Browse Definitions:
Definition

reputation management

Contributor(s): Ivy Wigmore

Reputation management (sometimes referred to as rep management, online reputation management or ORM) is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity.

The first step in reputation management is monitoring references to the person or business, primarily through social media monitoring and carefully crafted search queries. Social media analytics and similar processes on search results help to deliver a snapshot of current public opinion of the person or business in question and then a campaign can be designed to address any problematic issues that have been revealed.

Public relations (PR) campaigns may be conducted to increase the visibility of positive opinions or to decrease the visibility of negative opinions. One common practice is the creation of positive content pieces about a business to counter negative organic content. A reputation manager posts positive pieces in sufficient numbers to make the negative commentary display less prominently in search results or on social media sites. They might also join conversations, for example responding to tweets complaining about a company with comments that they had only good experiences to report.

Although there are artificial ways to at least attempt to affect your online reputation, there’s no way to effectively create a false impression with any lasting power. You can choose what information to intentionally share online but you cannot control the conversation about you or your brand. According to research by the Nielson consulting group, 53 percent of adults follow particular brands online and 60 percent of users of social networking sites write reviews of products and services. Given the number of people willing to discuss real customer experiences – and especially negative ones -- the only truly effective way to create a positive online reputation is through appropriate behaviour.

For individuals, the first and most essential step of reputation management is limiting what you make available online to information – whether images, video, posts or comments – that you are comfortable sharing with the world for the foreseeable future. For businesses, the most effective approach to reputation management involves promoting your company honestly, implementing customer experience management (CEM) practices and actively engaging with customers online.

See also: spin, internet shill, sock puppet, sock puppet marketing

 

This was last updated in December 2016

Continue Reading About reputation management

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Great post! Very informative. Learn a lot from reputation management. <a href="http://www.linkedin.com/in/taxtigeronline/">Tax Tiger</a>
Cancel
Good definition - if you want to investigate further how these practices work in reality check out - www.igniyte.com
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close