,

Chapter 17

Defining the Rules of Engagement

To prevent information leaks and other liabilities, companies are drafting guidelines for social media interaction. A rule of thumb: Don't be stupid.

—BUSINESS WEEK1

With access to social tools, we are more influential than we realize, and that works both for us and against us.

Before we create and implement outbound social media programs, we must first educate employees on the benefits and hazards associated with social media and the workplace. However, this should not include banning access to these networks. I discuss that topic more thoroughly a bit later.

Without realizing the impact of a single update, employees are jeopardizing brand stature, reputation, and competitive edge. Also, employees are sharing candid and damaging thoughts and updates—intentionally and unintentionally—that possess an uncanny ability to surface when least expected and be discovered by people who were never supposed to see them in the first place.

And, perhaps accidentally, employees are sharing company secrets and information that should never see the light of day, and are doing so simply because they have access to the tools that personally connect them to their friends, family, and peers. Just because we have access to the tools doesn't mean we know how to use them.

Yet, heeding BusinessWeek's advice is easier said than done. One might believe that common sense is pervasive and prevailing; I believe that common sense, however, is mostly uncommon. In a new media world where many of us are literally learning as we go, commonsensical behavior usually acquiesces to a resemblance to common nonsense, rather than sense and sensibility. Therefore, we need to proactively avert crises before they arise. Plus, it wouldn't hurt to have some direction in place so we know our role in this new business landscape.

INSIDE THE OUTSIDE: ASSESSING THREATS AND OPPORTUNITIES

Businesses are scrambling to understand the technologies and platforms associated with social computing and how to integrate them into the existing workflow. More so, information technology (IT), human resources, and executive management are also struggling with the impact of social networks on the culture and productivity within the company, as well as the resulting shifts in internal behavior.

Traditionally, new technology and policies were introduced to organizations in a top-down process once they were formally evaluated and ratified by IT and management. If new technologies, services, and applications were introduced by employees or outside influences, IT was responsible for assessing the benefits and risks from the perspective of improving and streamlining processes, and possibly cutting expenses.

Social computing has created a backdoor for many of these services that also introduces potential dangers to the existing infra-structure and to the systematic routines for ensuring productivity. For the first time, new technologies are permeating the enterprise and business infrastructures from the bottom up. And these technologies precipitate change, carrying the ability to significantly revolutionize business processes in every aspect of the business. In fact, social media starts to add new layers of process and responsibilities.

Some companies view social networks and blogs as a threat to productivity, network security, and company intelligence. They are therefore prohibiting access to these networks from within the firewall. Many studies have already concluded that there are indeed productivity decreases when employees have unregulated access to personal communications tools and distractions. But this isn't new. Distractions have long been debated, including smoke and coffee breaks, water cooler chats, and even cell phones, instant messaging services, and now social networks.

In August 2009, the United States Marines banned the use of Twitter, MySpace, Facebook, and other social networks for a period of one year, citing the risks to both personnel and network security.

The Marine Corps order attempted to explain the rationale:

These Internet sites in general are a proven haven for malicious actors and content and are particularly high risk due to information exposure, user-generated content and targeting by adversaries… . The very nature of SNS [social network sites] creates a larger attack and exploitation window, exposes unnecessary information to adversaries and provides an easy conduit for information leakage that puts OPSEC [operational security], COMSEC [communications security], and personnel … at an elevated risk of compromise.2

When news of this order initially surfaced, journalists and social media experts reacted in disbelief. However, understanding their concerns allows us to assess possibilities about how to deploy and guide usage as it relates to the business and mission of the armed forces, and any civilian organization for that matter.

On the other hand, before the Marines issued their ordinance, the Army had ordered bases to allow access to social networks, after a year-long banishment.

The Army public affairs managers shared the operations order publicly to clarify intentions and justify the command:

… the intent of senior Army leaders to leverage social media as a medium to allow soldiers to “tell the Army story” and to facilitate the dissemination of strategic, unclassified information. Therefore, the social media sites available from the Army homepage will be made accessible from all campus area networks. Additionally, all Web-based email will be made accessible.3

In an interview with Wired's Danger Room, Price Floyd, the Pentagon's social media czar, shared his views of and vision for social media:4

OPSEC is paramount. We will have procedures in place… . What we can't do is let security concerns trump doing business. We have to do business… . We need to be everywhere men and women in uniform are and the public is. If that's MySpace and YouTube, that's where we need to be, too.

As such, the Pentagon ordered a review of social networks in the second half of 2009 to craft policies that dictate usage scenarios and goals for services such as Twitter, MySpace, and Facebook.

