Enlarging Your Social Network Essay

1193 words - 5 pages

Social networking comprises of both strong and weak ties. Social networking has an impact on all human beings through organizations, relationships, associations, internet networks, and community. Being in the hospitality industry it is important that I develop social networking for both my personal self and industry. Belonging to the American Culinary Federation I believe increases my social network. Being a member of the American Culinary Federation allows me to share ideas and come together with professionals in the same business. The internet is a faucet that allows primary and secondary social networks. In order to keep one’s social network flowing is to simply stay in contact and leave the door open for others to contact you.

Social network “is the total set of relationships we have to include our family, our insurance agent, our neighbors, some of our class mates and co-workers, and the people who belong to our clubs” (Brinkerhoff, Ortega, White, & Weitz, 2011). My primary social networking group is comprised of managers and peers that I have worked with in the past. Keeping an open door of communication and moral support allows for me to have continuous networking for others in the same industry. My husband is also in the hospitality industry which broadens our social networking because we have more contacts between the two of us. Even though my peers and past managers are not a set organization, they are known as weak ties. It has been a key point of mine to keep in contact with all past peers and managers. I keep in contact through the internet, social occasions, and telephone communication. Keeping an open door contact to these ties allows for both me and my social network the opportunity to discuss the business, career opportunities and assist others of needs.
The organization I belong to is the American Culinary Federation and is my secondary social networking connection. The American Culinary Federation is a “professional, organization for chefs and cooks, founded in 1929 in New York City by three chefs’ organizations: the Societe Culinaire Philanthropique, the Vatel Club and the Chefs de Cuisine Association of America” (Federation, 2008). The ACF is a national organization that allows fellow professionals to come together and participate in discussions, view new products, and cross reference ideas, jobs, and new industrial ideas. Being a weak tie organization, I believe it has a high importance of networking possibilities with other passionate professionals. The American Culinary Federation offers the latest industry trends, career recognition, accreditation for Culinary Education, Honor Society, Representation in International Competitions, and Access to a Million-Member Intercontinental Society, A Fight against Childhood Hunger and Obesity, Product Quality Assurance, and A National Apprenticeship Program.
A secondary social network includes two real estate agents. One in Chicago, Illinois and the other...

Find Another Essay On Enlarging Your Social Network

Eli Lilly in India: Rethinking the Joint Venture Strategy

910 words - 4 pages distribution network and the second largest exporter to different countries, including Russia (which Eli Lilly was attempting to reach), with capital cost 50-75% lower than those of comparable US plant and R&D expenses of 2-5% of sales. Besides, Ranbaxy developed its own process for Eli Lilly's patented drug Cefaclor. Since Eli Lilly's product patent for Cefaclor expired in 1992 and the firm was expecting to protect its monopoly with process patents

Computer Networking Security Essay

933 words - 4 pages server, a technician would have to be brought in to resolve the issue. If you have a computer network or even just a computer for that matter, you need to know how to protect it and keep it up to date with secure measures of protection. With the majority of our lives and information out on the world wide web these days, it is critical to protect your information. On personal and work computers, we have social security numbers, salary

Consolidated Electronics Group Incident Response Plan

952 words - 4 pages awareness training to keep them updated on the latest trends in security threats and social engineering attacks. In the event of a network incident, there must be a team in place that is trained to investigate the event properly and thoroughly. The incident response team (IRT) should be proficient in the procedures and tools available to investigate an incident, and they should have an understanding of what the normal functioning of the network looks

Teachers and Technology

2454 words - 10 pages produces a network of social learning agents. Papert’s (1993/2000) prediction of computers transforming education plays an influential role with the demands on K–12 schools to integrate wireless computing in the instructional setting. Teaching with wireless computing resources will demand that teachers manage a collaborative community which requires the student to take part in their learning process. According to Piaget (1932/1997), SC stimulates

