Deck 8: Social Media Information Systems

Full screen (f)
exit full mode
Question
Employees who contribute to and manage social networking sites generate direct labor costs.
Use Space or
up arrow
down arrow
to flip the card.
Question
The primary risk of peer-to-peer support is loss of control.
Question
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
Question
Seekers of the truth are communities that share a common belief and form their hive around that belief.
Question
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Question
SM application providers mostly host their SM presence using elastic servers in the cloud.
Question
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Question
Social CRM supports those customers who are likely to generate the most business.
Question
Social CRM is more structured and controlled than traditional CRM.
Question
A viral hook induces users of an SM site to share a message with others.
Question
Content data is data and responses to data that are contributed by users and SM sponsors.
Question
Social networking procedures are more informal for SM sponsors than they are for social networking users.
Question
Social media sponsors are the companies that operate SM sites.
Question
Content data differentiates SMIS from Web site applications.
Question
Defenders of belief facilitate activities like sales and marketing.
Question
The number of second- and first-tier community members in a social media site reduces exponentially.
Question
Social media sponsors may or may not pay a fee, depending on the application and on what they do with it.
Question
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Question
SM sponsors contribute to SM sites via browsers or by using specialized sponsor applications provided by the SM application provider.
Question
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Question
When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital.
Question
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Question
Seekers of the truth will seek the truth, even if that means recommending a certain vendor's product over another vendor's.
Question
A person can gain more social capital by strengthening relationships with people who control resources that are important to him or her.
Question
According to the SEAMS process, social monitoring services are primarily used for measuring activities.
Question
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Question
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Question
Unlike humans, organizations do not have social capital.
Question
Social capital does not depreciate.
Question
In McAfee's SLATES Enterprise 2.0 Model, "E" stands for enterprise.
Question
Key users submit ideas and responses to nonkey users for publication in communities.
Question
Web 2.0 used free content and free software as the principal means to attract viewers.
Question
Web 2.0 includes Web-delivered services and content that are paid for by users.
Question
Homesourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Question
SMIS restricts word-of-mouth sales.
Question
Web 2.0 enables advertisers to know the percentage of viewers who click an ad.
Question
The multiplicative nature of social capital means that the value of a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Question
According to Gossieaux and Moran, a hyper-social organization focuses on managing and influencing customers rather than creating relationships.
Question
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Question
A person who sees an interesting feature in an SM presence and sends a link to that feature to friends is an active lurker.
Question
SM communities differ from communities in the past in that they are ________.

A) formed based on family relationships
B) limited by geographic location
C) formed based on mutual interests
D) limited by organizational boundaries
Question
________ is the use of information technology to support the sharing of content among networks of users.

A) Social media
B) Content publishing
C) Multimedia
D) Programming
Question
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Question
A ________ is an information system that supports the sharing of content among networks of users.

A) human resource information system (HRIS)
B) social media information system (SMIS)
C) database management system (DBMS)
D) transaction processing system (TPS)
Question
If a reasoned, nondefensive response generates continued and unreasonable UGC from the same source, it is best to respond to or delete the problematic content.
Question
________ are organizations that choose to support a presence on one or more SM sites.

A) Social media application providers
B) Social media sponsors
C) Seekers of the truth
D) Defenders of belief
Question
User-generated content (UGC) is the essence of SM relationships.
Question
When a problematic content causes an organization to do something positive as a result, it is best for the organization to ignore the issue without responding to the content.
Question
A characteristic of Web 2.0 is that the value of a site increases with an increase in users and use.
Question
Web 2.0 avoids mashups.
Question
When a business opens its site to user-generated content (UGC), it protects itself from misguided people who post junk unrelated to the site's purpose.
Question
One of the major sources of UGC problems is inappropriate content.
Question
Most SM applications earn their revenue through ________.

A) a licensing model
B) a franchising model
C) advertisements
D) merchandising
Question
A(n) ________ is an inducement that is awarded to social media users for passing communications along through different tiers of communities in social media.

A) network motif
B) viral hook
C) folksonomy
D) internet meme
Question
The storage of ________ differentiates SMIS from Web site applications.

A) secondary data
B) content data
C) connection data
D) continuous data
Question
Which of the following is an SM application provider?

A) Oracle
B) SAP
C) McAfee
D) LinkedIn
Question
Deleting legitimate negative comments can result in a strong user backlash.
Question
An example of a mashup is Google's My Maps in which Google provides tools for users to make custom modifications to those maps.
Question
________ are the companies that operate SM sites.

A) SM application providers
B) SM sponsors
C) Seekers of the truth
D) Defenders of belief
Question
Data and responses to data that are contributed to SM sites by users and SM sponsors are referred to as ________.

A) secondary data
B) content data
C) connection data
D) continuous data
Question
Which of the following is a risk associated with human resources when using social media to form conclusions about employees?

A) loss of privacy of the employees
B) loss of control over the employees
C) decrease in efficiency of the evaluation process
D) possibility of error on the site
Question
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

A) social capital
B) human capital
C) structural capital
D) process capital
Question
Defenders-of-belief communities facilitate activities like ________.

A) customer service functions
B) manufacturing and operations
C) inbound logistics
D) sales and marketing
Question
________ is the application of social media to facilitate the cooperative work of people inside organizations.

A) Enterprise 2.0
B) Enterprise resource planning
C) Enterprise application integration
D) Enterprise architecture
Question
________ is the dynamic social media process of employing users to participate in product design or product redesign.

A) Crowdsourcing
B) Outsourcing
C) Homesourcing
D) Farmshoring
Question
A student invests money and time in a business administration course. In this example, the student invests in ________.

A) human capital
B) social capital
C) structural capital
D) process capital
Question
According to Gossieaux and Moran, a common desire to learn something, solve a problem, or make something happen is shared by ________.

A) defenders of belief
B) proprietary communities
C) gated communities
D) seekers of the truth
Question
Which of the following components of McAfee's Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, etc.?

A) search
B) authoring
C) extensions
D) signals
Question
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her ________.

A) human capital
B) process capital
C) social capital
D) structural capital
Question
According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?

A) They are open to changing their beliefs when confronted with contrary evidence.
B) They are very effective for activities that involve innovation or problem solving.
C) They make ineffective sales and marketing professionals.
D) They seek conformity and want to convince others of the wisdom of their beliefs.
Question
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

A) links
B) authoring
C) signals
D) extensions
Question
In McAfee's SLATES Enterprise 2.0 model, "L" stands for ________.

A) LAN
B) links
C) language
D) leader
Question
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.

A) signals
B) search
C) links
D) authoring
Question
A ________ is content structure that has emerged from the processing of many user tags in social media.

A) mashup
B) taxonomy
C) folksonomy
D) viral hook
Question
According to Gossieaux and Moran, which of the following activities are seekers of the truth most likely to facilitate?

A) human resources
B) operations
C) marketing
D) sales
Question
Which of the following is a significant risk of using social media for inbound and outbound logistics?

A) loss of control
B) loss of credibility
C) loss of privacy
D) loss of effectiveness
Question
A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario?

A) defenders of belief
B) seekers of the truth
C) proprietary community
D) gated community
Question
Which of the following statements is true of social CRM?

A) Customers likely to generate the most business get the most attention from the organization.
B) All the customer relationship processes in social CRM are structured and controlled.
C) Each customer crafts his or her own relationship with the company.
D) Though relationships emerge from joint activity, companies control the customers.
Question
In McAfee's SLATES Enterprise 2.0 model, "A" stands for ________.

A) auditing
B) alerts
C) authoring
D) announcements
Question
The primary risk of peer-to-peer support in the context of social media and customer service is ________.

