual and organization.... Another important aspect of IBM computing guidelines deals with the tool of contribution, among the staff and all concerned, worldwide....
5 Pages (1250 words) Essay

Dependency of Commuting to Work on Automobile Transportation

The paper "Dependency of Commuting to Work on Automobile Transportation" describes that a careful examination of why bicycle commuting is not an alternative mode of transportation to travel to work may provide valuable information to government leaders, policymakers, and planners.... hellip; Limitations are the constraints embedded into the nature of the current study....
16 Pages (4000 words) Essay

UMUC Haircuts Stage 4

Moreover, Infrastructure as Service or (IaaS) or IaaS clouds often offer additional resources such as virtual machines, storage capacity, security and end-to-end logical network model. The deployment of BPM in the cloud presents… an opportunity to enable small and medium enterprise market (SME) to reach for BPM applications as they only pay for what they need due to the elasticity and scalability of cloud computing. The integration of BPM and cloud computing enable enterprise with specific domain Introduction Cloud computing is one of the most essential concepts that will continue to play a dramatic role in the modern century....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us