Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
  • Reliability.fm
    • Speaking Of Reliability
    • Rooted in Reliability: The Plant Performance Podcast
    • Quality during Design
    • Critical Talks
    • Dare to Know
    • Maintenance Disrupted
    • Metal Conversations
    • The Leadership Connection
    • Practical Reliability Podcast
    • Reliability Matters
    • Reliability it Matters
    • Maintenance Mavericks Podcast
    • Women in Maintenance
    • Accendo Reliability Webinar Series
    • Asset Reliability @ Work
  • Articles
    • CRE Preparation Notes
    • on Leadership & Career
      • Advanced Engineering Culture
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • ReliabilityXperience
      • RCM BlitzĀ®
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
    • on Risk & Safety
      • CERMĀ® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • Communicating with FINESSE
      • The RCA
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Testing 1 2 3
      • The Manufacturing Academy
  • eBooks
    • Reliability Engineering Management DRAFT
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Feed Forward Publications
    • Openings
    • Books
    • Webinars
    • Journals
    • Higher Education
    • Podcasts
  • Courses
    • 14 Ways to Acquire Reliability Engineering Knowledge
    • Reliability Analysis Methods online course
    • Measurement System Assessment
    • SPC-Process Capability Course
    • Design of Experiments
    • Foundations of RCM online course
    • Quality during Design Journey
    • Reliability Engineering Statistics
    • An Introduction to Reliability Engineering
    • An Introduction to Quality Engineering
    • Process Capability Analysis course
    • Root Cause Analysis and the 8D Corrective Action Process course
    • Return on Investment online course
    • CRE Preparation Online Course
    • Quondam Courses
  • Webinars
    • Upcoming Live Events
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home

by Greg Hutchins Leave a Comment

Changing the Game: Reputation Risk in the Cyber Era

Changing the Game: Reputation Risk in the Cyber Era

Guest Post byĀ Geary SikichĀ (first posted on CERMĀ Ā® RISK INSIGHTS – reposted here with permission)

Merriam Webster Dictionary defines reputation as:

1a: overall quality or character as seen or judged by people in general

b: recognition by other people of some characteristic or ability has the reputation of being clever

2: a place in public esteem or regard: good name; trying to protect his reputation

Google Dictionary:

the beliefs or opinions that are generally held about someone or something.

ā€œhis reputation was tarnished by allegations that he had taken bribesā€

a widespread belief that someone or something has a particular habit or characteristic.

ā€œhis knowledge of his subject earned him a reputation as an expertā€

Reputation is an intangible that, in the cyber era, is tenuous, at best.Ā  With the explosion of Social Media today, can you actually get a rendering of what is being said about you, your organization, etc. so as to enable you to protect your reputation?Ā  Or, is it just too much and too overwhelming due to the velocity of information that exists today?
Reputation Risk Management

Can you apply risk management techniques to reputation management?Ā  The simple answer is, yes.Ā  You can do a risk assessment – identify the risk(s), assess the probability, impact and prioritize resources against the risk(s) that have been identified.Ā  You end up with a version of a ā€œHeat Mapā€.Ā  Useful, perhaps.

A framework needs to be established that allows you to ā€œHorizon Scanā€ for the tidbits of information that are out there that may impact your reputation – either positively or negatively. Ā Ā This is much the same as setting up and intelligence gathering network as depicted below.

In an article published on 22 April 2016, by Wil Batrleman, entitled, ā€œReputation Management in a Digital Eraā€, (https://brightpast.com/reputation-management-in-a-digital-era/)three points are made that remain relevant still:

 

Start Managing Your Reputation Early

A key step to properly managing your company’s online reputation is to start early, ideally before your company even ā€œexistsā€. By taking a careful look at search results and social media chatter surrounding keywords associated with your business, you should be able to gauge what sort of steps you’ll need to take to ensure a positive online presence for your company. Are other businesses already dominating the social media space around your branding? You may want to consider adjusting your branding accordingly, both to avoid consumer confusion, and potential copyright infringement action. If not, it will be important to quickly establish a social media presence for your company.

Be Active in Social Media

For many consumers,Ā social media is a key point of contact for businessesĀ they interact with. It’s accessible to them, and a method of communication they’re likely to already be using daily. Being active and attentive on a variety of social media platforms will allow you to not only keep in touch with your customers, but also to catch wind of trouble early on. Negative reviews and feedback can often turn into positive PR if addressed quickly and handled properly. Many customers post their frustrations simply as a way to vent. Receiving actual assistance from the business they thought was too big to notice them is a great way of building loyalty among your consumer base.

Consider All Aspects of Your Online Reputation

Social media is a big part ofĀ your online reputation, but it isn’t the only part. There are other aspects of your reputation that aren’t as easily managed by you or your employees. More esoteric concerns, such as search engine optimization, can be more difficult to manage. Addressing customer complaints sent directly to you through social media is easy enough, but finding upset and frustrated consumers on the wide variety of third party review sites can be far more difficult. Depending on the size of your business, these sorts of reputation management tasks can be nearly impossible to tackle alone.

