Class Notes (1,100,000)
US (460,000)
KSU (2,000)
BMRT (50)
Lecture 48

BMRT 11009 Lecture Notes - Lecture 48: Goldbricking, Crowdsourcing, Videotelephony


Department
Business Management and Related Technologies
Course Code
BMRT 11009
Professor
Aviad Israli
Lecture
48

This preview shows page 1. to view the full 4 pages of the document.
SOCIAL MEDIA and EMPLOYER PRODUCTIVITY
Table 15.5 Social Media Benefits for Employers
SOCIAL MEDIA and INNOVATION
Crowdsourcing
Using the Internet and social media to enlist a group outside the organization for
help solving a problem; for example, to raise funds, organize competitions, for
recruitment.
Sales and brand recognition
Can increase product and service awareness.
Generate customer inquiry.
Reach customers on a global scale.
Foster promotion of local businesses.
Foster customers’ conversations about brands.
SOCIAL MEDIA and REPUTATION
One of the biggest dangers managers face is negative comments about the organization posted
by disgruntled customers or even employees.
Some tips for defusing or limiting the harm:
1. Create and enforce a social media policy for employees.
2. Appoint experienced managers to monitor your social media presence; respond
quickly and appropriately to negative posts.
3. Acknowledge that there is a problem.
4. Take the conversation offline if necessary.
DOWNSIDES of SOCIAL MEDIA:
CYBERLOAFING
Cyberloafing
A primary concern for employers in their adoption of social media is employees
accessing the Internet at work for personal use.
Some studies put the cost of cyberloafing at $85 billion per year in the United
States.
Software tools can reduce cyberloafing, limiting access or length of time used, or
both.
DOWNSIDES of SOCIAL MEDIA:
PHUBBING and FOMO
Phubbing
Microaggressions, or acts of unconscious bias, include a number of tiny but
repeated actions.
Phubbing is phone snubbing or ignoring those present in order to pay attention
to a mobile phone.
FOMO: Fear of missing out
Being out of touch with something happening on the social network.
DOWNSIDES of SOCIAL MEDIA:
CYBERTHREATS
Security threats
You're Reading a Preview

Unlock to view full version