56
Social Media Information Systems Chapter 8

kroenke umis9e inppt 08 - student.bus.olemiss.edustudent.bus.olemiss.edu/files/Conlon/mis309/Lectures/Slides/... · • Think about ways to apply new, ... • Yammer - enterprise

Embed Size (px)

Citation preview

Social Media Information Systems

Chapter 8

8-2

“It’s All About Eyeballs”

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Repurpose PRIDE to be more profitable.• “Eyeballs” & clicks generates revenue. • Will PRIDE handle large number of users?• Need to describe potential to vendors.• Think about details of how system will function before

estimating development costs or project timeline.

8-3

PRIDE Application Prototype

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Generating revenue from social media applications difficult.• Not all social media applications involve Facebook or Twitter.• It's all marketing.• Think about ways to apply new, emerging technology to

accomplish business organizational strategies.

8-4

Study Questions

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

Q1: What is a social media information system (SMIS)?Q2: How do SMIS advance organizational strategy?Q3: How do SMIS increase social capital?Q4: How do (some) companies earn revenue from social media?Q5: How do organizations develop an effective SMIS?Q6: What is an enterprise social network (ESN)?Q7: How can organizations address SMIS security concerns? Q8: 2026?

8-5

Q1: What Is A Social Media Information System (SMIS)?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Social media (SM) – IT for sharing content among networks of users.– Enables communities of practice.People related by a common interest.

• Social media information system (SMIS) – Sharing content among networks of users.

8-6

Convergence of Many Disciplines

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-7

Number of Social Media Active Users

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-8

Three SMIS Roles

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Social Media Providers– Facebook, Google+, LinkedIn, Twitter, Instagram, and Pinterest

platforms.– Attracting, targeting demographic groups.

• Users– Individuals and organizations.

• Communities– Mutual interests that transcend familial, geographic, and

organizational boundaries.

8-9

SM User Communities

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-10

Social Media Application Providers

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Facebook, Twitter, LinkedIn, Google …• May charge fee, depending on application and purpose.

– Free company page on Facebook, but ...– Fee to advertise to communities that “Like” that page.

• Internal SM using SharePoint for wikis, discussion board, photo sharing.

8-11

Five Components of SMIS

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-12

SMIS Is Not Free

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Costs to develop, implement, manage social networking procedures.

• Direct labor costs.• 92% of companies use social media to recruit employees (93%

from LinkedIn).• 73% hired using social media,

1/3 rejected candidates because of social profile.

8-13

Q2: How Do SMIS Advance Organizational Strategy?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Strategy determines value chains, – Value chains determine business processes.– Processes determine SMIS requirements.

• How do value chains determine dynamic processes?– Dynamic process flows cannot be designed or diagrammed.

• SM fundamentally changes balance of power among users, communities, and organizations.

8-14

SM in Value Chain Activities

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-15

Social Media and the Sales and Marketing Activity

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Dynamic, SM-based CRM process.• Social CRM

– Customers craft own relationship.Wikis, blogs, discussion lists, frequently asked questions, sites

for user reviews and commentary, other dynamic content.– Customers search content, contribute reviews and commentary,

ask questions, create user groups, etc.– Not centered on customer lifetime value.

8-16

Social Media and Customer Service

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Relationships emerge from joint activity, customers have as much control as companies.

• Product users freely help each other solve problems.• Selling to or through developer networks most successful.

– Microsoft's MVP program.• Peer-to-peer support risks loss of control.

8-17

Social Media and Inbound and Outbound Logistics

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Benefits– Numerous solution ideas and rapid evaluation of them.– Better solutions to complex supply chain problems.– Facilitates user created content and feedback among networks needed

for problem solving.

• Loss of privacy.– Open discussion of problem definitions, causes, and solution

constraints.– Problem solving in front of your competitors.

8-18

Social Media and Manufacturing and Operations

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Improves communication channels within organization and externally with consumers, design products, develop supplier relationships, and operational efficiencies.

• Crowdsourcing .• Businesses-to-consumer (B2C)• Youtube for posting videos of product reviews and testing, factory

walk-throughs.• Yammer - enterprise social networking service.

8-19

Social Media and Human Resources

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Employee communications using internal personnel sites.– Ex: MySite and MyProfile in SharePoint.

• Finding prospective employees, recruiting and evaluating candidates.

