This is “Social Media, Peer Production, and Web 2.0”, chapter 7 from the book Getting the Most Out of Information Systems (v. 1.4). For details on it (including licensing), click here.
For more information on the source of this book, or why it is available for free, please see the project's home page. You can browse or download additional books there. To download a .zip file containing this book to use offline, simply click here.
Over the past few years, a fundamentally different class of Internet services has attracted users, made headlines, and increasingly garnered breathtaking market valuations. Often referred to under the poorly defined umbrella term “Web 2.0A term broadly referring to Internet services that foster collaboration and information sharing; characteristics that distinctly set “Web 2.0” efforts apart from the static, transaction-oriented Web sites of “Web 1.0.” The term is often applied to Web sites and Internet services that foster social media or other sorts of peer production.,” these new services are targeted at harnessing the power of the Internet to empower users to collaborate, create resources, and share information in a distinctly different way than the static Web sites and transaction-focused storefronts that characterized so many failures in the dot-com bubble. Techies often joust over the precise definition of Web 2.0, but these arguments aren’t really all that important. What is significant is how quickly the Web 2.0 revolution came about, how unexpected it was, and how deeply impactful these efforts have become for individuals, businesses, and society. Consider the following:
The Web 2.0 moniker is a murky one because like so many popular technology terms there’s not a precise definition. We’ll add some precision to our discussion by focusing on social media efforts—technologies that support the creation of user-generated content, as well as content editing, commenting, curation, and sharing. Social media efforts include blogs, wikis, social networks, Twitter, and photo and video sharing sites. The rise of social media has also coincided with the rise of mobile computing—meaning the worldwide Internet conversation is always in your pocket. Mobile and social also work together to create entirely new services, like the location-based game / discovery engine / deals platform, Foursquare.
The peer productionWhen users collaboratively work to create content, products, and services. Includes social media sites, open source software, and peer-produced services, such as Skype and BitTorrent, where the participation of users provide the infrastructure and computational resources that enable the service. leveraged by collaborating users isn’t only used to create social media; it can be used to create services, too, and these are also considered to be part of Web 2.0. Skype and BitTorrent leverage users’ computers instead of a central IT resource to forward phone calls and video. This ability saves their sponsors the substantial cost of servers, storage, and bandwidth. Peer production is also leveraged to create much of the open source software that supports many of the Web 2.0 efforts described above. Techniques such as crowdsourcing, where initially undefined groups of users band together to solve problems, create code, and develop services, are also a type of peer production. These efforts often seek to leverage the so-called wisdom of crowds, the idea that a large, diverse group often has more collective insight than a single or small group of trained professionals.
Table 7.1 "Web 1.0 versus Web 2.0" lists several examples typically considered to fall under the Web 2.0 classification (a term coined by publisher and pundit Tim O’Reilly), and each is offered alongside its first-generation Internet counterpart.Adapted and modified from the original list presented in T. O’Reilly, “What Is Web 2.0?” O’Reilly, September 30, 2005.
Table 7.1 Web 1.0 versus Web 2.0
Web 1.0 | Web 2.0 | |
---|---|---|
domain name speculation | → | search engine optimization, fans, and followers |
page views | → | cost per click |
screen scraping | → | Web services |
publishing | → | participation |
content management systems | → | wikis |
directories (taxonomy) | → | tagging (“folksonomy”) |
Britannica Online | → | Wikipedia |
personal Web sites | → | blogging, status updates, and link sharing |
Ofoto | → | Flickr, Facebook, and Twitter |
instant messaging | → | Twitter and Facebook |
Monster.com | → | |
RealNetworks | → | YouTube |
YellowPages.com | → | Yelp |
Travelocity | → | TripAdvisor |
Vonage | → | Skype |
Millions of users, billions of dollars, huge social impact, and most of these efforts grew to influence millions in less time than it takes the average freshman to complete college. When technology moves that quickly, even some of the world’s most preeminent thought leaders can be sideswiped.
Consider that when management guru Michael Porter wrote a piece titled “Strategy and the Internet” at the end of the dot-com bubble, he lamented the high cost of building brand online, questioned the power of network effects, and cast a skeptical eye on ad-supported revenue models. Well, it turns out Web 2.0 efforts challenged all of these concerns. Among the efforts above, all built brand on the cheap with little conventional advertising, and each owes their hypergrowth and high valuation to their ability to harness the network effect.
This chapter can be considered in two parts. The first explains many technologies behind the social media / peer production / Web 2.0 movement, and we provide several examples of their use and impact. The final part of this chapter describes how firms should organize to engage with and take advantage of social media—specifically detailing how to “Get SMART” (with a social media awareness and response team). After going through both sections you should have a solid overview of major social technologies, how businesses are leveraging them, and how firms can organize for effective use while avoiding pitfalls.
Table 7.2 Major Social Media Tools
Description | Features | Technology Providers | |
---|---|---|---|
Blogs | Short for “Web log”—an online publication that keeps a running chronology of entries. Readers can comment on posts. Can connect to other blogs through blog rolls or trackbacks. Key uses: Share ideas, obtain feedback, mobilize a community. |
|
|
Wikis | A Web site that anyone can edit directly from within the browser. Key uses: Collaborate on common tasks or to create a common knowledge base. |
|
|
Electronic Social Network | Online community that allows users to establish a personal profile, link to other profiles (i.e., friends), share content, and communicate with members via messaging, posts. Most personal relationships are reciprocal (i.e., both parties agree to be “friends”). Key Uses: Discover and reinforce affiliations; identify experts; message individuals or groups; virally share media. |
|
Open/Public
Private Platforms
|
Microblogging | Short, asynchronous messaging system. Users send messages to “followers” who aren’t required to follow back. Key Uses: distribute time-sensitive information, share opinions, virally spread ideas, run contests and promotions, solicit feedback, provide customer support, track commentary on firms/products/issues, organize protests. |
|
Open/Public
Private Platforms
|
BlogsOnline journal entries, usually made in a reverse chronological order. Blogs typically provide comment mechanisms where users can post feedback for authors and other readers. (short for Web logs) first emerged almost a decade ago as a medium for posting online diaries. (In a perhaps apocryphal story, Wired magazine claimed the term “Web log” was coined by Jorn Barger, a sometimes homeless, yet profoundly prolific, Internet poster.) From humble beginnings, the blogging phenomenon has grown to a point where the number of public blogs tracked by BlogPulse has surpassed 160 million.BlogPulse.com stats, June 1, 2011. This is clearly a long tailIn this context, refers to an extremely large selection of content or products. The long tail is a phenomenon whereby firms can make money by offering a near-limitless selection. phenomenon, loaded with niche content that remains “discoverable” through search engines and that is often shared via other types of social media like Facebook and Twitter. TrackbacksLinks in a blog post that refer eaders back to cited sources. Trackbacks allow a blogger to see which and how many other bloggers are referring to their content. A “trackback” field is supported by most blog software and while it’s not required to enter a trackback when citing another post, it’s considered good “netiquette” to do so. (citation links back to original blog post) and blog rollsA list of a blogger’s favorite blogs. While not all blogs include blog rolls, those that do are often displayed on the right or left column of a blog’s main page. (a list of a blogger’s favorite sites—a sort of shout-out to blogging peers) also help distinguish and reinforce the reputation of widely read blogs.
Most blogs offer a two-way dialogue, allowing users to comment (a sort of “letters to the editor” section for each post). The running dialogue can read like an electronic bulletin board and can be an effective way to gather opinion, brainstorm, and vet ideas. Comments also help keep a blogger honest—a vigorous community of commenters will quickly expose a blogger’s errors of fact or logic.
Blogging can have significant appeal for an organization looking to be heard. Corporations that blog can enjoy immediate and unfiltered distribution of their ideas, with no limits on page size, word count, or publication deadline. And they can gather immediate feedback from readers via comments. Corporate blogs can be published directly to the public, skipping what bloggers call the mainstream media (MSM) and presenting their words without a journalist filtering their comments or an editor cutting out key points they’d hoped to make. That appeal has attracted some of the most senior executives to blogging. Hotel chief Bill Marriott, Zappos’ Tony Hsieh, Timberland’s Jeff Swartz, and Forrester Research’s George Colony are among those CEOs who use their blogs for purposes that include a combination of marketing, sharing ideas, gathering feedback, press response, image shaping, and reaching consumers directly.
Given the advantages of blogs over traditional broadcast and “dead tree” print publication, it’s not surprising that most mainstream news outlets also supplement their content with blogs that offer greater depth, more detail, and deadline-free timeliness. But they’ve got competition, and many of the most popular blogs have transformed into robust media enterprises. The political/news blog The Huffington Post grew to be more popular than all but eight newspaper sites and was acquired in 2011 by AOL for $315 million, a valuation significantly higher than many publicly traded papers.E. Alterman, “Out of Print, the Death and Life of the American Newspaper,” New Yorker, March 31, 2008; and M. Learmonth, “Huffington Post More Valuable Than Some Newspaper Cos.,” DigitalNext, December 1, 2008; V. Kopytoff, “AOL’s Bet on Another Makeover,” New York Times, February 7, 2011. Keep in mind that this is a site that lacks much of the sports, local news, weather, and other content offered by the locals.
Ratings like this are hard to achieve—most bloggers can’t make a living off their musings. But among the elite ranks, killer subscriber numbers are a magnet for advertisers. Top blogs operating on shoestring budgets can snare several hundred thousand dollars a month in ad revenue.S. Zuckerman, “Yes, Some Blogs Are Profitable—Very Profitable,” San Francisco Chronicle, October 21, 2007. Most start with ad networks like Google AdSense, but the most elite engage advertisers directly for high-value deals and extended sponsorships.
While the feature set of a particular blog depends on the underlying platform and the preferences of the blogger, several key features are common to most blogs:
Despite this increased popularity, blogging has its downside. Blog comments can be a hothouse for spam and the disgruntled. Ham-handed corporate efforts (such as poor response to public criticism or bogus “praise posts”) have been ridiculed. Employee blogging can be difficult to control and public postings can “live” forever in the bowels of an Internet search engine or as content pasted on other Web sites. Bloggers, beware—there are dozens of examples of workers who have been fired for what employers viewed as inappropriate posts. The voice of the blogosphere can also wield significant influence. While not all blogosphere commentary deserves a response, firms ignore social media at their own peril (see sidebar below)! Tips on how firms should organize for social media engagement, issues to consider when developing corporate social media policy, and examples of effective and poor social media use are covered in Section 7.9 "Get SMART: The Social Media Awareness and Response Team".
Organized bloggers have often banded together as a powerful voice for change, leading the charge, for example, for news anchor Dan Rather’s resignation. Others have helped an otherwise silent market voice be heard, such as when bloggers prompted the design of new insulin pumps. While not all blogosphere commentary deserves a response, firms ignore social media at their own peril! For an example of this, consider the flare-up Ingersoll Rand faced when the blogging community exposed a design flaw in its Kryptonite bike lock. Online posts and a video demonstrated that the thick metal lock could be broken with a simple ball-point pen. When Ingersoll Rand failed to react, the blogosphere erupted with criticism. Just days after online reports appeared, the mainstream media picked up the story. The New York Times ran a piece titled “The Pen Is Mightier Than the Lock” that included a series of photos demonstrating the ball-point Kryptonite lock pick. The event tarnished the once-strong brand and eventually resulted in a loss of over $10 million.
