CMGT 554 Wk 5: Ch. 10 Video Exercise: Social Media Information Systems

0 items
CMGT 554 Wk 5: Ch. 10 Video Exercise: Social Media Information Systems
CMGT 554 Wk 5: Ch. 10 Video Exercise: Social Media Information Systems
$5.00
  • Description

CMGT 554 Wk 5: Ch. 10 Video Exercise: Social Media Information Systems

Watch the video and complete the short quiz in MyLab MIS®. This video provides an example of how a company should plan to use social media for business purposes. You will have unlimited attempts on the quiz.

As Mike explains to Valerie, which of the following is a significant risk of using social media?

 

A.

loss of connections

 

B.

decrease in social capital

 

C.

loss of effectiveness

 

D.

loss of privacy

 

E.

decrease in content

 

 

According to the information presented in this video, organizations have options for responding to problematic user-generated social media content that include all of the follow EXCEPT _____.

 

A.

leaving the content

 

B.

taking no action on the content

 

C.

responding to the content

 

D.

changing the content

 

E.

deleting the content

 

 

 

In this video dramatization, Valerie describes organizational guidelines for all of the following social media behaviors EXCEPT _____.

 

A.

abstain

 

B.

identify

 

C.

refrain

 

D.

respect

 

E.

protect

 

 

According to the information presented by one of the characters in this video, which of the following describes the refrain guideline of social media behavior?

 

A.

Make sure you clarify if views are personal or if they represent a company.

 

B.

Make sure you don’t disclose anything such as nonpublic information.

 

C.

Don’t post personal information.

 

D.

Don’t say anything threatening or discriminatory.

 

E.

Don’t use company resources such as logos, photos, company email, and so on, unless you have permission to use them.

 

 

According to Valerie, which of the following describes the identify guideline of social media behavior?

 

A.

Check a site’s privacy notice to identify its information practices.

 

B.

Choose the highest privacy setting possible to protect your identity.

 

C.

Use a pseudonym.

 

D.

Make sure you clarify if views are personal or if they represent a company.

 

E.

Limit use of superficial identity factors (e.g., age and gender) to maintain privacy.