Jody Raines

  • Web MarCom
  • About
  • Blog

April 20, 2016 By Jody Raines Leave a Comment

Social Media Tips: Trust and Transparency

Social media trust, jody raines Trust. What does it take to create trust, and how can trust be taken away?

And for that matter, what is social media trust?  And how does social media transparency help or hinder building trust and engagement in social media?

You may have heard the term “transparency” used in relation to business branding or identity marketing, but what does the concept of transparent marketing mean, and how can you be sure to establish trust with your clients, customers and prospects?

When you’ve lost trust, you can bet you’ve lost business.

Recently I’ve been receiving a series of emails, on a almost daily basis from my Internet service provider, that imply that my computer and network have been compromised. At first, I disregarded this as a sales attempt… After all, I am running hordes of security on my network, and the op sys I am using is touted as being fairly stable and resistant to virus infiltration.

But as I started to think about it, I realized that if this was a sales attempt, it is preying on a vulnerable market. So many people have computers today who did not grow up with them like Generation C is… To this older an newly connected generation, computers are still something of a mystery!   Case in point, I recently got one of the new ipads for my mother who is 87. She absolutely loves the ipad interface and marvels at what the device can do,…. She’s unusual for her generation, howeve she is not as aware of hacker attacks or viruses as someone who is Generation C or even Gen Y.

So, the email about viruses made me angry.

I am sure this was not the result the company that sent it to me had hoped for.  They more likely were anticipating that I’d be thankful for the heads up.  But recently, I’ve had a malevolent person who has been stalking me, and in addition to my system potentially being hacked, I am now concerned that this individual may may have done something to my system when he had access to it.

But was my service provider preying on my insecurity?  For a megalith company, that I respect, and who I have as a service provider to stoop to sending me false allegations that my Mac may have a bot or key logger really miffed me.

Question is – do I trust that the service provider is truly attempting to be helpful, or do i disregard and figure it’s an attempt to add additional service fees to my monthly invoice?

Trust.  If I trusted the service provider, there would be no question. Like the Facebook trust experience, where multiple changes have disrupted or opened up our privacy settings, the Internet and social media marketing has elevated the attempts on the part of undesirable or poorly informed suppliers, especially those who are adept at positioning themselves as “experts”. They prey on our fears and use double talk to obfuscate their meaning, The plethora of these types has given rise to our questioning whether these are actually attempts to help versus attempts to sell. As it turns out, I did decide to have this third party evaluate what is going on with my systems…. They are immersed in my Mac as we speak and they’ve started to unravel things.

How much simpler things would have been for them, had they established a level of trust first. Then there would be no question that the first sign of trouble was real. As it was, this sale took 4 phone calls to 7 individuals including their security division before I “trusted” what they were telling me, that’s 7 people who were tied up taking to a prospect when really, and ideally, this should no have had to escalate to that level. If there is a lesson, it is to treat your brand and your customers with value, be truthful, and don’t think that a cleverly veiled sales approach will not be recognized as such by your prospects.

Certainly it’s important to aim at giving value, but it’s equally important to refrain from disguising your true intent. In this instance, had the service provider simply shared that there is a paid version and an unpaid version of support in a clear manner, I may have jumped inboard sooner. Have you had experiences where you were not sure whether the offer was genuine or a sales attempt? Do you have call to action offers that may cross the line, or have you experience one on a site you’ve visited?

Filed Under: Internet Privacy, Social Media, Social Media Connections, Social Media Marketing Tagged With: Jody Raines, social media transparency, social media trust

April 15, 2016 By Jody Raines

Online Safety: When To Beware The Invitation To Connect

Social Media SafetyRecently I received an invitation to connect to someone on Facebook.  In and of itself, this is not an unusual occurance.  Since I co-host several podcasts, and am active on Social Media, there are often people asking to be ‘friends’ who I don’t know personally, but this situation had my spidey senses tingling.

When it comes to social media safety, it helps to be cautious and look for the red flags.

There are some red flags that I noticed:

  1. The person’s name was a “gag name”.  Now this can happen, and may not be a total red flag, but if you receive a request from Seymore Bunns, or Anita Break you should most likely delve further into whether you truly want to accept this person among your connections.   In this case, the person’s name was a page turner of sorts.
  2. The profile picture and background picture are not of the person.   Again, this may not be a true indicator that the person does not exist or is not real, however, if someone is trying to be overly clever and they faked the profile, then it’s another way to detect a false profile.
  3. The profile is relatively new.   If someone has a profile that was recently created and they have a ton of ‘friends’ then be cautious if you do not recognize the name.

All three of these indicators were in place for this particular friend request, but… there was more…..

  1. All posts are memes and generic.  If there is no personal content, that’s very odd.   Every now and then, most people will post a picture of something that they are doing, or something they are eating or even a picture of their dog.  If the only posts are third party shares, that’s another suspicious characteristic.
  2. The friends that you are also connected to are primarily from similar circles.  If you notice that the unknown person who wants to friend you is connected to several people from that same circle, you should be suspicious.   Ask your friends whether htey really know the person,or whether they friended them because others were connected.  If you have friends who are numbers people and really don’t care who they accept, then it’s important to discount their response to your inquiry.
  3. Where it starts getting creepy is when the friend requester has many of your connections, but they are connected in ways that does not make sense.  For example, with this request, not only were they connected to a ton of people that I network with locally, they also were somehow connected to people that I went to High School with, and who do not live in the area.  The person also had connected to a guy I dated who now lives in another state.  The liklihood of someone knowing this same circle of people from very different points of my sphere is more like flashing beacons than red flags.   Just too much of a coincidence.

How do you handle the situation?  I reached out to a few of my friends who were connected and asked whether they knew this perons or had met the person in real life.  No one actually remembers meeting her.   I think it’s safe to say that in this instance, it’s a nefarious purpose and therefore, I will not friend the person.

You may ask what difference this makes, and I will share with you a situation in my town where someone who had been allowed to connect started stalking and victimising females.   None of the young ladies who were victims actually knew the stalker, but had accepted the person because he was a friend of their friends.

Be wary.  Be careful.  And do not post where you are going to be or what you are not going to be home. Don’t indiscriminantly friend people without knowing who they are or investigating why they wish to friend you.   Sure, it may turn out to be fine, but an ounce of prevention is worth a pound of cure.

Filed Under: Internet Privacy, Social Media, Social Media Connections Tagged With: social media safety

April 29, 2015 By Jody Raines Leave a Comment

How To Identify A Social Media Friend or Stalker?

Jody RainesThere seems to be a strange phenomena that is taking place and it’s a “new” way of connecting that is difficult to classify. The line between a new friend and a overly curious acquaintance has created a curious change in the way we protect or fail to protect our privacy.

The Facebook post that becomes a chat, for example, is an introduction of sorts. It’s a way that various people who may otherwise never connect, wind up discussion a topic with each other.

A few weeks ago, I was chatting about the season finale of The Walking Dead with several of my friends. As you can imagine, it was a lively post because as things happened, someone would make a comment and then others would chime in.  All was cool, until a male friend made a comment about one of my female friend’s pets.  They did not know each other, they live in different states, and their only connection to each other was through my association with both of them.   The reason this was odd – was because the woman did not have a picture of her pet on her profile photo, so my conjecture is that my male friend went to her profile page to “check her out”.

I’ve noticed several connections made this way, and most of them are harmless.   For example, a male friend of mine who is married is now connected to a female friend who has a life partner.  Although they are dichotomous extremes in a political sense, ironically their sense of humor is shared, and therefore, they connected.   I think that is kind of cool because under any other circumstance, these two people would never have ‘met’.

Another association is with a friend of mine who recently got a Siberian Husky puppy.  Just so happens another friend of mine breeds and shows Huskies.  By bringing the first person’s attention to the adorable videos of irresistable baby Huskies, he wound up connecting with my friend the breeder.  Of course this ‘friendship’ now has a life of it’s own.

Every now and then, I have a friend request from someone I don’t know.   I typically check to see how we are connected – what mutual friends we have.  In most instances, I will send off a quick note to the mutual connection to ask how they know the person and whether the individual is legitimate.   Periodically, I find that my friends have not been diligent in evaluating whether the profile is genuine.  I’ve seen several situation s where I’ve been asked to connect with someone I thought I was already connected to, only to learn that their profile picture had been used to make a ‘fake’ account that was now harvesting their friends.  A quick call to the original person may tip them off to potential fraud.

My advice is as follows:

1. Don’t post anything that is too personal or that you don’t want the world to know. Regardless of privacy settings the first rule is that NOTHING is private.

2. Periodically check your friends to determine if there are duplicates.  If you find the dupe, a little bit of research may help a friend who may be unaware that their profile was duplicated or compromised.

3. Don’t open attachments that you are not sure of.  I get these emails almost every day – an email that appears to come from a Facebook friend’s name, but it only has a link to a masked url.   These can contain trojans or viruses, so you should be absolutely cautious before clicking on them.   In fact, if you look at the name and then click on the name to see the email address it actually came from, you may be surprised it is also masked.  In other words, it’s an email from an unknown person that appears to be coming from someone you know.