Officials acknowledged the potential influence within the military and also in the greater population for these networks. As a result, they developed rules that would allow the military to take advantage of the expedient communications inherent within social networks without exposing sensitive information, jeopardizing personnel, or placing computer networks at risk.

A number of top commanders and officers already maintain public profiles on social networks.

Admiral Michael G. Mullen,5 chairman of the Joint Chiefs of Staff, and Army General Ray Odierno,6 the top commander in Iraq, maintain Facebook profiles. Mullen also actively tweets.

Responding to questions on Twitter as to whether or not Mullen would continue to participate during times when the security, threats, and benefits of social networks are questioned, Mullen wrote, “Obviously we need to find the right balance between security and transparency. We are working on that. But am I still going to tweet? You bet.”

In an interview with the Los Angeles Times, Navy Captain John Kirby, a spokesman for Mullen, acknowledged that the chairman had already seen the importance of using social media to communicate with the public. He stated,

The genie is out of the bottle. There is just such a power in it, we have to find a way to achieve this balance. No one wants to provide information to potential enemies, but this is a dialogue that we cannot afford not to be a part of.7

Top generals are also are taking the initiative to reach troops and other constituents through personal blogs. For example, Major General Michael Oates,8 a two-star general overseeing 19,000 U.S. soldiers in southern and central Iraq, maintains a blog and hosts chats to communicate within and to those defining the chain of command, as well as maintaining dialogues with troops who are scattered across Iraq.

So why am I sharing examples of social media bans and active communications in the military?

The answer is as simple as it is poignant. If the U.S. military is actively seeking guidelines for defining, regulating, and promoting the use of social media to improve communications and influence constituents, then it's safe to assume that your organization should follow suit.

Everything starts with assessment and the implementation of structure, followed by management and responsibility.

POLICIES AND GUIDELINES

Best Buy initially broke ground with its Blue Shirt Network, which fostered conversation, interaction, and content to improve employee communication and team spirit. The company also catalyzed customer support and participation when it introduced IdeaXchange, a dedicated feedback community designed to solicit feedback to help make Best Buy a better place to shop.

Among many other accomplishments, Best Buy again pioneered a new and controversial social program with the introduction of its @Twelpforce account on Twitter. The account is simple in design but radical in concept, deployment, and implications. Arguably one of the most outlandish social media mavens of its time, Best Buy leveraged the reach of mainstream traditional media in the form of television commercials to generate awareness for a specific new media initiative.

Twelpforce tapped the wisdom of its own crowds to assemble and deploy an armada of service professionals to help answer questions posed by everyday people on Twitter, and also to proactively share insights from their personal and professional accounts on the @twelpforce account directly (see Figure 17.1).

Figure 17.1 Twelpforce Tweet

ch17fig001.eps

Without direction, training, and a supporting infrastructure, this program would most likely have imploded. However, Best Buy provided a set of guidelines and instructions to guide participants in the program to help them assist customers and ultimately engender goodwill and to inspire action in the process.

Risky?

Yes.

Creative?

Yes.

Another example of overusing “tw” in a name?

Yes.

Effective?

Yes!

An excerpt from Best Buy Connect,9 an internal network that serves as the voice of the Best Buy employee, offers guidance to participants of the @Twelpforce program:

The promise we're making starting in July is that you'll know all that we know as fast as we know it. That's an enormous promise. That means that customers will be able to ask us about the decisions they're trying to make, the products they're using, and look for the customer support that only we can give. And with Twitter, we can do that fast, with lots of opinions so they can make a decision after weighing all the input. It also lets others learn from it as they see our conversations unfold.

When you start, remember that the tone is important. Above all, the tone of the conversation has to be authentic and honest. Be conversational. Be yourself. Show respect. Expect respect. The goal is to help. If you don't know the answer, tell them you'll find out. Then find out and let them know.

To help you establish programs and policies, I've included the complete set of instructions, as I feel that they are indicative of a solid foundation for implementing and sharing guidelines.

Approach

Tell them you're from Best Buy—part of the Twelpforce. Be engaged, know what's going on out there but don't intrude or invade. If someone is talking about how they're looking for a product that we may sell, don't swoop in and tell them they'd be better off buying it from us. If they're looking for help, or opinions, they'll ask.

Don't talk about private company stuff even in direct messages. Don't ask for personal customer information even in direct message. Offer an email by direct message instead.

Connect people to outside sources or other Best Buy people when appropriate. Don't directly refer them to other customers on Twitter or elsewhere. If your answer requires more than 140 characters, create a blog on your local store page and refer customers to it. Or look in the Best Buy Community Support Forums—there are tons of great questions and answers there.

