Web presence

Last updated

A web presence is a location on the World Wide Web where a person, business, or some other entity is represented (see also web property and point of presence).

Contents

Examples of a web presence for a person could be a personal website, a blog, a profile page, a wiki page, or a social media point of presence (e.g. a LinkedIn profile, a Facebook account, or a Twitter account). Examples of a web presence for a business or some other entity could be a corporate website, a microsite, a page on a review site, a wiki page, or a social media point of presence (e.g., a LinkedIn company page and/or group, a Facebook business/brand/product page, or a Twitter account).

Every web presence is associated with a unique web address to distinguish one point of presence from another.

Owned vs. unowned

Web presence can either be owned or unowned. Owned media exists when a single person or group can control the content that is published on its web presence (e.g. a corporate website or a personal Twitter account). However, when a single person or group cannot solely control the content, the creator is different from the owner. This is considered unowned media (see earned media). A Wikipedia or Yelp page about a person, company, or product would be an example of a known (or "earned") web presence.

Occasionally, a first form of media known as "paid media" is often included in the discussion of media types: "earned vs. owned vs. paid". Paid media is commonly found in the form of advertisements, but it is not considered a form of web presence.

Management

Web presence management is the process of establishing and maintaining a digital footprint on the web. The three factors that are considered include the following: where a person or business has web presence; how each web presence represents its enterprise; and what is published at a point of presence.

Web presence management is the discipline of determining and governing:

Management system

The purpose of a web presence management system is to manage the web presence of a person or business. This includes the collection of domain names, websites, social media, and other web pages where he, she, or it is being represented. The tool generally offers the following key functions: new presence discovery, inventory management, change detection, access control, stakeholder coordination, and compliance workflow.

A web presence management system is meant to have a broader reach so that it emphasizes where a presence has been established, will be established, must be maintained, or must be remediated. An example of a web presence management system is the Brandle Presence Manager. [1]

In order to publish content to the various points of web presence, multiple content management systems and sometimes even social media management systems are often used. The primary focus of most content and social media management systems is limited to their specific web platforms.

Domain names

Another aspect of web presence management is managing the collection of domain names registered to the person or business. Any entity may register multiple domain names for the same property. As a result, they can link alternative spellings, different top-level domains, aliases, brands, or products to the same website. Similarly, negative or derogatory domain names may also be registered. This is done to prevent certain domain names from being used against the person or business.

It is common for a larger business to have domain names registered by multiple employees at multiple domain name registrars, possibly a result of organizational or geographical requirements. Consequently, a web presence management system can be used to monitor all domain names registered by the business, regardless of the registrars used.

Discovery

Web presence discovery is the process of monitoring the web for a new point of presence about a person or business. Web presence discovery is often included in a web presence management system. Whether a new domain is registered, a new website is published, or a new social media account is established, it occurs outside of the person's or business’ control. As a result, its purpose is to assess a new point of presence and appropriately handle any violations.

It is important to note that web presence discovery differs from content listening. The former involves looking for new properties on the web, whereas the latter refers to analyzing content that already exists to hear how a person or business is seen often in near real time. Examples of content listening systems include Sysomos and Radian6, which is now a subsidiary of Salesforce.com.

Brand protection

A person or business may choose to watch for a new web presence that might appear to misrepresent or mislead an audience, such as counterfeiters, spoofers, or malicious hackers. One of the early software in the online brand protection marketplace was MarkMonitor, now part of Thomson Reuters. This software helped detect rogue domain names and websites.

However, the modern day growth of social media has seen a rise in the number of fraudulent brand impersonations. It has become much easier for a new web presence to be created on those platforms, which results in a greater frequency of them today. [2] [3] [4] [5] [6] As a preventive measure, online brand protection providers are now adding social media to their domain and website discovery options.

Security

The widespread growth of social media has also made it easier for unauthorized individuals to impersonate an employee. Consequently, social media has now become a recognized threat vector in that it can be used to socially engineer an attack on a business. [7] [8] To counter this, companies are able to use web presence monitoring tools to detect new points of presence on the web and thereby defend against socially engineered attacks. [4] [9] [3] [10] [11]

Distributed inventory management

A web presence monitoring system can be used by a business to associate a new web property with its corporate inventory. It is designed to address autonomous, distributed behaviors. This usually applies to larger businesses whose geographically diverse employees are more prone to creating new points of presence on the web. For example, a retail chain may allow each local store to create and manage their web presence to market to and communicate with their local customer base. [12] Similarly, a global business may have teams in each country or region who create and manage a web presence to adapt to local languages or cultures.