In another article, entitled, ā€œSense, Mesh and Transform: The 3 Critical Mindsets for 21st Century Leadersā€, published on 24 June 2018 (http://thefuturesschool.com/blog/sense-mesh-and-transform-the-3-critical-mindsets-for-21st-century-leaders/) the use of Causal Layered Analysis (CLA) is presented.Ā  While the focus of the article is on helping leaders develop a new vision for their industry, the three elements: Sense, Mesh and Transform can be readily applied to help you assess potential threats to your reputation.Ā  A summary of these is provided below:

Shift 1: Sense

Honing the skill of sense-making and pattern recognition (the art of creating a mosaic in intelligence terms) enables us to understand and leverage the world emerging around us. Ā ā€œHorizon Scanningā€ is one of the tools that can be used to facilitate pattern recognition and enable sense-making.

Shift 2: Mesh

Information often end up in siloes that appear to be unrelated.Ā  One of the things necessary in reputation management is to perforate these information siloes and begin to recognize how seemingly unrelated information can actually lead us to a clearer mosaic that we can better analyze.

Shift 3: Transform

Transformational thinking and invention move us away from short-term thinking to long-term vision.

Another good read is ā€œThe Essentials: Online Reputation Management FAQsā€, by Reputation Communications Staff, 1 April 2019 (Online reputation management).Ā  The authors provide information on 10 Ways Online Reputation is Used (10 Ways Online Reputation Management is Used).Ā  Here are some highlights from the article:

ā€œOnline Reputation Management (ORM) involves placing newĀ contentĀ online that pushes old or unwanted content lower in search results. It can also raise other online content higher to displace unwanted material. Once successfully arranged, the results must be maintained. Otherwise, the unwanted material may resurface at the top of Google search results — usually within three to six months.ā€

The key challenge of ORM is to create content that search engines will rank highly, according to the authors.

Conclusion

Managing your online and offline reputation in today’s fast paced and loosely controlled social media environment is an ongoing challenge for all of us as individuals; and our organizations when it comes to perspectives of the potential viewers of our information.

Once information is on the Internet it is virtually unbounded, freedom in time is created.Ā  In order to protect your reputation, you have to:

  • Manage your digital footprint – monitoring, maintenance and repair.
  • Educate yourself about Social Media
  • Keep abreast of regulations
  • Develop a reputation protection checklist

It’s your reputation, whether as an individual or as an organization.Ā  Be vigilant.

About the Author

Geary Sikich – Entrepreneur, consultant, author and business lecturer

Contact Information: E-mail: G.Sikich@att.net or gsikich@logicalmanagement.com.Ā  Telephone: 1- 219-922-7718.

Geary Sikich is a seasoned risk management professional who advises private and public sector executives to develop risk buffering strategies to protect their asset base.Ā  With a M.Ed. in Counseling and Guidance, Geary’s focus is human capital: what people think, who they are, what they need and how they communicate. With over 30 years in management consulting as a trusted advisor, crisis manager, senior executive and educator, Geary brings unprecedented value to clients worldwide.

Geary is well versed in contingency planning, risk management, human resource development, ā€œwar gaming,ā€ as well as competitive intelligence, issues analysis, global strategy and identification of transparent vulnerabilities.Ā  Geary began his career as an officer in the U.S. Army after completing his BS in Criminology.Ā  As a thought leader, Geary leverages his skills in client attraction and the tools of LinkedIn, social media and publishing to help executives in decision analysis, strategy development and risk buffering.Ā  A well-known author, his books and articles are readily available on Amazon, Barnes & Noble and the Internet.

References

https://reputation-communications.com/article/the-essentials-online-reputation-management-faqs/

ā€œAn Attorney’s Advice for Removing Negative, Defamatory and Infringing Material from the Internet,ā€ by Christine Rafin, Esq., provides insight into what is possible. (Her companion piece, ā€œā€œLegal Options When Battling Online Copyright Infringementā€, is also helpful.)Ā ā€œWhat to Do When You Are the Victim of Online Defamationā€, provides additional overviews of your options.

ā€œRisk and the Organizational Mindset: Learn to Think like a Commodities Traderā€ (Continuity Central)

Apgar, David, Risk Intelligence – Learning to Manage What We Don’t Know, Harvard Business School Press, 2006.

Sikich, Geary W., ā€œā€œTransparent Vulnerabilitiesā€ How we overlook the obvious, because it is too clear that it is thereā€ 2008

Sikich, Geary W., ā€œRisk and the Limitations of Knowledgeā€ 2014

Taleb, Nicholas Nassim, ā€œThe Black Swan: The Impact of the Highly Improbable,ā€ 2007, Random House – ISBN 978-1-4000-6351-2, 2nd Edition 2010, Random House – ISBN 978-0-8129-7381-5

Taleb, N.N., ā€œCommon Errors in Interpreting the Ideas of The Black Swan and Associated Papers;ā€ NYU Poly Institute October 18, 2009

Filed Under: Articles, CERMĀ® Risk Insights, on Risk & Safety

« Where to Take an Oil Sample
Model Building »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERMĀ® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • How to Structure Your ERM System
  • Rate of Occurrence of Failure
  • What is Six Sigma and How is it Used in Quality Engineering?
  • Terrorism Risk Insurance Act Exclusions: Gray Coverage Areas
  • Why Total Productive Maintenance Is The Answer To Reliability-Centered Culture

© 2023 FMS Reliability Ā· Privacy Policy Ā· Terms of Service Ā· Cookies Policy

This site uses cookies to give you a better experience, analyze site traffic, and gain insight to products or offers that may interest you. By continuing, you consent to the use of cookies. Learn how we use cookies, how they work, and how to set your browser preferences by reading ourĀ Cookies Policy.