Social Media Approach As a Marketing Tool

Total Page:16

File Type:pdf, Size:1020Kb

Social Media Approach As a Marketing Tool Social Media Approach as a Marketing Tool 1. Introduction Social media isn’t a new “Internet Hip” that just popped up, but it has been around for years in the shape of forums and newsgroups. So what has changed? The introduction of various new tools and the tremendous increase of the internet user base in the last decade along with easier internet access gave the big push. To best define social media, we need to break it down. Social is relating to human society; the interaction of the individual and the group. Media is a medium of cultivation, conveyance, or expression (Merriam-Webster Collegiate Dictionary). So, social media is a media designed to be disseminated through social interaction, created using highly accessible and scalable publishing techniques. Social media uses Internet and web-based technologies to transform broadcast media monologues (one-to- many aka traditional media) into social media dialogues (many-to-many). Primarily, social media depends on interactions between people –as discussions and integration of words – using technology as a conduit. Social media has been touted as presenting a fresh direction for marketing by allowing companies to talk with consumers, as opposed to talking at them (Wikipedia). It lives on the contributions and feedback of everyone. It eliminates the gap between the writers and the readers and forms a conversation-like content. As mentioned earlier, social media comes in the forms of various online tools or services. These can be categorized into numerous groups each with its own characteristics and usages. To elaborate, blogs, for example, aka web logs are an online journal for the writers to share their experiences, opinions, and thoughts while providing the readers the option add their feedback and comments to the topic. Social networks are online service websites consists of personal or commercial profiles of their users, their social relationships, and offer a variety of other activities (Wikipedia). Micro-blogging is a networking service that allows mobile users of cell phones and other Internet connected devices to stay attentive of activities within a group by receiving frequently published updates, typically of 140 characters or less. Text messages are uploaded to a micro-blogging server, and then distributed to group members (R. Kayne). Social bookmarking is a service that provides its users with the ability to store, organize, share, search, and rate bookmarks for web pages. There is also a specialized form of social bookmarking sites known as social news where users vote on articles and news. These are some of the social media variations available and are the most influential ones for businesses, There are others but are not mentioned as they are either hold no significant use toward the purpose of this document or reside outside its scope. 2. The gain of adopting Social Media Marketing Social media provides companies with the capability to closely reach a large number of consumers providing similar experience to direct marketing with much lower costs. It gives you the opportunity to take advantage of the power of word of mouth (WOM) or in this case electronic one. According to a study done by Steffes and Burgee from Towson University, the information the students gained from eWOM is more influential in their decision than speaking with friends in person (2008). Also, according to Alexa, A web traffic monitoring company, out of the top 10 most visited websites in the world, four are social ones and the rest are general search engines. Looking at Malaysia’s top 10, the number increases to five with the first spot occupied by Facebook –a social networking website (Alexa.com). Social networks like Facebook has over 350 million active users of which 70% are international ones with an average time spend of 55 minutes per day (facebook.com); MySpace –another social network –has over 100 million active users (myspace.com); Technorati has more than 133 million indexed blogs (January 2009) and 77% of active internet users are reading blogs (Adam Singer, 2009). Being able to influence even a small portion of a consumer base of this magnitude will produce noticeable results despite the difficulty of relating social activities to a percentage of revenue. Bear in mind that Social Media Marketing (SMM) is not to be used to sell, at least not directly. However, SMM is used to generate awareness and exposure to the business, reduce overall marketing expenses, increase traffic or subscribers to own website, create new business partnership, rise up in search ranking, improved PR, and an ending with more loyal customers (Michael Stelzner, 2009). If approached with intent to sell, internet users are now are savvy, they will be able to smell you coming and will shun you immediately. 3. The Way to Successful Social Media Utilization The use of social media as a marketing tool –if done right – can yield into huge benefits. To fully utilize the social media, the organization should include it in their marketing planning as it needs a careful preparation to know the medium best suited for the company’s activities. Unfortunately, lots of people look at social media as a free marketing tool, leading into little planning which in return yields no benefits and in some cases even negative ones. While it might not take much -if any- financial wise, social media marketing do consume a lot of time. On the other hand, the financial requirement makes it the best choice for start up companies and individuals. The first step in the plan is to see if social media is suitable for you as it is not for everybody. Businesses with products targeted at elderly or retired people, won’t generate much benefits from using it. Also, companies with tight government regulation supervision shouldn’t pick social media as a marketing tool. After ensuring that you belong with the majority, whose social media engagement suits their activities, you have to decide on your objectives; the desired results from engaging into social media. This in return will help in choosing the best suited tools (Anita Campbell, 2009). This paper will cover in some details a part of these tools and their uses later. Within the social sphere, organizations can’t push their messages or products to the consumer; rather they have to lure the consumer toward them. To be able to achieve that, the message should attain certain attributes to be considered attractive enough to lure them. First of all, the message should sound familiar to the target audience. People like to communicate with each other. Try reaching them, listening to their ideas and thoughts, and then formulate your message. Adding a budget to the mix in the form of incentives can encourage much better feedback as well as help spread the word associated with the incentives. The third element that can be thrown to the mix is fame. Providing the audience with a chance of fame, be it as small as it gets, it can really stimulate the audiences interest. The forth element is the fun, entertaining one, which is shared with most of the online activities. Adding the fun entertaining factor can excite the audience to spread the word. Lastly, the message should contain the mobility factor; the ability to move from one person to the next (Richard Clark, 2009). Having at least one the first four elements along with the last one will encourage a beneficial response from the community. An organization should continue to listen to the community as long as it is in business. Since anyone can say anything, a company should always keep an eye on the sphere. Listen to what the communities say about it. This help in controlling bad press and empowering good ones. Of course, monitoring the blogosphere may seem impossible, fortunately, there are some tools that keeps the company notified whenever a new entry with its name appear in the wild. 4. The Way to a Catastrophic Social Media Utilization As beneficial as SMM can be, a misuse or unplanned approach can result in a total waste of resources. Lacking a staff member who can handle a frequent delivery of quality content can degrade the social effort. Also, the absence of a strong message that can create a community around it will result in a partial loss for the impact on people. Social media is global, so, cautious should be practiced at all times to avoid any offending messages. Not only that, a corporation should realize that social media is an open platform and there is no such thing as off-the-record and for that not only should they monitor their own channels but also their employees. There have been many incidents where companies had to fire their employees for inappropriate messages posted in their own personal spaces. One famous incident when Delta Airlines had to fire Ellen Simonetti a flight attendant over inappropriate pictures posted in her blog in the company’s uniform (Ellen Simonetti, 2005). To avoid such incidents, the organization should provide clear guidelines to what is appropriate and what is not when it comes to their social messages. 5. Blogs We have mentioned earlier different social media tools that can be utilized to the benefit of the organization. Now, we will discuss these in further details while providing real examples for the usages of these tools by other organizations or individuals. Starting with blogs, which as mentioned earlier is a website with regular entries of commentary, descriptions of events, or other material usually maintained by one person with few exceptions where they are maintained by a group of people depending on the function or goal of the blog. Blogs also give the readers the ability to leave their comments in an interactive format.
Recommended publications
  • Untangling the World Wide Weblog: a Proposal for Blogging, Employment-At-Will, and Lifestyle Discrimination Statutes
    Valparaiso University Law Review Volume 42 Number 1 Fall 2007 pp.245-290 Fall 2007 Untangling the World Wide Weblog: A Proposal for Blogging, Employment-at-Will, and Lifestyle Discrimination Statutes Shelbie J. Byers Follow this and additional works at: https://scholar.valpo.edu/vulr Part of the Law Commons Recommended Citation Shelbie J. Byers, Untangling the World Wide Weblog: A Proposal for Blogging, Employment-at-Will, and Lifestyle Discrimination Statutes , 42 Val. U. L. Rev. 245 (2007). Available at: https://scholar.valpo.edu/vulr/vol42/iss1/8 This Notes is brought to you for free and open access by the Valparaiso University Law School at ValpoScholar. It has been accepted for inclusion in Valparaiso University Law Review by an authorized administrator of ValpoScholar. For more information, please contact a ValpoScholar staff member at [email protected]. Byers: Untangling the World Wide Weblog: A Proposal for Blogging, Employ UNTANGLING THE WORLD WIDE WEBLOG: A PROPOSAL FOR BLOGGING, EMPLOYMENT-AT-WILL, AND LIFESTYLE DISCRIMINATION STATUTES I. INTRODUCTION Laws are like spider’s webs: if some poor weak creature come[s] up against them, it is caught; but a bigger one can break through and get away.1 Imagine landing your dream job. All of your hard work and education has finally paid off. You accept the job offer, give two weeks’ notice at your current place of employment, and move to another state to start your dream job. Being far from home, and wanting to keep in touch with family and friends scattered around the country, you start up a blog.
    [Show full text]
  • 2005 Campus Chronicle Fall
    In A&E: Summer brings blockbusters to the screen HIGH POINT UNIVERSITY Camgus Chronicle :VOL. 13, NO. 1 UESD/...Y , August 23 , .2005 HIGH POINT. H.C. Celebration ends in tragedy - Well-known sophomore Terrence McCann died after school ended last May---- Donations at By Justin Spinks house on Circle Drive . He apparently just passed out somewhere and not to Staff Writer tripped and fell into the ditch while at­ worry about it." Lamb didn't want to PU are now at tempting to cross it, drowning in the shal­ believe that something happened to his Behind the Eastchester Village apart­ low creek. Toxicology results later friend, but when Mccann 's family arrived n all-time high ment complex in a small showed that his that same morning to take him back to wooded area lies a creek blood alcohol con­ Pennsylvania and he was still missing , he The funds keep mounting. Eigh no deeper than six inches tent was .2, more knew deep down that "somethmg's not onths into his first year as president nestled in a steep trench. than twice the legal right." ido Qubein has raised $31 millio This is where the body of limit for driving in During his short stay at HPU, or High Point University, includin Terrence Patrick the state of North McCann was widely known and respected 11 million since most of you left fo McCann was found by a Carolina. among both students and faculty. Enca woman walking her dog Brandon Hansen, his girlfriend, attended his fu­ um.mer vacation. two days after be was re­ Wright, a 21-year­ neral service m Glenside and says that On Aug.
    [Show full text]
  • The Corporate Blog As an Emerging Genre of Computer-Mediated Communication: Features, Constraints, Discourse Situation
    GÖTTINGER SCHRIFTEN ZUR INTERNETFORSCHUNG Hg.: S. Hagenhoff, D. Hogrefe, E. Mittler, M. Schumann, G. Spindler, V. Wittke igital technology is increasingly impacting how we keep informed, how we communicate professionally and privately, and how we initiate and maintainD relationships with others. The function and meaning of new forms of computer-mediated communication (CMC) is not always clear to users on The corporate blog as an the onset and must be negotiated by communities, institutions and individuals alike. Are chatrooms and virtual environments suitable for business communi- emerging genre of cation? Is email increasingly a channel for work-related, formal communication and thus „for old people“, as especially young Internet users flock to Social computer-mediated Networking Sites (SNSs)? communication: ornelius Puschmann examines the linguistic and rhetorical properties of the features, constraints, weblog, another relatively young genre of CMC, to determine its function C communication computer-mediated in private and professional (business) communication. He approaches the que- discourse situation stion of what functions blogs realize for authors and readers and argues that corporate blogs, which, like blogs by private individuals, are a highly diverse The corporate blog as an emerging genre of genre emerging an as blog corporate The in terms of their form, function and intended audience, essentially mimic key characteristics of private blogs in order to appear open, non-persuasive and Cornelius Puschmann personal, all essential
    [Show full text]
  • Security in Context-Aware Mobile Business Applications
    Security in Context-aware Mobile Business Applications Inauguraldissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften der Universit¨at Mannheim vorgelegt von M.Sc. Emin Islam Tatlı aus Istanbul (T¨urkei) Mannheim, 2008 Dekan: Professor Dr. Felix Freiling, Universit¨at Mannheim Referent: Professor Dr. Stefan Lucks, Bauhaus-Universit¨at Weimar Korreferent: Professor Dr. Matthias Krause, Universit¨at Mannheim Tag der m¨undlichen Pr¨ufung: 06. M¨arz 2009 Abstract The support of location computation on mobile devices (e.g. mobile phones, PDAs) has enabled the development of context-aware and especially location- aware applications (e.g. Restaurant Finder, Friend Finder) which are becom- ing the new trend for future software applications. However, fears regarding security and privacy are the biggest barriers against their success. Espe- cially, mobile users are afraid of the possible threats against their private identity and personal data. Within the M-Business research group at the University of Mannheim, various security and privacy aspects of context-aware mobile business appli- cations are examined in this thesis. After providing a detailed introduction to context-aware applications, the security challenges of context-aware ap- plications from the perspectives of different principals (i.e. mobile users, the broker, service providers) are analyzed. The privacy aspects, the chal- lenges, the threats and legal directives regarding user privacy are explained and illustrated by real-life examples. The user-centric security architectures integrated within context-aware applications are introduced as anonymity and mobile identity management solutions. The M-Business security archi- tecture providing security components for communication security, dynamic policy-based anonymity, secure storage on mobile devices, identity manage- ment for mobile users and cryptography libraries is explained in detail.
