Protecting yourself on Facebook

Some basic tips on guarding your online data

Social networks are great way of keeping in touch with friends, family and colleagues. With 500 million users, none is a more effective tool than Facebook.

Keeping in touch with friends and relatives though does have a downside, sometimes you might give away more than you intend to. When you share with friends on a social service, everyone in your network can see what you are doing.

To make things worse, many social media businesses will give away their customers’ private information to make a few dollars as the controversy over Facebook’s recent changes to their privacy settings and the company’s subsequent backdown shows .

Because this information is valuable, organisations are prepared to pay for it and the bad guys are eager to trick it out of you. Given the risks of identity theft, stalkers or all manner of Internet crazies finding you online, it’s important to guard this information.

Facebook don’t make it easy to protect yourself, but you can hide key information.

Take off personal data
The first, simple step to protecting yourself is to move as much data as possible off your profile – home address, phone number, relationships, sexual orientation, birth year  – are a few things that simply don’t need to be online. Take off everything that could potentially cause problems, you may need to use some judgement on what you’re comfortable sharing with your online contacts.

Birthdays are a good example of where you should use that judgement. Facebook’s quite a good tool for reminding you of birthdays, but your birth date is also an important part of identity theft. If you do want to share a birthday, never put your birth year in – your relatives and friends have a good idea of how old you are – and you might want to consider putting the date a day or two earlier than the real day.

To change your Facebook profile information, click on the Profile link on the right hand side of your Facebook home page, you can edit all your details from there as shown below. Remember to click Save Changes after making each change and move between the different categories to ensure you’re only sharing what you’ve comfortable with.

Changing your Facebook profile informationSet your privacy
Facebook makes assumptions about what you want to share with your network of friends. This is not always in your interests and you should regularly review what your settings are as Facebook have a habit of changing how the privacy settings work.

To enter the privacy settings, click Account and Privacy Settings as shown below. Once you’re in the Privacy Settings, click on Custom option and Customise Settings. You can then set your details to only be accessible to you or your friends. The following example shows a recommended configuration which may be suitable for you.

Facebook Privacy Settings

Choose your friends
Many people treat Facebook and other social media services as a competition to gain as many friends, connections or followers as possible. This isn’t the point and on Facebook in particular it opens you up to a number of risks.

Once someone is your Facebook friend, they are privy to any information you choose to share and much of what your other friends post on your wall. The main risk is that new Internet is not quite as stable or honest as you thought. By accepting friend requests from people you don’t know you increase the risk of letting risky individuals into your life, your family and your group of friends.

Another danger lies in the Facebook places feature which allows your friends to check you into locations. A malicious “friend” or a practical joke could see you being advertised as having checked into a place you really don’t want to be associated with.

If you decide that is an acceptable risk, then revise the above recommendations on your profile information. If you are promiscuous in who you befriend online then be very careful about the information  shared with them.

Be careful which applications can see you
Facebook applications are one of the reasons for it’s success. These applications – or mini-programs – allow you to play games, enter competitions and sign up with other services quickly.

The proposed change in January 2011 to the information Facebook gives out to application owners would have allowed a lot of your personal information to be shared with third party developers. As it is quite a few of these applications “scrape” information from the various services you subscribe to. A good example is with Twitter where private, non-public, messages can be seen by some of these services.

You should only allow applications to use your Facebook connection details if you absolutely trust them; right now, there are few services people can or should trust.

If you have been allowing Facebook to connect your subscriptions to other websites, then you may want to review who you’ve given trust to. To do this, click Account then select Privacy as shown above. In the Privacy page click Apps and Websites and the page shown below will appear. By clicking Edit Settings you can then delete applications or change what they are allowed to do on your profile.

Facebook Privacy Settings

Despite the risks of stalkers, identity theft and various privacy issues, Facebook is a valuable tool for millions of people who want to keep up to date with their friends, relatives and colleagues. By being sensible in choosing your online friends and what you share with them, it is a great website for keeping in touch with people you might otherwise lose track of.

Trusting the web

How the Wikileaks scandal has damaged the cloud computing industry

The US court orders demanding Twitter and others hand over Wikileaks related information may have killed the cloud computing trend.

