The team at Convince and Convert wrote today about the widespread problem of plagiarism in social media, and the problem will only continue to worsen as more people produce more content on the public web. Here are three strategies you can take, to ensure you get the returns that you deserve for your original content work.
In 2009, Gartner reported that 70% of social business programs fail. Some folks seemed surprised. But, let’s take a look at the range of failure rates reported for CRM projects over the years.
More and more brands are realizing the benefits of enabling their employees in social media, so software vendors and IT departments are responding by adding features and functionality. In recent years, a few B2B tech companies enabled their employees with basic training and permission to engage, and a more sophisticated and transformational approach to enablement is coming over the next 2-3 years. (P.S. That is the focus of my book with Susan Emerick.)
In anticipation of this trend, a new class of software is emerging, specifically aimed at enabling employees in social media, at scale. The chart below shows the four types of solutions that are being applied in this emerging space:
For all the folks selling social business, who think that they will sway business leaders by beating a drum to the tune of “The World is Changing and You Must Change With It”, I offer the following two quotes from the 2003 book Reengineering the Corporation, by Michael Hammer:
As I write an upcoming book with Susan Emerick, on the topic of enabling large numbers of employees in social media, we continually meet people with a vision for change, who need help in developing their ability to lead the change — to tirelessly communicate their vision, and to simply get everyone on board.
In the mean time, we will begin peppering little nuggets like this one from Ken Burns, to help us all build the skill that we need, but have so little time to develop.
A lot of people think that a brand must own all aspects of social media listening. People fear that outsourcing even a part of the engagement process (i.e., listening) would take away the authenticity which is supposed to be the pixie dust of social media. People wonder how they would build an authentic, direct relationship with customers or stakeholders if they outsource some of the process.
While relationship-building can not be outsourced, we should ask ourselves which parts of the social media engagement process really do build the relationship. Here’s a hint: listening is not the critical part that you have to execute with internal employees, and this post explains why.
With players stitching hashtags and twitter handles onto their shoes, the Premier League in the UK has published social media guidelines for the players.
Since FINRA released Notice 10-06 in 2010, and Morgan Stanley began allowing financial advisors to use social networks for business, consumer expectations and business marketing trends have been colliding to create new and interesting regulatory requirements.
InvestmentPal created the following comparison of web email adoption, since 1996 when Hotmail launched, versus social network adoption, beginning in 2006 when Twitter launched:
Digiday recently wrote that “Twitter dominates brand conversations”, based on upon the observation by Burson-Marsteller that more than half of Fortune 100 brand mentions in a month occurred on Twitter . But counting brand mentions is not the same as counting business value. In fact, resources should be allocated according to the relative value of each social venues, not the relative volume of brand mentions.
B2B and B2C marketers are using social sign-on features to gather more data about the people who engage with their web properties — for example, letting people complete a lead-gen form or contest submission by logging-in with their Facebook or LinkedIn ID.
But a lot of marketers do not understand the data that is available through social sign-on, so Eloqua created a simple graphic to show the types of data that are available to a marketer when visitors use their Facebook, Twitter and LinkedIn credentials to access an offer, shown below: