Keep social media outsourcing under control: Facebook, Telstra
- 06 June, 2011 10:45
Facebook's Paul Borrud
Organisations looking to promote their brand through social media channels like Facebook, Twitter and LinkedIn should manage it with internal resources to avoid outsourcing the public image of the company, according to representatives from Facebook and Telstra.
Kristen Boschma, head of online communications and social media at Telstra, said organisations at least need to have someone who is going to be the “intermediary” between the in-house marketing team and a social media outsourcer.
“It’s okay to outsource social media consulting, but you also need someone who is going to recognise a good idea for the company and champion that idea,” Boschma said.
Equally, organisations need someone who will recognise a bad idea, so there is a need for both in-house and third-party social media skills, Boschma says.
The head of Facebook in Australia and New Zealand, Paul Borrud, said marketing professionals talk a lot about “knowing your language and brand” so it would be difficult to manage social media completely external to the organisation.
“It’s certainly really critical have a focus internally to keep it connected,” Borrud said.
Borrud recommends finding “owners” of what the business is trying to do with social media, says but once it’s started, it’s “always on”.
“It’s not the six-week microsite strategy that will live and die, and then you start over,” he said.
Borrud and Boschma shared their views during a panel discussion on social media at the CeBit 2011 conference in Sydney last week.
See photos and all the action from the event.
A general consensus was social media tends to be more of a challenge of companies that don’t live in the digital world and it’s always difficult to outsource a company culture. An outsourcer might know about the public brand of a company, but not the internals of the company so the social media split has to be at least 50-50.
Telstra’s Boschma said marketing in the 80s was all about the product, and then it moved into the “new marketing” era which was about “you deserve this car because you are amazing” and now we are in the era of “us marketing”.
Telstra is running a blog and coaching people to become better bloggers and then sending them to Africa to become citizen journalists to help “improve the world”.
“It’s not enough to just build a community,” Boschma said. “It’s like organising a party and you don't have a plan – it’s the same thing with a closed group forum.”
Follow Rodney Gedda on Twitter: @rodneygedda
Follow CIO Australia on Twitter: @CIO_Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Pathways Advanced ICT Leadership Development Program Course Outline and Big 6 2013
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
Performance in Supply Chain
Delivering more products, heightened quality and shortened customers with flawless execution and minimal business interruption defines your supply chain success. This report discusses a newly developed end-to-end solution with the right tools to efficiently procure, assemble, ship and deliver the goods your customers want, when they want them.
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.