• Place for employees to post their expertise.• Risks:

– Forming erroneous conclusions about employees.– Becoming defender of belief or pushing unpopular management

message.

8-20

Q3: How Do SMIS Increase Social Capital?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Capital– Investment of resources for future profit.

• Types of business capital– Physical capital: produce goods and services (factories,

machines, manufacturing equipment).– Human capital: human knowledge and skills investments. – Social capital: social relations with expectation of

marketplace returns.

8-21

What Is the Value of Social Capital?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Value of social capital Number of relationships, strength of relationships,

resources controlled.• Adds value in four ways

1. Information2. Influence 3. Social credentials4. Personal reinforcement

8-22

How Do Social Networks Add Value to Businesses?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

Progressive organizations:–Have Facebook, LinkedIn, Twitter, other SN sites. –Encourage customers and interested parties to leave

comments.–Risk – encouraging excessively critical feedback.–Klout score - measure of individual’s social capital.

8-23

Using Social Networking to Increase the Number of Relationships

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-24

Top YouTube Channels

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-25

Using Social Networks to Increase the Strength of Relationships

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Strength of a relationship– Likelihood other entity will do something that benefits your

organization.• Positive reviews, post pictures using organization’s products or

services, tweet about upcoming product releases, and so on.• Strengthen relationships by asking someone to do you a favor.• Frequent interactions strengthen relationships.

8-26

Using Social Networks to Connect to Thosewith More Resources

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Social Capital = Number of Relationships × Relationship Strength × Entity Resources.

• Huge network of people with few resources less valuable than a smaller network of people with substantial resources.

• Resources must be relevant.• Most organizations ignore value of entity assets.

8-27

So What?Facebook for Organizations… and Machines

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Chatter, by salesforce.com, to connect employees, customers.• Communities identify, solve problems more quickly, more

effectively. • Readily find, recruit needed experts within organization. • Faster project collaboration.• Internal-facing communities use social media to make

organizations better.

8-28

Ethics Guide: Synthetic Friends

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Army of bots for company SM.– Inflates follower count.

• “Click farms”– Form of click fraud.– Large group of low-paid workers hired to click on paid

advertising links for the click fraudster.• Attracts annoying spam accounts.• Then comes the purge.

8-29

Q4: How Do (Some) Companies Earn Revenue from Social Media?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Hyper-social organization – Transform interactions with customers, employees, and

partners into mutually satisfying relationships with them and their communities.

• You Are the Product.– “If you’re not paying, you’re the product.”– Renting your eyeballs to an advertiser.

• Monetize

8-30

Revenue Models for Social Media

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Advertising• Pay-per-click• Use increases value• Freemium

– Offers users a basic service for free, and then charges a premium for upgrades or advanced features.

• Sales - apps and virtual goods, affiliate commissions, donations.

8-31

Does Mobility Reduce Online Ad Revenue?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• By 2018, number of mobile devices to reach 10 billion.• Mobile data traffic increases eleven-fold.• Average click-through rate of smartphones is 4.12%, but just

2.39% on PCs.• Conversion rate

– Frequency someone clicks on ad makes a purchase, “likes” a site, or takes some other action desired by advertiser.

8-32

Does Mobility Reduce Online Ad Revenue? (cont'd)

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Paid search, display or banner ads, mobile ads, classifieds, or digital video ads.

• Use of ad-blocking software growing by 69% per year.

8-33

Mobile Ad Spending

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Mobile users click ads more often and generate more revenue.

• Design problem: How best to configure mobile experience to obtain legitimate clicks and conversions?

8-34

Q5: How Do Organizations Develop an Effective SMIS?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Focus on being cost leader or on product differentiation.• Industry-wide or segment focus.• Premeditated alignment of SMIS with organization’s strategy.• Next slide shows process of developing a practical plan to

effectively use existing social media platforms.

8-35

Social Media Plan

Development

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

KPI

8-36

Common SM Strategic Goals

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

Vanity metrics

8-37

Common SM Metrics

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

Minimize bounce rate

8-38

Q6: What Is an Enterprise Social Network (ESN)?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• ESN– Software platform uses SM to facilitate cooperative work of

people within an organization.– Improve communication, collaboration, knowledge sharing,

problem solving, and decision making.• Enterprise 2.0

– Use of emergent social software platforms within companies, or between companies, partners or customers.

