Home
Business Guide
 
simplicable technology guide   »  enterprise software   »  social software   »  social media monitoring

What is Social Media Monitoring (SMM)?

        posted by , December 23, 2011

Social Media Monitoring tools (and services) extract data from social media websites and provide social analytics.

Functionality

Social Media Monitoring tools monitor social media conversations and relationships. They allow organizations to target social information about competitors, brands, products, customers, partners, employees, events, political topics, etc. Common functionality includes:

ability to define target information (topic, language, location, demographics, etc.)

social media mining (data extraction)

data aggregation (combining social data from multiple sources with other information such as location and demographics)

ranking of data (what's a significant conversation and what's noise?)

sentiment analysis

identification of influencers

social metrics (key success indicators)

dashboards

social analytics

filters and queries

historical social data

integration with enterprise applications and services

alerts, escalations and workflows


Business Value

Organizations use Social Media Monitoring tools to drive business processes and decision support. Common applications include:

brand management and marketing

competitive intelligence

product development

sales

customer relationship management

partner relationship management

reputational risk management

human resources (employee monitoring, recruiting, etc.)

security





Related Articles



Enterprise Architecture
How to architect an organization.




Ever wonder when that hot new technology is going to get cheaper? Learn what really drives technology prices.

IT career management

Yes and no. There's no ITIL certification process offered by ITIL itself. However, an organization that's reached ITIL maturity can generally be ISO 20000 certified.

A digital signature embedded in information that can be tied to a source such as an individual or an IP address.


Recently on Simplicable


The Big List of Information Security Threats

posted by John Spacey
Understand the threats to your organization.

8 Enterprise Architecture Risks

posted by Anna Mar
Enterprise Architecture (EA) is supposed to help manage IT risks — but is it possible that EA itself introduces new risks?

Security Through Obscurity

posted by Anna Mar
Security through obscurity is generally considered a bad idea ...

Zombie Armies of The Digital Frontier

posted by Anna Mar
An quick explanation of botnets.

about     contact     sitemap     privacy     terms of service     copyright