4. If someone you recently connected with starts commenting on old pictures, it can be disconcerting.  Even more upsetting is they start posting pictures of you!  I had a situation recently where an individual started posting pictures of people who had deceased during the year and tagging the family indicating that they hadn’t forgotten.  In this instance, I think it was supposed to be a caring gesture, but it came across as very unsettling.

5. Be suspicious.  I know, it sounds awful, but in this day and age where profiles can be created and deleted in the blink of an eye, there are too many charlatans intent on obtaining personal information.  A healthy skepticism can save a lot of future grief.

What strange connections have you encountered?  Have you been friend requested by a clone of a friend and you caught it?  I’m curious what you are seeing, and if you have additional thoughts with regard to staying safe on social media sites.

Filed Under: Internet Privacy, Social Media, Social Media Connections Tagged With: social media awareness, social media connections, social media safety

February 9, 2014 By Jody Raines Leave a Comment

Social Media Marketing And Inbound Marketing Trends For 2014

Social Media Trends, Social Marketing TrendsWant your online marketing to be a Knock Out?

Internet marketing trends continue to evolve and as we enter the new calendar year we evaluate what the Internet marketing trends will be, and what the impact will be on social media marketing or inbound marketing.  Some of the changes we are tracking will have great impact on the way we communicate using the Internet.

  1. Semantic Search Yields Improved Results. The world of Google and search changed with the introduction of Hummingbird and the birth of semantic search.  What this means is that search is more intelligent and adaptive.  The old days of matching specific keywords for “optimized search” results are hopefully dead.  Long live the new SEO and semantic search results.  With a more intelligent and personalized result, the old days of ‘gaming’ the search engines are hopefully over.  A new dawn of improved search results will dictate that websites become more serious about improved and helpful content.  If the information is simply ‘marketing pablum’ with keywords sprinkled through the text, it will no longer garner top placement or search engine rankings.
  2. Mobile’s Influence On Responsive Web Design And Marketing. It still amazes me when I am searching for a company or service or product on my mobile device and the result is difficult to read or evaluate.  More and more, mobile has become the way we find what we are looking for, and if your website is not mobile enabled, you will be knocked out of the game.  Google Webmaster Tools even offers some best practices for mobile websites.  This past Holiday season, statistics show that over 25% of online purchasing was done on a mobile device.  With the increasing number of transactions and searches being performed on mobile devices, mobile responsive web design will be a huge factor for online marketing success moving forward.
  3. Social Video, Real Time Increase In Offers And Adoption.  Google+ was revolutionary with the Hangout and Hangouts On Air platforms. Integrating with YouTube (the #2 search engine) makes G+ Hangouts an important tool for 2014 and beyond.  Many traditionally audio podcasts have made the transition to video.   In fact, video production and embedding have become relatively easy.  There are tremendous advances in editing software that makes video production more attainable for the general population.   Apple has proven that you can use an iPhone as an all in one video capture and editing platform for creating surprisingly professional results.
  4. Wearable Technology And The Dick Tracy Era. Wearing your heart on a sleeve will take a back seat to wearing your phone on your wrist.  Jewelers who lamented the fact that no one wears watches any more are now excited about trends in wristwear that incorporate technology.  Whether it’s a watch that monitors your phone messages or records video or monitors your exercise, the way that we will communicate in the future is making great changes.  Google glass has had it’s blips and false starts, but generally its an exciting new technology.  At $1500 a pop, people have to wait to get an invitation to even line up to purchase the device.  Seems a bit expensive to have glasses that take pictures or record video, and perhaps the early adopters are reluctant to share the Emperor’s clothing scenario, but it’s definitely a trend to watch.
  5. Business Networking Expanded.  In the age of Linkedin, Quora, Google Plus and other networks that have a business edge, the importance of business networking, both online and in person has been escalated.  No longer can a company grow without a network of evangelists.  Brand evangelists will do the job of spreading the word better and faster and with greater credibility than the company can through advertising or other methods.
  6. Consolidation of Social Platforms. As social media platforms evolve, there is a tendency for them to become more and more similar.  When LinkedIn and Facebook added a Twitter-like stream, then when Twitter added a new improved Facebook-like wall the fuzzy differentiation became even more diffuse.  As Google+ and Facebook vie for social dominance with the newer entries like Pinterest and Jelly, the delineation will become blurred, and the fast pace of absorbing the newer, successful social channels will increase.  The good news is that the same skills for engagement and sharing social content that have helped to develop associations in the past will continue to be important, and those who have mastered the ability to identify and connect with influencers will continue to have success.
  7. Analytical Information Gains Importance. Does your social media program work?  How would you know.  Identifying measurable goals then finding a way to determine progress towards those goals will be the lifeblood of any social media program.  If a company is involved in social media, it’s not to say that every tweet or post or like has to be a contrived part of a plan, however the messaging and momentum should be consistent, especially in organizations where there could be more than one voice for the company.
  8. Sharing is the New SEO.  While Facebook celebrates its tenth birthday, social media and the era of engagement and sharing has blossomed and in some cases, social sharing has greater credibility than the old formula for inbound links.  The age of semantic marketing, of creating content that is meaningful and not just a mish mosh of keywords has begun.  For your web presence to be important, you must contribute and those contributions must be recognized by third parties. To the extent that you are tweeting or “liking” or “plussing” or being Best Call To Action Ideastweeted, liked or plussed, that is the way your authority and web presence will grow.
  9. Demands for Privacy Escalate. (The Downfall of Big Data).  Eric Snowden may have brought new focus to this issue, but it was there before the NSA backlash began.  In fact, there have been waves of people proclaiming loudly that they are leaving Facebook due to concerns about privacy, only to be  lured back and lulled into ambivalence by the comforting presence of their peers.  Just because other people are doing it, does not make it save and more and more the call for the opportunity to hide or block information has become louder and more strident.
  10. Accountability Of Individuals. (Reductions in Cyber threats, anonymous trolls, spam) Recently Google made a rather bold change in they way comments on YouTube videos are posted.  The comments are linked to a Google account and appear on Google+.  The anonymous troll who used to post derogatory and inflammatory comments is limited to a greater extent than ever before.  Whether the individual tries to obscure his or her identity or creates pseudonyms, the fact is that this is getting harder and more difficult than ever before.  Perhaps by making individuals accountable for their actions and words, we can begin to put a stop to cyber threats and online harassment.  Then again, if the person is truly “off their rocker”,  its evident by their posts.  Well, more appropriately clear to everyone except the perpetrator… The good news is that the public is demanding great accountability of organizations and individuals, and decrying those cowards who troll the Internet with the intent to do harm.