8-39

Enterprise 2.0: McAffee's SLATES Model

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-40

Changing Communication

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Communication channels within corporations changed in equally dramatic ways.– Using ESNs, employees can bypass managers and post

ideas directly for CEO to read.– Quickly identify internal experts to solve unforeseen

problems.

8-41

Deploying Successful Enterprise Social Networks

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Organizations still learning how to use and deploy ESNs.• Develop strategic plan for using SM internally via same process

as used for external social media use.• Assess likelihood of employee resistance.

8-42

ESN Implementation Best Practices

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-43

Q7: How Can Organizations Address SMIS Security Concerns?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Develop and publicize social media policy.– Delineate employees’ rights and responsibilities.– Index to 100 different policies at Social Media Today.

• Intel's Three Pillars of SM Policies.1. Disclose2. Protect3. Use Common Sense

8-44

Intel’s Rules of Social Media Engagement

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

8-45

Managing the Risk of Inappropriate Content

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• User-generated content (UGC)• Problems from external sources

– Junk and crackpot contributions– Inappropriate content– Unfavorable reviews– Mutinous movements

• Monitor by employees or use outsource service (Bazaarvoice)

8-46

Responding to Social Networking Problems

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Leave it.–“Never wrestle with a pig; you’ll get dirty and the pig will

enjoy it.”• Respond to it.

–If it yields positive result.• Delete it.– Comments by crackpots, have nothing to do with the site, or

contains obscene or otherwise inappropriate content.

8-47

Internal Risks from Social Media

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Threats to information security, increased organizational liability, decreased employee productivity.

• Directly affect ability to secure information resources.• Seemingly innocuous comments inadvertently leak information

used to secure access to organizational resources. – Bad idea to tell everyone it’s your birthday because your

date of birth (DOB) can be used to steal your identity.

8-48

Internal Risks from Social Media (cont'd)

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Employees may inadvertently increase corporate liability when they use social media.– Sexual harassment liability.– Leak confidential information.

• Reduced employee productivity.– 64% of employees visit non-work-related Web sites each day. – Tumblr (57%), Facebook (52%), Twitter (17%), Instagram

(11%), and SnapChat (4%).

8-49

Q8: 2026?

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• New mobile devices with innovative mobile-device UX, coupled with dynamic and agile information systems based on cloud computing and dynamic virtualization.

• BYOD policy– Organization the endoskeleton, supporting the work of people

on the exterior.Employees craft own relationships with their employers.

• Non-routine cognitive skills more important.

8-50

Security Guide: Digital Is Forever

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• You can become a victim by transmitting personal information using an Internet connection.

• Stored on numerous servers and employer’s server farms.• In most cases, impossible to delete.

– Digital zombie.• Companies analyze everything you digitally say or do.

– Google scans contents of Gmail messages so it can serve you targeted ads, looks at search queries, sites you visit, and your Google profile.

8-51

Security Guide: Digital Is Forever (cont'd)

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Big Data = Big Money– Personal data illegally accessed by criminals and sold on

black market to other nefarious characters; or– Legally accessed by companies and sold to other companies.

• Steps to remove or mask their digital footprints.– Clearing cookies,– Encrypting email, – Avoid using real name– Using virtual networks mask their internet protocol

8-52

Guide: Developing Your Personal Brand

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• College recruiters look for evidence a student has “walked the talk.”

• Social media presence one component of a professional brand. – Traditional sources of personal branding, like personal

networks of face-to-face relationships, important.• Understand importance and value of personal brand.

8-53

Active Review

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

Q1: What is a social media information system (SMIS)?Q2: How do SMIS advance organizational strategy?Q3: How do SMIS increase social capital?Q4: How do (some) companies earn revenue from social media?Q5: How do organizations develop an effective SMIS?Q6: What is an enterprise social network (ESN)?Q7: How can organizations address SMIS security concerns? Q8: 2026?

8-54

Case Study 8: Sedona Social

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

• Sedona Chamber of Commerce hired you as manager of community social media.

• Provide advice and assistance to local businesses in development of social media sites and manage Sedona CoC’s social media presence.

• Begin by making suggestions on ways their SM site could be improved.

8-55

Pink Jeep Tours

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .

C o p y r i g h t © 2 0 1 7 P e a r s o n E d u c a t i o n , I n c .