Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Twitter Tips: 5 Ways to Find Relevant Followers

The tricky part is seeking people out

Twitter has more than 100 million users, which means you're bound to encounter a lot of noise. You'll find brands hawking their products or services, some users tweeting the mundane details of their everyday lives and spammers insisting you check out their "hottest new pix!" Um, no thanks.

But within all that noise are people who can bring you value-whether it's an interesting perspective on an event, an exclusive offer, or an announcement from a figurehead from a competing business. The tricky part is seeking these people out. The good news: tools can help you find the right followers.

Last week, Twitter announced a new feature that suggests to you users to follow. With this announcement, Twitter joins a growing number of Twitter directory sites that work similarly-enter a keyword or location, and the site will generate a list of new accounts to follow. Here's how Twitter's "Who to Follow" feature works, and a look at four other sites that will help you build a more meaningful Twitter following.

[Twitter Fail Whale Is Hardest Working Employee]

1. Twitter's "Who to Follow"

How to use it: Log on to your Twitter account and click "Find People" from the main toolbar. This will give you three options to find new accounts to follow. With "Find on Twitter" you can search for people, organizations or companies that you know have a Twitter account.

The "Browse Interests" tab will give you a list of categories to choose from -for example, business, entertainment, family, health, music, politics and sports. Click on any of these categories to generate a list of people related to the category. You can follow them directly from this page. The "Find Friends" tab asks you to enter your e-mail address and password to find e-mail contacts who are on Twitter. This tab will also generate a list and let you follow the users from this page.

[5 Free Tools to Spring Clean Your Twitter Account]

2. WeFollow

WeFollow's directory gives you several methods to search for new followers. Its homepage lists the users with the most number of followers for each category, which include celebrities, music, social media, entrepreneurs, news, bloggers, tech, TV, actors and comedy. Clicking on any of these top users will bring you to a stats page, with the user's number of followers, how many they're following, the number of updates and the tags they're listed under.

WeFollow also lets you enter tags into the search bar to further narrow down your search for users to follow. Additionally, WeFollow lets you add yourself to its directory, which helps others find you, if your interests align properly. To do this, click "Add yourself to WeFollow, and enter the interests that best describe you.

3. Twellow

Twellow (think: YellowPages for Twitter) grabs publicly available messages from Twitter.com, then analyzes and categorizes each of the users responsible for those messages, helping you find suitable people to follow.

[Got Twitter Clout? New Tools Rate You]

There are several ways you can use Twellow. You can browse for users to follow based on category; keyword and "TwelloHood," in which you use a map of the world to zoom in on users from a specific location. Twellow also generates an extensive list of suggested users and lets you follow them without leaving the site.

4. Geofollow

Geofollow offers many of the stock Twitter search features-keyword, username, tag, etc.-but it's specialty is finding users based on their locations. Search for new users to follow based on city, state or country and "bulk follow" the ones whom you find interesting. Geofollow also lets you tweet, message users and view their avatar directly from its site, as well as add yourself to its directory.

5. Twibs

Just as Geofollow focuses on location, Twibs focuses on finding (and listing) businesses on Twitter. Log in to the site and search among its 25,000-plus businesses, or list your business so others can find it more easily. (You'll be asked for your Twitter username, four keywords that describe your business and whether you want your business e-mail, blog or online store displayed.)

Staff Writer Kristin Burnham covers consumer Web and social technologies for CIO.com. She writes frequently on Twitter, Facebook, LinkedIn and Google. You can follow her on Twitter: @kmburnham.

Read more about web productivity in CIO's Web Productivity Drilldown.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Facebook, Google, Yellow Pages
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: applications, twitter followers, twitter, Twitter Tips, social networking, software
Latest Blog Posts
Whitepapers
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO