- Content Marketing
When Your Customers Become Your Contributors: Brand Journalism Meets TraditionalGoogle Is Changing the Close Variant Matching Option in AdWordsBefore You Invest in Online Advertising, Do This!Native Advertising: The New New Thing or a Race to the Bottom? [VIDEO]
Technology & Data
Data and Creativity at the Social Shake Up: Defining Your Data-Driven Social CampaignTalking Strategy and Data with Shannon Lee of Precision StrategiesNew IBM Study Reveals 3 Key Characteristics of the Most Successful CompaniesMinority Report: Confronting Privacy Issues in Big Data Gathering
- Tech & Innovation
- marketing automation
Social Startups: Moment.me Captures a 360-Degree View of The Social Shake-Up 2014Hootsuite Partners With Syracuse University to Bring Social Media Savvy to College StudentsThe Best Hyperlapse VideosThe Best Content Moderation Tools for Busy People Who Don't Have Time for That
Social Change Agent Survey: Passion, Skill Set, and Persistence Lead to Career GrowthThe Social Shake-Up Attracts Wide Breadth of Brands and IndustriesThe Social Shake-Up: How CMOs Drive Innovation and Revenue GrowthThe Social Shake-Up: The Future of Social Business
- Small Business
- Social Organization
Recap from the First-Ever Employee Advocacy SummitFormer IBM Senior Advisors Launch Brands Rising to Build Employee Advocacy ProgramsPerformance and Risk Management Through Social Media TrainingEmployee Advocacy Summit: Advocate Stories from the Field
- Customer Service
Join us September 15th in Atlanta for The Employee Advocacy Summit and learn how to unleash the power of your employees.
Post your event here and we'll share it with our community. If one of our members is featured, we'll promote as well on their profile.
- Marketplace & Webinars
The SMT Marketplace
Your resource for exclusive content and insights from Social Media Today, and opportunities to reach our community of professionals.
The Social Business Book Club brings you books, discussions, and insights from today's to business thought leaders.
Join interactive talks and and panel discussions with leading thinkers and practitioners on social media and networked business, or browse the catalogue of recorded sessions - all completely free.
Reach Social Media Today's community of marketing and communications professionals in an editor-approved context with a native advertising package.
Wild West 2.0: Welcome to the New Digital Frontier
Posted on December 8th 2013
There are a variety of books on the shelves today claiming to help you heal a broken online reputation, and I’ve read most of them. There are only a few I would recommend. Wild West 2.0 by Michael Fertik and David Thompson is one of them.
Most of the reputation recovery books I’ve read have a similar formula for addressing negative online content. First, you deal with the search results, then you populate the internet with good, but authentic content. This book has an extensive formula—it’s the second half of the book. The authors, who are both lawyers in the field, lay out a very detailed plan that involves initially taking a thorough “reputation audit.”
After the audit is performed, a road map is laid out which includes four basic sections. The first, “roles you play,” requires you to define particular roles that may expose you to a variety of audiences, such as parent, friend, employee, student, online dater, or everyday person. In the context of each role, you’ll next define people who might be looking for information about you, sources they might use, and then search terms they might use. The book winds up with a chapter on how to repair the damage that you find.
Far more interesting to me was the first half of the book. In it, you’ll find out why the analogy of wild west is a fitting one for the internet. The authors build on the premise that “the Internet has grown too fast for social norms and common sense to keep up,” and that “nothing separates the ‘virtual’ and the ‘real’ worlds; an online smear impacts face-to-face interactions just as much as a hushed comment or a passed note.”
The authors define several types of online attacks and categorize them using two components: the content of the attack and the distribution method. The content types can be as elementary as a simple lie, a half-truth, a manipulated photo, or as intense as harassment, hoaxes, or SWATing. Learning the many methods that these attacks are distributed with—social media, Googestuffing, Googlebombing, E-mobbing, and others—gives you a good understanding heading into the second half of the book.
One of the most disturbing takeaways for me was something the authors call “The Google Truth.”
In short, your online reputation does not necessarily reflect the truth. Instead, it reflects the “Google Truth.” The Google Truth looks like the authoritative truth, but it is often incomplete, inaccurate, or just plain wrong. It’s what happens when computers try to guess who you are and what you do.
The bottom line: search engines do not rank by truth, they rank by popularity. But the average person has been conditioned to think the two are one. After all, computers don’t make mistakes, right? The authors write, “Part of this mistaken belief comes from a natural trust of computers. The fact that Google’s search engine often returns correct and unbiased results makes it all the more dangerous when Google fails by returning false or misleading statements." Remember the girl on the State Farm commercial who claimed, “they can't put anything on the internet that isn’t true”?
I recommend getting a copy of this book, especially if your work revolves around the internet at all. If you want to learn more about online privacy and how to counteract misinformation on the internet, this is a good read for you too.