Above all, if you don't know or if you're not sure, ask. Always respond quickly and follow up quickly. Apologize for delays or misunderstandings.

What Do You Have to Do?

You don't need any special skills—you just have to be curious, proactive, and helpful—much of the same stuff you do every day.

The best thing you can do to start is to listen to what people are saying and asking on Twitter. Go to http://search.twitter.com and search for things you're interested in. Search for your favorite brand, your favorite category, for Best Buy. Find out what questions and problems people have. And figure out a way to help them. It all starts with a simple post.

Customer:

yoshimac: need to buy a new tv for bedroom so i can watch what i want no desprate housewives blaaaaaaaaaaaaaa

You:

@yoshimac If you need some help figuring what to get, let me know. I work at Best Buy in the Home Theater Dept and could give you some opinions. If not, thats cool too.

What if someone else already answered her question? Have a different opinion? Let them know what you think. The goal of Twelpforce is to share our knowledge and give people the information they need to make a decision. When I look for a new home in a new city, I don't just ask one person, I get opinions from as many trusted sources as I can and then after weighing the input, I make a decision. But remember—if you engage, show respect. Expect respect. The goal is to help. Not to be creepy.

Other Tools for Searching for Twitter Questions or Customer Problems

Search @twelpforce on http://search.twitter.com after July 19th. Customers will be directed through the media support to ask questions directed at @twelpforce.

1. Twitter Search: It's the most basic and most obvious, but this tool now allows for RSS feeds as well as filtering based on language.

2. http:spy.appspot.com: Spy can listen in on the social media conversations you're interested in. What do you want to listen for?

3. www.monitter.com: It's a twitter monitor, it lets you monitter the twitter world for a set of keywords and watch what people are saying.

4. http://tweetbeep.com: Free Twitter alerts by e-mail.

5. Twist: Free site for Twitter visualizations over time.

6. Twitter Browser: Free application to see who is connected to whom. Good for relational analysis and velocity of a users’ network.

7. Tweetstats: If you want to research a specific user, you can see how often he posts, when he posts, and who he retweets (that is, who influences him) and plan accordingly.

Assumptions have no business in business—especially when influential voices can sway the crowd for you or against you.

Policies and guidelines must be clear and explicit in intentions and implementation and leave nothing to chance. Training is absolutely required.

To help those who are unfamiliar with style guides, document and convey the brand essence and how to accurately display it in various forms of media. Usage scenarios, approved artwork, type treatments, and approved language should all be included. Conversational workflow should also be defined.

These new media style guides serve as the sheet music to ensure that we as brand representatives are singing the same song, in key, in unison, and beautifully.

Style guides are not new to business. They are staples in the world of advertising and branding, as they outline in great detail how, when, and where the brand is to be portrayed. We need a style guide for social media. As such, every company should create and distribute a style guide or handbook of guidelines, not only for social media, but specifically for each social network in which the company currently engages or expects to engage, as well as policies and instructions for discrete programs and campaigns. Instructions such as “don't be stupid” are not enough.

When I wrote the guidelines for Facebook use for a Fortune 500 company, it was 25 pages long. It was considered far too long for practical use, so we trimmed it so that it was easier to consume. The problem was, it left too much open to interpretation. As you could imagine, this is where common sense becomes help or hindrance. The company learned the hard way, as many of the employees took liberties with all that was missing from the final document.

While you may offer a quick-start guide to help you and your team kick-start programs, true success is defined by understanding, reinforced by practice and continued education. Therefore we cannot overlook the need for a detailed instruction manual complete with best practices, scenarios, pitfalls, objectives, rewards, and corresponding consequences.

EXAMPLE GUIDELINES AND POLICIES

Here are some additional examples to glean inspiration and direction. Please keep in mind, however, that these examples are representative of what is and not always what should be. As you read these, remember the lessons, stories, and advice that I've shared with you thus far. Source these for inspiration only, and create a social style guide that is representative of your world and the questions, concerns, capabilities, and opportunities that are present in your business.10

Intel Social Media Guidelines11

These are the official guidelines for social media at Intel. If you're an Intel employee or contractor creating or contributing to blogs, wikis, social networks, virtual worlds, or any other kind of social media both on and off intel.com—these guidelines are for you. We expect all who participate in social media on behalf of Intel to be trained, to understand, and to follow these guidelines. Failure to do so could put your future participation at risk. These guidelines will continually evolve as new technologies and social networking tools emerge—so check back once in a while to make sure you're up to date.

When You Engage

Emerging platforms for online collaboration are fundamentally changing the way we work, offering new ways to engage with customers, colleagues, and the world at large. It's a new model for interaction and we believe social computing can help you to build stronger, more successful business relationships. And it's a way for you to take part in global conversations related to the work we are doing at Intel and the things we care about.

