Javascript required
Skip to content Skip to sidebar Skip to footer

Peer Reviewed Articles Danger of Social Media for Businesses

The ubiquity of social media has had a profound issue on the way we communicate and is of significant importance to order and business organization. Social media tools have helped break downwards geographical barriers that once restricted communication and take led to an explosion of e-participation, virtual presence, and online communities. Professional person benefits of social media include sharing of information, publicity, and giving and receiving support and advice (AlAlwan et al. 2017; Dwivedi et al. 2015, 2017a; Kapoor and Dwivedi, 2015; Kapoor et al. 2016; Mills et al. 2009; Feather et al. 2016). Consumers take go increasingly empowered to exert an influence on brands through online communities, while businesses are able to larn rapid feedback and garner insight into individual preferences without observer effects (AlAlwan et al. 2017; Ismagilova et al. 2017; Kapoor et al. 2016; Plume et al. 2016) and use such data for new product development (Rathore et al. 2016). Social media tools also enable citizens to share communication and information with their local community (Oh et al., 2013), from promoting events to searching for lost pets, and aids government appointment with citizens (Alryalat et al. 2017).

The radical transformation of communication that has been enabled past social media presents a fascinating environment for academics from all backgrounds. People browse and contribute to their social media accounts regularly using smart devices; some people even prefer to communicate using social media rather than participating in face-to-face interaction. Nevertheless communication using social media might be more than challenging as emotions can be difficult to observe and encompass. Furthermore, the anonymity granted through social media facilitates harmful and socially unacceptable behaviours such as cyberbullying.

The volume of valuable datasets available through social media applications has led to the emergence of automated techniques and systems that can analyse the 'big data' generated. Analytics help businesses to ensure their social media activities are adding value and helping to accomplish business goals. Analysis of social media content tin can as well help to safeguard lodge from organized crime but such uses remain a delicate effect. There are as well risks of using social media analysis in terms of generalizability, as people might prefer different social media or refrain from social media entirely, which could result in bias and even cartoon of the wrong conclusions.

With seemingly endless benefits it is easy to overlook the disadvantages of social media, which are an increasingly important consideration as social media platforms continue to proliferate. Social media has facilitated a loss of buying and control of content as individual, public and institutional domains progressively overlap. There is a need for careful balancing of professionalism and freedom of speech to ensure that posts do not cause offence or harm reputations. The quality of social media content is diverse, ranging from facts to 'fake news'. Inaccurate information can spread around the world within a very curt fourth dimension and influence perceptions and opinions of people negatively. Other drawbacks include time pressure, plagiarism, misrepresentation, addiction, and negative psychological consequences. While providing a ways to protect public safety, social media besides provides a means of threatening information technology and enabling new forms of cyber-crime and even cyberwarfare. Social media has also been used by terrorists for opportunistic decision making in volatile and extreme environments (Oh et al. 2011). Considering the threat posed past social media for security and prophylactic, now governments of some countries, such every bit South Korea, are starting to innovate Internet surveillance (Kwon & Rao, 2017).

This special issue of ISF aimed to bring together a multifariousness of disciplines and a community for the advancement of knowledge regarding the adoption, use, touch on, and potential of social media. To achieve this goal, literature review, theoretical and empirical papers employing quantitative and/or qualitative methods were welcomed for consideration. The nine manufactures accepted for inclusion in this special event are briefly summarised below; they take examined a diverse range of problems related to social media past employing either qualitative, quantitative, analytical or theoretical approaches.

The offset three articles of this special consequence have adopted a qualitative approach to examine issues of cocky-disclosure (Richey et al. 2018), organisational competitiveness (Kwayu et al. 2018), and tackling and improving Big Data of variable data quality (Wahyudi et al. 2018).

Richey et al.'s article (The Perils and Promises of Self-Disclosure on Social Media) adopted the dramaturgical vocabulary of Goffman (1959) to shed light on how individuals cope with increased levels of self-disclosure on social media. This report argues that self-presentations of professionals on social media tin can be likened to post-modern performances in which the traditional boundaries betwixt actor and audition are intentionally unsettled. These coincidental posts communicate additional personal traits that are not otherwise included in professional presentations. Since there are no strict boundaries betwixt formal front-phase and relaxed back-phase regions in these types of performance, a liminal mental state is often used, which enables a meliorate assessment of the type of data to present on social media (Richey et al. 2018).