Like any Web page, blogs can be public, tucked behind a corporate firewall, or password protected. Third-party blogging services include Google Blogger, WordPress, Tumblr, and Posterous, with most offering a combination of free and premium features. The most popular platform for organizations choosing to host their own blog server is the open source WordPress system. Firms often choose this option to gain more control over security and formatting.
In the end, the value of any particular blog derives from a combination of technical and social features. The technical features make it easy for a blogger and his or her community to reach out for an ongoing conversation on some topic of shared interest. But the social side means that unless a reader base discovers a blog and is engaged, an effort will have little impact.
A wikiA Web site that can be modified by anyone, from directly within a Web browser (provided that user is granted edit access). is a Web site anyone can edit directly within a Web browser (provided the site grants the user edit access). Wikis derive their name from the Hawaiian word for “quick.” Ward Cunningham, the “wiki father” christened this new class of software with the moniker in honor of the wiki-wiki shuttle bus at the Honolulu airport. Wikis can be one of the speediest ways to collaboratively create content online.
Many popular online wikis serve as a shared knowledge repository in some domain. The largest and most popular wiki is Wikipedia, but there are hundreds of publicly accessible wikis that anyone can participate in, with examples ranging from Wine Wiki for oenophiles to Wookieepedia, the Star Wars wiki. Wikis can also be used for any collaborative effort—from meeting planning to project management. And in addition to the hundreds of public wikis, there are many thousand more that are hidden away behind firewalls, used as proprietary internal tools for organizational collaboration. Many wikis also serve as knowledge management systems that act as a sort of collective corporate memory that’s vital for sharing skills, learning, and preserving expertise even when employees leave the firm.
Want to add to or edit a wiki entry? On most sites you just click the “Edit” link. Wikis support what you see is what you get (WYSIWYG)A phrase used to describe graphical editing tools, such as those found in a wiki, page layout program, or other design tool. editing that, while not as robust as traditional word processors, is still easy enough for most users to grasp without training or knowledge of arcane code or markup language. Users can make changes to existing content and can easily create new pages or articles and link them to other pages in the wiki. Wikis also provide a version history. Click the “History” link on Wikipedia, for example, and you can see when edits were made and by whom. This feature allows the community to roll backThe ability to revert a wiki page to a prior version. This is useful for restoring earlier work in the event of a posting error, inaccuracy, or vandalism. a wiki to a prior page, in the event that someone accidentally deletes key info, or intentionally defaces a page.
Wikis are available both as software (commercial as well as open source varieties) that firms can install on their own computers and as hosted online services (subscription or ad-supported) where software and content are housed by third parties that run the technology for wiki users. Since wikis can be started without the oversight or involvement of a firm’s IT department, their appearance in organizations often comes from grassroots user initiative.
As with blogs, a wiki’s features set varies depending on the specific wiki tool chosen, as well as administrator design, but most wikis support the following key features:
Jump-starting a wiki can be a challenge, and an underused wiki can be a ghost town of orphan, out-of-date, and inaccurate content. Fortunately, once users see the value of wikis, use and effectiveness often snowballs. The unstructured nature of wikis are also both a strength and weakness. Some organizations employ wikimastersIndividuals often employed by organizations to review community content in order to delete excessive posts, move commentary to the best location, and edit as necessary. to “garden” community content: “prune” excessive posts, “transplant” commentary to the best location, and “weed” as necessary. Wikipatterns.com offers a guide to the stages of wiki adoption and a collection of community-building and content-building strategies.
The larger and more active a wiki community, the more likely it is that content will be up to date and that errors or vandalism will be quickly corrected (again, we see the influence of network effects, where products and services with larger user bases become more valuable). At Wikipedia, for example, griefersInternet vandal and mischief maker; also sometimes referred to as a troll. and partisans regularly alter pages (in one noteworthy stretch, the page of former U.S. President Jimmy Carter was regularly replaced with a photo of a “scruffy, random unshaven man with his left index finger shoved firmly up his nose.”)D. Pink, “The Book Stops Here,” Wired, March 2005. But the Wikipedia community is so large and attentive that such changes are often recognized in seconds and rolled back, and mischief makers soon give up and move on. Several studies have shown that large community wiki entries are as or more accurate than professional publication counterparts.S. Robert Lichter, Are Chemicals Killing Us? Statistical Assessment Service, May 21, 2009; J. Kane, R. Fichman, J. Gallaugher, and J. Glaser, “Community Relations 2.0,” Harvard Business Review, November 2009.
Wikis can be vital tools for collecting and leveraging knowledge that would otherwise be scattered throughout an organization; reducing geographic distance; removing boundaries between functional areas; and flattening preexisting hierarchies. Companies have used wikis in a number of ways:
When brought outside the firewall, corporate wikis can also be a sort of value-generation greenhouse, allowing organizations to leverage input from their customers and partners:
Not only is the nonprofit Wikipedia, with its enthusiastic army of unpaid experts and editors, replacing the three-hundred-year reference reign of Encyclopedia Britannica, Wikipedia entries can impact nearly all large-sized organizations. Wikipedia is the go-to, first-choice reference site for a generation of “netizens,” and Wikipedia entries are invariably one of the top links, often the first link, to appear in Internet search results.
This position means that anyone from top executives to political candidates to any firm large enough to warrant an entry has to contend with the very public record of Wikipedia. In the same way that firms monitor their online reputations in blog posts and Twitter tweets, they’ve also got to keep an eye on wikis.
But firms that overreach and try to influence an entry outside of Wikipedia’s mandated neutral point of view (NPOV)An editorial style that is free of bias and opinion. Wikipedia norms dictate that all articles must be written in NPOV., risk a backlash and public exposure. Version tracking means the wiki sees all. Users on computers at right-leaning Fox News were embarrassingly caught editing the wiki page of the lefty pundit and politician Al Franken (a nemesis of Fox’s Bill O’Reilly);A. Bergman, “Wikipedia Is Only as Anonymous as your I.P.,” O’Reilly Radar, August 14, 2007. Sony staffers were flagged as editing the entry for the Xbox game Halo 3;I. Williams, “Sony Caught Editing Halo 3 Wikipedia Entry,” Vnunet.com, September 5, 2007. and none other than Wikipedia founder Jimmy Wales was criticized for editing his own Wikipedia biographyE. Hansen, “Wikipedia Founder Edits Own Bio,” Wired, December 19, 2005.—acts that some consider bad online form at best, and dishonest at worst.
One last point on using Wikipedia for research. Remember that according to its own stated policies, Wikipedia isn’t an original information source; rather, it’s a clearinghouse for verified information. So citing Wikipedia as a reference usually isn’t considered good form. Instead, seek out original (and verifiable) sources, such as those presented via the links at the bottom of Wikipedia entries.
Social networksAn online community that allows users to establish a personal profile and communicate with others. Large public social networks include MySpace, Facebook, LinkedIn, and Google’s Orkut. have garnered increasing attention as established networks grow and innovate, new networks emerge, and value is demonstrated. The two most dominant public social networks are Facebook and LinkedIn, sites often described as the personal and professional networks, respectively. But there are also a host of third-party networks where firms can “roll their own” private networks. Such services include Ning, Lithium, and SelectMinds.
Social networks allow you to set up a profile, share content, comment on what others have shared, and follow the updates of particular users, groups, firms, and brands that may also be part of those networks. Many also are platforms for the deployment of third-party applications (not surprisingly, social games dominate).
Hundreds of firms have established pages on Facebook and communities on LinkedIn, and these are now legitimate customer- and client-engagement platforms. If a customer has decided to press the “like” button of a firm’s Facebook page, corporate posts can appear in their news feed, gaining more user attention than the often-ignored ads that run on the sides of social networks. These posts, and much of the other activity that takes place on social networks, spread via feed (or news feed). Pioneered by Facebook but now adopted by most services, feeds provide a timely list of the activities of and public messages from people, groups, and organizations that an individual has an association with.
Feeds are inherently viralIn this context, information or applications that spread rapidly between users.. By seeing what others are doing on a social network, and by leveraging the power of others to act as word-of-mouth evangelists, feeds can rapidly mobilize populations, prompt activism, and offer low-cost promotion and awareness of a firm’s efforts. Many firms now see a Facebook presence and social engagement strategy as vital. Facebook’s massive size and the viral power of spreading the word through feeds, plus the opportunity to invite commentary and engage consumers in a dialogue, rather than a continual barrage of promotion, is changing the way that firms and customers interact (indeed, you’ll hear many successful social media professionals declare that social media is more about conversations with customers than about advertising-style promotion).
Feeds are also controversial. Many users have reacted negatively to a public broadcast of their online activity, and feed mismanagement can create accusation of spamming, public relations snafus, and user discontent and can potentially open up a site to legal action. Facebook initially dealt with a massive user outcry at the launch of feeds, and the site also faced a subsequent backlash when its Beacon service broadcast user purchases without first explicitly asking their permission and during attempts to rework its privacy policy and make Facebook data more public and accessible. (See Chapter 8 "Facebook: Building a Business from the Social Graph" for more details.)
The foundation of a social network is the user profile, but utility goes beyond the sort of listing found in a corporate information directory. Typical features of a social network include support for the following:
While a Facebook presence has become a must-have for firms (see Chapter 8 "Facebook: Building a Business from the Social Graph"), LinkedIn has become a vital tool for many businesses and professionals. LinkedIn boasted a nearly $9 billion valuation after its spring 2011 IPO (some say that price is a sign of a tech bubble and is far too high for a firm with less than $16 million in profits the previous year).S. Woo, L. Cowan, and P. Tam, “LinkedIn IPO Soars, Feeding Web Boom,” Wall Street Journal, May 20, 2011. Regardless of the valuation, the site’s growth has been spectacular, and its influence is threatening recruiting sites like Monster.com and CareerBuilder.M. Boyle, “Recruiting: Enough to Make a Monster Tremble,” BusinessWeek, June 25, 2009.
LinkedIn was conceived from the start as a social network for business users. On LinkedIn, members post profiles and contact information, list their work history, and can be “endorsed” by others on the network. It’s sort of like having your résumé and letters of recommendation in a single location. Users can pose questions to members of their network, engage in group discussions, and ask for introductions through mutual contacts. The site has also introduced a variety of additional services, including messaging, information sharing, and news and content curation—yes, LinkedIn will help you find stuff you’re likely to be most interested in (wasn’t that Google’s job?). The firm makes money from online ads, premium subscriptions, and hiring tools for recruiters.
Active members find the site invaluable for maintaining professional contacts, seeking peer advice, networking, and even recruiting. Starbucks manager of enterprise staffing has stated that LinkedIn is “one of the best things for finding midlevel executives.”R. King, “No Rest for the Wiki,” BusinessWeek, March 12, 2007. Such networks are also putting increasing pressure on firms to work particularly hard to retain top talent. While once HR managers fiercely guarded employee directories for fear that a list of talent may fall into the hands of rivals, today’s social networks make it easy for anyone to gain a list of a firm’s staff, complete with contact information and a private messaging channel.