If you participate in social media, please follow these guiding principles:

  • Stick to your area of expertise and provide unique, individual perspectives on what's going on at Intel and in the world.
  • Post meaningful, respectful comments—in other words, no spam and no remarks that are off-topic or offensive.
  • Always pause and think before posting. That said, reply to comments in a timely manner, when a response is appropriate.
  • Respect proprietary information and content, and confidentiality.
  • When disagreeing with others’ opinions, keep it appropriate and polite.
  • Know and follow the Intel Code of Conduct and the Intel Privacy Policy

Rules of Engagement

Be transparent. Your honesty—or dishonesty—will be quickly noticed in the social media environment. If you are blogging about your work at Intel, use your real name, identify that you work for Intel, and be clear about your role. If you have a vested interest in something you are discussing, be the first to point it out.

Be judicious. Make sure your efforts to be transparent don't violate Intel's privacy, confidentiality, and legal guidelines for external commercial speech. Ask permission to publish or report on conversations that are meant to be private or internal to Intel. All statements must be true and not misleading and all claims must be substantiated and approved. Product benchmarks must be approved for external posting by the appropriate product benchmarking team. Please never comment on anything related to legal matters, litigation, or any parties we are in litigation with without the appropriate approval. If you want to write about the competition, make sure you know what you are talking about and that you have the appropriate permission. Also be smart about protecting yourself, your privacy, and Intel confidential information. What you publish is widely accessible and will be around for a long time, so consider the content carefully.

Write what you know. Make sure you write and post about your areas of expertise, especially as related to Intel and our technology. If you are writing about a topic that Intel is involved with but you are not the Intel expert on the topic, you should make this clear to your readers. And write in the first person. If you publish to a website outside Intel, please use a disclaimer, something like this: “The postings on this site are my own and don't necessarily represent Intel's positions, strategies, or opinions.” Also, please respect brand, trademark, copyright, fair use, trade secrets (including our processes and methodologies), confidentiality, and financial disclosure laws. If you have any questions about these, see your Intel legal representative. Remember, you may be personally responsible for your content.

Perception is reality. In online social networks, the lines between public and private, personal and professional are blurred. Just by identifying yourself as an Intel employee, you are creating perceptions about your expertise and about Intel by our shareholders, customers, and the general public—and perceptions about you by your colleagues and managers. Do us all proud. Be sure that all content associated with you is consistent with your work and with Intel's values and professional standards.

It's a conversation. Talk to your readers like you would talk to real people in professional situations. In other words, avoid overly pedantic or composed language. Don't be afraid to bring in your own personality and say what's on your mind. Consider content that's open-ended and invites response. Encourage comments. You can also broaden the conversation by citing others who are blogging about the same topic and allowing your content to be shared or syndicated.

Are you adding value? There are millions of words out there. The best way to get yours read is to write things that people will value. Social communication from Intel should help our customers, partners, and co-workers. It should be thought-provoking and build a sense of community. If it helps people improve knowledge or skills, build their businesses, do their jobs, solve problems, or understand Intel better—then it's adding value.

Your responsibility. What you write is ultimately your responsibility. Participation in social computing on behalf of Intel is not a right but an opportunity, so please treat it seriously and with respect. If you want to participate on behalf of Intel, take the Digital IQ training and contact the Social Media Center of Excellence. Please know and follow the Intel Code of Conduct. Failure to abide by these guidelines and the Intel Code of Conduct could put your participation at risk. Contact [email protected] for more information. Please also follow the terms and conditions for any third-party sites.

Create some excitement. As a business and as a corporate citizen, Intel is making important contributions to the world, to the future of technology, and to public dialogue on a broad range of issues. Our business activities are increasingly focused on high-value innovation. Let's share with the world the exciting things we're learning and doing—and open up the channels to learn from others.

Be a leader. There can be a fine line between healthy debate and incendiary reaction. Do not denigrate our competitors or Intel. Nor do you need to respond to every criticism or barb. Try to frame what you write to invite differing points of view without inflaming others. Some topics—like politics or religion—slide more easily into sensitive territory. So be careful and considerate. Once the words are out there, you can't really get them back. And once an inflammatory discussion gets going, it's hard to stop.

Did you screw up? If you make a mistake, admit it. Be upfront and be quick with your correction. If you're posting to a blog, you may choose to modify an earlier post—just make it clear that you have done so.