Have you identified additional trends? I’d love to hear about them and learn your thoughts – please share you ideas with whether you agree (or disagree) with these trends, and also whether you feel that there are even greater waves of change coming?

Giving the One, Two Punch to Improve Web Marketing Communications.

Filed Under: Facebook, Google+, Internet Privacy, LinkedIn, Marketing Metrics, Mobile Marketing, Search Engine Optimization, Semantic Search, Social Media Marketing, Wearable Computers, Website Credibility

Internet Marketing Insights

Jody Raines, K-9 SAR

Emergency communications – Search And Rescue

March 11, 2015 By Jody Raines 1 Comment

Emergency communications can be a tricky thing. For one thing, you want to be sure to protect the privacy of the victim and their family. Another consideration is that you may not know at the time you find a victim whether a crime has been committed. When the search is conducted in concert with local […]

best practices keywords

Top 5 Keyword Phrases For Best Practice Marketing Campaign Conversion

July 18, 2013 By Jody Raines Leave a Comment

Search Engine Optimization gets traffic to your website.  Traffic is great, but it’s the conversions that become leads that are important. Marketing that converts is the best kind of marketing because you can prove a cause and effect and therefore determine a return on the marketing investment. How do you know what the best marketing […]

Jody Raines - online brand

Social Media Marketing And Your Online Brand

April 19, 2016 By Jody Raines Leave a Comment

Your website is only a part of your online campaign for online branding. Granted,an optimized website is the most important component of your online marketing strategy, however even with the most glorious and well thought-out website, you may be missing huge opportunities to support your product, champion your brand and connect with your customers and […]

Redesigning The Home Page? 8 Common Website Mistakes To Avoid

May 13, 2014 By Jody Raines 2 Comments

Redesigning the Website Homepage can result in greatly improved conversions when done well.  The first trick is finding a website designer who understands inbound marketing.    The process should begin with an evaluation of your existing online marketing campaign as well as your website to ensure that all  components work together in an effective and […]

Ruger Belgian Malinois

Fly Eagles? Fly Dogs! How Social Media Changed A Mascot

February 6, 2018 By Jody Raines Leave a Comment

The Eagles WON the Super Bowl.  Social Media is abuzz with burning questions regarding the team mascot:  Is it a bird?  Is it a German Shepherd? Or a is it a Belgian Malinois? Some fans may have been puzzled that the Eagles, whose mascot, by the way IS an Eagle, were wearing dog masks.  Most […]

  • Fly Eagles? Fly Dogs! How Social Media Changed A Mascot
  • QR Codes Are Dead? Long Live The QR Code!

Recent Posts

  • Social Media And Social Networking: Best Practices And Big Mistakes For LinkedIn
  • How To Develop An Online Brand
  • 3 Key Tips For Internet Branding
856.504.6066 Voorhees, NJ 08043

Copyright © 2023 Jody Raines | WebMaster· All For The Love Of Dogs