Deck 8: Social Media Information Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/120
Play
Full screen (f)
Deck 8: Social Media Information Systems
1
Employees who contribute to and manage social networking sites generate direct labor costs.
True
2
The primary risk of peer-to-peer support is loss of control.
True
3
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
False
4
Seekers of the truth are communities that share a common belief and form their hive around that belief.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
5
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
6
SM application providers mostly host their SM presence using elastic servers in the cloud.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
7
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
8
Social CRM supports those customers who are likely to generate the most business.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
9
Social CRM is more structured and controlled than traditional CRM.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
10
A viral hook induces users of an SM site to share a message with others.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
11
Content data is data and responses to data that are contributed by users and SM sponsors.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
12
Social networking procedures are more informal for SM sponsors than they are for social networking users.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
13
Social media sponsors are the companies that operate SM sites.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
14
Content data differentiates SMIS from Web site applications.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
15
Defenders of belief facilitate activities like sales and marketing.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
16
The number of second- and first-tier community members in a social media site reduces exponentially.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
17
Social media sponsors may or may not pay a fee, depending on the application and on what they do with it.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
18
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
19
SM sponsors contribute to SM sites via browsers or by using specialized sponsor applications provided by the SM application provider.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
20
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
21
When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
22
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
23
Seekers of the truth will seek the truth, even if that means recommending a certain vendor's product over another vendor's.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
24
A person can gain more social capital by strengthening relationships with people who control resources that are important to him or her.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
25
According to the SEAMS process, social monitoring services are primarily used for measuring activities.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
26
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
27
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
28
Unlike humans, organizations do not have social capital.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
29
Social capital does not depreciate.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
30
In McAfee's SLATES Enterprise 2.0 Model, "E" stands for enterprise.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
31
Key users submit ideas and responses to nonkey users for publication in communities.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
32
Web 2.0 used free content and free software as the principal means to attract viewers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
33
Web 2.0 includes Web-delivered services and content that are paid for by users.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
34
Homesourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
35
SMIS restricts word-of-mouth sales.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
36
Web 2.0 enables advertisers to know the percentage of viewers who click an ad.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
37
The multiplicative nature of social capital means that the value of a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
38
According to Gossieaux and Moran, a hyper-social organization focuses on managing and influencing customers rather than creating relationships.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
39
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
40
A person who sees an interesting feature in an SM presence and sends a link to that feature to friends is an active lurker.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
41
SM communities differ from communities in the past in that they are ________.
A) formed based on family relationships
B) limited by geographic location
C) formed based on mutual interests
D) limited by organizational boundaries
A) formed based on family relationships
B) limited by geographic location
C) formed based on mutual interests
D) limited by organizational boundaries
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
42
________ is the use of information technology to support the sharing of content among networks of users.
A) Social media
B) Content publishing
C) Multimedia
D) Programming
A) Social media
B) Content publishing
C) Multimedia
D) Programming
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
43
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
44
A ________ is an information system that supports the sharing of content among networks of users.
A) human resource information system (HRIS)
B) social media information system (SMIS)
C) database management system (DBMS)
D) transaction processing system (TPS)
A) human resource information system (HRIS)
B) social media information system (SMIS)
C) database management system (DBMS)
D) transaction processing system (TPS)
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
45
If a reasoned, nondefensive response generates continued and unreasonable UGC from the same source, it is best to respond to or delete the problematic content.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
46
________ are organizations that choose to support a presence on one or more SM sites.
A) Social media application providers
B) Social media sponsors
C) Seekers of the truth
D) Defenders of belief
A) Social media application providers
B) Social media sponsors
C) Seekers of the truth
D) Defenders of belief
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
47
User-generated content (UGC) is the essence of SM relationships.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
48
When a problematic content causes an organization to do something positive as a result, it is best for the organization to ignore the issue without responding to the content.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
49
A characteristic of Web 2.0 is that the value of a site increases with an increase in users and use.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
50
Web 2.0 avoids mashups.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
51
When a business opens its site to user-generated content (UGC), it protects itself from misguided people who post junk unrelated to the site's purpose.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
52
One of the major sources of UGC problems is inappropriate content.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
53
Most SM applications earn their revenue through ________.
A) a licensing model
B) a franchising model
C) advertisements
D) merchandising
A) a licensing model
B) a franchising model
C) advertisements
D) merchandising
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) ________ is an inducement that is awarded to social media users for passing communications along through different tiers of communities in social media.
A) network motif
B) viral hook
C) folksonomy
D) internet meme
A) network motif
B) viral hook
C) folksonomy
D) internet meme
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
55
The storage of ________ differentiates SMIS from Web site applications.
A) secondary data
B) content data
C) connection data
D) continuous data
A) secondary data
B) content data
C) connection data
D) continuous data
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is an SM application provider?
A) Oracle
B) SAP
C) McAfee
D) LinkedIn
A) Oracle
B) SAP
C) McAfee
D) LinkedIn
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
57
Deleting legitimate negative comments can result in a strong user backlash.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
58
An example of a mashup is Google's My Maps in which Google provides tools for users to make custom modifications to those maps.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
59
________ are the companies that operate SM sites.
A) SM application providers
B) SM sponsors
C) Seekers of the truth
D) Defenders of belief
A) SM application providers
B) SM sponsors
C) Seekers of the truth
D) Defenders of belief
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
60
Data and responses to data that are contributed to SM sites by users and SM sponsors are referred to as ________.
A) secondary data
B) content data
C) connection data
D) continuous data
A) secondary data
B) content data
C) connection data
D) continuous data
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is a risk associated with human resources when using social media to form conclusions about employees?
A) loss of privacy of the employees
B) loss of control over the employees
C) decrease in efficiency of the evaluation process
D) possibility of error on the site
A) loss of privacy of the employees
B) loss of control over the employees
C) decrease in efficiency of the evaluation process
D) possibility of error on the site
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
62
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
A) social capital
B) human capital
C) structural capital
D) process capital
A) social capital
B) human capital
C) structural capital
D) process capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
63
Defenders-of-belief communities facilitate activities like ________.
A) customer service functions
B) manufacturing and operations
C) inbound logistics
D) sales and marketing
A) customer service functions
B) manufacturing and operations
C) inbound logistics
D) sales and marketing
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
64
________ is the application of social media to facilitate the cooperative work of people inside organizations.
A) Enterprise 2.0
B) Enterprise resource planning
C) Enterprise application integration
D) Enterprise architecture
A) Enterprise 2.0
B) Enterprise resource planning
C) Enterprise application integration
D) Enterprise architecture
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
65
________ is the dynamic social media process of employing users to participate in product design or product redesign.
A) Crowdsourcing
B) Outsourcing
C) Homesourcing
D) Farmshoring
A) Crowdsourcing
B) Outsourcing
C) Homesourcing
D) Farmshoring
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
66
A student invests money and time in a business administration course. In this example, the student invests in ________.
A) human capital
B) social capital
C) structural capital
D) process capital
A) human capital
B) social capital
C) structural capital
D) process capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
67
According to Gossieaux and Moran, a common desire to learn something, solve a problem, or make something happen is shared by ________.
A) defenders of belief
B) proprietary communities
C) gated communities
D) seekers of the truth
A) defenders of belief
B) proprietary communities
C) gated communities
D) seekers of the truth
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following components of McAfee's Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, etc.?
A) search
B) authoring
C) extensions
D) signals
A) search
B) authoring
C) extensions
D) signals
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
69
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her ________.
A) human capital
B) process capital
C) social capital
D) structural capital
A) human capital
B) process capital
C) social capital
D) structural capital
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
70
According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?
A) They are open to changing their beliefs when confronted with contrary evidence.
B) They are very effective for activities that involve innovation or problem solving.
C) They make ineffective sales and marketing professionals.
D) They seek conformity and want to convince others of the wisdom of their beliefs.
A) They are open to changing their beliefs when confronted with contrary evidence.
B) They are very effective for activities that involve innovation or problem solving.
C) They make ineffective sales and marketing professionals.
D) They seek conformity and want to convince others of the wisdom of their beliefs.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
71
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
A) links
B) authoring
C) signals
D) extensions
A) links
B) authoring
C) signals
D) extensions
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
72
In McAfee's SLATES Enterprise 2.0 model, "L" stands for ________.
A) LAN
B) links
C) language
D) leader
A) LAN
B) links
C) language
D) leader
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
73
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.
A) signals
B) search
C) links
D) authoring
A) signals
B) search
C) links
D) authoring
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
74
A ________ is content structure that has emerged from the processing of many user tags in social media.
A) mashup
B) taxonomy
C) folksonomy
D) viral hook
A) mashup
B) taxonomy
C) folksonomy
D) viral hook
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
75
According to Gossieaux and Moran, which of the following activities are seekers of the truth most likely to facilitate?
A) human resources
B) operations
C) marketing
D) sales
A) human resources
B) operations
C) marketing
D) sales
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following is a significant risk of using social media for inbound and outbound logistics?
A) loss of control
B) loss of credibility
C) loss of privacy
D) loss of effectiveness
A) loss of control
B) loss of credibility
C) loss of privacy
D) loss of effectiveness
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
77
A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario?
A) defenders of belief
B) seekers of the truth
C) proprietary community
D) gated community
A) defenders of belief
B) seekers of the truth
C) proprietary community
D) gated community
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following statements is true of social CRM?
A) Customers likely to generate the most business get the most attention from the organization.
B) All the customer relationship processes in social CRM are structured and controlled.
C) Each customer crafts his or her own relationship with the company.
D) Though relationships emerge from joint activity, companies control the customers.
A) Customers likely to generate the most business get the most attention from the organization.
B) All the customer relationship processes in social CRM are structured and controlled.
C) Each customer crafts his or her own relationship with the company.
D) Though relationships emerge from joint activity, companies control the customers.
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
79
In McAfee's SLATES Enterprise 2.0 model, "A" stands for ________.
A) auditing
B) alerts
C) authoring
D) announcements
A) auditing
B) alerts
C) authoring
D) announcements
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck
80
The primary risk of peer-to-peer support in the context of social media and customer service is ________.
A) loss of control
B) loss of credibility
C) lack of privacy
D) increase in expenses
A) loss of control
B) loss of credibility
C) lack of privacy
D) increase in expenses
Unlock Deck
Unlock for access to all 120 flashcards in this deck.
Unlock Deck
k this deck