All about Counterpoint


Published on

An introduction to Counterpoint - a new online reputation management tool.

Published in: Business, Technology
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

All about Counterpoint

  1. 1. Introducing The online reputation management solution from Newscounter
  2. 2. Context
  3. 3. Reputation management has changed <ul><li>The mass media has been joined by the Internet as a key influencer of the perception of your reputation.   </li></ul><ul><li>The Internet is the primary source of research and information for decision making The Internet is synonymous with searching for information. When anyone wants to find out about your company, the web will be their first port of call. </li></ul><ul><li>Mass and specialised audiences are accessing the Internet Whether a customer, an investor, a member of staff or someone with no link to your organisation, mass and specialised audiences are accessing the Internet and learning about your reputation. They are also able to influence the perception themselves through user generated content. </li></ul><ul><li>Bad news is permanent online Information on the Internet can be stored permanently. Media coverage of your reputation is no longer used to wrap tomorrow’s fish and chips – information about you gathers on the Internet and is accessible for years to come. </li></ul><ul><li>It is vital to be aware and react fast to manage your reputation. </li></ul>
  4. 4. Your reputation under threat <ul><li>The speed of the threat </li></ul><ul><li>The hidden threat </li></ul><ul><li>The size of the threat </li></ul>
  5. 5. The speed of the threat <ul><li>From blog to front page </li></ul><ul><li>Reputational threats can move at lightning speed across the web creating a negative tipping point against you before you can react. </li></ul><ul><ul><li>Be blindsided by negative press </li></ul></ul><ul><ul><li>Appear slow to react </li></ul></ul><ul><ul><li>Appear vulnerable </li></ul></ul>
  6. 6. The hidden threat <ul><li>Bloggers can have a silent but deadly impact on your reputation. The identity of key influencers may remain hidden until it’s too late. </li></ul><ul><ul><li>Become aware of danger too late </li></ul></ul><ul><ul><li>Damage sustained to reputation </li></ul></ul><ul><ul><li>Negative impact on sales </li></ul></ul>
  7. 7. The size of the threat <ul><li>The rise of blogs and social media have given millions of people disproportionate influence compared to just a few years ago. </li></ul><ul><li>This new world operates very differently to the world of traditional media. </li></ul><ul><ul><li>1.6 million Web posts each second </li></ul></ul><ul><ul><li>540 hours of footage uploaded to Youtube everyday </li></ul></ul><ul><ul><li>Online news stories can attract over 1000 articles </li></ul></ul>
  8. 8. The reputation management challenge <ul><li>Not just a few newspapers but millions of posts each hour. The risk of silently losing your reputation within days. </li></ul><ul><li>Even with a team of full-time researchers it would be impossible to track and evaluate everything by hand. </li></ul><ul><li>Time is needed to avoid being swamped or ignorant </li></ul>
  9. 9. The Counterpoint solution <ul><li>After years of studying the threats and the tools available, we have created the Counterpoint to automatically track and monitor your reputation. </li></ul><ul><li>The Counterpoint system is: </li></ul><ul><ul><li>Automated </li></ul></ul><ul><ul><li>Immediate </li></ul></ul><ul><ul><li>Manageable </li></ul></ul>
  10. 10. How it works 1. Monitor 2. Evaluate 3. React
  11. 11. 1. Monitor <ul><li>The system scans the Internet for possible threats - to find the conversations about you. </li></ul><ul><li>Comprehensive </li></ul><ul><li>It pulls together content from blogs, from social sites, from across the Internet </li></ul><ul><li>Constant </li></ul><ul><li>These sources are rechecked several times each day </li></ul><ul><li>Tailored </li></ul><ul><li>You can measure the bias in content and measure your promoters and detractors accordingly </li></ul>
  12. 12. Comprehensive <ul><li>The system scans blogs, websites and search engines </li></ul><ul><li>All material that is found is accessible to the user through the system, including YouTube and social networking sites </li></ul>
  13. 13. Constant <ul><li>The system checks all available sources every couple of minutes </li></ul><ul><li>The system then re-checks all identified content to identify if and when a piece of content is attracting a large audience </li></ul>
  14. 14. Tailored <ul><li>You can change keywords whenever you want </li></ul><ul><li>Any material related to your search is filtered for relevance </li></ul><ul><li>You can assess the bias of each piece of content to evaluate your online coverage. </li></ul>
  15. 15. 2. Evaluate <ul><li>We evaluate those threats to determine how seriously they affect your reputation. There are three main ways that people access information online: </li></ul><ul><li>Search engines </li></ul><ul><li>The system measures how visible a threat is on the search engines </li></ul><ul><li>Websites </li></ul><ul><li>It measures the importance of a site by understanding the number of incoming links </li></ul><ul><li>Social networks </li></ul><ul><li>Where possible we measure the audience size of content on social networking sites </li></ul>
  16. 16. Search engines <ul><li>The majority of internet use begins on a search engine so you need to know: </li></ul><ul><li>Which keywords people are using most frequently </li></ul><ul><li>When your websites appear prominently in the results – and when they don’t </li></ul><ul><li>Any changes in the rankings which may give prominence to criticism of your brand or products </li></ul>Our methodology
  17. 17. Websites <ul><li>People also find information by clicking on hyperlinks between websites. Counterpoint counts: </li></ul><ul><li>The number of links that are coming in to a website </li></ul><ul><li>How many links each of these sites have, on average </li></ul>Our methodology
