Home/Business/Managing Online Reputation
Loading...
Managing Online Reputation cover

Managing Online Reputation

How To Protect Your Company On Social Media

3.7 (29 ratings)
22 minutes read | Text | 9 key ideas
In the fast-paced digital landscape, your online reputation can make or break you in the blink of an eye. "Managing Online Reputation" offers a vital lifeline to businesses navigating the treacherous waters of social media storms. This book isn’t just a guide—it’s your essential playbook for turning potential PR disasters into stories of resilience. With vivid real-world scenarios, it illustrates how even a single disgruntled voice can ignite a wildfire of negativity. But more crucially, it arms you with the know-how to quell the flames before they spread. For CEOs and companies teetering on the edge of online chaos, this resource provides the strategic edge to safeguard your digital image and emerge unscathed.

Categories

Business

Content Type

Book

Binding

Paperback

Year

2015

Publisher

Palgrave Macmillan

Language

English

ISBN13

9781137382290

File Download

PDF | EPUB

Managing Online Reputation Plot Summary

Introduction

In today's hyper-connected world, your online reputation can be your greatest asset or your most significant liability. With every tweet, post, review, and comment potentially visible to millions, the digital footprints we leave behind shape how others perceive us, often before we've had a chance to make a first impression in person. This reality extends beyond individuals to businesses, brands, and organizations of all sizes. The challenge isn't just about monitoring what's said about you online—it's about proactively shaping your digital narrative while being prepared to defend it when necessary. Whether you're facing an angry customer's viral complaint, navigating a PR crisis amplified by social media, or rebuilding after reputational damage, the strategies you employ can mean the difference between emerging stronger or watching your hard-earned reputation crumble in real-time. The good news is that with the right approach, tools, and mindset, you can take control of your online image and transform potential threats into opportunities for growth and connection.

Chapter 1: Map Your Digital Landscape

Understanding your online reputation begins with knowing exactly where and how you appear across the digital universe. Your digital landscape encompasses every mention, image, review, and conversation about you or your brand scattered across the vast internet. Just as a cartographer creates detailed maps of physical terrain, you must chart your digital presence to effectively navigate and manage it. Consider the experience of FedEx when a video of one of their delivery drivers carelessly tossing a customer's package containing a computer monitor over a fence went viral. FedEx PR manager Shea Leordeanu discovered the video through a Google Alert in her inbox one morning. Though it had only garnered a few hundred views initially, her instinct told her it would spread rapidly. Within 24 hours, her fears were confirmed as mainstream media, including the UK's Mail Online, picked up the story. Within 48 hours, the video had been viewed over 3 million times and attracted more than 10,000 comments, many expressing shock and criticism. What made this situation particularly challenging was that the FedEx team couldn't immediately identify the customer or location—the house number wasn't visible, and the driver's van license plate was unreadable. Through careful analysis of environmental clues like the weather and grass condition, they eventually narrowed it down to the West Coast of the US and were able to contact the customer. But precious time had been lost during which the narrative was completely beyond their control. To effectively map your own digital landscape, begin by conducting a comprehensive audit. Use search engines with various keyword combinations including your name or brand plus terms like "review," "complaint," or "problem." Set up Google Alerts for your name and related terms. Examine major review platforms relevant to your industry. Scan social media channels using social listening tools that can track mentions even when you're not directly tagged. Don't forget to check image search results, as visual content can significantly impact perception. Once you've identified where you appear online, categorize these touchpoints by importance, visibility, sentiment, and your level of control over them. High-traffic sites with negative content should become priority areas for response or remediation. Sites you directly control—your website, social profiles, business listings—should be optimized first as they often appear at the top of search results. Remember that mapping your digital landscape isn't a one-time exercise but an ongoing process. The internet evolves constantly, with new platforms emerging and search algorithms changing. Schedule regular audits to maintain an accurate picture of your online presence and respond quickly to new developments.

Chapter 2: Establish Clear Social Media Protocols

Creating robust social media protocols is like establishing guardrails that keep your online reputation on track while allowing for authentic engagement. These guidelines provide clear direction for how your organization and its representatives should conduct themselves across digital platforms, preventing missteps while enabling meaningful connections. The experience of Amy Cheong offers a sobering lesson in the importance of clear social media guidelines. As a senior executive at NTUC Income, a respected insurance cooperative in Singapore, Cheong posted offensive comments about local Malay weddings on her personal Facebook page. Though she likely thought she was just venting to friends, her post was leaked and quickly triggered a massive backlash accusing her of racism. The incident escalated dramatically, with Singapore's Prime Minister Lee Hsien Loong, government ministers, and civic leaders publicly condemning her actions. The controversy raised serious questions about NTUC's company culture and values, despite the post having been made on Cheong's personal account. What made this situation particularly damaging was that the incident surfaced simmering racial tensions in Singapore and contradicted NTUC's ongoing internal "Cultural" and "Orange" Revolutions aimed at transforming the company into "a modern Singapore icon, a social enterprise of distinction." Instead of showcasing its progressive values, NTUC found itself at the center of a national conversation about racism and corporate responsibility. Developing effective social media protocols requires balancing professional expectations with personal freedom. Start by clearly defining the scope—what platforms are covered, whether personal accounts are included when identifying with your organization, and who in your organization must adhere to these guidelines. Outline specific do's and don'ts regarding content, confidentiality, copyright considerations, and disclosure requirements. Transparency is key to successful implementation. Explain the reasoning behind restrictions rather than simply imposing rules. Provide real examples of both appropriate and inappropriate social media activity. Create a straightforward approval process for official communications that doesn't stifle timely engagement but ensures quality control. Define clear consequences for violations while establishing a fair process for addressing concerns. Most importantly, bring these protocols to life through regular training and discussion. Use case studies like Amy Cheong's to illustrate how quickly personal posts can become public relations disasters. Create a culture where team members understand not just the rules but the rationale—protecting both individual and organizational reputations in an increasingly connected world.

Chapter 3: Monitor Conversations That Matter

In today's digital landscape, monitoring online conversations about your brand has become as essential as listening to customers in a physical store. The key difference is scale and permanence—conversations happen simultaneously across countless platforms and leave lasting digital footprints that can shape perceptions for years to come. Tesla's response to a critical New York Times review demonstrates both the importance and complexity of effective monitoring. In February 2013, veteran journalist John M. Broder published a review describing how Tesla's Model S electric car failed to meet its mileage claims during cold weather and ultimately shut down on an exit ramp in Connecticut. Four days later, Tesla CEO Elon Musk took to Twitter to challenge Broder's account, calling the article "fake" and stating that vehicle logs told a different story. Musk followed up with a detailed blog post containing data logs showing discrepancies between Broder's account and the car's actual performance. This confrontation sparked days of controversy across social media and mainstream outlets. While Musk's approach was aggressive—directly questioning a journalist's integrity on Twitter—it highlighted Tesla's sophisticated monitoring capabilities. The company not only tracked traditional media coverage but also maintained detailed vehicle performance logs specifically for media test drives after previous negative experiences. This comprehensive monitoring allowed Tesla to quickly counter what it viewed as inaccurate reporting with concrete data. Effective conversation monitoring requires both technological tools and human interpretation. Begin by identifying which conversations truly matter to your reputation. These typically include direct mentions of your brand, discussions about key products or services, competitor comparisons, industry trends, and conversations involving influential voices in your field. Social listening tools can help track metrics like visibility (how widely a topic is being discussed), virality (how quickly it's spreading), sentiment (whether discussion is positive or negative), and influence (who's driving the conversation). However, tools have limitations. Sentiment analysis algorithms typically only achieve 60-70% accuracy and can miss cultural nuances, especially in languages like Chinese where a single word might have multiple meanings. Human analysis remains crucial for understanding context and implications. Establish thresholds for alerts based on factors like volume, sentiment changes, or mentions by high-influence accounts, ensuring appropriate team members are notified when significant issues emerge. Remember that monitoring extends beyond defensive purposes. These same insights can reveal emerging customer needs, competitive opportunities, and potential brand advocates. The conversations you monitor closely today may provide the foundation for tomorrow's innovation and growth.

Chapter 4: Respond Quickly and Thoughtfully

In the realm of online reputation management, response time and quality form two sides of the same coin—both are essential, yet balancing them requires finesse. The social web demands immediacy while simultaneously punishing rushed, poorly considered responses that can amplify rather than resolve issues. The story of Buffer's security breach in October 2013 illustrates masterful crisis response. Around 12:30 PM Pacific Time on a weekend, Buffer's social media management platform was hacked. Within two hours, users began receiving spam tweets and Facebook posts sent through their accounts via Buffer. Twenty minutes after users started reporting issues, the company acknowledged the attack on Twitter: "Hi all. So sorry, it looks like we've been compromised. Temporarily pausing all posts as we investigate. We'll update ASAP." What followed was a textbook example of quick yet thoughtful response. CEO Joel Gascoigne and his team, operating virtually from eight locations worldwide, used Google Hangouts to coordinate their efforts continuously throughout the incident. They provided regular updates through their blog, Twitter, and Facebook profiles about their investigation progress and steps users could take to protect their accounts. Within an hour, Gascoigne had emailed Buffer's million-plus customers acknowledging the problem and providing security guidance. Over the next 48 hours, they sent ten more updates across all channels, each clearly explaining what had happened, what was being done, and what users should do next. To respond effectively in similar situations, establish a tiered response framework based on the severity of the issue. For low-level concerns like individual customer complaints, aim to acknowledge within minutes and resolve within hours. For moderate issues involving multiple customers or potential reputation damage, respond within the hour with at least an acknowledgment and timeline for further information. For serious crises affecting your entire customer base or brand integrity, respond immediately with what you know, even if limited, while promising frequent updates. Quality responses share certain characteristics regardless of the situation's severity. They acknowledge the issue directly without minimizing it. They express appropriate concern for those affected. They provide clear, specific information about what you're doing to address the problem. They avoid corporate jargon in favor of plain, human language. And they maintain consistency across all communication channels. When facts are unclear, it's better to acknowledge uncertainty than to speculate incorrectly. Buffer's approach of providing frequent, transparent updates as their investigation progressed built trust even amid uncertainty. Their honesty turned a potentially damaging situation into one that actually strengthened customer loyalty, with many users publicly praising their handling of the crisis and some even pledging to switch from competitors. The ultimate goal of quick, thoughtful response is to demonstrate that you value your audience enough to prioritize both their immediate need for information and their long-term need for accurate, helpful guidance—proving your commitment to relationship over mere reputation management.

Chapter 5: Prepare for Crisis Before It Strikes

Crisis preparation is the insurance policy most organizations hope they'll never need but cannot afford to be without. In our hyperconnected world, where a single tweet can trigger a reputational avalanche, having robust crisis management systems in place isn't optional—it's essential. Fonterra, New Zealand's largest business and the world's largest dairy trader, learned this lesson the hard way in August 2013. The company recalled 38 tons of protein whey concentrate after tests suggested contamination by bacteria that could cause botulism. Though later tests proved this concern unfounded, the damage was done. An independent report commissioned afterward described a "litany of failures at almost every stage," from inadequate testing and slow escalation procedures to poor crisis management planning and communications. The report was particularly critical of Fonterra's social media capabilities, describing them as "immature" and highlighting the company's failure to communicate effectively online in China—its key market where the issue had escalated at tremendous speed. The company had outsourced its headquarters' social media activities and found itself restricted to monitoring reactions manually. It had no crisis plan for social media, had not trained its people accordingly, and its global corporate presence consisted of little more than an underutilized Twitter profile and LinkedIn page. Effective crisis preparation begins with identifying potential threats specific to your organization. Categorize these by likelihood and potential impact, from Level 1 (low severity) issues like individual customer complaints to Level 5 (critical) scenarios such as major data breaches or harm to customers. For each threat level, develop clear response protocols including team roles, communication templates, and decision-making frameworks. Your social media crisis plan should integrate with your broader crisis management strategy while addressing platform-specific requirements. Define which team members will monitor and respond on each channel, establish approval processes streamlined for crisis situations, and create content templates that can be quickly customized. Identify which official channels will serve as primary communication hubs during a crisis and how information will flow between online and offline response teams. Regular simulation exercises are crucial for testing your plan's effectiveness. These should recreate high-pressure scenarios where teams must respond to evolving situations in real-time, dealing with hostile questions, misinformation, and technical challenges. After each exercise, refine your protocols based on lessons learned. Remember that crisis preparation isn't just about documentation—it's about building organizational muscle memory. When Buffer faced its security breach, CEO Joel Gascoigne's team had practiced crisis communication extensively, allowing them to respond effectively even when scattered across eight locations worldwide. Their preparation transformed what could have been a devastating blow to customer trust into a showcase of their commitment to transparency and service.