    [Show full text]
  • Fired for Blogging: Are There Legal Protections for Employees Who Blog?
    FIRED FOR BLOGGING: ARE THERE LEGAL PROTECTIONS FOR EMPLOYEES WHO BLOG? Robert Sprague* I. INTRODUCTION One of the Internet-related phenomena of the early twenty-first century has been the exponential rise in the number of Web logs (referred to generally and hereinafter as "blogs"). Millions of people have begun chronicling their lives through online diaries and social networks. Sometimes they disclose too much information: describing past drug use, allowing pictures of themselves drunk at parties to be displayed, and griping about work. More and more of these "bloggers" are being fired because of what they publish online. This article reviews current employment law in light of the rising popularity of blogs.1 In particular, the application of the employment-at- will doctrine and its evolving exceptions is examined in the context of employees who blog. While individuals may believe that they have the right to say what they want to on their own time while using their own resources, the employment-at-will doctrine remains a powerful tool for employers to discharge their employees without legal backlash. However, the employment-at-will doctrine is not an absolute shield for employers and this article discusses those few circumstances in which an employer faces some potential liability. * J.D., M.B.A., Assistant Professor, Department of Management and Marketing, University of Wyoming College of Business. The author wishes to thank Michael Thatcher, J.D., 2006, University of Wyoming College of Law, for his excellent research assistance. 1. This article addresses employment laws related to private employers; it does not address the gamut of laws which may apply to public employers.
    [Show full text]
  • Workplace Privacy Policies
    NATIONAL EMPLOYMENT LAW INSTITUTE 28th Annual Public Sector EEO and Employment Law Conference August 28, 2009 – San Francisco, CA Workplace Privacy Policies Robert D. Brownstone, Esq.* _________________________________________________________________________ *Robert D. Brownstone is the Law & Technology Director at Fenwick & West LLP. He advises clients on electronic discovery, information-security, electronic information management and retention/destruction policies and protocols. Mr. Brownstone also collaborates with clients as to computer solutions enabling compliance with legal obligations. A nationwide advisor, speaker and writer on many law and technology issues, he is frequently quoted in the press as an expert on electronic information. He also teaches Electronic Discovery classes at the University of San Francisco School (USF) of Law and Santa Clara University School of Law. Mr. Brownstone is a member of: four state bars; the NELI Advisory Board; and the executive committee of the State Bar of California’s Law Practice Management and Technology (LPMT) Section. Before joining Fenwick & West in 2000, Mr. Brownstone had a varied 13-year career as a litigator, law school administrator, law school teacher and consultant. He received his J.D. magna cum laude from Brooklyn Law School in 1986 and his B.A. from Swarthmore College in 1982. THESE MATERIALS ARE MEANT TO ASSIST IN A GENERAL UNDERSTANDING OF THE CURRENT LAW RELATING TO PRIVACY AND ELECTRONIC INFORMATION MANAGEMENT. THEY ARE NOT TO BE REGARDED AS LEGAL ADVICE. ORGANIZATIONS OR INDIVIDUALS WITH PARTICULAR QUESTIONS SHOULD SEEK ADVICE OF COUNSEL. © 2009 Fenwick & West LLP Robert D. Brownstone advises clients on electronic discovery, on electronic information management and on retention/destruction policies and protocols.
