Social Networks Drive IT Purchasing Process
- 15 November, 2012 23:58
IT purchasing decisions can be daunting, but a new study by Forrester Research and LinkedIn finds that IT decision makers (ITDMs) are relying heavily on social networks to help them through the process.
The study, "IT Purchasing Goes Social," surveyed 400 ITDMs across a range of industries throughout North America and finds that 85 percent have used at least one social network for business purposes.
More surprising, according to Mike Weir, head of category development at LinkedIn, is the extent to which ITDMs use social networks during the purchasing process.
"Social media is a critical source of influence across the entire decision-making process," he says. "Not just during the research phase. The days of people thinking of social media as just an awareness platform is gone--it's much more than that now."
Fifty-nine percent of respondents say they are influenced by at least one social network when considering business purchases--moreso than by online general media publications (46 percent).
As a result, social networks are becoming a hotbed of activity for technology marketers: 73 percent of respondents say they have engaged with an IT vendor on a social network.
"CIOs are working extremely close with the chief marketing officers," Wier says. "That presents marketers with a unique opportunity to reach these IT decision makers in ways they never could before."
ITDMs are turning to social networks now, the report says, for four reasons:
To learn from trusted peers (58 percent)
To quickly find information (40 percent)
For relevant context to connect with vendors (37 percent)
For access to a broader network (49 percent).
Of the top three social networks--Twitter, LinkedIn and Facebook--ITDMs turn to LinkedIn most often to identify credentials of information sources (71 percent), to validate information from other sources (58 percent) and for a trusted channel for vendor information (55 percent).
Weir offers three tips for IT decision makers looking to tap LinkedIn during the purchasing process:
1. Follow companies. In the discovery phase of the IT purchasing process, make a list of the companies on your short list and follow them on LinkedIn.
To do so, search for the company name and hover over it on the results page. Click the "Follow Company" link, which appears in the top-right. You'll then start receiving updates from the company in your activity stream. These can include new product announcements, new hires, press releases and more.
2. Browse SlideShare. In May, LinkedIn announced its acquisition of SlideShare, a professional content sharing community.
This site, Weir says, offers a wealth of information for ITDMs in the education process. Search for presentations and information on the type of technology you're considering investing in, he says.
3. Join Groups. "Groups are a great way to follow thought leaders, learn about new technologies, discover new ideas and learn about who's the best in the business," Weir says. "Join some relevant groups, ask them questions and challenge the answers to questions you've received."
Kristin Burnham covers consumer technology, social networking and enterprise collaboration for CIO.com. Follow Kristin on Twitter @kmburnham. Follow everything from CIO.com on Twitter @CIOonline and on Facebook. Email Kristin at firstname.lastname@example.org
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- The Big Data Security Analytics Era is Here
- Cost Savings Through Virtual Patching
- The Vizada Satellite Network Selects Webroot® Web Security Services for Corporate Malware and WebSecurity Protection
- A New Dimension to Data Warehousing: 2011 IOUG Data Warehousing Survey
- Open Clouds Under your Control
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
BYOD and Beyond - Implementing a Unified Access Solution
The rise of BYOD programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace. Whether you are contemplating the creation of a BYOD program or currently trying to establish one, this fact cannot be overstated. Find out how to overcome these challenges.
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Why are today’s security defenses failing? In this battle, your security teams are using outdated arsenal - download now to learn more.