Monitoring

Web presence monitoring is the process of monitoring a known inventory of web presence to detect any changes that are made. Web presence monitoring is often included in a web presence management system and can serve multiple purposes for both larger corporations and certain individuals, such as celebrities.

It is important to note that presence monitoring differs from content listening. The former involves monitoring the properties (e.g. branding) of a web property in an established inventory, whereas the latter refers to analyzing content that already exists to hear how a person or business is seen often in near real time. [13] Additionally, presence monitoring focuses on owned media and content listening on earned media.

Corporate, brand, and regulatory compliance

Many companies ensure that certain standards are met for a property on the web that represents their business. For companies in regulated industries, such as finance and healthcare, the company may be required by law to ensure that all publicized content, regardless of platform or technology, follow specific requirements. [14] [15] [16]

The widespread growth of social media has seen a rise in the number of fraudulent corporate impersonations. It has become much easier for a new web presence to be created on these platforms, and so these are much more prevalent than they used to be. [17] As a preventive measure, a web presence monitoring system alerts the company when a known property is changed, allowing for the property to be reviewed and amended so that it follows the proper standards. . [17] A web presence monitoring system helps alert the company when a known property is changed, so it can be reviewed and brought back, if necessary, into compliance with the appropriate standards.

Audit

A web presence audit is performed by an enterprise to determine that all points of presence on the web meet the objectives as well as governance, risk management, and compliance (GRC) needs. To ensure neutrality, these audits are often conducted as part of an information technology audit by a professional services agency or an internal audit team. However, a less formal web presence audit is often performed by internal members as a routine to meet GRC objectives.

A web presence audit usually includes web presence discovery and a review of all web-based content in the business’ inventory of web presence. Even though web presence monitoring is not performed in a web presence audit, a review of the nature and scope of the company's web presence monitoring policies, procedures, and tools is considered.

Social media audit

Due to the emerging challenges introduced by the dynamic nature of social media, a business may choose to perform specific social media audits in greater frequency. [18] [19] A social media audit is similar to a web presence audit, but may also include the purposes of maintaining an accurate inventory of all business social media points of presence. Alternatively, the business may choose to employ automated web presence discovery and compliance systems to keep the corporate social media inventory up-to-date and compliant with GRC needs.

Web presence vs. web reputation management

Reputation management systems are often associated with web presence management. Web presence management is knowing where an individual or business is represented, whereas reputation management is knowing what people are saying about an individual or business. Web presence management handles owned media, while reputation management systems with earned media.

Both systems offer some similar degree of remediation. For web presence management systems, remediation would include finding counterfeit properties that infringe on a brand or trademark. For reputation management systems, remediation would include identifying and eliminating misleading reviews and/or encouraging the contribution of authentic comments.

Even though a web presence monitoring tool can help identify unowned web properties where people are talking about a person, product, or brand, it is only part of the solution. A reputation management system often includes a content listening system to monitor the stream of messages about a particular subject which may be coming from any point of presence on the web (e.g. a comment about a product by a customer on her personal Twitter account). For examples of some reputation management companies, click here.

See also

Related Research Articles

A web portal is a specially designed website that brings information from diverse sources, like emails, online forums and search engines, together in a uniform way. Usually, each information source gets its dedicated area on the page for displaying information ; often, the user can configure which ones to display. Variants of portals include mashups and intranet dashboards for executives and managers. The extent to which content is displayed in a "uniform way" may depend on the intended user and the intended purpose, as well as the diversity of the content. Very often design emphasis is on a certain "metaphor" for configuring and customizing the presentation of the content and the chosen implementation framework or code libraries. In addition, the role of the user in an organization may determine which content can be added to the portal or deleted from the portal configuration.

The reputation or prestige of a social entity is an opinion about that entity – typically developed as a result of social evaluation on a set of criteria, such as behavior or performance.

Corporate governance are mechanisms, processes and relations by which corporations are controlled and operated ("governed").

