... design, resourcing). Unsurprisingly, the former contained several studies exposing IT levers (Mergel, 2012) and capabilities (Kane et al., 2014) in the areas of customer relations and influence (Safko & Brake, 2009;Tajudeen et al., 2018;Trainor, 2012;Trainor et al., 2014); performance forecasting and improvement (Asur & Huberman, 2010;Braojos et al., 2019;Hoffman & Fodor, 2010;Parveen, Jaafar, & Ainin, 2014); social network collaborations (DiStaso et al., 2011;Hanna et al., 2011;Quan-Haase & Young, 2010); content management (Hanna et al., 2011;Kietzmann et al., 2011;Zeng & Wei, 2013); and, information quality (Singh, Dwivedi, Rana, Kumar, & Kapoor, 2017) and management (Treem & Leonardi, 2012). However, the use of IT in SM also brought potential challenges, such as data security risks, privacy breaches, trust deficits and technical skills shortages (DiStaso et al., 2011;Mills & Plangger, 2015), coupled with the regular systems auditing (Safko & Brake, 2009) and ongoing funding for upgrades (Claussen, Kretschmer, & Mayrhofer, 2013;DiStaso et al., 2011;Miller & Tucker, 2013). ...