The team will discuss how the new social media tools may be used to distribute messages to consumers and clients and explain which tools are the best to use in specific situations. Some of these tools that will be discussed include video conferencing, Skype, online schedules, online calendars, Smartphone, and internal shared hard drives. Several ethical issues are involved when using social media. The team will also analyze these ethical issues, including security concerns, maintaining credibility, privacy, and maintaining a reputation.
Included in this paper will be an outline of formal documents needed to launch this e-commerce unit. These documents will consist of the executive summary, the business description, the operations plan, the financial plan, the marketing plan, and the competitor analysis.
Distribution of Messages
Social media tools give companies the ability to expand communication in multiple ways. A corporate intranet is an inexpensive way to distribute messages across the company. The intranet can run off the existing internet to improve information and communication throughout the company. The intranet can maintain executive run blog sites continuously to keep virtual employees up to date on developments and ideas. The developments can be tested on the corporate intranet, thus creating feedback from within the company employees prior to revealing the ideas and development to the public (Roos, 2009).
The implementation of Smartphone devices such as Blackberries and I phones for employee use will ease the burden of distribution and retrieval of messages among virtual employees. The
References: Albo, B. (2008, March, 3). Business Plan. Retrieved, September 8, 2009 from http://entrepreneurs.suite101.com/article.cfm/business_plan Computer Fraud and Abuse Act (2001) Computer Securities Products, Inc. (2009). Retrieved September 8, 2009, from http://www.computersecurity.com/theft/corporate-desktops.htm E-Business Plan tutorial Feinman, Todd. (2008). Electronic Retailer Blog. Retrieved September 9, 2009, from http://www.electronicretailerblog.com/tag/identity-theft/ Microsoft Roos, D. (2009). How Intranets Work. Retrieved September 4, 2009, from http://communication.howstuffworks.com Skype Limited Tennant Risk Services. (2004). Technology and cyber-risk insurance. Retrieved September 8, 2009, from http://tennant.com/p-cyber.php#ecom Turban, E., King, D., McKay, J., Marshall, P., Lee, J., & Viehland, D