Social networks have also become organizational productivity tools. Employees have organized thousands of groups using publicly available social networking sites because similar tools are not offered by their firms.E. Frauenheim, “Social Revolution,” Workforce Management, October 2007. Assuming a large fraction of these groups are focused on internal projects, this demonstrates a clear pent-up demand for corporate-centric social networks (and creates issues as work dialogue moves outside firm-supported services).
Many firms are choosing to meet this demand by implementing internal social network platforms that are secure and tailored to firm needs. At the most basic level, these networks have supplanted the traditional employee directory. Social network listings are easy to update and expand, and employees are encouraged to add their own photos, interests, and expertise to create a living digital identity.
Firms such as Deloitte, Dow Chemical, and Goldman Sachs have created social networks for “alumni” who have left the firm or retired. These networks can be useful in maintaining contacts for future business leads, rehiring former employees (20 percent of Deloitte’s experienced hires are so-called boomerangs, or returning employees), or recruiting retired staff to serve as contractors when labor is tight.R. King, “Social Networks: Execs Use Them Too,” BusinessWeek, November 11, 2006. Maintaining such networks will be critical in industries like IT and health care that are likely to be plagued by worker shortages for years to come.
Social networking can also be important for organizations like IBM, where some 42 percent of employees regularly work from home or client locations. IBM’s social network makes it easier to locate employee expertise within the firm, organize virtual work groups, and communicate across large distances.W. Bulkley, “Playing Well with Others,” Wall Street Journal, June 18, 2007. As a dialogue catalyst, a social network transforms the public directory into a font of knowledge sharing that promotes organization flattening and value-adding expertise sharing.
While IBM has developed their own social network platforms, firms are increasingly turning to third-party vendors like SelectMinds (adopted by Deloitte, Dow Chemical, and Goldman Sachs) and LiveWorld (adopted by Intuit, eBay, the NBA, and Scientific American). Ning allows anyone to create a social network and currently hosts over 2.3 million separate online communities.K. Swisher, “Ning CEO Gina Bianchini to Step Down—Becomes an EIR at Andreessen Horowitz,” AllThingsD, March 15, 2010. However, with robust corporate tools now offered by LinkedIn, we might see proprietary, in-house efforts start to migrate there over time.
As with any type of social media, content flows in social networks are difficult to control. Embarrassing disclosures can emerge from public systems or insecure internal networks. Employees embracing a culture of digital sharing may err and release confidential or proprietary information. Networks could serve as a focal point for the disgruntled (imagine the activity on a corporate social network after a painful layoff). Publicly declared affiliations, political or religious views, excessive contact, declined participation, and other factors might lead to awkward or strained employee relationships. Users may not want to add a coworker as a friend on a public network if it means they’ll expose their activities, lives, persona, photos, sense of humor, and friends as they exist outside of work. And many firms fear wasted time as employees surf the musings and photos of their peers.
All are advised to be cautious in their social media sharing. Employers are trawling the Internet, mining Facebook, and scouring YouTube for any tip-off that a would-be hire should be passed over. A word to the wise: those Facebook party pics, YouTube videos of open mic performances, or blog postings from a particularly militant period might not age well and may haunt you forever in a Google search. Think twice before clicking the upload button! As Socialnomics author Erik Qualman puts it, “What happens in Vegas stays on YouTube (and Flickr, Twitter, Facebook…).”
Firms have also created their own online communities to foster brainstorming and customer engagement. Dell’s IdeaStorm.com forum collects user feedback and is credited with prompting line offerings, such as the firm’s introduction of a Linux-based laptop.D. Greenfield, “How Companies Are Using I.T. to Spot Innovative Ideas,” InformationWeek, November 8, 2008. At MyStarbucksIdea.com, the coffee giant has leveraged user input to launch a series of innovations ranging from splash sticks that prevent spills in to-go cups, to new menu items. Both IdeaStorm and MyStarbucksIdea run on a platform offered by Salesforce.com that not only hosts these sites but also provides integration into Facebook and other services. Starbucks (the corporate brand with the most Facebook “fans”) has extensively leveraged the site, using Facebook as a linchpin in the “Free Pastry Day” promotion (credited with generating one million in-store visits in a single day) and promotion of the firm’s AIDS-related (Starbucks) RED campaign, which garnered an astonishing three hundred ninety million “viral impressions” through feeds, wall posts, and other messaging.J. Gallaugher and S. Ransbotham, “Social Media and Customer Dialog Management at Starbucks,” MIS Quarterly Executive 9, no. 4 (December 2010): 197—212.
Dr. Daniel Palestrant often shows a gruesome slide that provides a powerful anecdote for Sermo, the social network for physicians that he cofounded and where he serves as CEO. The image is of an eight-inch saw blade poking through both sides of the bloodied thumb of a construction worker who’d recently arrived in a hospital emergency room. A photo of the incident was posted to Sermo, along with an inquiry on how to remove the blade without damaging tissue or risking a severed nerve. Within minutes replies started coming back. While many replies advised to get a hand surgeon, one novel approach suggested cutting a straw lengthwise, inserting it under the teeth of the blade, and sliding the protected blade out while minimizing further tissue tears.M. Schulder, “50on50: Saw Blade through Thumb. What Would You Do?” CNN, November 4, 2009. The example illustrates how doctors using tools like Sermo can tap into the wisdom of crowds to save thumbs and a whole lot more.
Sermo is a godsend to remote physicians looking to gain peer opinion on confounding cases or other medical questions. The American Medical Association endorsed the site early on (although they failed to renew during a raucous debate on health care reform),The AMA and Sermo have since broken ties; see B. Comer, “Sermo and AMA Break Ties,” Medical Marketing and Media, July 9, 2009. and the Nature scientific journals experimented with a “Discuss on Sermo” button alongside the online versions of their medical articles. Doctors are screened and verified to maintain the integrity of participants. Members leverage the site both to share information with each other and to engage in learning opportunities provided by pharmaceutical companies and other firms. Institutional investors also pay for special access to poll Sermo doctors on key questions, such as opinions on pending FDA drug approval. Sermo posts can send valuable warning signals on issues such as disease outbreaks or unseen drug side effects. And doctors have also used the service to rally against insurance company policy changes.
Figure 7.1
These are some of the rich health monitoring and sharing tools available on PatientsLikeMe. Note that treatments, symptoms, and quality-of-life measures can be tracked over time.
Source: PatientsLikeMe, 2011.
While Sermo focuses on the provider side of the health care equation, a short walk from the firm’s Cambridge, Massachusetts, headquarters will bring one to PatientsLikeMe (PLM), a social network empowering chronically ill patients across a wide variety of disease states. The firm’s “openness policy” is in contrast to privacy rules posted on many sites and encourages patients to publicly track and post conditions, treatments, and symptom variation over time, using the site’s sophisticated graphing and charting tools. The goal is to help others improve the quality of their own care by harnessing the wisdom of crowds.
Todd Small, a multiple sclerosis sufferer, used the member charts and data on PLM to discover that his physician had been undermedicating him. After sharing site data with his doctor, his physician verified the problem and upped the dose. Small reports that the finding changed his life, helping him walk better than he had in a decade and a half and eliminating a feeling that he described as being trapped in “quicksand.”T. Goetz, “Practicing Patients,” New York Times Magazine, March 23, 2008. In another example of PLM’s people power, the site ran its own clinical trial—like experiment to rapidly investigate promising claims that the drug Lithium could improve conditions for ALS (amyotrophic lateral sclerosis) patients. While community efforts did not support these initial claims, a decision was arrived at in months, whereas previous efforts to marshal researchers and resources to focus on the relatively rare disease would have taken many years, even if funding could be found.J. Kane, R. Fichman, J. Gallaugher, and J. Glaser, “Community Relations 2.0,” Harvard Business Review, November 2009.
Both Sermo and PatientsLikeMe are start-ups that are still exploring the best way to fund their efforts for growth and impact. Regardless of where these firms end up, it should be clear from these examples that social media will remain a powerful force on the health care landscape.
Spawned in 2006 as a side project at the now-failed podcasting start-up Odeo (an effort backed by Blogger.com founder Evan Williams), Twitter has been on a rocket ride. The site’s user numbers have blasted past both mainstream and new media sites, dwarfing the New York Times and LinkedIn, among others. Reports surfaced of rebuffed buyout offers as high as $500 million.S. Ante, “Facebook’s Thiel Explains Failed Twitter Takeover,” BusinessWeek, March 1, 2009. By its fifth birthday the firm’s 500 employees were supporting a global phenomenon embraced by over two hundred million users worldwide,P. Kafka, “Twitter CEO Dick Costolo Talks about His New Photo Service, but Not about Profits,” AllThingsD, June 1, 2011. including some 13 percent of U.S. adults.B. Womack and B. Pulley, “Twitter Use Climbs to 13% of U.S. Adults Online Boosted by Older Americans,” Bloomberg, June 1, 2011. In fact, by 2011 Twitter’s reach was so broad that the stealth raid that led to the killing of Osama Bin Laden was inadvertently live-tweeted by an IT-savvy neighbor, commenting on the ruckus in the neighborhood.
Figure 7.2 Bin Laden’s Neighbor Accidentally Tweets the U.S. Raid
Tweets (topmost is most recent) by Abbottabad, Pakistan—based IT consultant Sohaib Athar (Twitter handle @ReallyVirtal), who had no idea (1) that Osama Bin Laden was his neighbor and (2) that his tweets about the neighborhood disturbance were actually a live account of a U.S. raid.J. O’Dell, “One Twitter User Reports Live from Osama Bin Laden Raid,” Mashable, May 2, 2011.
Twitter is a microbloggingA type of short-message blogging, often made via mobile device. Microblogs are designed to provide rapid notification to their readership (e.g., a news flash, an update on one’s activities), rather than detailed or in-depth comments. Twitter is the most popular microblogging service. service that allows users to post 140-character messages (tweetsA Twitter post, limited to 140 characters.) via the Web, SMSA text messaging standard used by many mobile phones., or a variety of third-party desktop and smartphone applications. The microblog moniker is a bit of a misnomer. The service actually has more in common with Facebook’s status updates and news feeds than it does with traditional blogs. But unlike Facebook, where most users must approve “friends” before they can see status updates, Twitter’s default setting allows for asymmetrical following (although it is possible to set up private Twitter accounts and to block followers).
Sure, there’s a lot of inane “tweeting” going on—lots of meaningless updates that read, “I’m having a sandwich” or “in line at the airport.” But while not every user may have something worthwhile to tweet, many find that Twitter makes for invaluable reading, offering a sense of what friends, customers, thought leaders, and newsmakers are thinking. Twitter leadership has described the service as communicating “The Pulse of the Planet.”E. Schonfeld, “Twitter's Internal Strategy Laid Bare: To Be ‘The Pulse of The Planet,’” TechCrunch, July 19, 2009. For many, Twitter is a discovery engine, a taste-making machine, a critical source of market intelligence, a source of breaking news, and an instantaneous way to plug into the moment’s zeitgeist.
