學門類別
哈佛
- General Management
- Marketing
- Entrepreneurship
- International Business
- Accounting
- Finance
- Operations Management
- Strategy
- Human Resource Management
- Social Enterprise
- Business Ethics
- Organizational Behavior
- Information Technology
- Negotiation
- Business & Government Relations
- Service Management
- Sales
- Economics
- Teaching & the Case Method
最新個案
- A practical guide to SEC ï¬nancial reporting and disclosures for successful regulatory crowdfunding
- Quality shareholders versus transient investors: The alarming case of product recalls
- The Health Equity Accelerator at Boston Medical Center
- Monosha Biotech: Growth Challenges of a Social Enterprise Brand
- Assessing the Value of Unifying and De-duplicating Customer Data, Spreadsheet Supplement
- Building an AI First Snack Company: A Hands-on Generative AI Exercise, Data Supplement
- Building an AI First Snack Company: A Hands-on Generative AI Exercise
- Board Director Dilemmas: The Tradeoffs of Board Selection
- Barbie: Reviving a Cultural Icon at Mattel (Abridged)
- Happiness Capital: A Hundred-Year-Old Family Business's Quest to Create Happiness
Social networks and social media: Understanding and managing influence vulnerability in a connected society
內容大綱
Influence vulnerability has recently become a concern across society and in business. Such vulnerabilities increase as social networks are leveraged by different entities, oftentimes through social media, to affect how we think and behave. While many instances of social influence are positive and beneficial, others can be quite negative and lead to harmful outcomes for organizations and individuals such as reputational damage and an inability to control desirable thoughts, narratives, and behaviors, as well as decreasing people's freedom of thought and behavior. This article draws on the concepts of social embeddedness and network commitment to outline people's influence vulnerabilities. We then propose three guidelines to help reduce influence vulnerabilities based on the concepts of trustworthiness, network commitment, and self-management.