Kwayu et al.'south article (Enhancing Organisational Competitiveness Via Social Media - a Strategy as Practice Perspective) argues that the affordances, popularity and pervasive utilise of social media platforms such every bit Facebook, Twitter and Instagram have made these platforms bonny to organisations for enhancing their competitiveness and creating business organisation value. Despite this apparent significance of social media for businesses, they are struggling with the development of a social media strategy as well as agreement the implications of social media on exercise within their organisations. Considering the above arguments as a footing, this article explored how social media has become a tool for competitiveness and its influence on organisational strategy and exercise. The study utilised the 'strategy as exercise' lens and an interpretivist approach for conducting an empirical case of a telecom organisation in Tanzania. The results of this study show that social media is having an touch on on competitiveness through faux and production development. The results reported in this study also propose how social media affects the practices within an organisation, consequently making the social media strategy an emergent miracle (Kwayu et al. 2018).

In Wahyudi et al.'south commodity, entitled "A Process Pattern Model for Tackling and Improving Big Data of Variable Data Quality", the authors fence that social media data seldom create value by themselves. Social media data need to be linked and combined from multiple sources, which frequently have variable data quality. Many organizations are struggling to ameliorate the data quality and the tasks of improving the quality of social media data is a recurring challenge. For this, a practical situation is analyzed to derive patterns for improving information quality. A procedure pattern model is defined by the authors as a proven series of activities, aimed at improving the data quality given a certain context, a detail objective, and a specific set up of initial conditions. Four different patterns to deal with the variations in information quality of datasets have been identified in this study. Instead of having to find a way to better the quality of big information for each state of affairs, the procedure model (presented in this report) provides data users with generic patterns, which tin can be used as a reference model to ameliorate big information quality (Wahyudi et al. 2018).

The next three studies of this special issue have adopted a survey based quantitative approach to explore the sharing of sponsored advertisements (Plume and Slade al. 2018), sharing political content (Hossain et al. 2018), and impact of social media on consumers' acculturation and purchase intentions (Kizgin et al. 2018).

Feather and Slade (Sharing of Sponsored Advertisements on Social Media: A Uses and Gratifications Perspective) employed Uses and Gratifications theory to determine salient motivations for users' intentions to share sponsored advertisements in the tourism context. Analysis of survey data (n = 487) revealed that altruism, entertainment, socialising, and information seeking are the significant positive drivers of intention to share tourism related sponsored advertisements on Facebook. Notably, data sharing was plant to have a negative consequence, while self-expression had no significant issue. Results also determined that there were no significant differences in motivations betwixt males and females (Plume and Slade 2018).

In Hossain et al.'due south commodity (Sharing Political Content in Online Social Media: A Planned and Unplanned Behaviour Approach) the authors empirically examined factors related to planned and unplanned behaviour to empathize why people share political content in online social media. Based on an online survey of 257 social media users, results of this written report demonstrate that the factors representing both planned (i.e., perceived social recognition and altruistic motivation) and unplanned behaviour (i.e., extroversion and impulsiveness) affect people'southward political content sharing behaviour. This study argues that sharing political content is non like sharing other forms of content such every bit tourist attractions as the former can provoke serious penalization in some countries. The study also plant that the trait 'impulsiveness' is negatively associated with political content sharing behaviour. It is also establish that commonage opinion moderates people's planned behaviour simply not their unplanned behaviour, which means that the personality traits are unaffected by others' opinions, but traits that humans can command can be shaped by others (Hossain et al. 2018).

Kizgin et al. ("The Bear upon of Social Media on Consumers' Acculturation and Buy Intentions") argue that social media has emerged equally a significant and effective ways of assisting and endorsing activities and communications amongst peers, consumers and organizations that outdo the restrictions of time and infinite. Based on review of existing literature, this article suggests that while some of the existing work on social media has best-selling the part of agents of culture alter, there is still a lack of agreement regarding the role of social media in influencing acculturation outcomes and consumption choices. This written report employed a self-administered questionnaire to collect data from 514 Turkish-Dutch respondents to examine how their employ of social media affects their acculturation and consumption choices. The results suggest that social media is a vital means of culture change and a commuter of acculturation strategies and consumption choices (Kizgin et al. 2018).