Reputation management, originally a public relations term, refers to the influencing, controlling, enhancing, or concealing of an individual's or group's reputation. The growth of the internet and social media led to growth of reputation management companies, with search results as a core part of a client's reputation. Online reputation management, sometimes abbreviated as ORM, focuses on the management of product and service search engine results.

An audit committee is a committee of an organisation's board of directors which is responsible for oversight of the financial reporting process, selection of the independent auditor, and receipt of audit results both internal and external.

In general, compliance means conforming to a rule, such as a specification, policy, standard or law. Compliance has traditionally been explained by reference to the deterrence theory, according to which punishing a behavior will decrease the violations both by the wrongdoer and by others. This view has been supported by economic theory, which has framed punishment in terms of costs and has explained compliance in terms of a cost-benefit equilibrium. However, psychological research on motivation provides an alternative view: granting rewards or imposing fines for a certain behavior is a form of extrinsic motivation that weakens intrinsic motivation and ultimately undermines compliance.

An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure and business applications. The evaluation of evidence obtained determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.

Information technology controls are specific activities performed by persons or systems to ensure that computer systems operate in a way that minimises risk. They are a subset of an organisation's internal control. IT control objectives typically relate to assuring the confidentiality, integrity, and availability of data and the overall management of the IT function. IT controls are often described in two categories: IT general controls (ITGC) and IT application controls. ITGC includes controls over the hardware, system software, operational processes, access to programs and data, program development and program changes. IT application controls refer to controls to ensure the integrity of the information processed by the IT environment. Information technology controls have been given increased prominence in corporations listed in the United States by the Sarbanes-Oxley Act. The COBIT Framework is a widely used framework promulgated by the IT Governance Institute, which defines a variety of ITGC and application control objectives and recommended evaluation approaches.

The Committee of Sponsoring Organizations of the Treadway Commission (COSO) is an organization that develops guidelines for businesses to evaluate internal controls, risk management, and fraud deterrence. In 1992, COSO published the Internal Control – Integrated Framework, commonly used by businesses in the United States to design, implement, and conduct systems of internal control over financial reporting and assessing their effectiveness.

Enterprise risk management (ERM) in business includes the methods and processes used by organizations to manage risks and seize opportunities related to the achievement of their objectives. ERM provides a framework for risk management, which typically involves identifying particular events or circumstances relevant to the organization's objectives, assessing them in terms of likelihood and magnitude of impact, determining a response strategy, and monitoring process. By identifying and proactively addressing risks and opportunities, business enterprises protect and create value for their stakeholders, including owners, employees, customers, regulators, and society overall.

Governance, risk management and compliance (GRC) is the term covering an organization's approach across these three practices: governance, risk management, and compliance.

Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. According to ITIL, SAM is defined as “…all of the infrastructure and processes necessary for the effective management, control, and protection of the software assets…throughout all stages of their lifecycle.” Fundamentally intended to be part of an organization's information technology business strategy, the goals of SAM are to reduce information technology (IT) costs and limit business and legal risk related to the ownership and use of software, while maximizing IT responsiveness and end-user productivity. SAM is particularly important for large corporations regarding redistribution of licenses and managing legal risks associated with software ownership and expiration. SAM technologies track license expiration, thus allowing the company to function ethically and within software compliance regulations. This can be important for both eliminating legal costs associated with license agreement violations and as part of a company's reputation management strategy. Both are important forms of risk management and are critical for large corporations' long-term business strategies.

Internal control, as defined by accounting and auditing, is a process for assuring of an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. A broad concept, internal control involves everything that controls risks to an organization.

<span class="mw-page-title-main">Proofpoint, Inc.</span> American cybersecurity company

Proofpoint, Inc. is an American enterprise cybersecurity company based in Sunnyvale, California that provides software as a service and products for email security, identity threat defense, data loss prevention, electronic discovery, and email archiving.

Regulatory risk differentiation is the process used by a regulatory authority to systemically treat entities differently based on the regulator's assessment of the risks of the entity's non-compliance.

