Page 354 -
P. 354

Be transparent—use your real name and employer
                                                        Disclose  Q8-7  How Can Organizations Address SMIS Security Concerns?   353
                                                                         Be truthful—point out if you have a vested interest
                                                                         Be yourself—stick to your expertise and write what you
                                                                         know

                                                        Protect          Don’t tell secrets
                                                                         Don’t slam the competition
                                                                         Don’t overshare
                    Figure 8-14
                    Intel’s Rules of Social Media       Use Common Sense  Add value—make your contribution worthwhile
                    Engagement                                           Keep it cool—don’t inflame or respond to every criticism
                    Source: Used with permission from Intel              Admit mistakes—be upfront and quick with corrections
                    Corporation.



                                                   Two elements in this list are particularly noteworthy. The first is the call for transparency
                                               and  truth. As an  experienced and  wise  business  professional once shared, “Nothing is more
                                                 serviceable than the truth.” Truth may not be convenient, but it is serviceable over the long term.
                                               Second, SM contributors and their employers should be open and candid. If you make a mistake,
                                               don’t obfuscate; instead, correct it, apologize, and make amends. The SM world is too open, too
                                               broad, and too powerful to fool.
                                                   In 2013, Justine Sacco, a PR executive at IAC, was boarding a plane headed to South Africa
                                               and tweeted, “Going to Africa. Hope I don’t get AIDS. Just kidding. I’m white.” When she landed,
                                               she found out that she had been fired in flight and had elicited thousands of hostile posts.
                                                   The best way to avoid these types of missteps is to include an SM awareness module in users’
                                               annual security training. Social media is still new to many users. Honestly, they may be unaware
                                               a policy even exists. When cell phones first became popular, they were constantly ringing in movie
                                               theaters. Over time, people learned to mute their phones before entering a crowded theater. It just
                                               takes time for society to catch up to technology. Training helps.

                                               Managing the Risk of Inappropriate Content

                                               As with any relationship, comments can be inappropriate or excessively negative in tone or be
                                               otherwise problematic. Organizations need to determine how they will deal with such content
                                               before engaging in social media. This is done by designating a single individual to be respon-
                                               sible for official organizational SM interactions and by creating a process to monitor and man-
                                               age SM interactions. This allows the organization to have a clear, coordinated, and consistent
                                               message.
                                                   User-generated content (UGC), which simply means content on your SM site that is contrib-
                                               uted by users, is the essence of SM relationships. Below are a few examples of inappropriate UGC
                                               that can negatively affect organizations.

                                               Problems from External Sources
                                               The major sources of UGC problems are:

                                                   •  Junk and crackpot contributions
                                                   •  Inappropriate content
                                                   •  Unfavorable reviews
                                                   •  Mutinous movements
                                                   When a business participates in a social network or opens its site to UGC, it opens itself to mis-
                                               guided people who post junk unrelated to the site’s purpose. Crackpots may also use the network
                                               or UGC site as a way of expressing passionately held views about unrelated topics, such as UFOs,
                                               government cover-ups, fantastic conspiracy theories, and so forth. Because of the possibility of
                                               such content, organizations should regularly monitor the site and remove objectionable material
   349   350   351   352   353   354   355   356   357   358   359