The next article by Aswani et al., entitled "Detection of Spammers in Twitter Marketing: A Hybrid Arroyo Using Social Media Analytics and Bio Inspired Calculating", employed an analytical approach. The authors proposed a hybrid approach for identifying spam profiles past combining social media analytics and bio inspired computing. The study adopted a modified K-Means integrated Levy Flight Firefly Algorithm (LFA) with cluttered maps as an extension to Firefly Algorithm (FA) for spam detection in Twitter marketing. The written report analysed a total of 18,44,701 tweets from 14,235 Twitter profiles on xiii statistically significant factors that were derived from social media analytics. A Fuzzy C-Means Clustering technique was used to identify the overlapping users in two clusters of spammers and non-spammers. Half dozen variants of K-Means integrated FA including chaotic maps and levy flights were tested. The results of this study suggest that FA with chaos for tuning attractiveness coefficient using Gauss Map converges to a working solution the fastest. Farther, LFA with chaos for tuning the assimilation coefficient using sinusoidal map outperforms the residual of the approaches in terms of accuracy (Aswani et al. 2018).

The final 2 studies (Kapoor et al. 2018; Muhammad et al. 2018) in this special issue are exhaustive reviews of existing literature focussed on digital and social media.

The article by Kapoor et al. (Advances in Social Media Research: By, Present and Future), discusses the findings of 132 papers (published in selected IS journals between 1997 and 2017) on social media and social networking sites. Nigh papers reviewed in this article examined the behavioural side of social media, investigated the aspect of reviews and recommendations, and explored integration of social media for organizational purposes. The review revealed that existing studies on social media have as well investigated the viability of online communities/social media as a marketing medium and accept explored various aspects of social media, including the risks associated with its utilize, the value that it creates, and the negative stigma attached to it within workplaces. The use of social media for information sharing during critical events equally well every bit for seeking and/or rendering help has also been investigated in prior research. Other contexts include political and public assistants, and the comparison between traditional and social media. This work also identified theories and models (such as social role theory, game theory, structural holes theory, management and delivery theories, institutional theory, deterrence and mitigation theories, and cocky determination and self categorization theories) in social media research as well as noted that widely utilised IS/IT adoption theories such as Unified Theory of Acceptance and Utilise of Technology (Dwivedi et al. 2017b, c; Venkatesh et al. 2003), Technology Acceptance Model (Davis 1989) and Innovation Diffusion Theory (Kapoor et al. 2014a,b) are less widely utilised. Overall, this review commodity has identified multiple emergent themes in the existing corpus. The integrated view of the extant literature that this study has presented can assist avoid duplication by hereafter researchers, whilst offering fruitful lines of enquiry to aid shape research for this emerging field (Kapoor et al. 2018).

The 2nd review article by Muhammad et al., entitled "Analysis of Factors that Influence Customers' Willingness to Leave Big Information Digital Footprints on Social Media: a Systematic Review of Literature", conducted a systematic review of extant literature (published betwixt 2002 to 2017) to place and analyse the underlying factors that influence customers' willingness to leave digital footprints on social media. The primary consequence from this review is the decision that personal behaviour (intrinsic psychological dispositions), technological factors (relative advantage and convenience), social influence (social interaction, social ties and social support) and privacy and security (risk, command and trust) are the key factors that influence customers' willingness to generate and exit big data digital footprints on social media. The conceptual framework presented in this paper is likely to advance the scholarship of technology adoption and use, and provides useful directions for hereafter empirical enquiry for both academics and practitioners (Muhammad et al. 2018).

This special issue has evolved from research presented during the WG 6.11 15th IFIP e-Business organization, east-Services, and e-Society (I3E) Conference which was hosted at the School of Management, Swansea Academy, UK in September 2016. The conference invited the following ii types of submissions: full-length enquiry papers and brusque papers for 'research in progress'. The telephone call for papers attracted more than than 100 submissions, representing a broad international cross-section of authors. These submissions were reviewed rigorously by at least two independent reviewers which resulted in selection of the final set of papers that appeared in the bullheaded peer-review briefing proceedings. Further particular nigh the content of the conference proceedings can be institute in Dwivedi et al. (2016).

5 papers were selected from the I3E2016 conference for consideration for publication in this special issue of Data Systems Frontiers. The following guidelines were used for selection of these articles. We identified a set of papers with substantial empirical content and theoretical contribution that represented the range of issues bearing on the conference theme. The results of the peer-review process for the briefing influenced our selection decisions. Initially, authors of shortlisted papers were provided with feedback outlining suggestions for improving and extending their papers. The revised and substantially extended versions were submitted online, and each submission went through two-to-three rounds of farther reviews involving three reviewers each. The remaining four papers included in this special issue were submitted in response to an open up call for papers. These papers were as well subjected to two-to-3 rounds of reviews involving three reviewers each.