A) loss of control
B) loss of credibility
C) lack of privacy
D) increase in expenses
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/120
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Social Media Information Systems
1
Employees who contribute to and manage social networking sites generate direct labor costs.
True
2
The primary risk of peer-to-peer support is loss of control.
True
3
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
False
4
Seekers of the truth are communities that share a common belief and form their hive around that belief.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
5
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
6
SM application providers mostly host their SM presence using elastic servers in the cloud.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
7
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
8
Social CRM supports those customers who are likely to generate the most business.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
9
Social CRM is more structured and controlled than traditional CRM.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
10
A viral hook induces users of an SM site to share a message with others.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
11
Content data is data and responses to data that are contributed by users and SM sponsors.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
12
Social networking procedures are more informal for SM sponsors than they are for social networking users.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
13
Social media sponsors are the companies that operate SM sites.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
14
Content data differentiates SMIS from Web site applications.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
15
Defenders of belief facilitate activities like sales and marketing.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
16
The number of second- and first-tier community members in a social media site reduces exponentially.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
17
Social media sponsors may or may not pay a fee, depending on the application and on what they do with it.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
18
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
19
SM sponsors contribute to SM sites via browsers or by using specialized sponsor applications provided by the SM application provider.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
20
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
21
When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
22
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
23
Seekers of the truth will seek the truth, even if that means recommending a certain vendor's product over another vendor's.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
24
A person can gain more social capital by strengthening relationships with people who control resources that are important to him or her.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
25
According to the SEAMS process, social monitoring services are primarily used for measuring activities.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
26
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
27
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
28
Unlike humans, organizations do not have social capital.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
29
Social capital does not depreciate.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
30
In McAfee's SLATES Enterprise 2.0 Model, "E" stands for enterprise.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
31
Key users submit ideas and responses to nonkey users for publication in communities.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
32
Web 2.0 used free content and free software as the principal means to attract viewers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
33
Web 2.0 includes Web-delivered services and content that are paid for by users.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
34
Homesourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
35
SMIS restricts word-of-mouth sales.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
36
Web 2.0 enables advertisers to know the percentage of viewers who click an ad.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
37
The multiplicative nature of social capital means that the value of a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
38
According to Gossieaux and Moran, a hyper-social organization focuses on managing and influencing customers rather than creating relationships.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
39
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
40
A person who sees an interesting feature in an SM presence and sends a link to that feature to friends is an active lurker.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
41
SM communities differ from communities in the past in that they are ________.

A) formed based on family relationships
B) limited by geographic location
C) formed based on mutual interests
D) limited by organizational boundaries
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
42
________ is the use of information technology to support the sharing of content among networks of users.

A) Social media
B) Content publishing
C) Multimedia
D) Programming
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
43
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
44
A ________ is an information system that supports the sharing of content among networks of users.

A) human resource information system (HRIS)
B) social media information system (SMIS)
C) database management system (DBMS)
D) transaction processing system (TPS)
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
45
If a reasoned, nondefensive response generates continued and unreasonable UGC from the same source, it is best to respond to or delete the problematic content.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
46
________ are organizations that choose to support a presence on one or more SM sites.

A) Social media application providers
B) Social media sponsors
C) Seekers of the truth
D) Defenders of belief
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
47
User-generated content (UGC) is the essence of SM relationships.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
48
When a problematic content causes an organization to do something positive as a result, it is best for the organization to ignore the issue without responding to the content.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
49
A characteristic of Web 2.0 is that the value of a site increases with an increase in users and use.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
50
Web 2.0 avoids mashups.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
51
When a business opens its site to user-generated content (UGC), it protects itself from misguided people who post junk unrelated to the site's purpose.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
52
One of the major sources of UGC problems is inappropriate content.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
53
Most SM applications earn their revenue through ________.

A) a licensing model
B) a franchising model
C) advertisements
D) merchandising
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) ________ is an inducement that is awarded to social media users for passing communications along through different tiers of communities in social media.

