Abstract
Social media have a variety of use cases in CRM and Social CRM solutions vary considerably in scope and complexity. This chapter discusses four critical aspects for the implementation of Social CRM. First, businesses need to define their individual strategy towards Social CRM based on four generic options. Second, the organizational and the technological degree of integration indicates the sophistication of a chosen Social CRM approach. Third, the analytic technologies offer various degrees of automation with techniques of the semantic web requiring increasing investments in Social CRM. Fourth, regulations concerning privacy, copyright and competition aspects need to be taken into account.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Text mining combines “techniques from data mining, machine learning, natural language processing (NLP), information retrieval (IR), and knowledge management. Text mining involves the pre-processing of document collections (text categorization, information extraction, term extraction), the storage of the intermediate representations, the techniques to analyze these intermediate representations (such as distribution analysis, clustering, trend analysis, and association rules), and visualization of results.” (Feldman and Sanger 2006, p. x). Many of the statistical techniques, the intermediate representation as well as the visualization of results are known from the field of data mining, which focuses on the analysis of structured data.
- 2.
Ontologies are part of the semantic web investigation and may be characterized as “[…] a formal, explicit specification of a shared conceptualization” (Studer et al. 1998, p. 184). They create a common sense for a specific field of application.
- 3.
- 4.
Among the examples are the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, the Transborder Data Flow Contracts in the Wider Framework of Mechanisms for Privacy Protection on Global Networks, or the Policy Guidance for Digital Content.
- 5.
In general, this includes any natural person identified or identifiable by data (see Art. 4 GDPR). In the domain of Social CRM, this typically applies to all (potential) customers as well as users of social media platforms.
- 6.
An identifiable natural person is a data subject, who may be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
- 7.
References
Agichtein, E., Castillo, C., Donato, D., Gionis, A., & Mishne, G. (2008). Finding high-quality content in social media. In Proceedings of the 2008 International Conference on Web Search and Data Mining, ACM.
Alt, R., & Puschmann, T. (2004). Successful practices in customer relationship management. In 37th Hawaii International Conference on System Sciences (HICSS). https://doi.org/10.1109/HICSS.2004.1265415.
Alt, R., & Reinhold, O. (2012). Social customer relationship management (Social CRM)—Application and technology. Business & Information Systems Engineering, 4(5), 287–291.
Backhaus, D., & Nissen, O. (2014). Telekom hilft, Das A(lert)-Team—Beschwerdestimulation via digitalem Outbound [Telekom helps—The A(lert)-Team—Complain stimulation via digital outbound]. https://de.slideshare.net/fbmarket/telekom-hilft-das-alertteam-beschwerdestimulation-via-digitalem-outbound. Retrieved August 31, 2015.
Faase, R., Helms, R., & Spruit, M. (2011). Web 2.0 in the CRM domain: Defining Social CRM. International Journal of Electronic Customer Relationship Management, 5(1), 1–22.
Feldman, R., & Sanger, J. (2006). The text mining handbook: Advanced approaches in analysing unstructured data. Cambridge, MA: Cambridge University Press.
Forrester. (2017). The social marketing playbook for 2017. https://www.forrester.com/playbook/The+Social+Marketing+Playbook+For+2016/-/E-PLA124. Retrieved April 14, 2017.
Fromholz, J. M. (2000). The European Union data privacy directive. Berkeley Technology Law Journal, 15, 461–488.
Gibney, E. (2018). The scant science behind Cambridge Analytica’s controversial marketing techniques. https://www.nature.com/articles/d41586-018-03880-4. Retrieved April 20, 2018.
Greenwald, G. (2013). XKeyscore: NSA Tool Collects ‘Nearly Everything a User does on the Internet’. https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data. Retrieved April 20, 2018.
Grogan, S., & McDonald, A. M. (2016). Access denied! Contrasting data access in the United States and Ireland. Proceedings on Privacy Enhancing Technologies, 3, 191–211.
Lubowicka, K. (2018). First-party data marketing: 3 powerful use cases. https://piwik.pro/blog/first-party-data-3-powerful-use-cases/. Retrieved April 17, 2018.
Malthouse, E. C., Haenlein, M., Skiera, B., Wege, E., & Zhang, M. (2013). Managing customer relationships in the social media era: Introducing the Social CRM house. Journal of Interactive Marketing, 27(4), 270–280. https://doi.org/10.1016/j.intmar.2013.09.008.
Marx, S. (2011). Social media listening and engagement journey. https://blogs.cisco.com/socialmedia/social-media-listening-and-engagement-journey. Retrieved October 11, 2014.
Nijhawan, D. R. (2003). The emperor has no clothes: A critique of applying the European Union approach to privacy regulation in the Unites States. Vanderbilt Law Review, 56, 939–975.
Otto, B., Lee, Y. W., & Caballero, I. (2011). Information and data quality in networked business. Electronic Markets, 21(2), 79–81.
Reinhold, O., & Alt, R. (2012). Social customer relationship management: State of the art and learnings from current projects. In Proceedings of the 25th Bled eConference eDependability: Reliable and Trustworthy eStructures, eProcesses, eOperations and eServices for the Future, Bled.
Rigby, D. K., Reichheld, F. F., & Schefter, P. (2002). Avoiding the four perils of CRM. Harvard Business Review on Customer Relationship Management, 80(2), 101–109.
Studer, R., Benjamins, R., & Fensel, D. (1998). Knowledge engineering: Principles and methods. Data Knowledge Engineering, 25(1–2), 161–198.
Weiss, M. A., & Archick, K. (2016). U.S.-EU data privacy: From safe harbor to privacy shield. Washington D.C.: Congressional Research Service.
Zuckerberg, M. (2019). A privacy-focused vision for social networking. https://www.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/. Retrieved June 3, 2019.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alt, R., Reinhold, O. (2020). Social CRM: Challenges and Perspectives. In: Social Customer Relationship Management. Management for Professionals. Springer, Cham. https://doi.org/10.1007/978-3-030-23343-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-23343-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23342-6
Online ISBN: 978-3-030-23343-3
eBook Packages: Business and ManagementBusiness and Management (R0)