Twitter Tips: How to Safely Blend the Personal and the Professional
- 14 May, 2009 13:49
Twitter holds inherent value for both your personal and business life. As a business person, building a presence on Twitter helps you connect with customers and peers, and perhaps get feedback on your products and services. For your personal life, Twitter can create what social media experts call an "ambient awareness" for the people important to you in your life — while each message might not be hugely significant, taken in total people can piece together you as a person or at least see the things you value.
But this inevitable blurring between the personal and professional life creates perils for Twitter users. Sharing a tweet (a message on Twitter) that has certain personal information could cause you to lose your "followers" (people who subscribe to your Twitter messages) or, worse, get you into trouble at work.
"If you want to use Twitter for both personal and business, then you have to be very wise about the type of information you are displaying," says Dan Schawbel (@danschawbel), who authored the new book Me 2.0: Build a Powerful Brand to Achieve Career Success. "Either way, your updates are all crawled by Google and can hurt your reputation if they negatively portray your brand."
Like it or not, the emergence of social networks, the proliferation of mobile devices and the ubiquity of the Web has blurred our personal and professional lives. This has been particularly true on Twitter, the social networking service where users share short messages with one another.
CIO talked with some social media and experts in online reputation management about how to find the right balance. The best strategies will differ from person to person, based both upon the type of business you're in and the audience that follows you on Twitter.
Get Personal To Show What You Have in Common
Contrary to conventional wisdom — created via horror stories of people getting fired for outlandish Facebook or Twitter messages — sharing personal messages (intelligently) can be advantageous to your business. You should not be afraid to do it.
When people can relate to you, or find common themes, then they will be more likely do cut a deal or do business with you, says Laura Fitton (@pistachio), who runs Pistachio Consulting, a firm that helps companies utilize Twitter.
"The more human you are, it's harder to vilify you or your brand," Fitton says. "Twitter isn't as much about 'what are you doing,' as it is 'what do you have in common?'"
Perhaps the best example of this strategy has happened with Frank Eliason, a customer service representative from Comcast who runs the @comcastcares page. Because he has injected a genuine and personal tone into his tweets, he has likely changed some minds of people who love to hate the big cable company.
"Ultimately, people do business with people," says Kirsten Dixson (@kirstendixson), a reputation management and online identity expert. "You don't need to hide behind a company brand to interact with people. In fact, that might not be the best thing."
Know Your Twitter Audience
Before you can build a content strategy around your tweets, you must examine the people who follow them. While it might be a diverse group, you should be able to find some common themes that will guide your decision about what to focus on in your messages.
If many people follow you because of your profession, then you will want to populate your Twitter stream with many business related messages. But you shouldn't be afraid to hit on themes in your business life that intersect with the personal, says Dixson.
"If your brand attribute is that you're very global, talk about a trip you're going on, or you post a picture of a neat place you've just visited," she says.
You can also hit on universal themes that many people can relate to, such as family life, says Fitton. The key, she says, could be in frequency. "Talk about your kids a little bit, but don't bore people to death with messages about them.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.
Saving Time and Money with Savvy Use of Flash in Automated Storage Tiering
In a sluggish economy, getting the best ROI on every IT dollar spent is the top priority for almost every business. Storage budgets in most IT environments continue to remain flat or are capped as a percentage of the overall IT spend, while data storage requirements continue to grow at an unsustainable pace. Download now to learn about the benefits of using flash in automated storage tiering.