A) network motif
B) viral hook
C) folksonomy
D) internet meme
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
55
The storage of ________ differentiates SMIS from Web site applications.

A) secondary data
B) content data
C) connection data
D) continuous data
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is an SM application provider?

A) Oracle
B) SAP
C) McAfee
D) LinkedIn
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
57
Deleting legitimate negative comments can result in a strong user backlash.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
58
An example of a mashup is Google's My Maps in which Google provides tools for users to make custom modifications to those maps.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
59
________ are the companies that operate SM sites.

A) SM application providers
B) SM sponsors
C) Seekers of the truth
D) Defenders of belief
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
60
Data and responses to data that are contributed to SM sites by users and SM sponsors are referred to as ________.

A) secondary data
B) content data
C) connection data
D) continuous data
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is a risk associated with human resources when using social media to form conclusions about employees?

A) loss of privacy of the employees
B) loss of control over the employees
C) decrease in efficiency of the evaluation process
D) possibility of error on the site
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
62
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

A) social capital
B) human capital
C) structural capital
D) process capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
63
Defenders-of-belief communities facilitate activities like ________.

A) customer service functions
B) manufacturing and operations
C) inbound logistics
D) sales and marketing
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
64
________ is the application of social media to facilitate the cooperative work of people inside organizations.

A) Enterprise 2.0
B) Enterprise resource planning
C) Enterprise application integration
D) Enterprise architecture
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
65
________ is the dynamic social media process of employing users to participate in product design or product redesign.

A) Crowdsourcing
B) Outsourcing
C) Homesourcing
D) Farmshoring
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
66
A student invests money and time in a business administration course. In this example, the student invests in ________.

A) human capital
B) social capital
C) structural capital
D) process capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
67
According to Gossieaux and Moran, a common desire to learn something, solve a problem, or make something happen is shared by ________.

A) defenders of belief
B) proprietary communities
C) gated communities
D) seekers of the truth
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following components of McAfee's Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, etc.?

A) search
B) authoring
C) extensions
D) signals
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
69
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her ________.

A) human capital
B) process capital
C) social capital
D) structural capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
70
According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?

A) They are open to changing their beliefs when confronted with contrary evidence.
B) They are very effective for activities that involve innovation or problem solving.
C) They make ineffective sales and marketing professionals.
D) They seek conformity and want to convince others of the wisdom of their beliefs.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
71
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

A) links
B) authoring
C) signals
D) extensions
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
72
In McAfee's SLATES Enterprise 2.0 model, "L" stands for ________.

A) LAN
B) links
C) language
D) leader
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
73
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.

A) signals
B) search
C) links
D) authoring
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
74
A ________ is content structure that has emerged from the processing of many user tags in social media.

A) mashup
B) taxonomy
C) folksonomy
D) viral hook
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
75
According to Gossieaux and Moran, which of the following activities are seekers of the truth most likely to facilitate?

A) human resources
B) operations
C) marketing
D) sales
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following is a significant risk of using social media for inbound and outbound logistics?

A) loss of control
B) loss of credibility
C) loss of privacy
D) loss of effectiveness
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
77
A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario?

A) defenders of belief
B) seekers of the truth
C) proprietary community
D) gated community
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following statements is true of social CRM?

A) Customers likely to generate the most business get the most attention from the organization.
B) All the customer relationship processes in social CRM are structured and controlled.
C) Each customer crafts his or her own relationship with the company.
D) Though relationships emerge from joint activity, companies control the customers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
79
In McAfee's SLATES Enterprise 2.0 model, "A" stands for ________.

A) auditing
B) alerts
C) authoring
D) announcements
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
80
The primary risk of peer-to-peer support in the context of social media and customer service is ________.

A) loss of control
B) loss of credibility
C) lack of privacy
D) increase in expenses
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 120 flashcards in this deck.