Home
Business Guide
 
simplicable technology guide   »  enterprise software   »  social software   »  social media monitoring

What is Social Media Monitoring (SMM)?

        posted by , December 23, 2011

Social Media Monitoring tools (and services) extract data from social media websites and provide social analytics.

Functionality

Social Media Monitoring tools monitor social media conversations and relationships. They allow organizations to target social information about competitors, brands, products, customers, partners, employees, events, political topics, etc. Common functionality includes:

ability to define target information (topic, language, location, demographics, etc.)

social media mining (data extraction)

data aggregation (combining social data from multiple sources with other information such as location and demographics)

ranking of data (what's a significant conversation and what's noise?)

sentiment analysis

identification of influencers

social metrics (key success indicators)

dashboards

social analytics

filters and queries

historical social data

integration with enterprise applications and services

alerts, escalations and workflows


Business Value

Organizations use Social Media Monitoring tools to drive business processes and decision support. Common applications include:

brand management and marketing

competitive intelligence

product development

sales

customer relationship management

partner relationship management

reputational risk management

human resources (employee monitoring, recruiting, etc.)

security



3 Shares Google Twitter Facebook



Related Articles



Enterprise Architecture
How to architect an organization.




Understanding your vulnerabilities is the first step to managing risk.

Learn about the 10 most important patterns for SOA success.

The exciting world of ITIL metrics.

Service-oriented Architecture (SOA) is as simple as can be — it can all be boiled down to these 9 principles.


Recently on Simplicable


The Big List of Information Security Vulnerabilities

posted by John Spacey
Understanding your vulnerabilities is the first step to managing risk.

The Big List of Information Security Threats

posted by John Spacey
Understand the threats to your organization.

8 Enterprise Architecture Risks

posted by Anna Mar
Enterprise Architecture (EA) is supposed to help manage IT risks — but is it possible that EA itself introduces new risks?

Security Through Obscurity

posted by Anna Mar
Security through obscurity is generally considered a bad idea ...

Sitemap













about     contact     sitemap     privacy     terms of service     copyright