Browse Definitions :
Definition

employee advocacy

Contributor(s): Ivy Wigmore

Employee advocacy is the promotion of an organization by its staff members.

A business may ask employees to actively promote the organization, often through social media, as an element of their jobs. However, the most compelling employee advocacy consists of freely-offered communications on the part of the workforce. The question of whether or not staff members are likely to freely promote an organization is highly related to the degree of employee engagement in the workplace, and employee engagement is largely a factor of the corporate culture and the employer’s ability to make working for them a positive experience.

Forrester research studied the status of employee advocacy through a global survey of over 5,500 information workers. The survey used a 10-point Likert scale to quantify the response to two questions:

  • How likely are you to recommend your company's products or services to a friend or family member?
  • How likely are you to recommend a job at your company to a friend or family member?

The results of Forrester’s research indicated that there is a great deal of room for improvement. Overall, the North American score was negative twenty-four percent on the employee advocacy score for recommending their company's products and services. Forty-nine percent of the information workers sampled were detractors, twenty-four percent were neutral and just twenty-seven percent were promoters. For job referrals, the overall score was negative sixteen percent, with forty-three percent detractors, twenty-nine percent neutral and twenty-seven percent promoters.

See a Google hangout on the topic of employee advocacy:

This was last updated in October 2014

Continue Reading About employee advocacy

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close