Social Media Technologies for Business Intelligence Crisis, Security, Travel and Emergency
 
What social media do you use?
 
Which age group?
 
 
 
What is.... <ul><li>Today </li></ul>
 
 
Speaker <ul><li>Security </li></ul><ul><li>Business intelligence </li></ul><ul><li>Internet Marketing </li></ul><ul><li>On...
Advanced Session WARNING Content not context and any internal issues are all yours!!
<ul><li>Research </li></ul><ul><li>Monitoring </li></ul><ul><li>Management </li></ul><ul><li>Implementation </li></ul><ul>...
 
Research
<ul><li>Keyword Tool-Adwords </li></ul>
 
<ul><li>Google Insights </li></ul>
 
<ul><li>Google Trends </li></ul>
 
<ul><li>Google Search </li></ul>
<ul><li>Google Search </li></ul>Names, Groups & Companies
<ul><li>Google Search </li></ul>*@domain.com
<ul><li>Google Search </li></ul>“ http:/www.any-domain.com ”
<ul><li>Google Search </li></ul>site: domain-name.com
 
 
 
 
 
 
 
 
 
<ul><li>Market Samurai </li></ul>
 
 
 
 
Tools <ul><li>SEO Moz </li></ul><ul><li>Radian 6 </li></ul><ul><li>Adobe Ominture </li></ul><ul><li>Sysomos Audience </li>...
 
 
 
 
 
Management
24/7 monitoring <ul><li>Geo Arbitrage </li></ul><ul><li>Metrics </li></ul><ul><li>Breakouts </li></ul><ul><li>CMT </li></u...
 
Defensive Plan <ul><li>Content </li></ul><ul><ul><li>Video </li></ul></ul><ul><ul><li>Image </li></ul></ul><ul><ul><li>Art...
 
Offensive Plan <ul><li>Keyword Attack </li></ul><ul><li>Search Engine Optimisation </li></ul><ul><ul><li>Number 1-10 </li>...
Implementation
Game Plan <ul><li>Make a recording </li></ul><ul><li>Transcribe </li></ul><ul><li>Make Variants </li></ul><ul><li>Multi Ch...
Professionals
Outsourced Teams <ul><li>Freelancer </li></ul><ul><li>VWorker </li></ul><ul><li>oDesk </li></ul><ul><li>123 Employee </li>...
Trend spotting <ul><li>Market Samurai </li></ul><ul><li>Google Analytics </li></ul>
Submission Tools <ul><li>Twitter </li></ul><ul><li>Video </li></ul><ul><li>Blogs </li></ul><ul><li>News </li></ul><ul><li>...
Social Bookmarking <ul><li>Backlinks </li></ul><ul><li>High PR </li></ul><ul><li>Volume </li></ul><ul><li>Targeted </li></...
Example
 
 
 
Speaker <ul><li>Security </li></ul><ul><li>Business intelligence </li></ul><ul><li>Internet Marketing </li></ul><ul><li>On...
Social Media Technologies for Business Intelligence Crisis, Security, Travel and Emergency
Upcoming SlideShare
Loading in …5
×

Social Media Technologies for Business Intelligence (Crisis, Security, Travel and Emergency)

822 views

Published on

http://tony-ridley.com/webinars/social-media-technologies-for-business-intelligence-security-crisis-travel-and-risk-management-webinar

How to use social media technologies for for business intelligence, including security, crisis, emergency management and travel.

Presented by Tony Ridley, a leading international consultant, speaker, author and advisor to companies of all sizes.

In this presentation (click above to attend the webinar) Tony will identify the tools, tactics, solutions and reasons behind the growing use of social media for business intelligence.

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
822
On SlideShare
0
From Embeds
0
Number of Embeds
16
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Social Media Technologies for Business Intelligence (Crisis, Security, Travel and Emergency)