Limiting The Use of Social Media by Teens

1817 words - 7 pages cautious about information you provide online, and make sure you’re the only one using your online identity. An Internet social network can help you find like-minded individuals ( Online Social Networking ) Social Network can help find like-minded individuals and make connections. You can use a network to promote specific interest ( Online Social Networking ) Help connect with other people who share your interest, and find resources to gather

Technology in the Classroom

2380 words - 10 pages Vygotsky (1978/1981) are the noted developers of the SC theory. The theory of SC underlies building collaborative relationships between teachers and their students. Technology into the classroom illustrates SC because technology produces a network of social learning agents. Papert’s (1993/2000) prediction of computers transforming education plays an influential role with the demands on K–12 schools to integrate wireless computing in the

Security Plan: MOOCs

823 words - 4 pages network, as students get older. When discussing MOOCs and online course this becomes important because of the open nature of both types of learning. Social networking are vital to MOOCs and the current district RUP would need to be rework to allow students to access these resources at the very least at the high school level.(New,2013) As a part of the security plan these asynchronous tools could pose serious risk and student will need to be

Poke Me Poke You - A Connected Community

810 words - 3 pages Computer-Mediated Communication, 14(4), 1208-1227. Valenzuela, S., Park, N., & Kee, K., F. . (2009). Is There Social Capital in a Social Network Site?: Facebook Use and College Students' Life Satisfaction, Trust, and Participation1. Journal of Computer-Mediated Communication, 14(4), 875-901. Wandel, T. (2008). Colleges and Universities Want to be Your Friend: Communicating via Online Social Networking. Planning for Higher Education, 37(1), 35.

THE IMPLICATIONS OF INTERNET SOCIAL NETWORKS

1179 words - 5 pages themselves in order to limit access from certain users, criminals, and predators. This research suggests that even the most caution users can become victims of a social network site. Users need to exercise precautions to guard your personal information such as full name, birth date, address, email, credit card numbers and other sensitive personal information. Posting too much information such as inappropriate comments, racy photos and where you are

The Negative Impacts of Social Media

2532 words - 10 pages network sites will impact teen lives more negatively than positively because they can cause huge distractions from valuable and critical pursuits like education; they can also cause mental health issues and a reduction in communication skills. Social network sites is often an easy distraction tool disturbing you when you are supposed to be doing your homework or studies. Many students believe they are capable of multitasking and finishing

Firewalls: Preventing Unauthorized Access Into a Network

1013 words - 4 pages to the hacker. To catch these thieves on their way out your firewall must be capable of automatically blocking unauthorized outbound communications” (ZoneAlarm, 2014). As the global workforce is dominated by email, the primary mode of communication and collaboration it seems now, firewalls can implement behavior control to filter email that is sent into or out of a network. This helps in filtering spam, blocking emails that contain malicious code

Similar Essays

The Internet: Living In The Virtual World

582 words - 2 pages that's the problem, people always post good things on social networks, and even bad things just because they want you know. We perfectly control our self-image. So you can't really know a person through a social network. And what I'm really afraid of is in the end you don't know about yourself either.In addition to social networks, shopping online is also something most people will do on Internet; nowadays people don't need to go out for shopping

Overview Of Network Security Essay

1050 words - 4 pages Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to

Social Selling And Networking Essay

1349 words - 6 pages for prospecting and lead generations is having a large network. If you only have a couple of friend in your network, then your organic outreach will be very small. Think of your social network as a spider’s web with you in the middle. Now think of your friends as the next ring in the web. The friends of your friends would be the next ring, and so on. If you’re first ring is larger, then the amount of people you reach in the end will be

Constructivism Theory Essay

2356 words - 9 pages comprehension. Teaching-learning with wireless laptops can be characterized as an underpinning concept of cross-curricular instructional approach through social networking (Couros, 2010). Wireless computing can have a noticeable impact by enlarging the likelihood of technology integration in teaching-learning and peer-peer support (Moses, Khambari, & Luan, 2008). Present research suggests that SC facilitates a social network instructional setting (Bebell