If it gives you pause, pause. If you're about to publish something that makes you even the slightest bit uncomfortable, don't shrug it off and hit “send.” Take a minute to review these guidelines and try to figure out what's bothering you, then fix it. If you're still unsure, you might want to discuss it with your manager or legal representative. Ultimately, what you publish is yours—as is the responsibility. So be sure.

Moderation Guidelines

Moderation is the act of reviewing and approving content before it's published on the site. Intel does not endorse or take responsibility for content posted by third parties. It is preferred that all content be posted by registered users of a site in accordance with accepted terms and conditions and a code of conduct.

Intel Content: We do not moderate content we publish. This means we allow our blog authors to post directly without approval, as long as they have taken the required trainings.

Anonymous Content: Anonymous content is defined as content submitted as a comment, reply, or post to an Intel site on which the user has not registered and is not logged in to the site. For anonymous content, we require moderation on all submissions. Authors of the originating content and space moderators are required to review the content for approval or deletion before the content can be published.

Registered Content: Registered content is content submitted as a comment, reply, or post to an Intel site on which the user has registered and is logged in to the site. We do not require moderation of registered content before the content is published to the site. Registered content is directly published and content is moderated post-publishing. Intel strives for a balanced online dialogue. When we do moderate content, we moderate using three guiding principles.

The Good, the Bad, but Not the Ugly. If the content is positive or negative and in context to the conversation, then we approve the content, regardless of whether it's favorable or unfavorable to Intel. However if the content is ugly, offensive, denigrating, and completely out of context, then we reject the content.

IBM Social Computing Guidelines12

Responsible Engagement in Innovation and Dialogue

Whether or not an IBMer chooses to create or participate in a blog, wiki, online social network, or any other form of online publishing or discussion is one's own decision. However, emerging online collaboration platforms are fundamentally changing the way IBMers work and engage with each other, clients, and partners.

IBM is increasingly exploring how online discourse through social computing can empower IBMers as global professionals, innovators, and citizens. These individual interactions represent a new model: not mass communications, but masses of communicators.

Therefore, it is very much in IBM's interest—and, we believe, in each IBMer's own—to be aware of and participate in this sphere of information, interaction, and idea exchange.

To learn: As an innovation-based company, we believe in the importance of open exchange and learning—between IBM and its clients, and among the many constituents of our emerging business and societal ecosystem. The rapidly growing phenomenon of user-generated Web content—blogging, Social Web applications, and networking—are emerging important arenas for that kind of engagement and learning.

To contribute: IBM—as a business, as an innovator, and as a corporate citizen—makes important contributions to the world, to the future of business and technology, and to public dialogue on a broad range of societal issues. As our business activities increasingly focus on the provision of transformational insight and high-value innovation—whether to business clients or those in the public, educational, or health sectors—it becomes increasingly important for IBM and IBMers to share with the world the exciting things we're learning and doing, and to learn from others.

In 1997, IBM recommended that its employees get out onto the Internet—at a time when many companies were seeking to restrict their employees’ Internet access. In 2005, the company made a strategic decision to embrace the blogosphere and to encourage IBMers to participate. We continue to advocate IBMers’ responsible involvement today in this rapidly growing space of relationship, learning, and collaboration.

IBM Social Computing Guidelines: Executive Summary

1. Know and follow IBM's business conduct guidelines.13

2. IBMers are personally responsible for the content they publish on blogs, wikis, or any other form of user-generated media. Be mindful that what you publish will be public for a long time—protect your privacy.

3. Identify yourself—name and, when relevant, role at IBM—when you discuss IBM or IBM-related matters. And write in the first person. You must make it clear that you are speaking for yourself and not on behalf of IBM.

4. If you publish content to any website outside of IBM and it has something to do with work you do or subjects associated with IBM, use a disclaimer such as this: “The postings on this site are my own and don't necessarily represent IBM's positions, strategies, or opinions.”

5. Respect copyright, fair use, and financial disclosure laws.

6. Don't provide IBM's or another's confidential or other proprietary information. Ask permission to publish or report on conversations that are meant to be private or internal to IBM.

7. Don't cite or reference clients, partners, or suppliers without their approval. When you do make a reference, link back to the source, if possible.

8. Respect your audience. Don't use ethnic slurs, personal insults, obscenity, or engage in any conduct that would not be acceptable in IBM's workplace. You should also show proper consideration for others’ privacy and for topics that may be considered objectionable or inflammatory—such as politics and religion.

9. Find out who else is blogging or publishing on the topic, and cite them.

10. Be aware of your association with IBM in online social networks. If you identify yourself as an IBMer, ensure your profile and related content is consistent with how you wish to present yourself with colleagues and clients.

11. Don't pick fights, be the first to correct your own mistakes, and don't alter previous posts without indicating that you have done so.

12. Try to add value. Provide worthwhile information and perspective. IBM's brand is best represented by its people and what you publish may reflect on IBM's brand.

I've shared with you some of the most comprehensive examples available, and as you can see, they share many common attributes:

  • Ensure a consistent, personable, and brand-enhancing tone or voice.
  • Add value to each engagement—contribute to a stature and legacy.
  • Respect those with whom you're engaging and also respect the forum in which you participate.
  • Ensure that you honor copyrights and practice and promote fair use of applicable content.
  • Protect confidential and proprietary information.
  • Be transparent and be human (well, be believable and helpful).
  • Represent what you should represent.
  • Know and operate within the defined boundaries.
  • Know when to fold 'em and don't engage trolls or fall into conversational traps.
  • Keep things conversational as it applies to portraying and reinforcing the personality and value of your brand and the brand you represent.
  • Stay on message, on point, and on track with the goals of your role and its impact on the real-world business to which you contribute.
  • Don't trash the competition—not directly, anyway.
  • Apologize when necessary.
  • Be accountable for your actions and offer no excuses.
  • Know whom you're talking to and what they're seeking.
  • Disclose relationships, representations, affiliations, and intentions.
  • Practice self-restraint; some things are not worth sharing.

Stop reading this book and establish or champion the development of personal guidelines in reference to the business and brand right now.

THE LOUISIANA PURCHASE AND THE GREAT BRAND GRAB

Okay, so you put down the book or your electronic reader to set guidelines for employee usage, right? Great. Glad to have you back. Let's continue.

Much like the early days of the Web, which eventually contributed to the chaos and madness of the dotcom era and its eventual financial fall, the Social Web is opening up a veritable land grab for social real estate at a fraction of the price that it will be worth to you tomorrow.

As in anything new and exciting, there's usually a rush to action. But for some reason, in social media the rush to relevance seemed subdued—at least initially. It was understandable, however. After all, depending on the organization, skepticism, procrastination, or lethargy were at play.

Part of the rules of engagement require that we establish a consistent presence across the social networks where we need to maintain a presence as well as plan for those where we might one day need to engage or simply protect our brand assets.

These usernames, pages, and profiles are instrumental in how we portray our brand and brand story. They also serve as the fabric for the greater social construct that links visitors to intended experiences through the channels that deliver our intended experience and help them obtain desired results.

  • In every network, the brand and product name should be identical.
  • The profile pages must reflect the aesthetics, information, and personality as determined by the social style guide in the spirit of the network in which they appear.
  • Define the click paths to help visitors navigate your information network.

It should go without saying, but as you may or may not know, the landscape for social networks is vast and may be beyond our initial reach. However, excuses, ignorance, and ambivalence aside, we are responsible for attaining and managing our personal and professional brands, as well as those we represent, even if it simply implies that we secure the domain or username—including its derivatives, both positive and negative. For example, companyx, productx, companyxsucks, or companyxmustdie.

Create a standard naming convention that is simple, uncomplicated, concise (friendly to microblogs and other forms of micromedia), and easy to both remember and also to input on mobile devices. In addition to these guidelines, create a naming formula that is friendly and identifiable by the outside world. Too many organizations that I have worked with over the years forget that people outside the organization may not understand the significance of a unique department or division. Others attempt to inject more information than is necessary, embellished by quotes, underlines, and other symbols. This only leads to brand dilution and confusion.

This is true online as well. In 2008, FairWinds Partners14 released a study that documented the power of Internet gripe sites. The Wall Street Journal explored the topic with an in-depth article, “How to Handle ‘IHateYourCompany.com’,”15 which reviewed what some companies are doing, or not doing, to protect their brands online.

In its study, FairWinds researched the Web to identify gripe sites specifically containing “sucks.com.” The study uncovered more than 20,000 domains with only 2,000 ending in the phrase “stinks.com.” Of the major companies surveyed, only 35 percent owned the domain name for their brand followed by the word “sucks.”

But domain names are only one of the many opportunities for customers to share their discontent, and in the emerging era of the two-way Web, communications, customer service, and brand and reputation management teams must not only collaborate to actively survey the landscape to detect and diagnose negative experiences, but also proactively plan for it. And part of that process is securing and establishing a uniform brand name in addition to its positive or negative variations and adaptations.

Service providers such as Knowem.com can not only scour the entire Web for available and taken usernames in social networks for you, but also acquire them and cost-effectively create profiles based on a template you create. One of the greatest value propositions of this service and others like it is that they automatically create profiles in emerging networks to prevent opportunists and angry customers from squatting on desired usernames. And if the username is unavailable (read squatted), Knowem provides helpful steps to retrieve domain ownership.

