Deck 8: Social Media Information Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/121
Play
Full screen (f)
Deck 8: Social Media Information Systems
1
A viral hook is something that induces people to share a message with others.
True
2
Content data is data and responses to data that are contributed by users and SM sponsors.
True
3
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
False
4
Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
5
The primary risk of peer-to-peer support is loss of control.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
6
Social media is the use of information technology to support the sharing of content among networks of users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
7
Social CRM is a dynamic, SM-based CRM process.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
8
Social networking procedures are more informal for SM sponsors than they are for social networking users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
9
Content data differentiates SMIS from Web site applications.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
10
Social CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most effect on the organization.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
11
Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
12
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
13
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
14
SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
15
Both community users and employees of SM sponsors process SM sites using communications devices.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
16
Defenders of belief are communities that share a common belief and form their hive around that belief.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
17
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
18
Seekers-of-the-truth communities facilitate activities like sales and marketing.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
19
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
20
Social media sponsors are the companies that operate the SM sites.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
21
Someone who sees an interesting feature in an SM presence and sends a link to that feature to friends can be called an active lurker.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
22
An organization has a strong relationship with you if you buy its products and write positive reviews about it.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
23
Web 2.0 includes Web-delivered services and content that are paid for by users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
24
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
25
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
26
Social capital does not depreciate.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
27
According to Henk Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
28
The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
29
A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
30
Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
31
When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your social capital.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
32
Web 2.0 applications are characterized by frequent releases of thick-client applications.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
33
A folksonomy is content structure that has emerged from the processing of many user tags.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
34
Key users submit ideas and responses to nonkey users for publication in communities.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
35
An active lurker is someone who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
36
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
37
The term use increases value means that the value of a web site is indirectly proportional to the number of people using it.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
38
Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
39
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
40
Unlike humans, organizations do not have social capital.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
41
The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
42
A ________ is an inducement for passing the message along through the tiers.
A)motif
B)viral hook
C)folksonomy
D)protocol
A)motif
B)viral hook
C)folksonomy
D)protocol
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
43
User-generated content (UGC)is the essence of SM relationships.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
44
If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is an SM application provider?
A)Oracle
B)SAP
C)McAfee
D)LinkedIn
A)Oracle
B)SAP
C)McAfee
D)LinkedIn
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
46
SM communities differ from communities in the past because SM communities are ________.
A)formed based on family relationships
B)limited by geographic location
C)formed based on mutual interests
D)limited by organizational boundaries
A)formed based on family relationships
B)limited by geographic location
C)formed based on mutual interests
D)limited by organizational boundaries
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
47
________ are the companies that operate the SM sites.
A)SM application providers
B)SM sponsors
C)SM client servers
D)SM consultants
A)SM application providers
B)SM sponsors
C)SM client servers
D)SM consultants
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
48
In the context of CRM, hyper-social means that the vendor gains control of the customer relationship.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
49
________ is data and responses to data that are contributed by users and SM sponsors.
A)Networking data
B)Content data
C)Connection data
D)User-generated data
A)Networking data
B)Content data
C)Connection data
D)User-generated data
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
50
A characteristic of Web 2.0 is that the value of a site increases with users and use.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
51
Most SM applications earn revenue ________.
A)by selling the license to their applications
B)through merchandising
C)through a type of advertising model
D)through viral marketing
A)by selling the license to their applications
B)through merchandising
C)through a type of advertising model
D)through viral marketing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
52
Google publishes Google Maps and provides tools for users to make custom modifications to those maps, which is an example of mashup.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)________ is an information system that supports the sharing of content among networks of users.
A)DSS
B)SMIS
C)ERP
D)TPS
A)DSS
B)SMIS
C)ERP
D)TPS
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
54
Web 2.0 does not allow mashups, which occur when the output from two or more Web sites is combined into a single user experience.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
55
One of the major sources of UGC problems is inappropriate content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
56
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
57
Emergence in the context of management means loss of control of employees.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
58
________ is the use of information technology to support the sharing of content among networks of users.
A)Social media
B)Content publishing
C)Networking
D)Programming
A)Social media
B)Content publishing
C)Networking
D)Programming
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
59
When a business participates in a social network or opens its site to UGC, it protects itself from misguided people who post junk unrelated to the site's purpose.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
60
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
A)application providers
B)sponsors
C)blogs
D)users
A)application providers
B)sponsors
C)blogs
D)users
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
61
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true.When confronted with contrary evidence, the group members do not change their opinion.According to Gossieaux and Moran, this is an example of a ________ community.
A)defenders-of-belief
B)seekers-of-the-truth
C)heterogeneous
D)cloud
A)defenders-of-belief
B)seekers-of-the-truth
C)heterogeneous
D)cloud
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
62
________ is the dynamic social media process of employing users to participate in product design or product redesign.
A)Crowdsourcing
B)Blogging
C)Publishing
D)Tweeting
A)Crowdsourcing
B)Blogging
C)Publishing
D)Tweeting
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
63
Defenders-of-belief communities facilitate activities like ________.
A)customer service
B)manufacturing and operations
C)inbound logistics
D)sales and marketing
A)customer service
B)manufacturing and operations
C)inbound logistics
D)sales and marketing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
64
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
A)links
B)authoring
C)signals
D)extensions
A)links
B)authoring
C)signals
D)extensions
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
65
A student invests money and time in taking a business administration course.In this example, the student invests in ________.
A)human capital
B)social capital
C)functional capital
D)mechanical capital
A)human capital
B)social capital
C)functional capital
D)mechanical capital
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
66
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.
A)human
B)technical
C)social
D)mechanical
A)human
B)technical
C)social
D)mechanical
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?
A)loss of privacy
B)loss of control
C)decrease in efficiency
D)possibility of error
A)loss of privacy
B)loss of control
C)decrease in efficiency
D)possibility of error
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
68
________ is the application of social media to facilitate the cooperative work of people inside organizations.
A)Enterprise 2.0
B)Enterprise resource planning
C)Enterprise application integration
D)Enterprise architecture
A)Enterprise 2.0
B)Enterprise resource planning
C)Enterprise application integration
D)Enterprise architecture
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following activities would seekers of the truth facilitate?
A)human resources
B)operations
C)marketing
D)sales
A)human resources
B)operations
C)marketing
D)sales
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
70
________ differentiates SMIS from Web site applications.
A)Networking data
B)Content data
C)Connection data
D)User-generated data
A)Networking data
B)Content data
C)Connection data
D)User-generated data
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following statements is true of defenders-of-belief communities?
A)They are open to changing their belief when confronted with contrary evidence.
B)They are very effective for activities that involve innovation or problem solving.
C)They are useful in customer service activities.
D)They seek conformity and want to convince others of the wisdom of their belief.
A)They are open to changing their belief when confronted with contrary evidence.
B)They are very effective for activities that involve innovation or problem solving.
C)They are useful in customer service activities.
D)They seek conformity and want to convince others of the wisdom of their belief.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following statements is true of social CRM?
A)Customers that are likely to generate the most business get the most attention and have the most effect on the organization.
B)The relationships between organizations and customers emerge in a structured process as only the organization creates and processes content.
C)Each customer crafts his or her own relationship with the company.
D)Though relationships emerge from joint activity, companies have a lot more control than the customers.
A)Customers that are likely to generate the most business get the most attention and have the most effect on the organization.
B)The relationships between organizations and customers emerge in a structured process as only the organization creates and processes content.
C)Each customer crafts his or her own relationship with the company.
D)Though relationships emerge from joint activity, companies have a lot more control than the customers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is a significant risk of using social media for inbound and outbound logistics?
A)loss of control
B)loss of credibility
C)loss of privacy
D)loss of effectiveness
A)loss of control
B)loss of credibility
C)loss of privacy
D)loss of effectiveness
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
74
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
A)social capital
B)human capital
C)industrial capital
D)mechanical capital
A)social capital
B)human capital
C)industrial capital
D)mechanical capital
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
75
In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.
A)LAN
B)links
C)language
D)leader
A)LAN
B)links
C)language
D)leader
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
76
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.
A)avatar
B)Ajax
C)authoring
D)affiliation
A)avatar
B)Ajax
C)authoring
D)affiliation
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
77
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component.
A)signals
B)search
C)links
D)authoring
A)signals
B)search
C)links
D)authoring
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
78
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.
A)defenders of belief
B)advocates of philosophy
C)supporters of fidelity
D)seekers of the truth
A)defenders of belief
B)advocates of philosophy
C)supporters of fidelity
D)seekers of the truth
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
79
The primary risk of peer-to-peer support is ________.
A)loss of control
B)loss of credibility
C)lack of privacy
D)increase in expenses
A)loss of control
B)loss of credibility
C)lack of privacy
D)increase in expenses
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
80
A ________ is content structure that has emerged from the processing of many user tags.
A)mashup
B)taxonomy
C)folksonomy
D)microblog
A)mashup
B)taxonomy
C)folksonomy
D)microblog
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck