{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:39:35Z","timestamp":1761197975210,"version":"3.41.2"},"reference-count":56,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T00:00:00Z","timestamp":1626739200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["OIR"],"published-print":{"date-parts":[[2022,3,9]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>While memory institutions' use of social media has proliferated, research and scholarly literature on risks, resulting from social media use, memory institutions' social media risk-aware culture and, in particular, social media risk management remains scant. This study addresses this knowledge gap and identifies aspects of social media risk management from other sectors that could inform the cultural heritage sector.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This research involves a review of the scholarly and professional literature that contribute to social media risk management discourses. These include those that discuss the different categories of social media risks, social media policies, risk-aware culture and social media risk management strategies and processes. Works discussing social media risk management models and frameworks are also included in the review. Based on the insights gained from these reviews, a pillar framework to guide social media risk management in memory institutions is developed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The proposed framework outlines the baseline components relevant for the cultural heritage sector and underlines the evolving and continual nature of these components. Elements particularly important to memory institutions are highlighted. Notably, that social risks as a risk category must be recognised. Also noted is that the conventional apolitical stance still taken by many memory institutions need to be reviewed. The importance of memory institutions to be not overly risk-averse to the point of failing to take advantage of the affordances of social media platforms, thereby stifling potential innovations around services and engagement with their users\/audience is discussed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This research offers an extensive review of the social media risk management literature, both scholarly and professional across different domains. The ensuing insights inform the development of a pillar framework to guide social media risk management in memory institutions. The framework outlines a baseline mapping of the governance, processes and systems components. The expectation is that this framework could be extended to account for contextual and situational requirements at more granular levels to reflect the nuances, variances and complexities that exist among different types of memory institutions and to account for varying attributes, mandates and priorities in the cultural heritage sector.<\/jats:p><\/jats:sec>","DOI":"10.1108\/oir-08-2020-0380","type":"journal-article","created":{"date-parts":[[2021,7,18]],"date-time":"2021-07-18T21:24:20Z","timestamp":1626643460000},"page":"375-390","source":"Crossref","is-referenced-by-count":1,"title":["Let's talk about risks: a pillar framework for social media risk management in memory institutions"],"prefix":"10.1108","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4293-4800","authenticated-orcid":false,"given":"Chern Li","family":"Liew","sequence":"first","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,7,20]]},"reference":[{"volume-title":"2017 Global Risk Management Survey","year":"2017","author":"AON","key":"key2022030809312523900_ref001"},{"issue":"6","key":"key2022030809312523900_ref002","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1108\/10878571011088069","article-title":"Social media, reputation risk and ambient publicity management","volume":"38","year":"2010","journal-title":"Strategy and Leadership"},{"issue":"3","key":"key2022030809312523900_ref003","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1177\/0893318918766405","article-title":"Organizational boundary regulation through social media policies","volume":"32","year":"2018","journal-title":"Management Communication Quarterly"},{"issue":"6","key":"key2022030809312523900_ref004","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1080\/15205436.2017.1306748","article-title":"Solidarity through the visual: healing images in the Brussels terrorism attacks","volume":"20","year":"2017","journal-title":"Mass Communication and Society"},{"key":"key2022030809312523900_ref005","doi-asserted-by":"crossref","first-page":"475","DOI":"10.2307\/975569","article-title":"Public management information systems: theory and prescription","volume":"46","year":"1986","journal-title":"Public Administration Review"},{"issue":"2","key":"key2022030809312523900_ref006","first-page":"68","article-title":"Social media risk: governance of these diverse communication channels begins with assessing the risks","volume":"71","year":"2014","journal-title":"Internal Auditor"},{"issue":"1","key":"key2022030809312523900_ref007","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/00048623.2013.773858","article-title":"Socially practical or practically unsociable? A study into social media policy experiences in Queensland cultural heritage institutions","volume":"44","year":"2013","journal-title":"Australian Academic and Research Libraries"},{"issue":"4","key":"key2022030809312523900_ref008","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1525\/tph.2014.36.4.26","article-title":"Seeing yourself in history: community archives and the fight against symbolic annihilation","volume":"36","year":"2014","journal-title":"The Public Historian"},{"issue":"2","key":"key2022030809312523900_ref049","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/15536548.2016.1180942","article-title":"Social media policies in the Department of Defence: do they address the risk?","volume":"12","year":"2016","journal-title":"Journal of Information Privacy and Security"},{"year":"2015","key":"key2022030809312523900_ref009","article-title":"A comprehensive approach to managing social media risk and compliance"},{"issue":"April","key":"key2022030809312523900_ref010","first-page":"17","article-title":"The colonial continuum: archives, access and power","year":"2015","journal-title":"Archifacts"},{"article-title":"Copyright and cultural memory","year":"2017","key":"key2022030809312523900_ref011","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.345968"},{"year":"2015","key":"key2022030809312523900_ref012","article-title":"Using social media governance to protect reputation"},{"key":"key2022030809312523900_ref013","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.accinf.2017.12.004","article-title":"Do organizations use a formalized risk management process to address social media risk?","volume":"28","year":"2018","journal-title":"International Journal of Accounting Information Systems"},{"article-title":"Social media and its impact on ERM","year":"2015","author":"DHG","key":"key2022030809312523900_ref014"},{"issue":"5","key":"key2022030809312523900_ref015","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-016-9714-2","article-title":"What could possibly go wrong? A multi-panel Delphi study of organizational social media risk","volume":"20","year":"2016","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"key2022030809312523900_ref016","first-page":"279","article-title":"Full speed ahead: the challenges of cataloging a historic editorial cartoon collection","volume":"33","year":"2014","journal-title":"Art Documentation: Journal of the Art Libraries Society of North America"},{"key":"key2022030809312523900_ref017","unstructured":"EY (2012a), \u201cProtecting and strengthening your brand: social media governance and strategy\u201d, available at: https:\/\/www.eyjapan.jp\/services\/advisory\/global-contents\/pdf\/Insights-on-it-risk-2013-02-15-en.pdf."},{"key":"key2022030809312523900_ref018","unstructured":"EY (2012b), \u201cSocial media, strategy, policy and governance\u201d, available at: https:\/\/www.eycom.ch\/en\/Publications\/20120403-Social-media-strategy-policy-and-governance\/download."},{"key":"key2022030809312523900_ref019","unstructured":"EY (2014), \u201cSocial media risk management and FFIEC-proposed guidance\u201d, EY LLP, available at: https:\/\/pdf4pro.com\/view\/social-media-risk-management-and-ffiec-proposed-guidance-4d1583.html."},{"key":"key2022030809312523900_ref020","unstructured":"EY (2016), \u201cEngaging risk: creating a risk-aware culture through a more engaging GRC user experience\u201d, available at: https:\/\/www.ey.com\/Publication\/vwLUAssets\/EY-engaging-risk-creating-a-risk-aware-culture-through-a-more-engaging-GRC-user-experience\/."},{"key":"key2022030809312523900_ref021","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2020.101484","article-title":"Assessing social media use in Dutch municipalities: political, institutional, and socio-economic determinants","volume":"37","year":"2020","journal-title":"Government Information Quarterly"},{"first-page":"1","article-title":"Finding the voice: planning and evaluation of social media in cultural institutions","year":"2016","key":"key2022030809312523900_ref022"},{"key":"key2022030809312523900_ref023","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10502-009-9105-2","article-title":"Whose memories, whose archives? Independent community archives, autonomy and the mainstream","volume":"9","year":"2009","journal-title":"Archival Science"},{"issue":"7","key":"key2022030809312523900_ref024","article-title":"Social media risk management: why it matters and what you need to know","volume":"66","year":"2014","journal-title":"Governance Directions"},{"issue":"2","key":"key2022030809312523900_ref025","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1177\/0266382116651781","article-title":"Social media, risk and information governance","volume":"33","year":"2016","journal-title":"Business Information Review"},{"volume-title":"Social Media for Government: Social Media Risks Management","year":"2017","key":"key2022030809312523900_ref026"},{"issue":"5","key":"key2022030809312523900_ref027","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1177\/0894439314524701","article-title":"Social media risks and benefits","volume":"32","year":"2014","journal-title":"Social Science Computer Review"},{"key":"key2022030809312523900_ref050","first-page":"22","article-title":"Designing social media policy for local governments: opportunities and challenges","volume-title":"Social Media and Local Governments: Theory and Practice","year":"2016"},{"issue":"1","key":"key2022030809312523900_ref028","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1108\/JD-12-2016-0148","article-title":"Archives, libraries and museums in the Nordic model of the public sphere","volume":"74","year":"2018","journal-title":"Journal of Documentation"},{"issue":"3","key":"key2022030809312523900_ref051","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1515\/pdtc-2016-0017","article-title":"Social metadata and public-contributed contents in memory institutions: \u2018crowd voice\u2019 vs \u2018authenticated heritage\u2019?","volume":"45","year":"2016","journal-title":"Preservation, Digital Technology and Culture"},{"issue":"7\/8","key":"key2022030809312523900_ref029","article-title":"Participatory culture in memory institutions: of diversity, ethics and trust?","volume":"22","year":"2016","journal-title":"D-Lib Magazine"},{"issue":"1","key":"key2022030809312523900_ref030","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1108\/OIR-08-2016-0218","article-title":"Insight from social media use by memory institutions in New Zealand: participatory vs curatorial culture","volume":"42","year":"2018","journal-title":"Online Information Review"},{"key":"key2022030809312523900_ref031","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1851391","article-title":"From shoeboxes to shared spaces: participatory cultural heritage via digital platforms","year":"2020","journal-title":"Information, Communication and Society"},{"issue":"3\/4","key":"key2022030809312523900_ref052","first-page":"377","article-title":"Social media in libraries and archives: applied with caution","volume":"39","year":"2015","journal-title":"Canadian Journal of Information and Library Science"},{"key":"key2022030809312523900_ref032","unstructured":"Liverant, N.U. (2017), \u201cTweet carefully, museums: a case study of the #decolonizeourmuseums protest\u201d, unpublished Master's thesis, Victoria University of Wellington."},{"issue":"3","key":"key2022030809312523900_ref053","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1177\/0266666917748985","article-title":"Social media engagement in developing countries: boon or bane for academic libraries?","volume":"35","year":"2019","journal-title":"Information Development"},{"issue":"2","key":"key2022030809312523900_ref054","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1080\/10496491.2018.1443310","article-title":"Where is the security blanket? Developing social media marketing capability as a shield from perceived cybersecurity risk","volume":"25","year":"2019","journal-title":"Journal of Promotion Management"},{"year":"2017","key":"key2022030809312523900_ref033","article-title":"The state of digital and social media risk management"},{"journal-title":"Risk Management Magazine","article-title":"Effectively managing social media risks","year":"2013","key":"key2022030809312523900_ref034"},{"issue":"3","key":"key2022030809312523900_ref055","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1097\/JPN.0000000000000346","article-title":"Social media savvy: risk versus benefit","volume":"32","year":"2018","journal-title":"Journal of Perinatal and Neonatal Nursing"},{"year":"2015","key":"key2022030809312523900_ref035","article-title":"Managing the risks and opportunities of social media"},{"first-page":"180","article-title":"Social media applications in e-government: a risk assessment approach","year":"2014","key":"key2022030809312523900_ref036"},{"issue":"3","key":"key2022030809312523900_ref037","first-page":"219","article-title":"Perceived risks and risk management of social media in an organizational context","volume":"24","year":"2013","journal-title":"Electronic Markets"},{"journal-title":"Wall Street Journal","article-title":"Managing risk in an age of social media","year":"2017","key":"key2022030809312523900_ref038"},{"issue":"4","key":"key2022030809312523900_ref039","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/j.giq.2012.07.002","article-title":"Understanding risks, benefits, and strategic alternatives of social media applications in the public sector","volume":"29","year":"2012","journal-title":"Government Information Quarterly"},{"issue":"4","key":"key2022030809312523900_ref040","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1108\/JD-10-2012-0130","article-title":"A tale of two images: the quest to create a story-based image indexing system","volume":"70","year":"2014","journal-title":"Journal of Documentation"},{"journal-title":"Global Knowledge, Memory and Communication","article-title":"Descriptive standards and collection management software for documentary heritage management: attitudes and experiences of information professionals","year":"2021","key":"key2022030809312523900_ref041"},{"key":"key2022030809312523900_ref042","article-title":"Managing social media risks to reputation risk","volume":"7","year":"2015","journal-title":"Deloitte Inside Magazine"},{"key":"key2022030809312523900_ref043","first-page":"925","article-title":"Social media and the public sector","year":"2017","journal-title":"Knowledge Solutions"},{"issue":"5","key":"key2022030809312523900_ref044","first-page":"1","article-title":"The (social) media is the message: navigating legal and reputational risks associated with employee social media use","volume":"36","year":"2019","journal-title":"The Computer and Internet Lawyer"},{"key":"key2022030809312523900_ref045","unstructured":"Shullich, R. (2011), \u201cRisk assessment of social media\u201d, SANS Institute Infosec Reading Room, available at: https:\/\/www.sans.org\/reading-room\/whitepapers\/riskmanagement\/risk-assessocial mediaent-social-media-33940."},{"issue":"2","key":"key2022030809312523900_ref046","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1177\/1098214005283748","article-title":"A general inductive approach for analysing qualitative evaluation data","volume":"27","year":"2006","journal-title":"American Journal of Evaluation"},{"key":"key2022030809312523900_ref047","article-title":"Social media and policing: a review of recent research","volume":"13","year":"2019","journal-title":"Sociology Compass"},{"key":"key2022030809312523900_ref048","unstructured":"Webber, A., Li, C. and Syzmanski, J. (2012), \u201cGuarding the Gates: the imperative for social media risk management\u201d, Altimeter Group."},{"article-title":"Enterprise risk management (ERM) fact sheet","year":".","author":"Society of Actuaries","key":"key2022030809312523900_fur1"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-08-2020-0380\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/OIR-08-2020-0380\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:43:42Z","timestamp":1753397022000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/46\/2\/375-390\/315556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,20]]},"references-count":56,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,7,20]]},"published-print":{"date-parts":[[2022,3,9]]}},"alternative-id":["10.1108\/OIR-08-2020-0380"],"URL":"https:\/\/doi.org\/10.1108\/oir-08-2020-0380","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2021,7,20]]}}}