2. Agenda Social media in context Risks Rewards Implementation Social enterprise New internet domains Resources Note: these slides are published under Creative Commons and available to download (some animations plus further details and references in notes view). Please feel free to re-use, but do please cite source .Thank you.
6. Web - evolution Web 1.0 Dial-up Passive downloading Peripheral comms activity ‘Bricks and clicks’ transactions Limited business value Web 2.0 Broadband Rich media User generated content Customer conversations Increasing business value Semantic web AI Business value Social web Web 3.0? Wireless Intelligent agents Machine manipulation Inter-operable content Strategic imperative Knowledge Information Brochure-ware 2000 2005 1995 Today Complexity & role of technology
7. Traditional brand promotion One to many Disruptive advertising Alerting and awareness PR Staff Comms idea Ads Physical Direct marketing Web
8. Social media More than a movement from traditional media to online media It is a fundamental cultural change that has far reaching implications Control over customer conversations is no longer possible in this new world All organisations operate in this changing social environment and must engage with this cultural and technological change if they are to influence these new conversations “If you have a brand, you‘re under threat. Your customers have always had an idea about what your brand signifies, an idea that may vary from the image you are projecting. Now they‘re talking to each other about that idea. They are redefining for themselves the brand you spent millions of dollars creating.”ForresterGroundswell Report
9. Social media spectrum Social video, photo & audio Social bookmarking Social networks Wikis Microblogs Blogs Widgets & Mashups Social media
11. The new culture Many to one Listening & engaging You do not control.. ..do not try to control.. ..but you can affect your audience’s perception – and on a much larger scale than ever before Source: DigitalStrangelove PR Staff Brand community Ads Print Direct marketing Web
17. Risks Reputation: misinformation, defamation, IP rights abuse, brand protection Financial: stock price manipulation Legal: regulation violation, liability claims arising from false endorsement (fake reviews) Identity theft: impersonation, access to corporate data, malware/social engineering Ownership: employee vs organisation, documents leaked to internet “If your business depends on a positive Internet reputation, then you have little choice than to explicitly manage that reputation online”. Gartner “These Internet sites in general are a proven haven for malicious actors and content and are particularly high risk due to information exposure, user generated content and targeting by adversaries.”US Military
20. Twitter phishing attacks Jan 5 2009 – ‘Monday morning madness’ – 18yr old hacks 33 high profile accounts including President Obama and Britney Spears Feb 26 2010 – Twitter phishing attacks make UK headlines Ed Miliband – Cabinet minister for energy and climate change tweeted - "Oh dear it seems like I've fallen victim to twitter's latest 'phishing' scam.“ (the offending hack tweet has been removed) Some hacked by software that looked for weak passwords URL shortening services e.g. Bit.ly –now implementing monitoring and scanning akin to web-hosted email such as Hotmail or Gmail
22. Online brand infringement Global Counterfeit Sales Defend Revenue: control online channels, prevent loss of revenue Counterfeit Wholesale Exchanges Gray Market Sales Identity Fraud(Financial) Protect Brand: monitor for abuses and take action Identity/ Credential Theft(Phishing) Complexity of Threat Brand Abuse Direct Marketing of Fake Goods Brand Compliance Traffic Diversion Create Ownership in Identity with global domain registration and management Customer Solicitation False Association Copycat Sites Disparagement Cyber-Squatting Source: MarkMonitor Severity of Threat
23. Reputation - Brand abuse threats Phishing - criminals attempt to steal personal identity and related information using emails, websites and social media that reflect brand identity of targeted brand Pharming - hacker redirects website traffic to a bogus site Cybersquatting - infringing on trademarks within the domain name system - often part of an overall brand infringement that involves other tactics Malware - visitor directed to a bogus site or page – malicious code (e.g. a virus) is downloaded in the background – compromised computer can now be used to launch email spam, log info entered via keyboard, and even in cyber warfare
24. Mitigating risks Organisational: process, policies, guidance, resourcing Staff policy on appropriate use of internet sites – how is this communicated, monitored and enforced? Are staff educated on online risks, security, privacy? Does your organisational structure and operational resources align to the new reality? No, really? Shift blogs and community sites to separate legal entity? Need to explicitly monitor and manage online presence: determine relevancy of threat, sentiment etc. prioritisation of content of concern and issues process for determining sites for enforcement consideration for responses to infringers Site complaint mechanism, cease & desist, litigation Crisis communications – what to do in real time world – contingency planning – buying keywords etc.
27. Power of social recommendations Source: http://arnoldwaldstein.com/blog/facebook/
28. Facebook revenue - $1Billion + Branded direct sale inventory Sells campaigns to agencies and brand owners through its sales force Rate card is circa $20 CPM – higher than most social networks $50K min spend for agencies? Self serve display ads Search engine marketers beginning to switch some of their budgets to Facebook Early adoption resulting in higher click through rates, but likely to decline as adoption becomes mainstream Virtual goods & Facebook credits Collects 30% of all sales of virtual goods such as birthday gifts and items in games or worlds Launched branded virtual-good ad units Targeting and viral features Advertisers can select by a range of demographic and preference criteria Estimated size of target audience, clicks and impressions are provided at configuration Viral elements can expand a campaign well past the ad units bought.
31. Dell Learnt from early brand damage Developed a ‘conversations and communities’ team of 40+ people Several blogs 65 twitter accounts which 400K+ followers Promotions on Twitter have generated in excess of £3m in sales http://www.dell.com/twitter - official Dell twitter feeds, blogs, customer ratings & reviews
33. Social media implementation Organisations recognize the need to implement or improve their social marketing programs, but cite a lack of tools and expertise as their biggest challenges. Strategy and objectives – not technology tools! Enabling employees – rapid micro-communications Listen and respond to what customers and critics say
34. Online brand protection - implementation Considerations Services Start early to set precedent and to demonstrate pro-activity to sponsors Establish process, workflow and reporting Identify technology tools Prioritise infringement types Continuously revise filters as new sponsors and issues arise Filter out irrelevant domains Allow time for Cease & Desist notifications to take effect Brand monitoring services Online security services Social media buzz monitoring Domain monitoring Internet monitoring for trademarks Logo and image tracking URL link checking Auction site monitoring Phishing attack management
36. Social not-working Most organisations are concerned about the impact of social networking on staff productivity & risks of leaking sensitive corporate information Robert Half Technology – Oct 09 survey of 1,400 US CIOs: 54% of U.S. companies say that they have banned workers from using social networking sites 19% of companies allow social networking use only for business purposes 16% allow limited personal use Nucleus Research – July 09 survey of 237 corporate employees employee productivity drops 1.5% at companies that allow full access to Facebook in the workplace one in 33 workers surveyed said that they use Facebook only while at work 87% said they had no clear business reason for accessing the social network
37. Social enterprise Organisations must also adapt to the expectations of customers and employees who widely use such tools “The adoption of social networking type applications will drive the next generation of business software and growth” (Bill Gates)
39. New Internet domains “New York City, like many of its global competitors, plans to apply for a top level domain name.” NYC council * The Internet domain system is to be liberalised - it will soon be possible to create new domains for: cities, as well cultural & geographic regions brands & trademarks generic keywords ICANN predicts 400-500 new domains in first round of applications. “My government would certainly welcome and support a dot Sydney domain.” - Nathan Rees, (former) New South Wales Premier
43. Conclusions The marketing mix is broader and deeper, with a plethora of interactive tools and channels – keep web investment up Risk and reputation - must monitor your internet presence and act accordingly Cultural shift - to engage externally, you must first change internally
46. Resources Top 10 social media blogs Mashable Socialnomics Wikipedia Social Media Digital Strangelove
47. Photo credits All photos are Creative Commons, sourced via Compfight Slide 3 - Atlas Slide 4 – Digital Globe Slide 5 – Map of Internet Slide 13 – The Conversation Prism Slide 16 – Barbra Streisand Slide 17 – Astroturf
48. Biography David Green is an Internet consultant. He is currently (March 10) working on several projects including applications for new domains resulting from the impending liberalisation of the Internet domain system. Previously he was Global eMarketing Director for Deloitte, where he led the firm’s global web operations & Internet marketing, including online brand protection & social media. He is a regular speaker at conferences and events, including presenting on sustainable brands at MARQUES, and has contributed to a variety of publications including Financial Times, The Independent & World Trademark Review. www.davidgreen.me.uk
Source: Flickr Creative Commons – Digital Globe: http://www.flickr.com/photos/planetpub/3814162436/sizes/o/in/photostream/
Source: Flickr Creative Commons: Map of internet http://www.flickr.com/photos/48600098314@N01/3485479724/http://www.opte.org/
Increase in wireless digital spectrum to provide greater infrastructure for wireless web – wireless technologies already account for 3% of EU GDPSemantic web – meaningful machine manipulation
‘Social media’ encompasses a broad spectrum of websites and tools, but all are defined by rapid micro-communications, content sharing/syndication and ‘real-time’ timeframes.Organisations need to develop an overall social media strategy, within which they have appropriate prioritisation, processes and employee guidelines for each (type of) social media channel.
Employees - social media use – brand ambassadors – raise importance of brand culture within the brand hierarchy, not just identity and positioning
Even ‘inactives’ are exposed to User Generated Content through search results, friends opinions etc Quote source: Forrester – Social Media Groundswell report - http://www.forrester.com/Groundswell
US military - Aug 09 – reaffirm ban Feb 10 – revoke ban, but emphasise policy & guidelinesQuote sources:Gartner – Notes on brand monitoring firms – Sept 07Source: http://www.marines.mil/news/messages/Pages/MARADMIN0458-09.aspxhttp://www.marines.mil/usmc/Pages/SocialMedia.aspx
Streisand effect – attempts to remove content from the internet result in its spreading widelyStreisand effect – California coastline was photographed – singer Barbra Streisand attempted to get the photo of her house removed – publicity caused people to copy the photo and post copies on other sites around the internet - http://en.wikipedia.org/wiki/Streisand_effectSource: Flickr Creative Commons – Barbra Streisand - http://www.flickr.com/photos/caro1000/1336076251/sizes/l/
Fake blogs, false posting on authentic sites, fake identitiesWalmartingacrossamerica.com key tag - FAKEL’Oreal – Journal de ma peau – fake blogger called ‘Claire’Sony - alliwantforxmasisapsp.com – fake hip hop blogger wanting a Playstation for christmasSony – 2005 pays $1.5M for ‘reviews’ from fake film criticSock pupetry - Employees posting bogus reviews on genuine sitesCan be corporate or political. Result? Viral vitriolEU's Directive on Unfair Business-to-ConsumerCommercial Practices makes such scams illegalLifestylelift fined $300K by State of New York for anonymous, fake, positive reviewsPhot source: Flickr Creative Commons http://www.flickr.com/photos/21342817@N00/3244673556/en.wikipedia.org/wiki/Astroturfinghttp://www.prwatch.org/node/8531Fake Blogs: http://news.bbc.co.uk/1/hi/business/7287413.stm
A whole spectrum of other threats to brandson the internetTraffic Diversion can include SEO manipulation (use of brands, slogans or trademarks located in visible text, hidden text, meta tags and title in order to manipulate search engine rankings), links (to third party or competitor sites), framed website, pay per click (Google Adwords) etcBrand abuse could entail incorrect use of logo or trademark imagesBrand compliance would entail that authorised third parties (or even parts of your own organisation) are using your brand or licensed trademarks appropriately
Phishers are finding new opportunities, and are reacting to anti-phishing efforts. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real addresses — they are the "signposts" of the Internet - http://en.wikipedia.org/wiki/Pharming“The release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications”.Symantec Internet Security Threat Report’ April 09 http://www.symantec.com/business/theme.jsp?themeid=threatreport
Emarketing such as search marketing, email marketing still need to be excecuted flawlesslyThe marketing mix has become broader and deeper
Source: Economist survey on social networking: http://www.economist.com/specialreports/displaystory.cfm?story_id=15351026Facebook – 450M users – 70% outside of US – growing by 500K per dayFacebook expects to do between $1.2 billion and $2 billion in sales this year.Go public in 2011 – investors anticipate a market cap of $35B - $40B (Google’s market cap on first day of trading in 2004 - $27B)Facebook successfully granted patent for its newsfeed feature - may be struck down as ‘obvious’ *(*Source:http://blogs.wsj.com/digits/2010/02/26/facebook-patents-the-news-feed/)
Sources: http://www.businessinsider.com/facebook-revenues-near-1-billion-2009-12?utm_source=Triggermail&utm_medium=email&utm_campaign=SAI%20Select%2C%20Thursday%2C%2012%2F17%2F09Target ads to Facebook members using page, location, gender, marital status,/relationships education, age, hobbies on education, workplaces, relationships, sexual preference, language, group membership, page membership, and application usage. Viral elements – e.g. Your profile is updated if you become a fan, and your friends are notifiedVirtual goods - Global virtual goods markets estimate at $5 billion, 30% margin akin to Apple apps, Skittels & P&G are amongst virtual goods brand adopters. Farmville and Mafia Wars are popular virtual games in Facebookhttp://www.businessinsider.com/how-much-ad-money-can-facebook-get-from-diaper-and-flower-sales-on-the-site-2010-3Facebook.com/advertising
On the social web, interruptive push advertising is basically spamGoogle’s Ad Words and Ad Sense programs deliver the vast majority of Google’s $22 billion in revenue, (approx a quarterof all online advertising revenue).Google has over one million advertisers.
www.Facebook.com/marmitebarsSoft launch – Dec 3rd 2009 – campaign launch Feb 19 2010Has 2,325 fans (March 8) – roadshow of cereal booth bar around London train stations – post user videos, videos, comments etc. Importantly – campaign tagline ‘What do you think?’ designed to generate conversation and individual interactionshttp://www.facebook.com/ninewestUS accessory retailer Nine West – Facebook commerce app on its ‘fan’ page – 15% discount - Over 56,000 fanswww.facebook.com/avonproductsincOver 103,000 fans. Make up video tips, rep locator, used for recruitment etc.Avon – Mark brand – friend-to-friend sales appOthers of note: 1-800 Flowers ,P& G Pampers -
Most brand monitoring services have been acquired by domain name registrars e.g. Envisional acquired by Netnames, Mark Monitor is an integrated service, but some remain independent e.g. Brand Dimensions
Social media also offers tremendous internal potential for large organisations – e.g. Reducing knowledge silos on intranets etc. Yammer.com Quote source:Bill Gates – Microsoft Tech Ed June 2008 http://www.microsoft.com/presspass/exec/billg/speeches/2008/06-03teched.mspx
*- NYC Council Member Gale A. Brewer, Chair of the Council’s Technology in Government Committee.