For example, when I worked with Anheuser-Busch, we initially discovered that the names associated with the premier corporate and product brands were already taken in key social networks. We were forced to manually contact each network to transfer ownership back, even if we weren't planning on deploying a strategy within each network immediately or in the near future. Produce and company names are, after all, brand assets.

RULES OF ENGAGEMENT

As the Social Web continues to emerge, establishing not only policies and guidelines but also defining the rules of engagement will help shape proactive and reactive dialogues to benefit the business, brand, employees, and customers. This is not the same as implementing and managing rules of conduct. Assessing the common traits found in the guidelines referred to previously, here is a suggested list of rules of engagement with which to compose your “sheet music.”

  • Unveil the communities of influence and discover their choices, challenges, impressions, and wants.
  • Participate where your presence is advantageous and mandatory; don't just participate anywhere and everywhere.
  • Consistently create, contribute to, and reinforce service and value.
  • Concentrate participation where it will offer the greatest rewards for both sides.
  • Assess pain points, frustrations, and also expressions of contentment, to establish emotional connections.
  • Determine the brand identity, character, and personality you wish to portray—and match it to the individual persona of who's in front of it when online.
  • Adapt predefined personalities with the voice of the community in which you engage.
  • Observe the behavioral cultures within each network and adjust your outreach accordingly.
  • Become a true participant in each community you wish to galvanize.
  • Don't speak at audiences through messages.
  • Dig deeper to connect what transpires in the Social Web to your business objectives.
  • Learn from each engagement.
  • Ensure that any external activities are supported by a comprehensive infrastructure to address situations and adapt to market conditions and demands.
  • Establish a point of contact who is ultimately responsible for identifying, trafficking, or responding to all things that can affect brand perception.
  • Act, don't just listen and placate—do something.
  • Earn connections through collaboration.
  • Empower advocacy.
  • Embody the attributes you wish to portray and instill.
  • Don't get lost in conversation or translation; ensure your involvement strategically maps to objectives specifically created for the Social Web.
  • Establish and nurture beneficial relationships online and in the real world as long as public perception and action is important to your business.
  • Un- campaign programs and ensure they're part of a day-to-day cause.
  • Unmarket by offering solutions and becoming a resource to your communities.
  • Give back, reciprocate, acknowledge, add value, and contribute where it makes sense.

INTEL'S DIGITAL IQ PROGRAM

While guidelines are critical, they are only as effective as the training, education, and implementation of that insight into day-to-day practice.

I serve as an advisor to Intel as part of the company's Intel Insider program, along with Frank Gruber, Tom Foremski, J. D. Lasica, Cathy Brooks, and other incredible people. I have enjoyed the opportunity to help instill these messages with the already forward-thinking people defining Intel's marketing, communications, and service teams. Ken Kaplan is responsible for the implementation of this educational program. But its reach is companywide, and thus carries a global impact.

I have also had the benefit of working with Intel's Bryan Rhodes on educational and organizational transformation projects (this is discussed in more depth later) and I believe that Rhodes's work and the corresponding new media educational programs that Intel has implemented and fostered should serve as the standard for all organizations.

Rhodes serves as the curriculum architect and senior digital strategist for the Intel Social Media Center of Excellence and chairs the Digital IQ program for all employees who already have or who will participate in new media on behalf of the company—for internal and external communications.

The goals of the Digital IQ program complement the company's shift of marketing investments from traditional to new media by increasing employee capabilities. The topics shared as part of this program provide insight into sales and marketing techniques, online retailing and reselling, and media, as well as search, analytics, and metrics. In all, Rhodes and his team have compiled a curriculum of more than 55 courses, complete with videos, supplementary materials, and a test at the end of each course. (See Figure 17.2 for a list of some of the courses.)

Figure 17.2 Digital IQ Partial Course Listing

ch17fig002.eps

The aim of Digital IQ is to:

  • Create a vast Intel digital force.
  • Unlock digital genius.
  • Capture digital sales and marketing best-known methods.
  • Apply this knowledge on the job.

As such, Intel has instituted four role-based training levels:

1. Level IV is created for the digital marketing specialist, for whom the results of the program are intended to enhance and guide the creation of improved, relevant, and compelling content and social objects.

2. Level III is programmed for integrated marketing, communications managers, and internal bloggers, providing them with the tools, guidelines, lessons, and directions for integrating and distributing insight and information.

3. Level II serves as the blueprint for helping field account managers sell effectively, using social tools, networks, and services to reach their customers and prospects.