Chapter 6: Transform Negative Feedback into Opportunity

Negative feedback, while often uncomfortable, represents one of the most valuable opportunities for growth and relationship building available to individuals and organizations alike. When handled skillfully, criticism can become a catalyst for improvement and a platform for demonstrating your values in action. KitchenAid faced this scenario during the first 2012 presidential debate between Barack Obama and Mitt Romney. An offensive tweet referencing Obama's recently deceased grandmother was accidentally posted from KitchenAid's official Twitter account to its 24,000+ followers. The message was immediately retweeted, triggering what could have been a devastating brand crisis. However, KitchenAid brand manager Cynthia Soledad transformed this potential disaster into a demonstration of authentic leadership and accountability. Within minutes, Soledad deleted the offensive tweet and issued a multi-part apology on Twitter, identifying herself personally: "Hello, everyone. My name is Cynthia Soledad, and I am the head of the KitchenAid brand." She offered a "deepest apologies for an irresponsible tweet that is in no way a representation of the brand's opinion," personally apologized to President Obama and his family, explained that the tweet was sent by a team member who "won't be tweeting for us anymore," and concluded by taking full responsibility for her team. The response hit all the right notes—it was fast, personal, sincere, proportionate, and demonstrated accountability without evasiveness. Rather than becoming defined by the mistake, KitchenAid became recognized for its exemplary handling of the situation, ultimately strengthening rather than weakening consumer trust. To transform negative feedback into opportunity, begin by adopting the right mindset. View criticism as valuable market research provided free of charge. Listen with genuine curiosity rather than defensiveness, seeking to understand the underlying concerns or unmet expectations. Respond promptly to acknowledge the feedback, even if you need more time to investigate or develop a solution. When crafting your response, personalize your communication by using the customer's name and addressing their specific concerns. Avoid generic templates that suggest you're not really listening. Take ownership of the issue without making excuses or shifting blame. Clearly explain what happened and what you're doing to resolve it. Where appropriate, offer concrete compensation or resolution that demonstrates your commitment to making things right. The most powerful transformation happens when you use feedback to drive systematic improvement. Document patterns in negative feedback to identify root causes. Share insights across your organization to prevent similar issues. When you implement changes based on feedback, circle back to let customers know how their input has shaped your business. Remember that negative feedback handled well creates stronger loyalty than never having problems at all. It shows customers that when inevitable challenges arise, you'll respond with integrity and genuine concern—a powerful differentiator in building lasting relationships.

Chapter 7: Build a Resilient Online Presence

Building a resilient online presence is like creating a fortress with multiple layers of defense—it provides protection during attacks while serving as a platform from which to project your authentic voice to the world. This foundation must be established long before any reputation challenges arise. Dell's journey from online punching bag to digital pioneer illustrates the power of resilient online presence building. In 2005, the computer manufacturer faced a brutal public mauling when journalist Jeff Jarvis detailed his frustrating customer service experience in a blog post titled "Dell Hell." The post went viral, seriously damaging Dell's reputation and contributing to declining customer satisfaction ratings and market share. Rather than merely weathering the storm, Dell used this wake-up call to fundamentally transform its approach to digital engagement. In July 2006, Dell launched Direct2Dell, a blog platform designed to make the company more open to external audiences and engage customers directly. In February 2007, responding to a request from founder Michael Dell to become more innovative, the company launched IdeaStorm, an online community where customers could suggest and vote on product and service ideas. When customers overwhelmingly requested Linux-based operating systems on Dell notebooks—potentially threatening the company's relationship with Microsoft—Dell listened and implemented the change anyway, sending a powerful message about its commitment to customer-centricity. The results were remarkable. Customer complaints declined significantly, vocal critics like Jarvis quieted down, and negative blog posts about Dell dropped from 49% to 22% within six months. By building multiple channels for authentic engagement and demonstrating its willingness to listen and change, Dell transformed its online presence from a vulnerability into a competitive advantage. To build your own resilient online presence, start by claiming and optimizing all relevant digital properties. Secure your name across major social platforms even if you don't plan to use them immediately. Create a content hub—ideally a blog on your own domain—where you control the narrative and can publish in-depth responses when needed. Develop relationships with relevant online communities and influencers during good times, so you have allies during challenges. Diversify your digital footprint by creating valuable, search-optimized content across multiple platforms. This ensures that if negative content does appear, it doesn't dominate your search results. Maintain consistent activity across your channels—accounts that sit dormant for months appear abandoned when suddenly reactivated during a crisis. Build resilience through transparency and authenticity. Like Dell, incorporate feedback mechanisms that demonstrate you're listening. Share both successes and challenges openly, establishing a pattern of honesty that builds credibility. Document positive customer experiences and media coverage that can serve as character witnesses if your reputation is questioned. Remember that online resilience isn't built overnight—it develops through consistent investment in digital relationships and infrastructure. By establishing strong digital foundations today, you create both a shield against potential attacks and a springboard for future growth.

Summary

Throughout this journey into online reputation management, we've explored the multifaceted approaches required to defend and strengthen your digital image in today's interconnected world. From mapping your digital landscape to building resilient online foundations, the strategies outlined provide a comprehensive framework for both proactive reputation building and effective crisis response. As Warren Buffett wisely noted, "It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you'll do things differently." The path forward begins with a single step: conduct a thorough audit of your current online presence today. Search for your name or brand across major platforms, note what appears in the first page of results, and identify any vulnerabilities that require immediate attention. Remember that in the digital realm, your reputation isn't just something to defend—it's a valuable asset to cultivate thoughtfully through authentic engagement, careful listening, and consistent action that aligns with your core values. The question isn't whether your online reputation will be tested, but how prepared you'll be when that moment arrives.

Best Quote

Review Summary

Strengths: The book is deemed essential for PR experts, students, and socially active individuals in the virtual world. It provides numerous lessons with examples, actionable advice, and is easy to read and understand even for non-PR professionals.\nWeaknesses: The review does not explicitly mention any weaknesses, but hints at a potential downside by describing the book as "lil costly."\nOverall Sentiment: Enthusiastic\nKey Takeaway: The book emphasizes the importance of effective and sincere communication in preventing PR disasters, highlighting the potential for small incidents to escalate into major crises through social media. It suggests creating a corporate blog as a strategic tool for managing and mitigating such situations.

About Author

Loading...
Charlie Pownall Avatar

Charlie Pownall

Communications & reputation adviser, trainer, troubleshooter. Bibliophile, musicaholic, coffee fiend, traveler

Read more

Download PDF & EPUB

To save this Black List summary for later, download the free PDF and EPUB. You can print it out, or read offline at your convenience.

Book Cover

Managing Online Reputation

By Charlie Pownall

Build Your Library

Select titles that spark your interest. We'll find bite-sized summaries you'll love.