  1. 1. Social Media Technologies for Business Intelligence Crisis, Security, Travel and Emergency
  2. 3. What social media do you use?
  3. 5. Which age group?
  4. 6.
  5. 9.
  6. 10.
  7. 12.
  8. 13.
  9. 14.
  10. 15.
  11. 16.
  12. 17.
  13. 18.
  14. 19.
  15. 20. What is.... <ul><li>Today </li></ul>
  16. 23. Speaker <ul><li>Security </li></ul><ul><li>Business intelligence </li></ul><ul><li>Internet Marketing </li></ul><ul><li>Online Reputation Management (ORM) </li></ul><ul><li>Social Media </li></ul>-Scan this QR Code for my contact details Tony Ridley www.tony-ridley.com
  17. 24. Advanced Session WARNING Content not context and any internal issues are all yours!!
  18. 25. <ul><li>Research </li></ul><ul><li>Monitoring </li></ul><ul><li>Management </li></ul><ul><li>Implementation </li></ul><ul><li>Professionals </li></ul>
  19. 27. Research
  20. 28. <ul><li>Keyword Tool-Adwords </li></ul>
  21. 30. <ul><li>Google Insights </li></ul>
  22. 32. <ul><li>Google Trends </li></ul>
  23. 34. <ul><li>Google Search </li></ul>
  24. 35. <ul><li>Google Search </li></ul>Names, Groups & Companies
  25. 36. <ul><li>Google Search </li></ul>*@domain.com
  26. 37. <ul><li>Google Search </li></ul>“ http:/www.any-domain.com ”
  27. 38. <ul><li>Google Search </li></ul>site: domain-name.com
  28. 40.
  29. 49. <ul><li>Market Samurai </li></ul>
  30. 51.
  31. 52.
  32. 56.
  33. 57. Tools <ul><li>SEO Moz </li></ul><ul><li>Radian 6 </li></ul><ul><li>Adobe Ominture </li></ul><ul><li>Sysomos Audience </li></ul><ul><li>Digitcal Footprint Index </li></ul><ul><li>Google </li></ul><ul><li>Conversation Impact </li></ul><ul><li>Fluent by Razorfish </li></ul><ul><li>Demographics Now </li></ul><ul><li>WeePlaces </li></ul><ul><li>Twitter Demographics </li></ul><ul><li>Brandwatch </li></ul><ul><li>Viralheat </li></ul><ul><li>Viral Tracker </li></ul><ul><li>Alterian </li></ul><ul><li>Brandtology </li></ul><ul><li>SM2 </li></ul><ul><li>HubSpot </li></ul>
  34. 63. Management
  35. 64. 24/7 monitoring <ul><li>Geo Arbitrage </li></ul><ul><li>Metrics </li></ul><ul><li>Breakouts </li></ul><ul><li>CMT </li></ul><ul><li>Technical Input </li></ul>
  36. 66. Defensive Plan <ul><li>Content </li></ul><ul><ul><li>Video </li></ul></ul><ul><ul><li>Image </li></ul></ul><ul><ul><li>Articles </li></ul></ul><ul><ul><li>Press Release </li></ul></ul><ul><ul><li>Distribution </li></ul></ul><ul><ul><ul><li>Self Publishing </li></ul></ul></ul><ul><ul><ul><li>Providers </li></ul></ul></ul><ul><li>Creation Plan </li></ul><ul><li>Canned Vs Real-Time </li></ul>
  37. 68. Offensive Plan <ul><li>Keyword Attack </li></ul><ul><li>Search Engine Optimisation </li></ul><ul><ul><li>Number 1-10 </li></ul></ul><ul><li>Key Markets and Channels </li></ul><ul><li>Test and Adjust </li></ul><ul><li>Reverse Engineering </li></ul><ul><ul><li>The hunter becomes the hunted </li></ul></ul><ul><li>One message 10 formats </li></ul>
  38. 69. Implementation
  39. 70. Game Plan <ul><li>Make a recording </li></ul><ul><li>Transcribe </li></ul><ul><li>Make Variants </li></ul><ul><li>Multi Channel Release </li></ul><ul><li>Social Bookmarking </li></ul><ul><li>x 50 </li></ul>
  40. 71. Professionals
  41. 72. Outsourced Teams <ul><li>Freelancer </li></ul><ul><li>VWorker </li></ul><ul><li>oDesk </li></ul><ul><li>123 Employee </li></ul><ul><li>Guru.com </li></ul><ul><li>Remote Staff </li></ul>
  42. 73. Trend spotting <ul><li>Market Samurai </li></ul><ul><li>Google Analytics </li></ul>
  43. 74. Submission Tools <ul><li>Twitter </li></ul><ul><li>Video </li></ul><ul><li>Blogs </li></ul><ul><li>News </li></ul><ul><li>Websites </li></ul>
  44. 75. Social Bookmarking <ul><li>Backlinks </li></ul><ul><li>High PR </li></ul><ul><li>Volume </li></ul><ul><li>Targeted </li></ul><ul><li>Forums </li></ul>
  45. 76. Example
  46. 80. Speaker <ul><li>Security </li></ul><ul><li>Business intelligence </li></ul><ul><li>Internet Marketing </li></ul><ul><li>Online Reputation Management (ORM) </li></ul><ul><li>Social Media </li></ul>-Scan this QR Code for my contact details Tony Ridley www.tony-ridley.com
  47. 81. Social Media Technologies for Business Intelligence Crisis, Security, Travel and Emergency

×