4. Level I is designed for everyone else, to help employees understand the landscape and promise of new media and how it affects their job and career, today and tomorrow.

The Digital IQ program mirrors university models in that its employees register for required courses as well as electives to earn a diploma. This certification allows employees to represent Intel in new media at the corresponding level.

To complete each level, participants are required to attend and pass as many as five courses to earn the desired certification. Each year, employees must complete courses in the continuing education program for recertification.

Perhaps the most common response to Intel's groundbreaking program is one of appreciation, followed quickly by skepticism about the ability to fund, design, and institute such a program within a particular part of the organization.

If the potential perils aren't enough to convey the need to do so, and induce a sense of urgency, think about Intel's results.

By the middle of 2009, Intel's then-10-month-old program had served more than 18,500 courses and delivered a total of 16,000 training hours. More than 68 percent of participants found it immediately applicable to their job, with even more attesting to the potential of their careers as they evolve. Funding for the program was overwhelmingly approved because of the buzz, improved morale, and companywide engagement.

There is no choice. Employees must learn the art and science of content creation and distribution, engagement, and community development before they can lead conversations and the tribes that form around your brand, culture, and ideologies.

WITH SOCIAL MEDIA COMES GREAT RESPONSIBILITY

Please remember these words… .

Perhaps the biggest mistakes committed in social media occur when businesses jump in to social networks blindly, without establishing guidelines or a plan of action. What's really missing is a sense of what people are seeking and how and why they communicate, an understanding of where people are congregating, a definition of what they represent and how they will personify the brand online, and the goals, objectives, and metrics associated with participation.

Everything starts with education and the institution of policies to protect individuals and brands.

In addition to setting the guidelines and regulations for how and when employees should and shouldn't engage online, we must now teach our spokespersons, ambassadors, and advocates how to leverage the immediacy, extent, and potential of these powerful social tools. Our communities will follow by example.

Holding informal and infrequent workshops or publishing internal guidelines for self-consumption and interpretation is not nearly enough to satisfy the substantial requirements for an in-depth comprehension of the scenarios, circumstances, objectives, hazards, and nuances associated with engagement, influence, and community building.

This is more than publishing and it's far more important than empowering employees with the ability to chat online.

It's our responsibility to contribute to the increase of a significant, tuned, and strategic signal.

We are vested in the brands we represent—especially if we're on the front lines of emerging media. Enthusiasm, energy, spirit, and fervor are contagious, inspirational, and addictive.

NOTES

1. Douglas MacMillan, “A Twitter Code of Conduct,” BusinessWeek (May 8, 2009), www.businessweek.com/managing/content/may2009/ca2009058_089205.htm?chan=careers_special+report+–+social+media+2009_special+report+–+social+media+2009.

2. “Immediate Ban on Internet Social Networking Sites on Marine Corps Enterprise Network NIPRNET,” U.S. Marine Corps (August 3, 2009), www.marines.mil/news/messages/Pages/MARADMIN0458–09.aspx.

3. Noah Shachtman, “Army Orders Bases to Stop Blocking Twitter, Facebook, Flickr,” Wired (June 10, 2009), www.wired.com/dangerroom/ 2009/06/army-orders-bases-stop-blocking-twitter-facebook-flickr/.

4. Noah Shachtman, “Marines Ban Twitter, MySpace, Facebook,” Wired (August 3, 2009), www.wired.com/dangerroom/2009/08/marines-ban -twitter-myspace-facebook/.

5. www.facebook.com/admiralmikemullen.

6. www.facebook.com/RayOdierno.

7. Julian E. Barnes, “What's on the Pentagon's mind? Facebook,” Los Angeles Times (August 5, 2009), www.latimes.com/news/nationworld/nation/la-na-pentagon-facebook5–2009aug05,0,3998956.story.

8. www.drum.army.mil/sites/tenants/division/CMDGRP/CG/CG.htm.

9. Best Buy Connect, http://bbyconnect.appspot.com/tips_and_expectations/.

10. “Guidelines,” Best Buy, www.bestbuyinc.com/aggregator/our-guidelines.

11. “Intel Social Media Guidelines,” Intel, www.intel.com/sites/sitewide/ en_US/social-media.htm.

12. “IBM Social Computing Guidelines,” IBM, www.ibm.com/blogs/zz/en/ guidelines.html.

13. “Business Conduct Guidelines,” IBM, www.ibm.com/investor/corpgovernance/cgbcg.phtml.

14. www.fairwindspartners.com/.

15. Emily Steel, “How to Handle ‘IHateYourCompany.com’,” Wall Street Journal (September 5, 2008), http://webreprints.djreprints.com/2022491227441.html.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
44.200.94.150