Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
________ is the application of social media to
facilitate the cooperative work of people inside organizations.
The Web 2.0 business model relies on _______
To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
Strength of a realtionship
Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?
Possibility of error
Highest advertising revenue is generated from ________.
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not
change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
________ measures the frequency that someone who clicks on an ad makes a purchase, Likes a site, or takes some other action desired by the advertiser.
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
Deleting problematic content on social networking sites is best reserved for when ________.
The content is obscene and inappropriate
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.
Web 2.0 companies provide software _______.
As a free service
A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Defenders-of-belief communities facilitate activities like ________.
Sales and marketing
Which of the following best represents the value of social capital?
Number of Relationships X Relationship Strength X Entity Resources
Web 2.0 as Web-delivered services and content that are paid for by ________.
A characteristic of Web 2.0 is that the value of a Web site increases ________.
With the number of users
A ________ is content structure that has emerged from the processing of many user tags.
The first step that any hypersocial organization should take is to develop and publicize a(n) ________ policy.
Which of the following revenue model is followed by companies providing Web 2.0 services?
Pay per click
Which of the following is a significant risk of using social media for inbound and outbound logistics?
Loss of privacy
________ is the essence of SM relationships.
Which of the following observations is true about a hypersocial organization?
It creates relationships in which both parties perceive and gain value
Which of the following statements is true of defenders-of-belief communities?
They seek conformity and want to convince others of the wisdom of their belief
Emergence in the context of management means loss of control of ________.
Which of the following is true of the model of
social media developed by Gossieaux and Moran?
It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.
Which of the following activities would seekers of the truth facilitate?
________ differentiates SMIS from Web site applications.
Social capital depreciates, but such depreciation can be ameliorated by ________.
Adding something of value to the interaction
Being linked to a network of highly regarded contacts is a form of ________.
SM communities differ from communities in the past because SM communities are ________.
Formed based on mutual interests
________ is the use of information technology to support the sharing of content among networks of users.
________ is data and responses to data that are contributed by users and SM sponsors.
A ________ is an inducement for passing the message along through the tiers.
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.
Which of the following is an SM application provider?
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.
Seekers of the truth
The primary risk of peer-to-peer support is ________.
Loss of control
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component.
If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.
A student invests money and time in taking a business administration course. In this example, the student invests in ________.
Which of the following describes the meaning of "sense" activity, in the SEAMS dynamic
The communities which are important to a person
Which of the following is one of the main principles used by companies implementing Web 2.0 to attract viewers?
Web 2.0 encourages ________, which occur when the output from two or more Web sites is combined into a single user experience.
A social media policy is a statement ________.
That delineates employee's rights and responsibilities
Responding to problematic content on social networking sites is best reserved for when ____.
The problematic content has caused the organization to do something positive as a result