CD510 Fizza Malik Unit 3
Unit 3: Using social media in
business
Contents
Contents......................................................................................................................................................1
Introduction.................................................................................................................................................2
List two threats to business using social media?.........................................................................................2
Analyse different types of hackers...............................................................................................................3
How are social media websites constantly evolving?..................................................................................3
How can businesses use social media websites to support their Business aims?........................................6
How are features of social media tailored to business needs?..................................................................10
How do social media websites develop an audience and encourage follows and likes?...........................12
Enhancing the relationship between social media and websites...............................................................12
The impact of negative comments on social media...................................................................................13
Audience profile for Facebook...................................................................................................................16
Audience profile for Instagram..................................................................................................................17
Audience profile for Twitter.......................................................................................................................18
Audience profile for YouTube....................................................................................................................19
Audience profile for Pinterest....................................................................................................................20
Different ways businesses can use social media to attract a target audience...........................................22
,CD510 Fizza Malik Unit 3
Introduction
What is social media?
- Social media is a variety of online platforms that enable us to upload photographs and
videos, connect with others, and create and share information with anyone on earth or
numerous people at once. We can communicate with a diverse group of individuals and
share our experiences, thoughts, ideas, knowledge and opinions with them. It also
provides advantages in the area of business, marketing and expertise development.
Approximately 4.5 million people utilize social networking sites globally. Twitter, TikTok,
YouTube, Facebook, and Instagram are the most frequented platforms.
- Social media sites were developed to facilitate communication with friends, family and
people you know. Eventually, businesses utilized them to engage with customers around
the world and outsource their business globally. By enhancing their features, they are
rapidly evolving and changing. Annually, new platforms are created around the world.
What are the benefits of social media?
- Oline communities have transformed how we communicate online. We can utilize them
to stay in touch with friends who reside far away, socialize with each other, and discover
current events on the planet within seconds. They also provide us with instant access to
an enormous quantity of knowledge. Social networks have in various ways made the
entire globe more approachable by enabling users to connect with others digitally.
- Additionally, businesses are using social media marketing techniques to reach out to
customers directly through their computer and mobile devices, gaining followers in the
process to develop a network of ardent supporters and a brand-culture.
List two threats to business using social media?
- Keylogger: It is spyware that logs and steals each successive keystroke a user types into
a computer or other device. It is software that keeps records of the keyboard inputs you
make. Because it can intercept passwords and other sensitive data typed into the
keyboard, a keylogger can be a significant threat. Cybercriminals can thus utilize stolen
PIN codes, bank account numbers, and passwords for email and social media accounts
to steal victims' money, steal their identities, and extort data and cash from close
relatives.
- Ransomware: It is malware made to prevent a user or organization from accessing their
computer data, which has an impact on the entire system. When a company is infected
with ransomware, there are numerous concerns they must deal with. Financial loss is
one of the biggest risks because a ransom demand can be quite expensive. If the
, CD510 Fizza Malik Unit 3
business does not have enough money, it may lose everything. Data loss is another risk
that businesses may face. This can result in serious issues with user information or
confidential company information.
Analyse different types of hackers.
Typically, when we talk about hackers, we picture either a terrible individual who takes money from
other people or a nice guy who helps others and improves the world. Hackers don't always wear black
hats; some of them have different shades. There are 6 types of hackers:
Black hat hacker: These are the usual malicious hackers who use their technical expertise and
knowledge to extort or steal money from others. They can break into any computer without the
owner’s permission. They can do any illegal activities just to make money.
White hat hacker: As opposed to black hat hackers, these are the "good" hackers. They
safeguard your system or website from malicious hackers. They are employed by businesses and
government organizations to safeguard their information from other hackers. They identify and
address the system's weaknesses.
Grey hat hacker: They hake for their personal enjoyment. They don’t harm or help anyone,
instead they play with the system and enjoy finding gaps, breaking protection and they find
hacking fun. They hack because they can.
Blue hat hacker: Their goal is straightforward and simple: to take revenge. They alter the
malware or virus code that they downloaded from the internet and target companies or people
who enrage them and they want to "make them pay."
Red hat hacker: red hat hackers, also referred to as vigilante hackers, are driven by a desire to
retaliate against black hat hackers, but they accomplish this by infiltrating black hat communities
on the dark web and initiating hacking attacks against their networks and gadgets.
How are social media websites constantly evolving?
- Social networks began to emerge around the 90’s, being “AOL Instant Messenger” one of the
first online sites, which influenced teenagers and young people of that time. They have evolved
to the point that they not just influence our personal and social connections; they also influence
how we conduct businesses. They are no longer simply a tool for communication. It is a platform