Differences Between Business Oriented and Social Oriented Networks


This paper will discuss the difference between business-oriented networks and enterprise social networks. What makes up a social-networking site and what makes up a business-oriented social networking site and why are they different?

Another topic concerns why do organizations need a business continuity plan? Why is it important to determine what business will do if a disaster, man-made or natural, strikes? Three issues that a business continuity plan should cover concern identifying assets, controlling the flow if information, and determining who is in charge, what is the line of succession?

Many companies have created profitable businesses from selling small amounts of products previously sold in bigger chunks. Music and books are two such products. The market started asking to buy single songs and not the whole album; so how do you serve that market and still make a profit?  Micropayment systems seemed to have come up with an answer, and it serves more than just the entertainment industry. This paper will discuss how this system works and how it is expanding beyond music and books.

How business-oriented networks and enterprise social networks differ

A social network is defined as a place where people can create a personalized homepage writing about events in their lives, post pictures of the family, short video’s, music, post and exchange thoughts and ideas,  and link to their friend’s websites; in essence, they create their space on the internet. They can even tag, or create hashtags (#thisisme) for their content, add keywords, so the content is searchable. Others can comment, like, or share your content should you allow them to do so (Turban, 2012).

Mobile devices play a big role in social networking; enter mobile social networking. Users can let their social network know that they’re checking in at a local restaurant for dinner, or they’re at a favorite watering hole watching a live band. They can even post pictures as well as live videos of the event. Many entertainers encourage people attending these events to share their experience as it is free advertising and helps to increase sales of their products such as music or films. Data has shown that mobile social networking has increased subscribers by substantial amounts; the number of mobile subscribers accessing Facebook increased over 100% in one year from2009 to 2010 (Stackpole, 2012). Two basic types of mobile social networks exist; companies are partnering up with wireless carriers such as Yahoo and MySpace via AT&Ts wireless network, and companies that do not have such relationships with cell companies; they use other means in which to attract users such as mobile apps. Examples of these include Classmates.com and Couchsurfing.com.

Business Oriented sites, also known as professional social networks, primary objective are to foster business relationships amongst its members and subscribers. Examples of these sites include LinkedIn, ViaDeo, and Zing.

Many businesses are increasingly using these sites to increase their business contacts, especially in a global economy. Social networks make it easier to maintain contact with colleagues around the world. Companies can advertise businesses services and products. They can show expertise in their field using multiple media including educational presentations, articles, videos; all at virtually no cost to host. This low cost is especially beneficial to small companies. The small business can contact potential customers on the other side of the world. This type of connection was impossible ten years ago. This type of cross-border networking makes globalization available for the individual and the small business (Turban, 2012).

The need for a business continuity plan

The number one reason for a company to have a formalized disaster plan in place is to ensure ongoing business activities that provide business continuity with the least amount of disruption and costs for the business. Many businesses have failed due to a lack of disaster recovery planning because they could not guarantee business continuity that would allow them to survive an unexpected disaster (Turban, 2012).

Part of a company’s security efforts involve preparing for man-made or natural disasters since these may occur without any warning at any time. It is best to prepare an actual plan that will work effectively in the face of calamity. The most important part of this plan is the business continuity plan. It addresses the question of how the business is going to operate should an unexpected disaster occur. Most likely a disaster will be localized; if it’s a worldwide disaster, a plan would be unnecessary.

A disaster recovery plan confronts two issues: one how does the business recover from a disaster; two, how does it continue to operate should a disaster affect the business. This continuity is especially true for global businesses since, as stated earlier, a disaster is usually a localized event, and the business will want to ensure the rest of the business continues as those operations will help to pay for the cost of recovery. It is imperative for a business to have a disaster recovery plan in place to obtain insurance that covers the cost of recovery from the disaster. Disaster recovery describes the events linking the business continuity plan to safeguarding and ensuring recovery.

The purpose of a business continuity plan is to keep the business running after a disaster occurs. All functions and departments need to have in place an effective recovery plan. Part of that plan includes asset protection and recovery, even replacement. The plan needs to detail who makes the decisions, even to the point of secession. The plan needs to concentrate on total recovery from a total loss. The plan needs to be kept current due to changes in technologies, circumstances, even personnel. Critical applications need identifying. And the plan needs to be kept in a safe and accessible place.

A disaster recovery plan needs to cover many areas sufficiently to ensure recovery. It includes identification of assets and their value; including people, buildings, hardware, software, data, and supplies. A threat assessment needs to be conducted to include man-made and natural threats from inside or outside the business. Conduct a vulnerability assessment, and calculate the probability for exploitation, and evaluate all policies and procedures.

Micropayment Systems

The music and book industries today allow consumers set up accounts allowing them to buy single songs, even individual chapters in a book at very low prices. Accumulation of single-item purchases occurs until the amount makes it cost-effective to submit the payment to the credit card company. These systems are known as closed-loop systems. The credit card companies are not enamored with these systems because it has caused them to lower their fees to capture what is becoming a huge industry. Much of this type of business was unimaginable 15 years ago. Today, transactions worth billions of dollars are being handled daily (Schonfeld, 2009))

The shopkeeper gathers all the purchases subscribers make until they are sufficient enough to submit to the credit card company to be cost effective. It’s much like gathering all the days sales at a cash only business and depositing the money in the bank at the end of the day. The problem is the shopkeeper risks waiting a long time on some low volume customers. By aggregating these purchases together, the shopkeepers lower their costs per transaction to the credit card company enabling to operate profitably.

Other industries that are successfully taking advantage of micropayments include mobile banking and microfinancing to poor, underdeveloped areas of Africa; M-Pesa has been successfully operating in Kenya and Tanzania, and has spread to India and Afghanistan as well. Cell phone technology has allowed people in remote areas to apply for and receives loans as small as $100.00 allowing them to finance business operations and providing electricity to their homes using solar powered generators (Mutiga, 2014).


The difference between business-oriented networks and enterprise social networks occur in the area of concentration addressed by the individual sites and how they meet their subscriber needs. FaceBook addresses the need for their subscribers to interact on a social basis, sharing thoughts, family news and photos, opinions are important to this group. LinkedIn allows for sharing contact information, providing specifications on products, showing expertise, getting a job. Mobile devices have played a big role in both businesses oriented as well as the social networking sites so that people can share and talk with each other at anytime from anywhere.

The need for a disaster recovery plan must include a business continuity plan. With a business continuity plan, the business will find it difficult, if not impossible, to find the resources needed to recover from a man-made or natural disaster. Business continuity ensures that the business has continual incoming resources adequately funding the recovery.

Micropayment of become successful because it addressed a need and demand in the marketplace for services otherwise unavailable without it. The market was demanding the ability to be supplied with goods and services on a smaller scale rather than previously available; especially with entertainment and finance products. Entrepreneur’s stepped up and began to determine that if they aggregated their sales receipts and submitted them in bundles rather than individually, they could cut their costs while also serving their customers. The rest of the market, mostly the credit card industry, had to change to meet the demand.


Mutiga, M. (2014, January 20). Kenyaâ’s Banking Revolution Lights a Fire – The New

York Times. Retrieved from http://www.nytimes.com/2014/01/21/opinion/kenyas-


Schonfeld, E. (2009, March 25). Spare Change On Track To Process $30 Million In

Micropayments On Social Apps This Year | TechCrunch. Retrieved from


Stackpole, B. (2012, August). Business case for enterprise social networks: Better

collaboration. Retrieved from http://searchcontentmanagement.techtarget.com

Turban, E. (2012). Electronic commerce 2012: A managerial and social

networks perspective. Upper Saddle River, NJ: Pearson Prentice Hall.

eCommerce Security & Payments Systems

It’s funny how the supposed secure RFID chips on credit cards are less secure than the magnetic stripe cards are. According to Chase Bank and American Express, the chips are built with 128-bit encryption and Triple-DES (Data Encryption Standard) protecting the data on the chip. Furthermore, the chips, theoretically, send a unique, single-use code with each transaction that does not match the number on the card (Johnson, 2009). And now wallets are available at Amazon that contains shields within your wallet preventing the reading of the card chips by portable readers of RFID chips.

Part of the problem with fighting computer criminals is that once companies have developed the means to fight the latest virus or DoS attack, computer criminals have developed another way to attack. Anti-virus software is only as good as the last known virus. A computer virus, phishing scams, Trojan horses, and DoS (Denial of Service) is used to get information, prevent the use of your computer, gather the information that can be used illegally or sold for illegal use. The biggest threat to computer security has been found to be the user. In the early days, users would write their passwords on a sticky note and post it on their monitors. You may laugh at this notion, but it’s very true. The problem with fighting computer crime is the inability of many people to understand that they’re being spammed or phished. They download a file containing a Trojan horse virus thinking it’s from their best friend, or they’re gullible enough into believing that their child, who is standing next to them, is badly injured in a Nigerian hospital and needs emergency help. The file they download carries a code that will allow their computer to be used in a vast network of other computers to infect many more computers. These computers provide enough power to cause heavy-duty denial-of-service attacks on many well-known companies or government services (Brumfield, 2015)

Grameen Koota set up micro-finance and is part of Grameen Bank in Bangalore, India. It provides small loans to poor or low-income clients. One of the problems that Grameen Koota was trying to bridge by developing a mobile loan and payment system was the inability of the poor to grow their way out of poverty. They didn’t have access to the means of capital they needed to provide even for necessities of life. Grameen Koota had a desire to grow their business. Since business and government were unwilling to set up the needed infrastructure due to the heavy costs of that infrastructure, and the people had a need, and the people owned the means; an abundance of cell phones, the opportunity to provide easy banking and financial services presented itself (Turban, 2012).

M-Pesa has been providing mobile banking and micro-financing to poor, underdeveloped areas of Africa; Kenya, and Tanzania since 2009, and that has since spread to India and Afghanistan. Many people with just a simple flip phone can apply for and receive loans as small as $100.00 to finance providing electricity to their homes using solar-powered generators. And the system allows the borrower to pay the bank using the phone. Grameen Koota had a problem with providing loans when it came time to collect payment; his collectors became victims of armed robberies while returning to the bank with the day’s receipts. One can only imagine the immensity of such a change to a rural area that has never had electricity. And the ability to be able to communicate directly with buyers anywhere in the world, versus just in their local area, allowing these people to sell their products allows them to work their way out of poverty and live a better life (Mutiga, 2014).


Brumfield, J. (2015, April 13). Verizon 2015 Data Breach Investigations Report – About Verizon

Enterprise Solutions. Retrieved from http://news.verizonenterprise.com/2015/04/2015-data-


Johnson, J. (2009, September 30). RFID Credit Cards and Theft: Tech Clinic. Retrieved from


Mutiga, M. (2014, January 20). Kenyaâ’s Banking Revolution Lights a Fire – The New York Times.

Turban, E. (2012). Electronic commerce 2012: A managerial and social networks perspective. Upper

Saddle River, NJ: Pearson Prentice Hall.