References

  • AlAlwan, A., Rana, N. P., Dwivedi, Y. K., & Algharabat, R. (2017). Social Media in Marketing: A review and analysis of the existing literature. Telematics and Informatics, 34(vii), 1177–1190.

    Article  Google Scholar

  • Alryalat, M., Rana, N. P., Sahu, Grand. P., Dwivedi, Y. M., & Tajvidi, G. (2017). Use of social Media in Citizen-Axial Electronic Regime Services: A literature analysis. International Journal of Electronic Government Research, thirteen(3), 55–79.

    Commodity  Google Scholar

  • Aswani, R., Kar, A. Thousand., & Ilavarasan, P. V. (2018). Detection of spammers in twitter marketing: A hybrid approach using social media analytics and bio inspired computing. Data Systems Frontiers, xx(3). https://doi.org/10.1007/s10796-017-9805-eight.

  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of it. MIS Quarterly, xiii(three), 318–339.

    Article  Google Scholar

  • Dwivedi Y.G., Mäntymäki M., Ravishankar M.North., Janssen Thou., Cloudless M., Slade Due east.L., Rana North.P., Al-Sharhan S., & Simintiras A.C. (Eds.) (2016). Social media: The skillful, the bad, and the ugly. 15th IFIP WG 6.11 Briefing on e-Business, e-Services, and e-Lodge, I3E 2016, Swansea, UK, September thirteen–xv, 2016, proceedings (Vol. 9844).

  • Dwivedi, Y. K., Kapoor, K. K., & Chen, H. (2015). Social media marketing and advertizing. The Marketing Review, 15(three), 289–309.

    Article  Google Scholar

  • Dwivedi, Y. Yard., Rana, N. P., & Alryalat, G. (2017a). Affiliate marketing: An overview and analysis of emerging literature. The Marketing Review, 17(1), 33–50.

    Article  Google Scholar

  • Dwivedi, Y. One thousand., Rana, N. P., Jeyaraj, A., Clement, M., & Williams, M. D. (2017b). Re-examining the unified theory of credence and utilise of technology (UTAUT): Towards a revised theoretical model. Information Systems Frontiers. Available at. doi:https://doi.org/10.1007/s10796-017-9774-y.

  • Dwivedi, Y. Chiliad., Rana, North. P., Janssen, M., Lal, B., Williams, Grand. D., & Cloudless, G. (2017c). An empirical validation of a unified model of electronic authorities adoption (UMEGA). Authorities Information Quarterly, 34(2), 211–230.

    Article  Google Scholar

  • Hossain, M. A., Dwivedi, Y. K., Chan, C., Standing, C., & Olanrewaju, A. S. (2018). Sharing political content in online social media: A planned and unplanned behaviour approach. Information Systems Frontiers, 20(3). https://doi.org/10.1007/s10796-017-9820-9.

  • Ismagilova, E., Dwivedi, Y. One thousand., Slade, E. 50., & Williams, M. D. (2017). Electronic word of mouth (eWOM) in the marketing context: A country of the art analysis and time to come directions. Springer International Publishing.

  • Kapoor, K. Thousand., Tamilmani, 1000., Rana, N. P., Patil, P., Dwivedi, Y. K., & Nerur, Due south. (2018). Advances in social media research: Past, nowadays and hereafter. Information Systems Frontiers, twenty(3). https://doi.org/10.1007/s10796-017-9810-y.

  • Kapoor, K. K., Dwivedi, Y. K., & Piercy, N. (2016). Pay-per-click advertising: A literature review. The Marketing Review, xvi(2), 183–202.

    Commodity  Google Scholar

  • Kapoor, K. K., & Dwivedi, Y. Grand. (2015). Metamorphosis of Indian electoral campaigns: Modi's social media experiment. International Journal of Indian Culture & Business Direction, 11(4), 496–516.

    Commodity  Google Scholar

  • Kapoor, G. Thousand., Dwivedi, Y. K., & Williams, Thousand. D. (2014a). Innovation adoption attributes: A review and synthesis of research findings. European Journal of Innovation Direction, 17(three), 327–348.

