Browse Definitions:
Definition

reputation management

Contributor(s): Ivy Wigmore

Reputation management (sometimes referred to as rep management, online reputation management or ORM) is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity.

The first step in reputation management is monitoring references to the person or business, primarily through social media monitoring and carefully crafted search queries. Social media analytics and similar processes on search results help to deliver a snapshot of current public opinion of the person or business in question and then a campaign can be designed to address any problematic issues that have been revealed.

Public relations (PR) campaigns may be conducted to increase the visibility of positive opinions or to decrease the visibility of negative opinions. One common practice is the creation of positive content pieces about a business to counter negative organic content. A reputation manager posts positive pieces in sufficient numbers to make the negative commentary display less prominently in search results or on social media sites. They might also join conversations, for example responding to tweets complaining about a company with comments that they had only good experiences to report.

Although there are artificial ways to at least attempt to affect your online reputation, there’s no way to effectively create a false impression with any lasting power. You can choose what information to intentionally share online but you cannot control the conversation about you or your brand. According to research by the Nielson consulting group, 53 percent of adults follow particular brands online and 60 percent of users of social networking sites write reviews of products and services. Given the number of people willing to discuss real customer experiences – and especially negative ones -- the only truly effective way to create a positive online reputation is through appropriate behaviour.

For individuals, the first and most essential step of reputation management is limiting what you make available online to information – whether images, video, posts or comments – that you are comfortable sharing with the world for the foreseeable future. For businesses, the most effective approach to reputation management involves promoting your company honestly, implementing customer experience management (CEM) practices and actively engaging with customers online.

See also: spin, internet shill, sock puppet, sock puppet marketing

 

This was last updated in December 2016

Continue Reading About reputation management

Join the conversation

3 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Great post! Very informative. Learn a lot from reputation management. <a href="http://www.linkedin.com/in/taxtigeronline/">Tax Tiger</a>
Cancel
Good definition - if you want to investigate further how these practices work in reality check out - www.igniyte.com
Cancel
I think this information is pretty solid. It doesn't go into detail on the role ORM plays when it comes to personal search results though, which I think would be helpful for others to see.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • SSD write cycle

    An SSD write cycle is the process of programming data to a NAND flash memory chip in a solid-state storage device.

  • data storage

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • hard disk

    A hard disk is part of a unit -- often called a disk drive, hard drive or hard disk drive -- that stores and provides relatively ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close