  18. 18. Social networks <ul><li>Social networking platforms such as YouTube or Facebook are increasingly important </li></ul><ul><li>More than 12 million Britons use a social network each month </li></ul><ul><li>Counterpoint measures: </li></ul><ul><ul><li>The current audience; how many people are seeing a piece of content </li></ul></ul><ul><ul><li>How many friends they have each, to indicate its potential audience </li></ul></ul>Our methodology
  19. 19. 3. React <ul><li>We alert you immediately so you can decide how best to deal with the threat. </li></ul><ul><li>React Fast </li></ul><ul><li>When necessary you can react directly before a small problem escalates </li></ul><ul><li>Get Help </li></ul><ul><li>Working with specialists, we can help you decide on the best response </li></ul>
  20. 20. React fast <ul><li>Set how you are alerted about any material the system monitors </li></ul><ul><li>What you need to know, when you need to know it </li></ul>
  21. 21. Get help <ul><li>Newscounter can help you engage with blogs, promote your content or put you in touch with specialists to reduce your risk exposure. </li></ul><ul><li>The company can provide consultancy services as and when needed </li></ul>
  22. 22. Who needs it?
  23. 23. The speed of the threat: HSBC <ul><li>The National Union of Students claimed a campaign victory over banking giant HSBC after protests on Facebook. </li></ul><ul><li>Thousands of graduates found the bank had suddenly started charging them for overdrafts. They made their anger known by joining a Stop the Great HSBC Graduate Rip-Off! group on the website, started by NUS vice-president Wes Streeting. It attracted more than 4,000 members. </li></ul><ul><li>The bank took a u-turn and froze overdraft charges to recent graduates and pledged to repay charges deducted in August. </li></ul><ul><li>A spokesman for HSBC acknowledged the role of this new-style cyber campaign on Facebook. </li></ul><ul><li>“ We are a service-oriented organisation and we have to listen to our customers - that is a priority for us. It's a good example of where a medium like Facebook has enabled customers to tell us something they feel strongly about.” </li></ul>
  24. 24. The hidden threat: Kryptonite <ul><li>A blogger posted instructions on how to pick a Kryptonite lock using a Bic pen. </li></ul><ul><li>However, the company had no knowledge of this and was unaware of the defective lock. </li></ul><ul><li>Of course, monitoring blogs wouldn’t have prevented the problem with the locks. </li></ul><ul><li>But had public relations and marketing people at the company known about the issue earlier, they could have proactively addressed the situation. </li></ul>
  25. 25. The size of the threat: Verizon <ul><li>In early 2005, a customer of Verizon Wireless wrote of his dissatisfaction on a blog regarding the company’s mobile phone service. </li></ul><ul><li>The blog claimed that Verizon had advertised a particular phone as being Bluetooth-enabled but that the company had disabled a function that enabled wireless connection. </li></ul><ul><li>As a result, customers were charged extra to use the Verizon network to transfer files. </li></ul><ul><li>The blog sparked a response, with other dissatisfied customers posting to blogs to discuss the problems they had had with the service. </li></ul><ul><li>Online blogs gave an outlet for customers to share stories about phone failures and complain about the company’s service. </li></ul><ul><li>A California man initiated a class action lawsuit against the company. </li></ul>
  26. 26. Our methodology
  27. 27. Search engines <ul><li>To understand when the society wants to be found on search engines, we take the keyword tags from the source code in the client’s homepage. </li></ul><ul><li>We then found out how often each of these search terms is used and ranked them from accordingly. </li></ul><ul><li>Counterpoint then put these terms into search engines. The system analysed the search results and scored each according to its rank from first to twentieth. </li></ul><ul><li>The system then gives each result a score from 100 for the top result to 10 for the 20th result and adds up the score for each search result that links to a client website. </li></ul><ul><li>If all 20 search results linked to the websites of the client, it would score 675. </li></ul>
  28. 28. Websites <ul><li>Counterpoint understands the reputation of websites by measuring their authority, in a similar way to the citation of academic research. </li></ul><ul><li>Firstly, Counterpoint counts up all the websites that link in to your website, which gives the ‘direct authority’ of your website. However, some links are worth more than others. One link from a website with a lot of authority is worth more than ten links from a website with little authority. </li></ul><ul><li>So Counterpoint then it finds out the authority of the top 100 websites that link in to your site. It calculates whether on average those sites have more or less authority than your website. A score in excess of 100 shows that the sites that link to your site have, on average, a greater than your own site. This gives the ‘indirect authority’ score. </li></ul><ul><li>Finally, Counterpoint assigns each website a risk level from critical to low according to its authority in comparison to other UK-based websites. So a website with a similar authority to the BBC website will be labelled ‘critical risk’ whilst a small blog will be labelled ‘low risk’. </li></ul>
  29. 29. Social networks <ul><li>Counterpoint scans the major social networks, Facebook, Myspace and YouTube. </li></ul><ul><li>Where it finds relevant content, it identifies how many people have expressed an interest in it – by viewing it or joining its network. That gives the direct reach value. </li></ul><ul><li>Counterpoint then searches each of those people (or the subscribers to videos) to find out the size of their online networks. This reveals the total potential reach of the content, within two or three clicks. </li></ul>
  30. 30. For more information [email_address] 07809 882844
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.