    Commodity  Google Scholar

  • Kapoor, K. K., Dwivedi, Y. K., & Williams, M. D. (2014b). Rogers' innovation adoption attributes: A systematic review and synthesis of existing research. Information Systems Management, 31(i), 74–91.

    Article  Google Scholar

  • Kizgin, H., Jamal, A., Dey, B. L., & Rana, N. P. (2018). The impact of social media on consumers' acculturation and purchase intentions. Information Systems Frontiers, 20(3). https://doi.org/10.1007/s10796-017-9817-4.

  • Kwon, K. H., & Rao, H. R. (2017). Cyber-rumor sharing nether a homeland security threat in the context of authorities internet surveillance: The example of Southward-Democratic people's republic of korea conflict. Authorities Information Quarterly, 34(2), 307–316.

    Commodity  Google Scholar

  • Kwayu, S., Lal, B., & Abubakre, Chiliad. (2018). Enhancing Organisational competitiveness via social media - a strategy as practice perspective. Data Systems Frontiers, 20(3). https://doi.org/10.1007/s10796-017-9816-5.

  • Mills, A., Chen, R., Lee, J., & Raghav Rao, H. (2009). Web 2.0 emergency applications: How useful can twitter be for emergency response? Periodical of Data Privacy and Security, 5(iii), 3–26.

    Article  Google Scholar

  • Muhammad, Southward. S., Dey, B. L., & Weerakkody, V. (2018). Analysis of factors that influence customers' willingness to get out big data digital footprints on social media: A systematic review of literature. Data Systems Frontiers, 20(3). https://doi.org/10.1007/s10796-017-9802-y.

  • Oh, O., Agrawal, M., & Rao, H. R. (2013). Customs intelligence and social media services: A rumor theoretic analysis of tweets during social crises. MIS Quarterly, 37(2), 407–426.

    Commodity  Google Scholar

  • Oh, O., Agrawal, M., & Rao, H. R. (2011). Information control and terrorism: Tracking the Bombay terrorist attack through twitter. Information Systems Frontiers, thirteen(one), 33–43.

    Article  Google Scholar

  • Plume, C. J., & Slade, Eastward. L. (2018). Sharing of sponsored advertisements on social media: A uses and gratifications perspective. Information Systems Frontiers, 20(3). https://doi.org/10.1007/s10796-017-9821-viii.

  • Plume, C. J., Dwivedi, Y. K., & Slade, E. L. (2016). Social Media in the Marketing Context: A state of the fine art analysis and future directions (1st ed.). Oxford, Great britain: Chandos Publishing Ltd.

    Google Scholar

  • Rathore, A. One thousand., Ilavarasan, P. V., & Dwivedi, Y. K. (2016). Social media content and product co-creation: An emerging paradigm. Journal of Enterprise Information Management, 29(ane), seven–18.

    Commodity  Google Scholar

  • Richey, One thousand., Gonibeed, A., & Ravishankar, M. North. (2018). The perils and promises of self-disclosure on social media. Information Systems Frontiers, 20(iii). https://doi.org/10.1007/s10796-017-9806-7.

  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of data technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.

    Article  Google Scholar

  • Wahyudi, A., Kuk, G., & Janssen, Yard. (2018). A procedure pattern model for tackling and improving large data quality. Information Systems Frontiers, 20(3). https://doi.org/x.1007/s10796-017-9822-seven.

Download references

Acknowledgments

We would like to thank the Chief Editors, Prof. H. Raghav Rao and Prof. Ram Ramesh, of Information Systems Frontiers for providing the opportunity to organize this special event. The guest editors besides gratefully acknowledge the support of referees who reviewed the manuscripts submitted for possible publication in this special issue.

Author information

Affiliations

Corresponding author

Correspondence to Yogesh K. Dwivedi.

Rights and permissions

About this article

Verify currency and authenticity via CrossMark

Cite this commodity

Dwivedi, Y.K., Kelly, G., Janssen, G. et al. Social Media: The Expert, the Bad, and the Ugly. Inf Syst Front end 20, 419–423 (2018). https://doi.org/ten.1007/s10796-018-9848-5

Download commendation

  • Published:

  • Issue Date:

  • DOI : https://doi.org/10.1007/s10796-018-9848-5

helydiferathe.blogspot.com

Source: https://link.springer.com/article/10.1007/s10796-018-9848-5