EBK USING MIS
10th Edition
ISBN: 8220103633635
Author: KROENKE
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 8, Problem 8.15CS8
Explanation of Solution
Social media sites for the value chain activities:
The social media contributes to the five primary value chain activities and also human resources support activity. They are:
- Sales and marking
- Customer service
- Inbound and outbound logistics
- Manufacturing and operations
- Human resources
Sales and marketing:
It involves peoples from marketing sector and it will monitor and updates the pages on daily basic providing solutions to the questions of the customers.
- An example for the inbound logistics website is Amazon website.
Inbound logistics:
It involves the assets that are being needed in the social presence of the company over the social network platforms.
- An example for the inbound logistics website is Facebook...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Consider the pros and cons of requiring visitors to a website to provide as much personal information as they can and then storing that information.
discuss various ways social networking sites were used during the storming of the Capitol protests on January 6, 2021. Give specific examples in your answer.
What is the social responsibility of social media organizations in controlling fake news, misinformation, hate speech, and violence? Support your answer with at least one specific example of a recent news event.
Discuss the many different ways in which social networking platforms were used during the demonstrations that took place at the Capitol on January 6, 2021. In your response, include some particular instances.
Chapter 8 Solutions
EBK USING MIS
Ch. 8.3 - Prob. 1EGFQCh. 8.3 - Prob. 2EGFQCh. 8.3 - Prob. 3EGFQCh. 8.3 - Prob. 4EGFQCh. 8.4 - Prob. 1EGDQCh. 8.4 - Prob. 2EGDQCh. 8.4 - Prob. 3EGDQCh. 8.4 - Prob. 4EGDQCh. 8.4 - Prob. 5EGDQCh. 8.8 - Prob. 1SGDQ
Ch. 8.8 - Prob. 2SGDQCh. 8.8 - Prob. 3SGDQCh. 8.8 - Prob. 4SGDQCh. 8.8 - Prob. 8.1ARQCh. 8.8 - Prob. 8.2ARQCh. 8.8 - Prob. 8.3ARQCh. 8.8 - Prob. 8.4ARQCh. 8.8 - Prob. 8.5ARQCh. 8.8 - Prob. 8.6ARQCh. 8.8 - Prob. 8.7ARQCh. 8.8 - Prob. 8.8ARQCh. 8 - Prob. 8.1UYKCh. 8 - Prob. 8.2UYKCh. 8 - Prob. 8.3UYKCh. 8 - Prob. 8.4UYKCh. 8 - Prob. 8.5UYKCh. 8 - Prob. 8.6CE8Ch. 8 - Prob. 8.7CE8Ch. 8 - Prob. 8.1CS8Ch. 8 - Prob. 8.11CS8Ch. 8 - Prob. 8.12CS8Ch. 8 - Prob. 8.13CS8Ch. 8 - Prob. 8.14CS8Ch. 8 - Prob. 8.15CS8Ch. 8 - Using your answers to these questions, write a job...Ch. 8 - Prob. 8.17CS8Ch. 8 - Prob. 8.18MMLCh. 8 - Prob. 8.19MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- To this end, you should "do an analysis of methods for gathering evidence from social networking platforms."arrow_forwardIt is debatable whether or not Facebook users should be held responsible for any privacy concerns that arise from their usage of the platform. Explain?arrow_forwardDiscuss the role of Internet Service Providers (ISPs) in providing access to the Internet and their impact on net neutrality.arrow_forward
- Social networking websites are used by people of all ages to maintain relationships with their friends, family, and professional associates. As a result, many social network users are unaware about the ramifications of releasing a huge amount of personal data. How might the use of social media be used to assist in the process of social engineering?What steps may be taken by individuals and companies to ensure the security of their personal and private information?arrow_forwardWithin the scope of this investigation, we will investigate a variety of methods for extracting evidence from social media networks?arrow_forwardShow that you know your stuff by explaining what social networking sites are and how online forums and message boards function, and how they all relate to your area. When doing research on the web, what advantages do you see utilizing these resources?arrow_forward
- How responsible should Facebook users be for the security of the information they share on the platform, particularly if it concerns their private lives? Explain? .arrow_forwardWhat are the five drivers of social media engagement described in thearrow_forwardSocial Engineering is one of the most successful ways to attack and gain access to a network. How would you use the Social-Engineer Toolkit as one of your methods of reducing the effect of social engineering? Provide your response with a minimum of 150 words.arrow_forward
- Explore the concept of Internet censorship and the methods employed by governments and organizations to control online content. Provide examples of countries with strict Internet censorship policies.arrow_forward6. What are the three types of interventions Facebook uses to combat fake news on its platform? How do they work?arrow_forwarda) Conduct a quick investigation into two successful web firms that do not rely on advertising for income, and write a report on both of them.b) Locate a website that you believe is successful in establishing a strong online presence. What makes you believe this website is worthwhile? Find a website that does not, in your view, provide an effective digital presence. What are the issues with this website, and what can be done to fix them?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning