Social Media: Measure, Monitor and Mean It

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
Previous Social Media: Measure, Monitor and Mean It-1 Next

Click though to see highlights and suggestions from Burson-Marsteller's Global Social Media Check-up.

Our Ann All commented extensively on the Burson-Marsteller's Global Social Media Check-up earlier this month, so we wanted to bring you the highlights of the study (which you can download in its entirety here in PDF format).

Burson-Marsteller found a somewhat different twist to this strategy problem of exactly how many folks at your company to get involved in social media. Rather than not including enough folks in their social efforts, as other sources had described to Ann, many companies include too many -- and don't provide a unifying strategy to guide them.

Specifically, Burson-Marsteller found 65 percent of Global 100 companies have active Twitter accounts, 54 percent have Facebook fan pages, 50 percent have YouTube video channels and 33 percent have corporate blogs. Seventy-nine percent of the companies use at least one of these social media platforms, but just 20 percent utilize all four channels, suggesting they are missing opportunities for deeper interactions with customers. While just about a third of the companies blog, Burson-Marsteller says blogs are "ideal venue[s] for a more in-depth interactive discussion." (You can only say so much in 140 characters, right?)


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.