    [Show full text]
  • Developing Corporate Blog Policies
    Dear Diary (((Hello(Hello World!World!)))):: Developing Corporate Blog Policies Karena Tyan Massachusetts Institute of Technology November 17, 2007 6.805: Ethics and Law on the Electronic Frontier Professors Hal Abelson, Mike Fischer, Danny Weitzner AbAbAbstractAb stract Blogging is an increasingly popular marketing strategy in the corporate world, but many companies have yet to develop proper policies and guidelines for managing corporate and personal employee blogs. This paper develops a deeper understanding of the nature and power of blogs as a corporate asset through blog studies and offers an example of possible corporate blog policy through analysis of several existing ones. We find successful policies that both protect company interests and promote employee speech are best developed through cooperation between employee-bloggers and employers. Contents 1 Introduction 2 Blogs 2.1 What are blogs? 2.2 Corporate blogs 2.2.1 What are corporate blogs? 2.2.2 Why corporate blogging? 2.2.2.1 External corporate blogs 2.2.2.2 Internal corporate blogs 3 Blog Policy 3.1 Why are blog policies important? 3.2 Custom-tailoring a blog policy for your company 3.2.1 Formulating your company's blog-policy 3.2.1.1 IBM 3.2.1.2 Sun Microsystems 3.2.1.3 Plaxo 3.2.1.4 Thomas Nelson Publishers 3.2.2 Summary of Process 3.2.3 Suggested policies 4 Conclusion 5 Appendix A: IBM blog policy 6 Appendix B: Sun Microsystems blog policy 7 Appendix C: Sun Microsystems blog guidelines 8 Appendix D: Plaxo blog policy 9 Appendix E: Yahoo! blog policy 10 Appendix F: Thomas Nelson Publishers blog policy 11 Bibliography 1 Introduction In the past decade or so, blogging has risen as a powerful new means of communication.
    [Show full text]
  • Can Blogging and Employment Co-Exist?
    Comments Can Blogging and Employment Co-Exist? By JOHN S. HONG* SUPPOSE RACHEL JONES, a hypothetical employee at a midsized newspaper, writes the following entry on her personal Web log': I really hate clowns. Seriously. Okay, first off. They have these stu- pid little tricks that they do to thrill little kids. Then they have that evil-looking make-up that gives me nightmares. They run around laughing like complete morons and then charge you an arm and a leg for a couple of hours of complete torture. Jones's supervisor finds the entry during her weekly Friday ritual of reading through her employees's Web logs. The supervisor's hus- band happens to be the clown that worked the party Jones threw for her children. The day after that posting, Jones is fired. The fairness of terminating Jones's employment is debatable. Jones's supervisor may genuinely perceive the Web log-or "blog," as it is more commonly known-entry as a personal insult against her and her family. If Jones's co-workers commonly read the blog and know of the supervisor's affinity for clowns, this "personal insult" might have a detrimental effect on company morale, hurting the com- pany's bottom line. On the other hand, Jones's entry does not deal at all with the newspaper's business interests. It is merely a personal rant regarding off-duty activities that does not in the least pertain to the news. So what rights does an employee, such as Jones, have when fired for an off-duty blog posting that does not pertain to her employer's business interests or other legitimate business needs? * Class of 2007; B.A., Davidson College, 1999; Managing Editor, U.S.F.
    [Show full text]
  • Workplace Blogs and Workers' Privacy Rafael Gely University of Missouri School of Law, [email protected]
    University of Missouri School of Law Scholarship Repository Faculty Publications Summer 2006 Workplace Blogs and Workers' Privacy Rafael Gely University of Missouri School of Law, [email protected] Leonard Bierman University of TexasA & M Mays Business, [email protected] Follow this and additional works at: http://scholarship.law.missouri.edu/facpubs Part of the Internet Law Commons, and the Labor and Employment Law Commons Recommended Citation Rafael Gely & Leonard Bierman, Workplace Blogs and Workers' Privacy, 66 La. L. Rev. 1079 (2006) This Article is brought to you for free and open access by University of Missouri School of Law Scholarship Repository. It has been accepted for inclusion in Faculty Publications by an authorized administrator of University of Missouri School of Law Scholarship Repository. Workplace Blogs and Workers' Privacy Rafael Gely* Leonard Bierman** I. INTRODUCTION Over the years, the ability of employers to impinge upon the privacy rights of their employees has been shaped to a large extent by technology. New forms of technology have allowed employers to more intrusively and surreptitiously monitor employees while at work in forms that were unimaginable few years ago.' Advances in technology even allow employers to monitor employees outside the traditional confines of the physical workplace. 2 Employees who work at home are subject to monitoring through webcams, or monitoring of keyboard strokes.3 Even employees whose jobs take them on the road are subject to monitoring4 through satellite monitoring through GPS positioning devices. Technology serves also a different function. Technology helps create new ways for employees to communicate and interact with other employees both in and outside the workplace.