Many also find Twitter to be an effective tool for quickly blasting queries to friends, colleagues, or strangers who might offer potentially valuable input. Says futurist Paul Saffo, “Instead of creating the group you want, you send it and the group self-assembles.”C. Miller, “Putting Twitter’s World to Use,” New York Times, April 13, 2009. Users can classify comments on a given topic using hash tagsA method for organizing tweets where keywords are preceeded by the # character. (keywords preceded by the “#” or “hash” symbol), allowing others to quickly find related tweets (e.g., #iranelection, #mumbai, #swineflu, #sxsw). Any user can create a hash tag—just type it into your tweet (you may want to search Twitter first to make sure that the tag is not in use by an unrelated topic and that if it is in use, it appropriately describes how you want your tweet classified).
Twitter users have broken news during disasters, terror attacks, and other major events. Dictators fear the people power Twitter enables, and totalitarian governments worldwide have moved to block citizen access to the service (prompting Twitter to work on censor-evading technology). During the 2009 Iranian election protests, the U.S. State Department even asked Twitter to postpone maintenance to ensure the service would continue to be available to support the voice and activism of Iran’s democracy advocates.C. Ruffini, “State Dept. Asked Twitter to Delay Maintenance,” CBS News, June 16, 2009.
Twitter is also emerging as a legitimate business tool. Consider the following commercial examples:
Figure 7.3 A Sampling of Tweets Filtered through Best Buy’s @Twelpforce Twitter Account
Surgeons and residents at Henry Ford Hospital have even tweeted during brain surgery (the teaching hospital sees the service as an educational tool). Some tweets are from those so young they’ve got “negative age.” Twitter.com/kickbee is an experimental fetal monitor band that sends tweets when motion is detected: “I kicked Mommy at 08:52.” And savvy hackers are embedding “tweeting” sensors into all sorts of devices. Botanicalls, for example, offers an electronic flowerpot stick that detects when plants need care and sends Twitter status updates to owners (sample post: “URGENT! Water me!”).
Organizations are well advised to monitor Twitter activity related to the firm, as it can act as a sort of canary-in-a-coal mine uncovering emerging events. Users are increasingly using the service as a way to form flash protest crowds. Amazon.com, for example, was caught off guard over a holiday weekend when thousands used Twitter to rapidly protest the firm’s reclassification of gay and lesbian books (hash tag #amazonfail). Others use the platform for shame and ridicule. BP has endured withering ridicule from the satire account @BPGlobalPR (followed by roughly 200,000 people two months after the spill).
For all the excitement, many wonder if Twitter is overhyped. Some reports suggest that many Twitter users are curious experimenters who drop the service shortly after signing up.D. Martin, “Update: Return of the Twitter Quitters,” Nielsen Wire, April 30, 2009. This raises the question of whether Twitter is a durable phenomenon or just a fad.
Pundits also wonder if revenues will ever justify its initially high valuation (by 2009 the firm was said to have been worth $1 billion; by 2011 shares trading on private secondary markets suggested a $10 billion valuation).D. Rushe, “Twitter Valued at $10bn as Google and Facebook Reportedly Vie to Buy It,” Guardian, February 10, 2011. Others wonder if rivals could usurp Twitter’s efforts with similar features. Thus far, Twitter has been following a “grow-first-harvest-later” approach.J. Murrell, “Twitter Treads Gently into Advertising Minefield,” San Jose Mercury News, April 13, 2010. The site’s rapid rise has allowed it to attract enough start-up capital to enable it to approach revenue gradually and with caution, in the hopes that it won’t alienate users with too much advertising (an approach not unlike Google’s efforts to nurture YouTube). MIT’s Technology Review reports that data sharing deals with Google and Bing may have brought in enough money to make the service profitable in 2009, but that amount was modest (just $25 million).D. Talbot, “Can Twitter Make Money?” Technology Review, March/April 2010. Twitter’s advertising platform is expected to be far more lucrative, but the firm has thus far struggled to find the right model. Reflecting Twitter’s “deliberately cautious” approach to revenue development, the ad model featuring sponsored “promoted tweets” rolled out first as part of the search, with distribution to individual Twitter feeds progressing as the firm experiments and learns what works best for users and advertisers.
Another issue—as the service grew, many Twitter users rarely visited the firm’s Web site. Instead, most active users would post and read tweets using one of many—often free—applications provided by third parties, such as Seesmic, TweetDeck, and Twhirl. This happened because Twitter made its data available for free to other developers via API (application programming interface)Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data. For example, Amazon.com provides APIs to let developers write their own applications and Websites that can send the firm orders.. Exposing data can be a good move as it spawned an ecosystem of over one hundred thousand complementary third-party products and services that enhance Twitter’s reach and usefulness (generating network effects from complementary offerings similar to other “platforms” like Windows, iPhone, and Facebook). But there are potential downsides to such openness. If users don’t visit Twitter.com, that makes it difficult to count users, serve profiling technologies such as tracking cookies (see Chapter 14 "Google in Three Parts: Search, Online Advertising, and Beyond"), collect additional data on service use, and make money by serving ads or offering promotions on the Web site. All this creates what is known as the “free rider problemWhen others take advantage of a user or service without providing any sort of reciprocal benefit.,” where others benefit from a service while offering no value in exchange. Encouraging software and service partners to accept ads for a percentage of the cut could lessen the free rider problem.P. Kafka, “Twitter’s Ad Plan: Copy Google,” AllThingsD, February 25, 2010.
When users don’t visit a service, it makes it difficult to spread awareness of new products and features. It can also create branding challenges and customer frustration. Twitter execs lamented that customers were often confused when they searched for “Twitter” in the iPhone App Store and were presented with scores of offerings but none from Twitter itself.D. Goldman, “Twitter Grows Up: Take a Peek Inside,” CNN, April 16, 2010. Twitter’s purchase of the iPhone app Tweetie (subsequently turned into the free “Twitter for iPhone” app), its acquisition of TweetDeck, and the launch of its own URL-shortening service (limiting opportunities for bit.ly and others) signal that Twitter is willing to move into product and service niches and compete with third parties that are reliant on the Twitter ecosystem.
Twitter also got a boost when Apple deeply embedded Twitter into iOS 5. Users of the more than two hundred million Apple mobile devices gain a new one-button option to tweet photos, Web links, videos, map locations, and more. And the iOS will make Twitter easy to embed in other apps, too. Users can link a Twitter account used on their iOS devices to other apps, which means no need to log in or manually add an account each time you add an app that you’ll want to tweet from. While not directly tied to Twitter revenue, these features have the potential to encourage Twitter adoption and decrease friction for embedding a tweet button into even more applications, offering a key alliance that broadens Twitter’s distribution and utility and making it even harder for rivals to displace.
Microblogging does appear to be here to stay, and the impact of Twitter has been deep, broad, stunningly swift, and at times humbling in the power that it wields. But whether Twitter will be a durable, profit-gushing powerhouse remains to be seen. Speculation on Twitter’s future hasn’t prevented many firms from commercializing new microblogging services, and a host of companies have targeted these tools for internal corporate use. Salesforce.com’s Chatter, Socialtext Signals, and Yammer are all services that have been billed as “Twitter for the Enterprise.” Such efforts allow for Twitter-style microblogging that is restricted for participation and viewing by firm-approved accounts.
RSSA method for sending/broadcasting data to users who subscribe to a service’s “RSS feed.” Many Web sites and blogs forward headlines to users who subscribe to their “feed,” making it easy to scan headlines and click to access relevant news and information. (an acronym that stands for both “really simple syndication” and “rich site summary”) enables busy users to scan the headlines of newly available content and click on an item’s title to view items of interest, thus sparing them from having to continually visit sites to find out what’s new. Users begin by subscribing to an RSS feed for a Web site, blog, podcast, or other data source. The title or headline of any new content will then show up in an RSS readerA tool for subscribing to and accessing RSS feeds. Most e-mail programs and Web browsers can also act as RSS readers. There are also many Web sites (including Google Reader) that allow users to subscribe to and read RSS feeds.. Subscribe to the New York Times Technology news feed, for example, and you will regularly receive headlines of tech news from the Times. Viewing an article of interest is as easy as clicking the title you like. Subscribing is often as easy as clicking on the RSS icon appearing on the home page of a Web site of interest.
Many firms use RSS feeds as a way to mange information overload, opting to distribute content via feed rather than e-mail. Some even distribute corporate reports via RSS. RSS readers are offered by third-party Web sites such as Google and Yahoo! and they have been incorporated into all popular browsers and most e-mail programs. Most blogging platforms provide a mechanism for bloggers to automatically publish a feed when each new post becomes available. Google’s FeedBurner is the largest publisher of RSS blog feeds, and offers features to distribute content via e-mail as well.
Figure 7.4
RSS readers like Google Reader can be an easy way to scan blog headlines and click through to follow interesting stories.
Figure 7.5
Web sites that support RSS feeds will have an icon in the address bar. Click it to subscribe.
FolksonomiesKeyword-based classification systems created by user communities (also known as social tagging). (sometimes referred to as social tagging) are keyword-based classification systems created by user communities as they generate and review content. (The label is meant to refer to a people-powered taxonomy.) Bookmarking site Del.icio.us, photo-sharing site Flickr (both owned by Yahoo!), and Twitter’s hash tags all make heavy use of folksonomies.
With this approach, classification schemes emerge from the people most likely to understand them—the users. By leveraging the collective power of the community to identify and classify content, objects on the Internet become easier to locate, and content carries a degree of recommendation and endorsement.
Flickr cofounder Stewart Butterfield describes the spirit of folksonomies, saying, “The job of tags isn’t to organize all the world’s information into tidy categories, it’s to add value to the giant piles of data that are already out there.”D. Terdiman, “Folksonomies Tap People Power,” Wired, February 1, 2005. The Guggenheim Museum in New York City and the San Francisco Museum of Modern Art, among other museums, are taking a folksonomic approach to their online collections, allowing user-generated categories to supplement the specialized lexicon of curators. Amazon.com has introduced a system that allows readers to classify books, and most blog posts and wiki pages allow for social tagging, oftentimes with hot topics indexed and accessible via a “tag cloud” in the page’s sidebar.
Mash-upsThe combination of two or more technologies or data feeds into a single, integrated tool. are combinations of two or more technologies or data feeds into a single, integrated tool. Some of the best known mash-ups leverage Google’s mapping tools. Mapnificent.net combines transit agency data with Google Maps to let users find locations that are close to public transportation. HousingMaps.com combines Craigslist.org listings with Google Maps for a map-based display for apartment hunters. IBM linked together job feeds and Google Maps to create a job-seeker service for victims of Hurricane Katrina. SimplyHired links job listings with Google Maps, LinkedIn listings, and salary data from PayScale.com. And Salesforce.com has tools that allow data from its customer relationship management (CRM) system to be combined with data feeds and maps from third parties.
Mash-ups are made easy by a tagging system called XMLAbbreviation of Extensible Markup Language. A tagging language that can be used to identify data fields made available for use by other applications. For example, programmers may wrap XML tags around elements in an address data stream (e.g., 〈business name〉, 〈street address〉, 〈city〉, 〈state〉) to allow other programs to recognize and use these data items. (for extensible markup language). Site owners publish the parameters of XML data feeds that a service can accept or offer (e.g., an address, price, product descriptions, images). Other developers are free to leverage these public feeds using application programming interfaces (APIs), published instructions on how to make programs call one another, to share data, or to perform tasks. Using APIs and XML, mash-up authors smoosh together seemingly unrelated data sources and services in new and novel ways. Lightweight, browser-friendly software technologies like Ajax and HTML5 can often make a Web site interface as rich as a desktop application, and rapid deployment frameworks like Ruby on Rails will enable and accelerate mash-up creation and deployment.
Computing devices increasingly know where you are—and this is creating all sorts of new opportunities for social media. Twitter, Facebook, and Google Buzz are among the many social services that have added location-based options, allowing you to tweet or post a status update attached with a physical location as determined by your phone’s global positioning system (GPS)A network of satellites and supporting technologies used to identify a device’s physical location., triangulation from nearby cell phone towers, or proximity to neighboring Wi-Fi hotspots. This introduces a whole new way to gather and share information. In a new part of town and curious what folks are saying about the spot? Search for tweets tagged as being posted around that location.
Augmented-realityComputer applications that overlay real-world images with computer-generated imagery and data. apps can overlay real data on top of images from a GPS and compass-equipped smartphone. Swivel your iPhone around with Stella Artois’s Bar Finder app open, and it’ll point you to the nearest Stella-equipped watering hole (it’ll also let you text your friends to join you for a drink and call a cab for a safe ride home). Wikitude overlays images appearing through your phone’s camera lens with geotagged data from Wikipedia. Point your Yelp app down the street and activate the monocle feature to see starred reviews hover over the top of establishments that appear on screen.
Boston-based SCVNGR (pronounced “scavenger”), a gaming app, has allowed over one thousand clients, including Princeton, MetLife, and Boston’s Museum of Fine Arts, to create their own mobile phone–based scavenger hunts. The profitable firm has an 80 percent client return rate and had attracted funding from Google Ventures and Highland Capital Partners all before founder Seth Priebatsch turned twenty-one.J. Kincaid, “SCVNGR Raises $4 Million from Google Ventures,” TechCrunch, December 24, 2009; R. Kim, “What Makes SCVNGR So Sticky (Hot Sauce Not Included), GigaOM, February 17, 2011. SCVNGR has also run promotions that encourage repeat purchases and return visits with a diverse client base that has included American Express, Coca-Cola, and Buffalo Wild Wings. The firm also offers the mobile app LevelUp, which rewards users with Groupon-style deals and includes some rewards if you bring friends (making buying social).
Perhaps the best known among the location-based pure plays is Foursquare. The service allows players to “check in” at different locations, allowing players to earn “badges” displayed in the app for completing specific achievements (“gym rat” for exercise buffs, “school night” for weeknight bar hoppers). Check into a location more than anyone else and you become that spot’s “mayor.” Foursquare users can follow public location postings from their friends, discovering when a buddy is close by. Users submit tips, and a recommendations button offers suggestions on nearby places to explore. Foursquare grew to over one million users roughly one year after the service debuted at the 2009 South by Southwest conference, and now, roughly two years later, those numbers have grown to ten million.R. Kim, “Foursquare Found as Featured Location Service for INQ Facebook Phone,” GigaOM, May 23, 2011. Firms are now using Foursquare for promotions and to support loyalty programs—offering “mayor specials” or other incentives when users are nearby. Starbucks, the Bravo television channel, frozen yogurt chain Tasti D-Lite, and the Milwaukee-based burger chain AJ Bombers are among the diverse clients leveraging the service.
Figure 7.6 A Sampling of Location-Aware Apps
Wikitude shows Wikipedia overlays on top of images appearing through the viewfinder. Stella Artois’s Le Bar will point you to establishments offering the brew, and Foursquare offers nearby vendor promotions and discounts.
Of course, all this public location sharing raises privacy concerns. The Web site PleaseRobMe.com was created to draw attention to the potentially dangerous issues around real-time location sharing. After a brief demonstration period, the site stopped its real-time aggregation of publicly accessible user-location data and now serves as an awareness site warning of the “stalkerish” side of location-based apps. In most cases, though, users remain firmly in control—determining if they want to keep a visit private or release their locale to verified “app friends” or to the broader online space.
In virtual worldsA computer-generated environment where users present themselves in the form of an avatar, or animated character., users appear in a computer-generated environment in the form of an avatarAn online identity expressed by an animated or cartoon figure., or animated character. Users can customize the look of their avatar, interact with others by typing or voice chat, and can travel about the virtual world by flying, teleporting, or more conventional means.
The most popular general-purpose virtual world is Second Life by Linden Labs, although many others exist. Most are free, although game-oriented worlds, such as World of Warcarft (with ten million active subscribers), charge a fee. Many corporations and organizations have established virtual outposts by purchasing “land” in the world of Second Life, while still others have contracted with networks to create their own, independent virtual worlds.
Most organizations have struggled to commercialize these Second Life forays, but activity has been wide-ranging in its experimentation. Reuters temporarily “stationed” a reporter in Second Life, presidential candidates have made appearances in the virtual world, corporations have set up virtual storefronts, and there’s a significant amount of virtual mayhem. Second Life “terrorists” have “bombed” virtual outposts run by several organizations, including ABC News, American Apparel, and Reebok.
Even grade schoolers are heavy virtual world users. Many elementary school students get their first taste of the Web through Webkinz, an online world that allows for an animated accompaniment with each of the firm’s plush toys. Webkinz’s parent company, privately held Ganz, doesn’t release financial figures. But according to Compete.com, by the end of 2008 Webkinz.com had roughly the same number of unique visitors as FoxNews.com. The kiddie set virtual world market is considered so lucrative that Disney acquired ClubPenguin for $350 million with agreements to pay another potential three hundred fifty million if the effort hits growth incentives.B. Barnes, “Disney Acquires Web Site for Children,” New York Times, August 2, 2007.
Blogs, wikis, and social networks not only enable sharing text and photos, they also allow for the creation and distribution of audio and video. PodcastsDigital audio or video files served as a series of programs or a multimedia blog. are digital audio files (some also incorporate video), provided as a series of programs. Podcasts range from a sort of media blog, archives of traditional radio and television programs, and regular offerings of original online content. While the term podcast derives from Apple’s wildly successful iPod, podcasts can be recorded in audio formats such as MP3 that can be played on most portable media players. (In perhaps the ultimate concession to the market leader, even the iPod rival Microsoft Zune referred to serialized audio files as podcasts on its navigation menu.)
There are many podcast directories, but Apple’s iTunes is by far the largest. Anyone who wants to make a podcast available on iTunes can do so for free. A podcast publisher simply records an audio file, uploads the file to a blog or other hosting server, then sends the RSS feed to Apple (copyrighted material cannot be used without permission, with violators risking banishment from iTunes). Files are discovered in the search feature of the iTunes music store, and listings seamlessly connect the user with the server hosting the podcast. This path creates the illusion that Apple serves the file even though it resides on a publisher’s servers.
While blogs have made stars of some unknowns, the most popular podcasts are from mainstream media outlets. A recent visit to the podcasting section of iTunes showed that eight of the top ten most popular podcasts were high-quality productions of mainstream media programs, including offerings from CBS, Comedy Central, NPR, and PBS. Podcasts are also revolutionizing education, with scores of universities “open sourcing” their classrooms and offering lectures for public consumption via Apple’s iTunesU.
In contrast to iTunes, YouTube actually hosts video on its own servers, so all you need to do is shoot a video and upload it to the site. YouTube is a bastion of amateur video, with most clips shot and uploaded by nonprofessionals. It’s also become a protest site (e.g., “A Comcast Technician Sleeping on my Couch”). However, YouTube has also become a go-to distribution platform for professional content such as ad clips, customer support guides, music videos, TV shows, movies, and more. Much of this rich mediaContent that is more complex than simple text. The term can refer to images, animation, audio, and video. content can be distributed or streamed within another Web site, blog, or social network profile.
Many social software efforts leverage what has come to be known as the wisdom of crowdsThe idea that a group of individuals (the crowd), often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals.. In this concept, a group of individuals (the crowd often consists mostly of untrained amateurs), collectively has more insight than a single or small group of trained professionals. Made popular by author James Surowiecki (whose best-selling book was named after the phenomenon), the idea of crowd wisdom is at the heart of wikis, folksonomy tagging systems, and many other online efforts. An article in the journal Nature positively comparing Wikipedia to Encyclopedia Britannica lent credence to social software’s use in harnessing and distilling crowd wisdom.J. Giles, “Special Report: Internet Encyclopedias Go Head to Head,” Nature 438, no. 15 (December 14, 2005): 900–901.
The crowd isn’t always right, but in many cases where topics are complex, problems are large, and outcomes are uncertain, a large, diverse group may bring collective insight to problem solving that one smart guy or a professional committee lacks. One technique for leveraging the wisdom of crowds is a prediction marketPolling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome., where a diverse crowd is polled and opinions aggregated to form a forecast of an eventual outcome. The concept is not new. The stock market is arguably a prediction market, with a stock price representing collective assessment of the discounted value of a firm’s future earnings. But Internet technologies are allowing companies to set up prediction markets for exploring all sorts of problems.
Consider Best Buy, where employees are encouraged to leverage the firm’s TagTrade prediction market to make forecasts, and are offered small gifts as incentives for participation. The idea behind this incentive program is simple: the “blue shirts” (Best Buy employees) are closest to customers. They see traffic patterns and buying cycles, can witness customer reactions first hand, and often have a degree of field insight not available to senior managers at the company’s Minneapolis headquarters. Harness this collective input and you’ve got a group brain where, as wisdom of crowds proponents often put it, “the we is greater than the me.” When Best Buy asked its employees to predict gift card sales, the “crowd’s” collective average answer was 99.5 percent accurate; experts paid to make the prediction were off by 5 percent. Another experiment predicting holiday sales was off by only 1/10 of 1 percent. The experts? Off by 7 percent!P. Dvorak, “Best Buy Taps ‘Prediction Market,’” Wall Street Journal, September 16, 2008; and Renée Dye, “The Promise of Prediction Markets: A Roundtable,” McKinsey Quarterly (2008): 83–93.
In an article in the McKinsey Quarterly, Surowiecki outlined several criteria necessary for a crowd to be “smart.”R. Dye, “The Promise of Prediction Markets: A Roundtable,” McKinsey Quarterly (2008): 83–93. The crowd must
Google, which runs several predictive markets, underscored these principles when it found that predictions were less accurate when users were geographically proximate, meaning folks in the same work group who sat near one another typically thought too much alike.B. Cowgill, J. Wolfers, and E. Zitzewitz, “Using Prediction Markets to Track Information Flows: Evidence from Google,” working paper accessed November 30, 2009, via http://bocowgill.com/GooglePredictionMarketPaper.pdf. Poorer predictive outcomes likely resulted because these relatively homogeneous clusters of users brought the same information to the table (yet another reason why organizations should hire and cultivate diverse teams).
