Page 354 - Using MIS
P. 354

322       Chapter 8  Social Media Information Systems

                                       If the problematic content represents reasonable criticism of the organization’s prod-
                                    ucts or services, the best response may be to leave it where it is. Such criticism indicates
                                    that the site is not just a shill for the organization but contains legitimate user content. Such
                                    criticism also serves as a free source of product reviews, which can be useful for product
                                    development. For the criticism to be useful, the development team needs to know about it,
                                    so, as stated, processes to ensure that the criticism is found and communicated to the team
                                    are necessary.
                                       A second alternative is to respond to the problematic content. However, this alternative
                                    is dangerous. If the response can be construed in any way as patronizing or insulting to the
                                    content contributor, it can enrage the community and generate a strong backlash. Also, if the
                                    response appears defensive, it can become a public relations negative.
                                       In most cases, responses are best reserved for when the problematic content has caused the
                                    organization to do something positive as a result. For example, suppose a user publishes that he
                                    or she was required to hold for customer support for 45 minutes. If the organization has done
                                    something to reduce wait times, then an effective response to the criticism is to recognize it as
                                    valid and to state, nondefensively, what has been done to reduce wait times.
                                       If  a  reasoned,  nondefensive  response  generates  continued  and  unreasonable  UGC
                                    from that same source, it is best for the organization to do nothing. Never wrestle with a pig;
                                    you’ll get dirty, and the pig will enjoy it. Instead, allow the community to constrain the user.
                                    It will.
                                       Deleting content should be reserved for contributions that are inappropriate because they
                                    are contributed by crackpots, have nothing to do with the site, or contain obscene or other-
                                    wise inappropriate content. Deleting legitimate negative comments can result in a strong user
                                    backlash. In the early days of social media, Nestlé created a PR nightmare on its Facebook ac-
                                    count with its response to criticism it received about its use of palm oil. Someone altered the
                                    Nestlé logo, and in response Nestlé decided to delete all Facebook contributions that used that
                                    altered logo and did so in an arrogant, heavy-handed way. The result was a negative firestorm
                                    on Twitter. 42
                                       A sound principle in business is to never ask a question to which you do not want the an-
                                    swer. We can extend that principle to social networking; never set up a site that will generate
                                    content for which you have no effective response!


                                    Internal Risks from Social Media

                                    The increased adoption of social media has created new risks within organizations as well.
                                    These risks include threats to information security, increased organizational liability, and de-
                                    creased employee productivity.
                                       First, the use of social media can directly affect the ability of an organization to secure
                                    its information resources. For example, suppose a senior-level employee tweets, “Married 20
                                    years ago today in Dallas,” or “Class of 1984 reunion at Central High School was awesome,” or
                                    “Remembering my honeymoon to Hawaii.” All of these tweets provide attackers with the an-
                                    swers to password reset questions. Once attackers reset the user’s passwords, they could have
                                    full access to internal systems. Thus, seemingly innocuous comments can inadvertently leak
                                    information used to secure access to organizational resources. Unfortunately, it turns out that
                                    it’s not a good idea to tell everyone it’s your birthday because your date of birth (DOB) can be
                                    used to steal your identity.
                                       Employees using social media also can unintentionally (or intentionally) leak infor-
                                    mation  about  intellectual  property,  new  marketing  campaigns,  future  products,  potential




                                    42 Bernhard Warner, “Nestlé’s ‘No Logo’ Policy Triggers Facebook Revolt,” Social Media Influence, March 19, 2010,
                                    http://socialmediainfluence.com/2010/03/19/nestles-no-logo-policy-triggers-facebook-revolt/.
   349   350   351   352   353   354   355   356   357   358   359