    [Show full text]
  • The Blogging Revolution: Government in the Age of Web 2.0 David C
    PROVIDING CUTTING-EDGE KNOWLEDGE TO GOVERNMENT LEADERS The Blogging Revolution: Government in the Age of Web 2.0 IBM Center for The Business of Government The IBM Center for About the IBM Center for The Business of Government Through research stipends and events, the IBM Center for The Business of Government stimulates research and facilitates discussion of new approaches to improving the effectiveness of government at the federal, state, local, and international levels. The Center is one of the ways that IBM seeks to advance knowledge on how to improve public sector effectiveness. The IBM Center focuses on the future of the operation and management of the public sector. The Blogging Revolution: The About IBM Global Business Services With consultants and professional staff in more than 160 countries globally, IBM Global Business Services is the world’s largest consulting services organization. IBM Global Business Services provides clients with business process and industry expertise, a deep understanding of technology solutions that address specific industry issues, and the ability to design, build and run those solutions in a way that delivers bottom-line business David C. Wyld value. For more information visit www.ibm.com. 2.0 Web Age of in the Government Maurin Professor of Management and Director of the Strategic e-Commerce/ e-Government Initiative For additional information, contact: Department of Management Jonathan D. Breul Southeastern Louisiana University Executive Director IBM Center for The Business of Government E-Government Series 1301 K Street, NW Fourth Floor, West Tower Washington, DC 20005 (202) 515-4504, fax: (202) 515-4375 e-mail: [email protected] website: www.businessofgovernment.org Wyld C.
    [Show full text]
  • Employee "Blogging" and Legal Reform Rafael Gely University of Missouri School of Law, [email protected]
    University of Missouri School of Law Scholarship Repository Faculty Publications Spring 2007 Social Isolation and American Workers: Employee "Blogging" and Legal Reform Rafael Gely University of Missouri School of Law, [email protected] Leonard Bierman University of TexasA & M Mays Business, [email protected] Follow this and additional works at: http://scholarship.law.missouri.edu/facpubs Part of the Internet Law Commons, and the Labor and Employment Law Commons Recommended Citation Rafael Gely & Leonard Bierman, Social Isolation and American Workers: Employee Blogging and Legal Reform, 20 Harv. J.L. & Tech. 287 (2007) This Article is brought to you for free and open access by University of Missouri School of Law Scholarship Repository. It has been accepted for inclusion in Faculty Publications by an authorized administrator of University of Missouri School of Law Scholarship Repository. HarvardJournal of Law & Technology Volume 20, Number 2 Spring 2007 SOCIAL ISOLATION AND AMERICAN WORKERS: EMPLOYEE BLOGGING AND LEGAL REFORM Rafael Gely and Leonard Bierman* TABLE OF CONTENTS 1. IN TROD UCTIO N .............................................................................. 288 II. B LOGS: A PRIM ER ........................................................................ 292 1I1. SOCIAL ISOLATION IN AMERICA ................................................. 296 A. The Decline in Interpersonal "Connectedness"................. 296 B. The Workplace as a Nexus of Interpersonal Connectivity ....... 297 C. The Law and Declining Workplace
    [Show full text]
  • Stony Brook University
    SSStttooonnnyyy BBBrrrooooookkk UUUnnniiivvveeerrrsssiiitttyyy The official electronic file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate School at Stony Brook University. ©©© AAAllllll RRRiiiggghhhtttsss RRReeessseeerrrvvveeeddd bbbyyy AAAuuuttthhhooorrr... Content-based Access Control A Dissertation Presented by Michael Andrew Hart to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University May 2011 Stony Brook University The Graduate School Michael Andrew Hart We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation. Rob Johnson – Dissertation Advisor Assistant Professor, Computer Science Yejin Choi - Chairperson of Defense Assistant Professor, Computer Science Scott Stoller Professor, Computer Science Mónica F. Fernandez-Bugallo Professor, Electrical and Computer Engineering, Stony Brook University This dissertation is accepted by the Graduate School Lawrence Martin Dean of the Graduate School ii Abstract of the Dissertation Content-based Access Control by Michael Andrew Hart Doctor of Philosophy in Computer Science Stony Brook University 2011 In many contexts, users are either unable or unwilling to specify their access control policies. In Data Loss Prevention, for example, users cannot fully express what is secret in rule-based formats. Many users are unwilling to use access controls, particularly in the Web 2.0, because they are too draconian, leading to disastrous consequences in terms of privacy. To address both of these issues, we have introduced the concept of Content-Based Access Control (CBAC). CBAC combines content recognition with policy acquisition and enforcement. A CBAC-enabled system can be trained to recognize policy violations by learning what is secret from examples.
    [Show full text]