Many firms run predictive markets to aid in key forecasts, and with the potential for real financial payoff. But University of Chicago law professor Todd Henderson warns predictive markets may also hold legal and ethical challenges. The Securities and Exchange Commission may look askance at an employee who gets a heads-up in a predictive market that says a certain drug is going to be approved or fail clinical trials. If she trades on this information is she an insider, subject to prosecution for exploiting proprietary data? Disclosure issues are unclear. Gambling laws are also murky, with Henderson uncertain as to whether certain predictive markets will be viewed as an unregulated form of betting.R. Dye, “The Promise of Prediction Markets: A Roundtable,” McKinsey Quarterly 2 (2008): 83–93.
Publicly accessible prediction markets are diverse in their focus. The Iowa Electronic Market attempts to guess the outcome of political campaigns, with mixed results. Farecast (now part of Microsoft’s Bing knowledge engine) claims a 75 percent accuracy rate for forecasting the future price of airline tickets.“Audit Reveals Farecast Predictive Accuracy at 74.5 percent,” farecast.live.com, May 18, 2007, http://www.prnewswire.com/news-releases/farecast-launches-new-tools-to -help-savvy-travelers-catch-elusive-airfare-price-drops-this-summer-58165652.html. The Hollywood Stock Exchange allows participants to buy and sell prediction shares of movies, actors, directors, and film-related options. The exchange, now owned by investment firm Cantor Fitzgerald, has picked Oscar winners with 90 percent accuracy.J. Surowiecki, “Crowdsourcing the Crystal Ball,” Forbes, October 15, 2007. And at HedgeStreet.com, participants can make microbets, wagering as little as ten dollars on the outcome of economic events, including predictions on the prices of homes, gold, foreign currencies, oil, and even the economic impact of hurricanes and tropical storms. HedgeStreet is considered a market and is subject to oversight by the Commodity Futures Trading Commission.E. Lambert, “Hedging for Dummies,” Forbes, March 13, 2006, 70–72.
The power of Web 2.0 also offers several examples of the democratization of production and innovation. Need a problem solved? Offer it up to the crowd and see if any of their wisdom offers a decent result. This phenomenon, known as crowdsourcingThe act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined generally large group of people in the form of an open call., has been defined by Jeff Howe, founder of the blog crowdsourcing.com and an associate editor at Wired, as “the act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.”J. Howe, “The Rise of Crowdsourcing,” Wired, June 2006.
Can the crowd really do better than experts inside a firm? At least one company has literally struck gold using crowdsourcing. As told by Don Tapscott and Anthony Williams in their book Wikinomics, mining firm Goldcorp was struggling to gain a return from its 55,000-acre Canadian property holdings. Executives were convinced there was gold “in them thar hills,” but despite years of efforts, the firm struggled to strike any new pay dirt. CEO Rob McEwen, a former mutual fund manager without geology experience who unexpectedly ended up running Goldcorp after a takeover battle then made what seemed like a Hail Mary pass—he offered up all the firm’s data, on the company’s Web site. Along with the data, McEwen ponied up $575,000 from the firm as prize money for the Goldcorp Challenge to anyone who came up with the best methods and estimates for reaping golden riches. Releasing data was seen as sacrilege in the intensely secretive mining industry, but it brought in ideas the firm had never considered. Taking the challenge was a wildly diverse group of “graduate students, consultants, mathematicians, and military officers.” Eighty percent of the new targets identified by entrants yielded “substantial quantities of gold.” The financial payoff? In just a few years a $100 million firm grew into a $9 billion titan. For Goldcorp, the crowd coughed up serious coin.
Netflix followed Goldcorp’s lead, offering anonymous data to any takers, along with a one-million-dollar prize to the first team that could improve the accuracy of movie recommendations by 10 percent. Top performers among the over thirty thousand entrants included research scientists from AT&T Labs, researchers from the University of Toronto, a team of Princeton undergrads, and the proverbial “guy in a garage” (and yes, that was his team name). Frustrated for nearly three years, it took a coalition of four teams from Austria, Canada, Israel, and the United States to finally cross the 10 percent threshold. The winning team represented an astonishing brain trust that Netflix would never have been able to harness on its own.S. Lohr, “And the Winner of the $1 Million Netflix Prize (Probably) Is…” New York Times, June 26, 2009.
Other crowdsourcers include Threadless.com, which produces limited run t-shirts with designs users submit and vote on. Marketocracy runs stock market games and has created a mutual fund based on picks from the 100 top-performing portfolios. Just under seven years into the effort, the firm’s m100 Index reports a 75 percent return versus 35 percent for the S&P 500. The St. Louis Cardinals baseball team is even crowdsourcing. The club’s One for the Birds contest calls for the fans to submit scouting reports on promising players, as the team hopes to broaden its recruiting radar beyond its classic recruiting pool of Division I colleges.
There are several public markets for leveraging crowdsourcing for innovation, or as an alternative to standard means of production. Waltham, Massachusetts—based InnoCentive allows “seekers” to offer cash prizes ranging from ten to one hundred thousand dollars. Over 120,000 “solvers” have registered to seek solutions for tasks put forward by seekers that include Dow Chemical, Eli Lilly, and Procter & Gamble. Among the findings offered by the InnoCentive crowd are a biomarker that measures progression of ALS. Amazon.com has even created an online marketplace for crowdsourcing called Mechanical Turk. Anyone with a task to be completed or problem to be solved can put it up for Amazon, setting their price for completion or solution. For its role, Amazon takes a small cut of the transaction. And alpha geeks looking to prove their code chops can turn to TopCoder, a firm that stages coding competitions that deliver real results for commercial clients, such as ESPN. TopCoder contests have attracted roughly 300,000 participants from 200 countries.M. Brandel, “Should Your Company ‘Crowdsource’ Its Next Project?” Computerworld, December 6, 2007; M. Brandel, “Crowdsourcing: Are You Ready to Ask the World for Answers?” Computerworld, March 3, 2008; and TopCoder, 2011, http://topcoder.com/home.
Not all crowdsourcers are financially motivated. Some benefit by helping to create a better service. Facebook leveraged crowd wisdom to develop versions of its site localized in various languages. Facebook engineers designated each of the site’s English words or phrases as a separate translatable object. Members were then invited to translate the English into other languages, and rated the translations to determine which was best. Using this form of crowdsourcing, fifteen hundred volunteers cranked out Spanish Facebook in a month. It took two weeks for two thousand German speakers to draft Deutsch Facebook. How does the Facebook concept of “poke” translate around the world? The Spaniards decided on “dar un toque,” Germans settled on “anklopfen,” and the French went with “envoyer un poke.”D. Kirkpatrick, “Help Wanted: Adults on Facebook,” Fortune, March 21, 2008. Vive le crowd!
For an example of how outrage can go viral, consider Dave Carroll.The concepts in this section are based on work by J. Kane, R. Fichman, J. Gallaugher, and J. Glasser, many of which are covered in the article “Community Relations 2.0,” Harvard Business Review, November 2009. The Canadian singer-songwriter was traveling with his band Sons of Maxwell on a United Airlines flight from Nova Scotia to Nebraska when, during a layover at Chicago’s O’Hare International Airport, Carroll saw baggage handlers roughly tossing his guitar case. The musician’s $3,500 Taylor guitar was in pieces by the time it arrived in Omaha. In the midst of a busy tour schedule, Carroll didn’t have time to follow up on the incident until after United’s twenty-four-hour period for filing a complaint for restitution had expired. When United refused to compensate him for the damage, Carroll penned the four-minute country ditty “United Breaks Guitars,” performed it in a video, and uploaded the clip to YouTube (sample lyrics: “I should have gone with someone else or gone by car…’cuz United breaks guitars”). Carroll even called out the unyielding United rep by name. Take that, Ms. Irlwig! (Note to customer service reps everywhere: you’re always on.)
The clip went viral, receiving 150,000 views its first day and five million more by the next month. Well into the next year, “United Breaks Guitars” remained the top result on YouTube when searching the term “United.” No other topic mentioning that word—not “United States,” “United Nations,” or “Manchester United”—ranked ahead of this one customer’s outrage.
Dave Carroll’s ode to his bad airline experience, “United Breaks Guitars,” went viral, garnering millions of views.
Scarring social media posts don’t just come from outside the firm. Earlier that same year employees of Domino’s Pizza outlet in Conover, North Carolina, created what they thought would be a funny gross-out video for their friends. Posted to YouTube, the resulting footage of the firm’s brand alongside vile acts of food prep was seen by over one million viewers before it was removed. Over 4.3 million references to the incident can be found on Google, and many of the leading print and broadcast outlets covered the story. The perpetrators were arrested, the Domino’s storefront where the incident occurred was closed, and the firm’s president made a painful apology (on YouTube, of course).
Not all firms choose to aggressively engage social media. As of this writing some major brands still lack a notable social media presence (Apple comes immediately to mind). But your customers are there and they’re talking about your organization, its products, and its competitors. Your employees are there, too, and without guidance, they can step on a social grenade with your firm left to pick out the shrapnel. Soon, nearly everyone will carry the Internet in their pocket. Phones and MP3 players are armed with video cameras capable of recording every customer outrage, corporate blunder, ethical lapse, and rogue employee. Social media posts can linger forever online, like a graffiti tag attached to your firm’s reputation. Get used to it—that genie isn’t going back in the bottle.
As the “United Breaks Guitars” and “Domino’s Gross Out” incidents show, social media will impact a firm whether it chooses to engage online or not. An awareness of the power of social media can shape customer support engagement and crisis response, and strong corporate policies on social media use might have given the clueless Domino’s pranksters a heads-up that their planned video would get them fired and arrested. Given the power of social media, it’s time for all firms to get SMARTThe social media awareness and response team. A group tasked with creating policies and providing support, training, guidance, and development expertise for and monitoring of a firm’s social media efforts., creating a social media awareness and response team. While one size doesn’t fit all, this section details key issues behind SMART capabilities, including creating the social media team, establishing firmwide policies, monitoring activity inside and outside the firm, establishing the social media presence, and managing social media engagement and response.
Firms need to treat social media engagement as a key corporate function with clear and recognizable leadership within the organization. Social media is no longer an ad hoc side job or a task delegated to an intern. When McDonald’s named its first social media chief, the company announced that it was important to have someone “dedicated 100% of the time, rather than someone who’s got a day job on top of a day job.”E. York, “McDonald’s Names First Social-Media Chief,” Chicago Business, April 13, 2010. Firms without social media baked into employee job functions often find that their online efforts are started with enthusiasm, only to suffer under a lack of oversight and follow-through. One hotel operator found franchisees were quick to create Facebook pages, but many rarely monitored them. Customers later notified the firm that unmonitored hotel Facebook pages contained offensive messages—a racist rant on one, paternity claims against an employee on another.
Organizations with a clearly established leadership role for social media can help create consistency in firm dialogue; develop and communicate policy; create and share institutional knowledge; provide training, guidance, and suggestions; offer a place to escalate issues in the event of a crisis or opportunity; and catch conflicts that might arise if different divisions engage without coordination.
While firms are building social media responsibility into job descriptions, also recognize that social media is a team sport that requires input from staffers throughout an organization. The social media team needs support from public relations, marketing, customer support, HR, legal, IT, and other groups, all while acknowledging that what’s happening in the social media space is distinct from traditional roles in these disciplines. The team will hone unique skills in technology, analytics, and design, as well as skills for using social media for online conversations, listening, trust building, outreach, engagement, and response. As an example of the interdisciplinary nature of social media practice, consider that the social media team at Starbucks (regarded by some as the best in the business) is organized under the interdisciplinary “vice president of brand, content, and online.”Starbucks was named the best firm for social media engagement in a study by Altimeter Group and WetPaint. See the 2009 ENGAGEMENTdb report at http://engagementdb.com.
Also note that while organizations with SMARTs (social media teams) provide leadership, support, and guidance, they don’t necessarily drive all efforts. GM’s social media team includes representatives from all the major brands. The idea is that employees in the divisions are still the best to engage online once they’ve been trained and given operational guardrails. Says GM’s social media chief, “I can’t go in to Chevrolet and tell them ‘I know your story better than you do, let me tell it on the Web.’”C. Barger, talk at the Social Media Club of Detroit, November 18, 2009. Also available via UStream and DigitalMarketingZen.com. Similarly, the roughly fifty Starbucks “Idea Partners” who participate in MyStarbucksIdea are specialists. Part of their job is to manage the company’s social media. In this way, conversations about the Starbucks Card are handled by card team experts, and merchandise dialogue has a product specialist who knows that business best. Many firms find that the social media team is key for coordination and supervision (e.g., ensuring that different divisions don’t overload consumers with too much or inconsistent contact), but the dynamics of specific engagement still belong with the folks who know products, services, and customers best.
In an age where a generation has grown up posting shoot-from-the-hip status updates and YouTube is seen as a fame vehicle for those willing to perform sensational acts, establishing corporate policies and setting employee expectations are imperative for all organizations. The employees who don’t understand the impact of social media on the firm can do serious damage to their employers and their careers (look to Domino’s for an example of what can go wrong).
Many experts suggest that a good social media policy needs to be three things: “short, simple, and clear.”J. Soat, “7 Questions Key to Social Networking Success,” InformationWeek, January 16, 2010. Fortunately, most firms don’t have to reinvent the wheel. Several firms, including Best Buy, IBM, Intel, The American Red Cross, and Australian telecom giant Telstra, have made their social media policies public.
Most guidelines emphasize the “three Rs”: representation, responsibility, and respect.
Policies also need to have teeth. Remember, a fourth “R” is at stake—reputation (both the firm’s and the employee’s). Violators should know the consequences of breaking firm rules and policies should be backed by action. Best Buy’s policy simply states, “Just in case you are forgetful or ignore the guidelines above, here’s what could happen. You could get fired (and it’s embarrassing to lose your job for something that’s so easily avoided).”
Despite these concerns, trying to micromanage employee social media use is probably not the answer. At IBM, rules for online behavior are surprisingly open. The firm’s code of conduct reminds employees to remember privacy, respect, and confidentiality in all electronic communications. Anonymity is not permitted on IBM’s systems, making everyone accountable for their actions. As for external postings, the firm insists that employees not disparage competitors or reveal customers’ names without permission and asks that any employee posts from IBM accounts or that mention the firm also include disclosures indicating that opinions and thoughts shared publicly are the individual’s and not Big Blue’s.
Some firms have more complex social media management challenges. Consider hotels and restaurants where outlets are owned and operated by franchisees rather than the firm. McDonald’s social media team provides additional guidance so that regional operations can create, for example, a Twitter handle (e.g., @mcdonalds_cincy) that handle a promotion in Cincinnati that might not run in other regions.E. York, “McDonald’s Names First Social-Media Chief,” Chicago Business, April 13, 2010. A social media team can provide coordination while giving up the necessary control. Without this kind of coordination, customer communication can quickly become a mess.
Training is also a critical part of the SMART mandate. GM offers an intranet-delivered video course introducing newbies to the basics of social media and to firm policies and expectations. GM also trains employees to become “social media proselytizers and teachers.” GM hopes this approach enables experts to interact directly with customers and partners, allowing the firm to offer authentic and knowledgeable voices online.
Followers of fashion label Kenneth Cole know when the firm’s eponymous founder, chairman, and chief creative officer has tweeted via the corporate account—he signs these tweets with his initials KC. But it looks like KC could have used a bit of SMART training when he offered up a meant-to-be-light-hearted quip comparing Egypt’s historic Mubarak-ousting protests (where several citizens were killed and injured) to enthusiasm for his firm’s “new spring collection.” Although the tweet was quickly deleted, screenshots (see below) linger forever, and the media widely reported on the big brand’s insensitive gaffe.
Training should also cover information security and potential threats. Social media has become a magnet for phishing, virus distribution, and other nefarious online activity. Over one-third of social networking users claim to have been sent malware via social networking sites (see Chapter 13 "Information Security: Barbarians at the Gateway (and Just About Everywhere Else)"). The social media team will need to monitor threats and spread the word on how employees can surf safe and surf smart.
Since social media is so public, it’s easy to amass examples of what works and what doesn’t, adding these to the firm’s training materials. The social media team provides a catch point for institutional knowledge and industry best practice; and the team can update programs over time as new issues, guidelines, technologies, and legislation emerge.
The social media space introduces a tension between allowing expression (among employees and by the broader community) and protecting the brand. Firms will fall closer to one end or the other of this continuum depending on compliance requirements, comfort level, and goals. Expect the organization’s position to move. Firms will be cautious as negative issues erupt, others will jump in as new technologies become hot and early movers generate buzz and demonstrate results. But it’s the SMART responsibility to avoid knee-jerk reaction and to shepherd firm efforts with the professionalism and discipline of other management domains.
Social media can be a cruel space. Sharp-tongued comments can shred a firm’s reputation and staff might be tempted to make anonymous posts defending or promoting the firm. Don’t do it! Not only is it a violation of FTC rules, IP addresses and other online breadcrumbs often leave a trail that exposes deceit.
Whole Foods CEO John Mackey fell victim to this kind of temptation, but his actions were eventually, and quite embarrassingly, uncovered. For years, Mackey used a pseudonym to contribute to online message boards, talking up Whole Foods stock and disparaging competitors. When Mackey was unmasked, years of comments were publicly attributed to him. The New York Times cited one particularly cringe-worthy post where Mackey used the pseudonym to complement his own good looks, writing, “I like Mackey’s haircut. I think he looks cute!”A. Martin, “Whole Foods Executive Used Alias,” New York Times, July 12, 2007.
Fake personas set up to sing your own praises are known as sock puppetsA fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual. Be aware that the use of undisclosed relationships in endorsements is a violation of U.S. Federal Trade Comission rules. among the digerati, and the practice of lining comment and feedback forums with positive feedback is known as astroturfingEngineering the posting of positive comments and reviews of a firm’s product and services (or negative ones of a firm’s competitors). Many ratings sites will penalize firms that offer incentives for positive feedback posts.. Do it and it could cost you. The firm behind the cosmetic procedure known as the Lifestyle Lift was fined $300,000 in civil penalties after the New York Attorney General’s office discovered that the firm’s employees had posed as plastic surgery patients and wrote glowing reviews of the procedure.C. Cain Miller, “Company Settles Case of Reviews It Faked,” July 14, 2009.
Review sites themselves will also take action. TripAdvisor penalizes firms if it’s discovered that customers are offered some sort of incentive for posting positive reviews. The firm also employs a series of sophisticated automated techniques as well as manual staff review to uncover suspicious activity. Violators risk penalties that include being banned from the service.
Your customers will also use social media keep you honest. Several ski resorts have been embarrassed when tweets and other social media posts exposed them as overstating snowfall results. There’s even an iPhone app skiers can use to expose inaccurate claims.L. Rathke, “Report: Ski Resorts Exaggerate Snowfall Totals,” USA Today, January 29, 2010.
So keep that ethical bar high—you never know when technology will get sophisticated enough to reveal wrongdoings.
Concern over managing a firm’s online image has led to the rise of an industry known as online reputation managementThe process of tracking and responding to online mentions of a product, organization, or individual. Services supporting online reputation management range from free Google Alerts to more sophisticated services that blend computer-based and human monitoring of multiple media channels.. Firms specializing in this field will track a client firm’s name, brand, executives’ names, or other keywords, reporting online activity and whether sentiment trends toward the positive or negative.
But social media monitoring is about more than about managing one’s reputation; it also provides critical competitive intelligence, it can surface customer support issues, and it can uncover opportunities for innovation and improvement. Firms that are quick to lament the very public conversations about their brands happening online need to embrace social media as an opportunity to learn more.
Resources for monitoring social media are improving all the time, and a number of tools are available for free. All firms can take advantage of Google Alerts, which flag blog posts, new Web pages, and other publicly accessible content, regularly delivering a summary of new links to your mailbox (for more on using Google for intelligence gathering, see Chapter 14 "Google in Three Parts: Search, Online Advertising, and Beyond"). Twitter search and Twitter clients like TweetDeck can display all mentions of a particular term. And more advanced commercial tools, such as Radian9, HubSpot, and CoTweet, monitor a wide variety of social media mentions, provide metrics for ongoing campaigns and practices, and gauge sentiment and spot opportunities for sales leads or customer service.
Figure 7.7
Tools, such as those provided by HubSpot (depicted here), track social media mentions by key word or phrase. Savvy organizations can mine comments for competitive intelligence, insight, and product ideas or to coordinate follow-up and thoughtful customer service.
Facebook provides a summary of page activity to administrators (including stats on visits, new fans, wall posts, etc.), while Facebook’s Insights tool measures user exposure, actions, and response behavior relating to a firm’s Facebook pages and ads.
Bit.ly and many other URL-shortening services allow firms to track Twitter references to a particular page. Since bit.ly applies the same shortened URL to all tweets pointing to a page, it allows firms to follow not only if a campaign has been spread through “retweeting” but also if new tweets were generated outside of a campaign. Graphs plot click-throughs over time, and a list of original tweets can be pulled up to examine what commentary accompanied a particular link.
Location-based services like Foursquare have also rolled out robust tools for monitoring how customers engage with firms in the brick-and-mortar world. Foursquare’s analytics and dashboard present firms with a variety of statistics, such as who has “checked in” and when, a venue’s male-to-female ratio, and which times of day are more active for certain customers. “Business owners will also be able to offer instant promotions to try to engage new customers and keep current ones.”N. Bolton, “Foursquare Introduces New Tools for Businesses,” March 9, 2010. Managers can use the tools to notice if a once-loyal patron has dropped off the map, potentially creating a special promotion to lure her back.
Monitoring should also not be limited to customers and competitors. Firms are leveraging social media both inside their firms and via external services (e.g., corporate groups on Facebook and LinkedIn), and these spaces should also be on the SMART radar. This kind of monitoring can help firms keep pace with employee sentiment and insights, flag discussions that may involve proprietary information or other inappropriate topics, and provide guidance for those who want to leverage social media for the firm’s staff—that is, anything from using online tools to help organize the firm’s softball league to creating a wiki for a project group. Social media are end-user services that are particularly easy to deploy but that can also be used disastrously and inappropriately, so it’s vital for IT experts and other staffers on the social media team to be visible and available, offering support and resources for those who want to take a dip into social media’s waters.
Firms hoping to get in on the online conversation should make it easy for their customers to find them. Many firms take an embassyIn the context of social media, an established online presence where customers can reach and interact with the firm. An effective embassy approach uses a consistent firm name in all its social media properties. approach to social media, establishing presence at various services with a consistent name. Think facebook.com/starbucks, twitter.com/starbucks, youtube.com/starbucks, flickr.com/starbucks, and so on. Corporate e-mail and Web sites can include icons linking to these services in a header or footer. The firm’s social media embassies can also be highlighted in physical space such as in print, on bags and packaging, and on store signage. Firms should try to ensure that all embassies carry consistent design elements, so users see familiar visual cues that underscore they are now at a destination associated with the organization.
As mentioned earlier, some firms establish their own communities for customer engagement. Examples include Dell’s IdeaStorm and MyStarbucksIdea. Not every firm has a customer base that is large and engaged enough to support hosting its own community. But for larger firms, these communities can create a nexus for feedback, customer-driven innovation, and engagement.
Customers expect an open dialogue, so firms engaging online should be prepared to deal with feedback that’s not all positive. Firms are entirely within their right to screen out offensive and inappropriate comments. Noting this, firms might think twice before turning on YouTube comments (described as “the gutter of the Internet” by one leading social media manager).Brad Nelson, presentation at the Social Media Conference NW, Mount Vernon, WA, March 25, 2010. Such comments could expose employees or customers profiled in clips to withering, snarky ridicule. However, firms engaged in curating their forums to present only positive messages should be prepared for the community to rebel and for embarrassing cries of censorship to be disclosed. Firms that believe in the integrity of their work and the substance of their message shouldn’t be afraid. While a big brand like Starbucks is often a target of criticism, social media also provides organizations with an opportunity to respond fairly to that criticism and post video and photos of the firm’s efforts. In Starbucks’ case, the firm shares its work investing in poor coffee-growing communities as well as efforts to support AIDS relief. A social media presence allows a firm to share these works without waiting for conventional public relations (PR) to yield results or for journalists to pick up and interpret the firm’s story. Starbucks executives have described the majority of comments the company receives through social media as “a love letter to the firm.” By contrast, if your firm isn’t prepared to be open or if your products and services are notoriously subpar and your firm is inattentive to customer feedback, then establishing a brand-tarring social media beachhead might not make sense. A word to the self-reflective: Customer conversations will happen online even if you don’t have any social media embassies. Users can form their own groups, hash tags, and forums. A reluctance to participate may signal that the firm is facing deeper issues around its product and service.
While firms can learn a lot from social media consultants and tool providers, it’s considered bad practice to outsource the management of a social media presence to a third-party agency. The voice of the firm should come from the firm. In fact, it should come from employees who can provide authentic expertise. Starbucks’ primary Twitter feed is managed by Brad Nelson, a former barista, while the firm’s director of environmental affairs, Jim Hanna, tweets and engages across social media channels on the firm’s green efforts.
Having an effective social media presence offers “four Ms” of engagement: it’s a megaphone allowing for outbound communication; it’s a magnet drawing communities inward for conversation; and it allows for monitoring and mediation of existing conversations.J. Gallaugher and S. Ransbotham, “Social Media and Dialog Management at Starbucks” (presented at the MISQE Social Media Workshop, Phoenix, AZ, December 2009). This dialogue can happen privately (private messaging is supported on most services) or can occur very publicly (with the intention to reach a wide audience). Understanding when, where, and how to engage and respond online requires a deft and experienced hand.
Many firms will selectively and occasionally retweet praise posts, underscoring the firm’s commitment to customer service. Highlighting service heroes also reinforces exemplar behavior to employees who may be following the firm online, too. Users are often delighted when a major brand retweets their comments, posts a comment on their blog, or otherwise acknowledges them online—just be sure to do a quick public profile investigation to make sure your shout-outs are directed at customers you want associated with your firm. Escalation procedures should also include methods to flag noteworthy posts, good ideas, and opportunities that the social media team should be paying attention to. The customer base is often filled with heartwarming stories of positive customer experiences and rich with insight on making good things even better.
Many will also offer an unsolicited apology if the firm’s name or products comes up in a disgruntled post. You may not be able to respond to all online complaints, but selective acknowledgement of the customer’s voice (and attempts to address any emergent trends) is a sign of a firm that’s focused on customer care. Getting the frequency, tone, and cadence for this kind of dialogue is more art than science, and managers are advised to regularly monitor other firms with similar characteristics for examples of what works and what doesn’t.
Many incidents can be responded to immediately and with clear rules of engagement. For example, Starbuck issues corrective replies to the often-tweeted urban legend that the firm does not send coffee to the U.S. military because of a corporate position against the war. A typical response might read, “Not true, get the facts here” with a link to a Web page that sets the record straight.
Reaching out to key influencers can also be extremely valuable. Prominent bloggers and other respected social media participants can provide keen guidance and insight. The goal isn’t to create a mouthpiece, but to solicit input, gain advice, gauge reaction, and be sure your message is properly interpreted. Influencers can also help spread accurate information and demonstrate a firm’s commitment to listening and learning. In the wake of the Domino’s gross-out, executives reached out to the prominent blog The Consumerist.A. Jacques, “Domino’s Delivers during Crisis: The Company’s Step-by-Step Response after a Vulgar Video Goes Viral,” The Public Relations Strategist, October 24, 2009. Facebook has solicited advice and feedback from MoveOn.org months before launching new features.B. Stone, “Facebook Aims to Extend Its Reach across the Web,” New York Times, December 2, 2008. Meanwhile, Kaiser Permanente leveraged advice from well-known health care bloggers in crafting its approach to social media.J. Kane, R. Fichman, J. Gallaugher, and J. Glaser, “Community Relations 2.0,” Harvard Business Review, November 2009.
However, it’s also important to recognize that not every mention is worthy of a response. The Internet is filled with PR seekers, the unsatisfiably disgruntled, axe grinders seeking to trap firms, dishonest competitors, and inappropriate groups of mischief makers commonly referred to as trolls. One such group hijacked Time Magazine’s user poll of the World’s Most Influential People, voting their twenty-one-year-old leader to the top of the list ahead of Barack Obama, Vladimir Putin, and the pope. Prank voting was so finely calibrated among the group that the rankings list was engineered to spell out a vulgar term using the first letter of each nominee’s name.E. Schonfeld, “Time Magazine Throws Up Its Hands As It Gets Pawned by 4Chan,” TechCrunch, April 27, 2009.
To prepare, firms should “war game” possible crises, ensuring that everyone knows their role, and that experts are on call. A firm’s social media policy should also make it clear how employees who spot a crisis might “pull the alarm” and mobilize the crisis response team. Having all employees aware of how to respond gives the firm an expanded institutional radar that can lower the chances of being blindsided. This can be especially important as many conversations take place in the so-called dark Web beyond the reach of conventional search engines and monitoring tools (e.g., within membership communities or sites, such as Facebook, where only “friends” have access).
In the event of an incident, silence can be deadly. Consumers expect a response to major events, even if it’s just “we’re listening, we’re aware, and we intend to fix things.” When director Kevin Smith was asked to leave a Southwest Airline flight because he was too large for a single seat, Smith went ballistic on Twitter, berating Southwest’s service to his thousands of online followers. Southwest responded that same evening via Twitter, posting, “I’ve read the tweets all night from @ThatKevinSmith—He’ll be getting a call at home from our Customer Relations VP tonight.”
In the event of a major crisis, firms can leverage online media outside the social sphere. In the days following the Domino’s incident, the gross-out video consistently appeared near the top of Google searches about the firm. When appropriate, companies can buy ads to run alongside keywords explaining their position and, if appropriate, offering an apology.S. Gregory, “Domino’s YouTube Crisis: 5 Ways to Fight Back,” Time, April 18, 2009. Homeopathic cold remedy Zicam countered blog posts citing inaccurate product information by running Google ads adjacent to these links, containing tag lines such as “Zicam: Get the Facts.”Zicam had regularly been the victim of urban legends claiming negative side effects from use; see Snopes.com, “Zicam Warning,” http://www.snopes.com/medical/drugs/zicam.asp. However, the firm subsequently was cited in an unrelated FDA warning on the usage of its product; see S. Young, “FDA Warns against Using 3 Popular Zicam Cold Meds,” CNN.com, June 16, 2009.
Review sites such as Yelp and TripAdvisor also provide opportunities for firms to respond to negative reviews. This can send a message that a firm recognizes missteps and is making an attempt to address the issue (follow-through is critical, or expect an even harsher backlash). Sometimes a private response is most effective. When a customer of Farmstead Cheeses and Wines in the San Francisco Bay area posted a Yelp complaint that a cashier was rude, the firm’s owner sent a private reply to the poster pointing out that the employee in question was actually hard of hearing. The complaint was subsequently withdrawn and the critic eventually joined the firm’s Wine Club.K. Paterson, “Managing an Online Reputation,” New York Times, July 29, 2009. Private responses may be most appropriate if a firm is reimbursing clients or dealing with issues where public dialogue doesn’t help the situation. One doesn’t want to train members of the community that public griping gets reward. For similar reasons, in some cases store credit rather than reimbursement may be appropriate compensation.
Using the Twitter handle “TheConnor,” a graduating college student recently offered full-time employment by the highly regarded networking giant Cisco posted this tweet: “Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.” Bad idea. Her tweet was public and a Cisco employee saw the post, responding, “Who is the hiring manager. I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the web.” Snap!
But this is also where the story underscores the subtleties of social media engagement. Cisco employees are right to be stung by this kind of criticism. The firm regularly ranks at the top of Fortune’s list of “Best Firms to Work for in America.” Many Cisco employees take great pride in their work, and all have an interest in maintaining the firm’s rep so that the company can hire the best and brightest and continue to compete at the top of its market. But when an employee went after a college student so publicly, the incident escalated. The media picked up on the post, and it began to look like an old guy picking on a clueless young woman who made a stupid mistake that should have been addressed in private. There was also an online pile-on attacking TheConnor. Someone uncovered the woman’s true identity and posted hurtful and disparaging messages about her. Someone else set up a Web site at CiscoFatty.com. Even Oprah got involved, asking both parties to appear on her show (the offer was declined). A clearer social media policy highlighting the kinds of issues to respond to and offering a reporting hierarchy to catch and escalate such incidents might have headed off the embarrassment and helped both Cisco and TheConnor resolve the issue with a little less public attention.H. Popkin, “Twitter Gets You Fired in 140 Characters or Less,” MSNBC, March 23, 2009.
It’s time to take social media seriously. We’re now deep into a revolution that has rewritten the rules of customer-firm communication. There are emerging technologies and skills to acquire, a shifting landscape of laws and expectations, a minefield of dangers, and a wealth of unexploited opportunities. Organizations that professionalize their approach to social media and other Web 2.0 technologies are ready to exploit the upside—potentially stronger brands, increased sales, sharper customer service, improved innovation, and more. Those that ignore the new landscape risk catastrophe and perhaps even irrelevance.