Verified Document

Platform To Host Different Applications Term Paper

Such businesses can therefore approach the opinion leaders with incentives to recruit new members to the buying service. I would personally not participate in group buying experience on Facebook this is because it can lead to protracted legal battle with those Facebook users whose profiles and postings were studied without their consent. Using such information to track members' activities and purchases on the Web for marketing purposes is a violation of someone's privacy. This is especially tragic if personal information that members had not intended to share is gleaned to third parties.

The Facebook experience with Beacon spells doom for the two group buying business opportunities. Businesses that embark on usage of text-analytic software to probe the content of the member profiles and postage message with a view to identifying their interests in specific products or services violates the...

Many Facebook users use messaging services to send private messages that they would never want the public to see. Group buyers who analyze Facebook profiles and posting to identify are opinion leaders who can easily influence others also violate user's privacy. Their engagements can lead to protracted court battle if personal details are mined for commercial purposes. Group buying business opportunities can only be genuine if Facebook formally tells its users that information that is reflected on their profile will be used for marketing purposes. That should also apply to their postings and messages. If they consent, then such information can be used for commercial purposes.
References

McCuddy, M.K. & Morgal, M.L. (2012). Facebook: Just a Social Networking Site or an Opportunity for Entrepreneurs? Retrieved from http://brainmass.com/business/management/455893

Sources used in this document:
References

McCuddy, M.K. & Morgal, M.L. (2012). Facebook: Just a Social Networking Site or an Opportunity for Entrepreneurs? Retrieved from http://brainmass.com/business/management/455893
Cite this Document:
Copy Bibliography Citation

Related Documents

Cross Platform Mobile and Web
Words: 17284 Length: 63 Document Type: Thesis

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Why Threat Management Is Different From Vulnerability Management
Words: 3098 Length: 10 Document Type: Term Paper

Networks Security Management Network Security Management Why Threat Management Is Different from Vulnerability Management Studies have attempted to examine on the possibility of implementing an all rounded technology that seeks to manage several layers of OSI networking levels. However, this implementation has considerably lost influence since this approach is defeated by the nature of attacks. Currently, 2600 hacking publication presents to a user several methodologies of attacks. In fact, hacking as become complex

Application of a Pedagogic Model to the Teaching of Technology to...
Words: 60754 Length: 230 Document Type: Dissertation

Pedagogic Model for Teaching of Technology to Special Education Students Almost thirty years ago, the American federal government passed an act mandating the availability of a free and appropriate public education for all handicapped children. In 1990, this act was updated and reformed as the Individuals with Disabilities Education Act, which itself was reformed in 1997. At each step, the goal was to make education more equitable and more accessible to

Web 2.0 Technologies & Applications
Words: 6227 Length: 24 Document Type: Thesis

Most well-known was Robert Scoble of Microsoft. With the 2004 U.S. Presidential elections, blogs' growth accelerated dramatically as nearly every news network, candidate in both U.S. Senate and House of Representative races, and political pundit has their own blog competing for the publics' attention. The era of 2004 to today in fact has created a blogging industry that is pervasive in its availability of publishing platforms (USC Annenberg School of

Roles of Systems and Application
Words: 1376 Length: 4 Document Type: Term Paper

Like many companies, we're also customizing Salesforce.coms' applications to match exactly what we need in terms of being able to track specific customization orders from customers. We're also working with Salesforce.com to create more integration points to our hand-coded systems as well, using the Apex programming language. AMR Research (2007) has mentioned Apex in their cited research, specifically on the point of ensuring upgrade paths possible using Salesforce.com main

Improving the CRM Suite of Software Applications
Words: 3357 Length: 9 Document Type: Essay

Improving the CRM Suite of Software Applications at SAP SAP AG (NYSE:SAP) is the worldwide leader in Enterprise Resource Planning (ERP) and one of the top companies globally in Customer Relationship management (CRM) software as well. While their dominance in ERP is solid, with Gartner, a leading industry research firm reporting that SAP has 25% global market share today, it's global CRM market share trails Salesforce.com who is the worldwide leader

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now