SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
Risk and Reward
    in Social Media
or…

     …how do we control the
  message in Social Media, what
   is the risk of getting involved
        and when is this risk
   outweighed by the risk of not
         getting involved?

© Daemon Group 2008          www.daemondigital.com
What’s on the agenda


•    A short history of the world
•    What is the risk … and how can we evaluate it?
•    How to manage, or mitigate, risk in Social Media
•    How much does it really matter if you get it wrong?
•    Controlling your message … or have you ever?
•    Key person risk, who should engage and why?
•    Approaching the tipping point?




© Daemon Group 2008                              www.daemondigital.com
The opportunity in context
                                                              29.8m
                                              61.0m
                                  0.26m
                                                      5.4m
                                      17.8m


                                                       3.7m




                                                             72.9%
                                                              5.1m



    © Daemon Group 2008                                               www.daemondigital.com
Source: UM Wave 3
Social Media users by global region
                                                       5.20%
                                    9.17%

                                                                                                   34.55%

             22.61%



                                                                    28.47%




                        Asia Pacific      Europe      North America              Latin America   Mid East/Africa

                                                       Based upon unique visitors in June 2008




© Daemon Group 2008   Source: comScore World Metrix                                                                www.daemondigital.com
Social Media                                                  62%
                                            47.4%             read
                                             post                       29.0%
                                                                         write
                               77.0%               Imagery   Blogging
                               watch                                               No14
                          28.2%                                            Micro Sydney*
                                       Video
                          upload                                          blogging




                              Podcasting                                         RSS
                                                                                       24.6%
                      40.2%                                                             feed
                      listen

                                      Forums                              Widgets


                                                      Chat   Networks
                                           74%
                                          message                21.1%
                                                                 belong




© Daemon Group 2008   Source: UM Wave 3 *Twitter Grader                                        www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
Normal distribution of technology adoption




© Daemon Group 2008                          www.daemondigital.com
Early adoption




© Daemon Group 2008   www.daemondigital.com
Standard extended lifecycle




© Daemon Group 2008           www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   source: thepaisano.wordpress.com   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
Traditional definition of risk




   Risk = probability x impact
           Risk = (probability of an event occurring) x (impact of event occurring)




© Daemon Group 2008                                                            www.daemondigital.com
Risk in information systems


        •     The probability that there is a threat;




        •     The probability that there are any vulnerabilities;




        •     The potential impact on the business




© Daemon Group 2008                                                 www.daemondigital.com
Risk in information systems


        •     The probability that there is a threat;

              Someone who could attack the organisation


        •     The probability that there are any vulnerabilities;

              The susceptiblity to attack, or what could be used against the organisation


        •     The potential impact on the business

              What damage could be caused by the attack




© Daemon Group 2008                                                            www.daemondigital.com
Definition of risk in information management




Risk = threat x vulnerability x impact




© Daemon Group 2008                            www.daemondigital.com
Risk profile of engagement


       Use Social Media to listen
       Use Social Media to ask questions
       Use Social Media to extend your contacts
       Use Social Media to drive your existing contacts
       Use Social Media to sell your IP
       Use Social Media to sell your services



© Daemon Group 2008                               www.daemondigital.com
Binary risk profile of Social Media

                                     Threat   Vulnerability   Impact   Risk

        Listen
                                       0           0            0         0

        Ask questions
                                       0           1            0         0

        Extend contacts
                                       1           1            1         1

        Drive contacts
                                       0           1            1         0

        Sell intellectual property
                                       1           1            1         1

        Sell products or services
                                       1           1            1         1




© Daemon Group 2008                                                    www.daemondigital.com
Risk profile of engagement


       Use Social Media to listen
       Use Social Media to ask questions
       Use Social Media to extend your contacts
       Use Social Media to drive your existing contacts
       Use Social Media to sell your IP
       Use Social Media to sell your services



© Daemon Group 2008                               www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
Definition of risk in Social Media




Risk = threat x vulnerability x impact
                        engagement




© Daemon Group 2008                  www.daemondigital.com
Definition of risk in Social Media




Risk = Kohnstamm x reputation x sales
                      Credibility/Thorn Tree




© Daemon Group 2008                            www.daemondigital.com
95 video results on You Tube
                        0 video responses from Taco Bell
                        1.2 million view to first video alone
                         Taco Bell response on website
                       2,975 comments to first video alone
                           0 comments from Taco Bell

                      Rats Take Over KFC/Taco Bell

© Daemon Group 2008                                             www.daemondigital.com
Social Media engagement




© Daemon Group 2008       www.daemondigital.com
Social Media engagement model




© Daemon Group 2008             www.daemondigital.com
Social Media engagement model




© Daemon Group 2008             www.daemondigital.com
Controlled




                        ADVERTISING




                      Monologue                    Dialogue




© Daemon Group 2008                                           www.daemondigital.com
                                  Uncontrolled
Controlled




                        ADVERTISING




                      Monologue                       Dialogue




                                             WORD OF MOUTH



© Daemon Group 2008                                              www.daemondigital.com
                                  Uncontrolled
Controlled




                        ADVERTISING




                      Monologue                         Dialogue




                                               SOCIAL MEDIA



© Daemon Group 2008                                                www.daemondigital.com
                                  Uncontrolled
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
Zero to 60: Ford’s Social Media
Story




Scott Monty (@ScottMonty)
Global Digital Communications
Ford Motor Company (@Ford)

© Daemon Group 2008               www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
Early adoption




© Daemon Group 2008   www.daemondigital.com
45% of employers screen
        Social Media sites


    © Daemon Group 2008          www.daemondigital.com
source: careerbuilder.com 2009
reported they found content on social media that
                                      caused them not to hire the candidate




    © Daemon Group 2008                                                             www.daemondigital.com
source: careerbuilder.com 2009
Standard extended lifecycle




© Daemon Group 2008           www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com
© Daemon Group 2008   www.daemondigital.com

Contenu connexe

Similaire à Risks and Rewards of Social Media Engagement

B2 B B2 C Web 2.0 From Conversation To Communication V2
B2 B B2 C Web 2.0 From Conversation To Communication V2B2 B B2 C Web 2.0 From Conversation To Communication V2
B2 B B2 C Web 2.0 From Conversation To Communication V2Andy Curlewis
 
The state of social media_2012 Comscore report
The state of social media_2012 Comscore reportThe state of social media_2012 Comscore report
The state of social media_2012 Comscore reportKaran Bhujbal
 
The State of Social Media 2012
The State of Social Media 2012The State of Social Media 2012
The State of Social Media 2012immediate future
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Vertical Networks V10
Vertical Networks V10Vertical Networks V10
Vertical Networks V10PublicShare
 
Mphan international project
Mphan international projectMphan international project
Mphan international projectMikki Phan
 
Helix - Media Delivery Platform
Helix - Media Delivery PlatformHelix - Media Delivery Platform
Helix - Media Delivery PlatformInteract
 
2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack 2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack Raleigh ISSA
 
Social Media Outlook 2012
Social Media Outlook 2012Social Media Outlook 2012
Social Media Outlook 2012Sallie Burnett
 
Creating videos people want to watch
Creating videos people want to watchCreating videos people want to watch
Creating videos people want to watchRichard Harrington
 
The Social Web. Why Brands Must Listen, Measure and Act v2.0
The Social Web. Why Brands Must Listen, Measure and Act v2.0The Social Web. Why Brands Must Listen, Measure and Act v2.0
The Social Web. Why Brands Must Listen, Measure and Act v2.0Visible Technologies
 
Take The Leap: Finding the Right Place for Social Media in Your Organizationa...
Take The Leap: Finding the Right Place for Social Media in Your Organizationa...Take The Leap: Finding the Right Place for Social Media in Your Organizationa...
Take The Leap: Finding the Right Place for Social Media in Your Organizationa...Kevin Trowbridge, Ph.D., APR
 
SEMA 2011: Changing Landscape of Media | Automotive Marketing
SEMA 2011: Changing Landscape of Media | Automotive MarketingSEMA 2011: Changing Landscape of Media | Automotive Marketing
SEMA 2011: Changing Landscape of Media | Automotive MarketingLevelwing
 
Transforming Public Engagement- Craig Thomler v3.2
Transforming Public Engagement- Craig Thomler v3.2Transforming Public Engagement- Craig Thomler v3.2
Transforming Public Engagement- Craig Thomler v3.2PublicVoice
 

Similaire à Risks and Rewards of Social Media Engagement (20)

b2b use of social media
b2b use of social mediab2b use of social media
b2b use of social media
 
B2 B B2 C Web 2.0 From Conversation To Communication V2
B2 B B2 C Web 2.0 From Conversation To Communication V2B2 B B2 C Web 2.0 From Conversation To Communication V2
B2 B B2 C Web 2.0 From Conversation To Communication V2
 
The state of social media_2012 Comscore report
The state of social media_2012 Comscore reportThe state of social media_2012 Comscore report
The state of social media_2012 Comscore report
 
The State of Social Media 2012
The State of Social Media 2012The State of Social Media 2012
The State of Social Media 2012
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Vertical Networks V10
Vertical Networks V10Vertical Networks V10
Vertical Networks V10
 
Mphan international project
Mphan international projectMphan international project
Mphan international project
 
Helix - Media Delivery Platform
Helix - Media Delivery PlatformHelix - Media Delivery Platform
Helix - Media Delivery Platform
 
2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack 2010-11 The Anatomy of a Web Attack
2010-11 The Anatomy of a Web Attack
 
Kick off Social Media
Kick off Social MediaKick off Social Media
Kick off Social Media
 
Glam 2008 V12
Glam 2008 V12Glam 2008 V12
Glam 2008 V12
 
Social Media Outlook 2012
Social Media Outlook 2012Social Media Outlook 2012
Social Media Outlook 2012
 
Creating videos people want to watch
Creating videos people want to watchCreating videos people want to watch
Creating videos people want to watch
 
The Open Strategy
The Open StrategyThe Open Strategy
The Open Strategy
 
How to Get LinkeIn
How to Get LinkeInHow to Get LinkeIn
How to Get LinkeIn
 
How to Get LinkedIn
How to Get LinkedInHow to Get LinkedIn
How to Get LinkedIn
 
The Social Web. Why Brands Must Listen, Measure and Act v2.0
The Social Web. Why Brands Must Listen, Measure and Act v2.0The Social Web. Why Brands Must Listen, Measure and Act v2.0
The Social Web. Why Brands Must Listen, Measure and Act v2.0
 
Take The Leap: Finding the Right Place for Social Media in Your Organizationa...
Take The Leap: Finding the Right Place for Social Media in Your Organizationa...Take The Leap: Finding the Right Place for Social Media in Your Organizationa...
Take The Leap: Finding the Right Place for Social Media in Your Organizationa...
 
SEMA 2011: Changing Landscape of Media | Automotive Marketing
SEMA 2011: Changing Landscape of Media | Automotive MarketingSEMA 2011: Changing Landscape of Media | Automotive Marketing
SEMA 2011: Changing Landscape of Media | Automotive Marketing
 
Transforming Public Engagement- Craig Thomler v3.2
Transforming Public Engagement- Craig Thomler v3.2Transforming Public Engagement- Craig Thomler v3.2
Transforming Public Engagement- Craig Thomler v3.2
 

Plus de TWO Social

2 s slideshare_james squire
2 s slideshare_james squire2 s slideshare_james squire
2 s slideshare_james squireTWO Social
 
2 s slideshare_elastoplast india
2 s slideshare_elastoplast india2 s slideshare_elastoplast india
2 s slideshare_elastoplast indiaTWO Social
 
Hangover - Case Study
Hangover - Case StudyHangover - Case Study
Hangover - Case StudyTWO Social
 
The Hangover - Case Study
The Hangover - Case StudyThe Hangover - Case Study
The Hangover - Case StudyTWO Social
 
ROI in Social Media
ROI in Social MediaROI in Social Media
ROI in Social MediaTWO Social
 
Beyond Facebook - Social Networks you should know about | TWO Social
Beyond Facebook - Social Networks you should know about | TWO SocialBeyond Facebook - Social Networks you should know about | TWO Social
Beyond Facebook - Social Networks you should know about | TWO SocialTWO Social
 
Two Social Timelines
Two Social TimelinesTwo Social Timelines
Two Social TimelinesTWO Social
 
HR and Social Media
HR and Social MediaHR and Social Media
HR and Social MediaTWO Social
 
Social Media #fails
Social Media #failsSocial Media #fails
Social Media #failsTWO Social
 
Facebook Do you have to Like it?
Facebook Do you have to Like it?Facebook Do you have to Like it?
Facebook Do you have to Like it?TWO Social
 
HR and Social Media 041011
HR and Social Media 041011HR and Social Media 041011
HR and Social Media 041011TWO Social
 
PwC_GrowingFamily
PwC_GrowingFamilyPwC_GrowingFamily
PwC_GrowingFamilyTWO Social
 
PwC_GrowingCareer
PwC_GrowingCareerPwC_GrowingCareer
PwC_GrowingCareerTWO Social
 
Employer Brand and Social Media
Employer Brand and Social MediaEmployer Brand and Social Media
Employer Brand and Social MediaTWO Social
 
Daemon Within guide to alumni Facebook pages
Daemon Within guide to alumni Facebook pagesDaemon Within guide to alumni Facebook pages
Daemon Within guide to alumni Facebook pagesTWO Social
 
How social media has changed the way we engage on the web
How social media has changed the way we engage on the webHow social media has changed the way we engage on the web
How social media has changed the way we engage on the webTWO Social
 
HR and Social Media 150410
HR and Social Media 150410HR and Social Media 150410
HR and Social Media 150410TWO Social
 
HR and Social Media
HR and Social MediaHR and Social Media
HR and Social MediaTWO Social
 

Plus de TWO Social (20)

2 s slideshare_james squire
2 s slideshare_james squire2 s slideshare_james squire
2 s slideshare_james squire
 
2 s slideshare_elastoplast india
2 s slideshare_elastoplast india2 s slideshare_elastoplast india
2 s slideshare_elastoplast india
 
Hangover - Case Study
Hangover - Case StudyHangover - Case Study
Hangover - Case Study
 
The Hangover - Case Study
The Hangover - Case StudyThe Hangover - Case Study
The Hangover - Case Study
 
ROI in Social Media
ROI in Social MediaROI in Social Media
ROI in Social Media
 
Beyond Facebook - Social Networks you should know about | TWO Social
Beyond Facebook - Social Networks you should know about | TWO SocialBeyond Facebook - Social Networks you should know about | TWO Social
Beyond Facebook - Social Networks you should know about | TWO Social
 
Two Social Timelines
Two Social TimelinesTwo Social Timelines
Two Social Timelines
 
HR and Social Media
HR and Social MediaHR and Social Media
HR and Social Media
 
Social Media #fails
Social Media #failsSocial Media #fails
Social Media #fails
 
Facebook Do you have to Like it?
Facebook Do you have to Like it?Facebook Do you have to Like it?
Facebook Do you have to Like it?
 
HR and Social Media 041011
HR and Social Media 041011HR and Social Media 041011
HR and Social Media 041011
 
PwC_GrowingFamily
PwC_GrowingFamilyPwC_GrowingFamily
PwC_GrowingFamily
 
PwC_GrowingCareer
PwC_GrowingCareerPwC_GrowingCareer
PwC_GrowingCareer
 
Employer Brand and Social Media
Employer Brand and Social MediaEmployer Brand and Social Media
Employer Brand and Social Media
 
Daemon Within guide to alumni Facebook pages
Daemon Within guide to alumni Facebook pagesDaemon Within guide to alumni Facebook pages
Daemon Within guide to alumni Facebook pages
 
Twitter 101
Twitter 101Twitter 101
Twitter 101
 
Twitter 101
Twitter 101Twitter 101
Twitter 101
 
How social media has changed the way we engage on the web
How social media has changed the way we engage on the webHow social media has changed the way we engage on the web
How social media has changed the way we engage on the web
 
HR and Social Media 150410
HR and Social Media 150410HR and Social Media 150410
HR and Social Media 150410
 
HR and Social Media
HR and Social MediaHR and Social Media
HR and Social Media
 

Dernier

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Dernier (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Risks and Rewards of Social Media Engagement

  • 1. Risk and Reward in Social Media
  • 2. or… …how do we control the message in Social Media, what is the risk of getting involved and when is this risk outweighed by the risk of not getting involved? © Daemon Group 2008 www.daemondigital.com
  • 3. What’s on the agenda • A short history of the world • What is the risk … and how can we evaluate it? • How to manage, or mitigate, risk in Social Media • How much does it really matter if you get it wrong? • Controlling your message … or have you ever? • Key person risk, who should engage and why? • Approaching the tipping point? © Daemon Group 2008 www.daemondigital.com
  • 4. The opportunity in context 29.8m 61.0m 0.26m 5.4m 17.8m 3.7m 72.9% 5.1m © Daemon Group 2008 www.daemondigital.com Source: UM Wave 3
  • 5. Social Media users by global region 5.20% 9.17% 34.55% 22.61% 28.47% Asia Pacific Europe North America Latin America Mid East/Africa Based upon unique visitors in June 2008 © Daemon Group 2008 Source: comScore World Metrix www.daemondigital.com
  • 6. Social Media 62% 47.4% read post 29.0% write 77.0% Imagery Blogging watch No14 28.2% Micro Sydney* Video upload blogging Podcasting RSS 24.6% 40.2% feed listen Forums Widgets Chat Networks 74% message 21.1% belong © Daemon Group 2008 Source: UM Wave 3 *Twitter Grader www.daemondigital.com
  • 7. © Daemon Group 2008 www.daemondigital.com
  • 8.
  • 9. Normal distribution of technology adoption © Daemon Group 2008 www.daemondigital.com
  • 10. Early adoption © Daemon Group 2008 www.daemondigital.com
  • 11. Standard extended lifecycle © Daemon Group 2008 www.daemondigital.com
  • 12. © Daemon Group 2008 www.daemondigital.com
  • 13. © Daemon Group 2008 www.daemondigital.com
  • 14. © Daemon Group 2008 source: thepaisano.wordpress.com www.daemondigital.com
  • 15. © Daemon Group 2008 www.daemondigital.com
  • 16. © Daemon Group 2008 www.daemondigital.com
  • 17. Traditional definition of risk Risk = probability x impact Risk = (probability of an event occurring) x (impact of event occurring) © Daemon Group 2008 www.daemondigital.com
  • 18. Risk in information systems • The probability that there is a threat; • The probability that there are any vulnerabilities; • The potential impact on the business © Daemon Group 2008 www.daemondigital.com
  • 19. Risk in information systems • The probability that there is a threat; Someone who could attack the organisation • The probability that there are any vulnerabilities; The susceptiblity to attack, or what could be used against the organisation • The potential impact on the business What damage could be caused by the attack © Daemon Group 2008 www.daemondigital.com
  • 20. Definition of risk in information management Risk = threat x vulnerability x impact © Daemon Group 2008 www.daemondigital.com
  • 21. Risk profile of engagement Use Social Media to listen Use Social Media to ask questions Use Social Media to extend your contacts Use Social Media to drive your existing contacts Use Social Media to sell your IP Use Social Media to sell your services © Daemon Group 2008 www.daemondigital.com
  • 22. Binary risk profile of Social Media Threat Vulnerability Impact Risk Listen 0 0 0 0 Ask questions 0 1 0 0 Extend contacts 1 1 1 1 Drive contacts 0 1 1 0 Sell intellectual property 1 1 1 1 Sell products or services 1 1 1 1 © Daemon Group 2008 www.daemondigital.com
  • 23. Risk profile of engagement Use Social Media to listen Use Social Media to ask questions Use Social Media to extend your contacts Use Social Media to drive your existing contacts Use Social Media to sell your IP Use Social Media to sell your services © Daemon Group 2008 www.daemondigital.com
  • 24. © Daemon Group 2008 www.daemondigital.com
  • 25. Definition of risk in Social Media Risk = threat x vulnerability x impact engagement © Daemon Group 2008 www.daemondigital.com
  • 26. Definition of risk in Social Media Risk = Kohnstamm x reputation x sales Credibility/Thorn Tree © Daemon Group 2008 www.daemondigital.com
  • 27. 95 video results on You Tube 0 video responses from Taco Bell 1.2 million view to first video alone Taco Bell response on website 2,975 comments to first video alone 0 comments from Taco Bell Rats Take Over KFC/Taco Bell © Daemon Group 2008 www.daemondigital.com
  • 28. Social Media engagement © Daemon Group 2008 www.daemondigital.com
  • 29. Social Media engagement model © Daemon Group 2008 www.daemondigital.com
  • 30. Social Media engagement model © Daemon Group 2008 www.daemondigital.com
  • 31. Controlled ADVERTISING Monologue Dialogue © Daemon Group 2008 www.daemondigital.com Uncontrolled
  • 32. Controlled ADVERTISING Monologue Dialogue WORD OF MOUTH © Daemon Group 2008 www.daemondigital.com Uncontrolled
  • 33. Controlled ADVERTISING Monologue Dialogue SOCIAL MEDIA © Daemon Group 2008 www.daemondigital.com Uncontrolled
  • 34. © Daemon Group 2008 www.daemondigital.com
  • 35. © Daemon Group 2008 www.daemondigital.com
  • 36. © Daemon Group 2008 www.daemondigital.com
  • 37. Zero to 60: Ford’s Social Media Story Scott Monty (@ScottMonty) Global Digital Communications Ford Motor Company (@Ford) © Daemon Group 2008 www.daemondigital.com
  • 38. © Daemon Group 2008 www.daemondigital.com
  • 39. © Daemon Group 2008 www.daemondigital.com
  • 40. © Daemon Group 2008 www.daemondigital.com
  • 41. © Daemon Group 2008 www.daemondigital.com
  • 42. Early adoption © Daemon Group 2008 www.daemondigital.com
  • 43. 45% of employers screen Social Media sites © Daemon Group 2008 www.daemondigital.com source: careerbuilder.com 2009
  • 44. reported they found content on social media that caused them not to hire the candidate © Daemon Group 2008 www.daemondigital.com source: careerbuilder.com 2009
  • 45. Standard extended lifecycle © Daemon Group 2008 www.daemondigital.com
  • 46. © Daemon Group 2008 www.daemondigital.com
  • 47. © Daemon Group 2008 www.daemondigital.com
  • 48. © Daemon Group 2008 www.daemondigital.com