<span class="mw-page-title-main">Corporate social media</span>

Corporate social media is the use of social media platforms, social media communications and social media marketing techniques by and within corporations, ranging from small businesses and tiny entrepreneurial startups to mid-size businesses and huge multinational firms. Within the definition of social media, there are different ways corporations utilize it. Although there is no systematic way in which social media applications can be categorized, there are various methods and approaches to having a strong social media presence.

Online presence management is the process of creating and promoting traffic to a personal or professional brand online. This process combines web design, and development, blogging, search engine optimization, pay-per-click marketing, reputation management, directory listings, social media, link sharing, and other avenues to create a long-term positive presence for a person, organization, or product in search engines and on the web in general.

<span class="mw-page-title-main">Brand.com</span> Defunct American online reputation and brand management company

Brand.com was an American online reputation and brand management company based in Philadelphia, Pennsylvania. It was founded as Reputation Changer in 2009. In 2013, it purchased the Brand.com domain name for $500,000, and changed its name. The company provided Internet search management, creating positive web articles about its clients in order to have them overtake negative news, and Wikipedia profile management. The company filed for bankruptcy in 2015 and was shut down.

Social media use by businesses includes a range of applications. Although social media accessed via desktop computers offer a variety of opportunities for companies in a wide range of business sectors, mobile social media, which users can access when they are "on the go" via tablet computers or smartphones, benefit companies because of the location- and time-sensitive awareness of their users. Mobile social media tools can be used for marketing research, communication, sales promotions/discounts, informal employee learning/organizational development, relationship development/loyalty programs, and e-commerce.

References

  1. Roberson, Chip. "Social Content vs. Social Presence - Don't neglect your social footprint". Brandle, Inc. Retrieved 12 August 2015.
  2. "Reputation@Risk - 2014 global survey on reputation risk" (PDF). Deloitte. Deloitte. Retrieved 12 August 2015.
  3. 1 2 "Global Risk Management Survey 2015". AON. AON. Retrieved 12 August 2015.
  4. 1 2 "17th Annual Global CEO Survey". PwC. PwC. Retrieved 12 August 2015.
  5. "BoardMatters Quarterly, April 2014 - The business of social media - EY - United States". EY. Retrieved 2 September 2018.
  6. "Board Matters Quarterly - Critical insights for today's audit committee" (PDF). Ernst & Young LLP. Retrieved 12 August 2015.
  7. Hinkley, Chris (10 November 2011). "Social Media Makes Way for Social Engineering". SecurityWeek. Wired Business Media. Retrieved 12 August 2015.
  8. Bradley, Tony (31 October 2013). "Think twice before you accept that 'friend' request". CSO. CXO Media, Inc. Retrieved 12 August 2015.
  9. Foster, James (12 January 2015). "A CISO's Nightmare: Digital Social Engineering". SecurityWeek. Wired Business Media. Retrieved 12 August 2015.
  10. "Security for social networking" (PDF). PwC. PwC. Retrieved 12 August 2015.
  11. Andreesen, Tom; Slemp, Cal. "Managing Risk in a Social Media-Driven Society" (PDF). Protiviti. Protiviti, Inc. Retrieved 12 August 2015.
  12. Roberson, Chip. "Social Media for the Retail Industry - Going Local and Liking It!". Brandle. Brandle, Inc. Retrieved 12 August 2015.
  13. "2015 Survey of Bank Compliance Officers". ABA. American Bankers Association. Retrieved 12 August 2015.
  14. "Social Media: Consumer Compliance Risk Management Guidance" (PDF). FDIC. FFIEC. Retrieved 12 August 2015.
  15. Holmes, Ryan (23 August 2012). "Social Media Compliance Isn't Fun, But It's Necessary". Harvard Business Review. Harvard Business School Publishing. Retrieved 12 August 2015.
  16. "Regulatory Notice 10-06". FINRA. FINRA. Retrieved 12 August 2015.
  17. 1 2 Church, Janet; Roberson, Chip. "Social Media Risks and Rewards". Scotsman Guide. Scotsman Guide Media. Retrieved 12 August 2015.
  18. Juergens, Michael. "Social Media Risks Create an Expanded Role for Internal Audit". Wall Street Journal. Retrieved 10 August 2015.
  19. Dowie, Jon. "EMERGING TECHNOLOGY RISKS - Social Media - Internal Audit's response" (PDF). KPMG. Retrieved 10 August 2015.