Paul Carr in Techcrunch raised his concerns about how this has affected his views on storing his personal life and details online. He’s not alone.

Cloud computing relies on trust and confidence; for us to use it we have to trust our data is safe, secure and confidential. That many of us are even suspicious that Google and Amazon have quietly handed over the Wikileaks details shows how that trust has been eroded.

The behaviour of the US cloud providers shows most will buckle under the slightest political and government pressure, let alone a letter from the FBI of which the New York Times claims over 50,000 are sent each year.

That tens of thousands of these orders are made each year in the US alone – and we should have no doubt that governments in other countries are just as eager to seize online details – shows how insecure our information is in the hands of third party providers.

This is more than just activists who have upset the US government; in the event of a trade dispute, spurious copyright claim or a simple case of political malice or opportunism a businesses’ service could be shut down, often without any warning, due process or appeal.

Which is exactly what Amazon and various other cloud service providers did to Wikileaks.

Cloud services offers great business advantages, particularly to small and startup enterprises. But the Wikileaks shutdown scandal shows the managements of many cloud computing providers are untrustworthy cowards.

For many businesses it will still be worthwhile sticking with cloud services for the convenience, cost and scale however it’s also important to keep in mind these providers cannot be trusted and a backup plan has to be available should they fail.

The data we keep online has to be considered as well, it appears we cannot trust cloud services with our critical business and personal information so we need to be discriminating about exactly what we put online, this includes social media services like Facebook and Twitter.

Cloud service providers have to prove they deserve our trust, right now it’s difficult to see how they can regain it.

Destroying your brand

How your online presence can hurt your reputation.

One of the constant business tips in the last few years is that be competitive in the new economy an enterprise – big or small – has to blog, tweet and have a credible online presence. But there is a downside to this, a business or individual that lets too much hang out runs the risk of trashing their brand.

Two recent examples of this are a PC Repair business on Queensland’s Sunshine Coast and a bar on the Gold Coast, there’s no links to the businesses in this post as the intention isn’t to trash their brands any  further.

Customer service is always a tough business and the Gold Coast bar their blogger, who bills themselves a “jaded bar worker” and is obviously one of the younger members of the staff, recently wrote a post on customer “whining”. Some of the whines include;

  • asking to change the music
  • wanting a drink in a different glass, or with less ice
  • preferring a decent head on a beer (referred to as “foam” in the post)
  • asking for a table to be cleared
  • complaining about a wobbly table

While all of those customer requests can be irritating, and sometimes unreasonable, there’d be little sympathy for the bar staff dealing with these complaints from any hospitality professional or a customer expecting any standard of service.

It appears the blog’s intent is to be a local, chatty version of the successful Waiterrant blog whose author, Steve Dublanica, chronicled the adventures of New York waiter. Waiterrant was good for Steve’s brand, but would have been disastrous for some of the restaurants he worked at.

Steve got around this problem by remaining anonymous until he landed a book deal – always a bad sign for a blogger – along with never identifying the establishments he served at.

While whining about customers is a necessary pressure relief for anyone serving the public, it’s not a good idea to do it publicly unless a particular patron has done something spectacularly rude or stupid. Asking to clear a table or for less ice in their drink does not qualify as even being unreasonable.

By just moaning about the typical day to day work that most of us have to deal with, this blog is not helping the bar’s brand. They might want to consider shutting it down or getting a more senior person to write or edit it.

A little further North on the Sunshine Coast, a local computer tech has built a successful YouTube channel with 20,000 subscribers based around his rough, Aussie larrikin persona featuring some very, very robust language and views.

With eight million views, the YouTube channel is doing well, but as an advert for the business it doesn’t portray his outlet in a particularly positive way and as the video clips become more popular, the damage to the shop’s brand becomes greater – along with the risks given he’s already had one legal threat against him .

Online channels give us the opportunity to get our businesses before the world but with every opportunity comes a risk. When we post a blog, video or tweet online the entire world can see what we’ve said.

Understand those risks – and they are very real – and be careful with what you post and which staff members you trust to post on your business’ behalf. What might have once just upset a few people can now turn the market against you.

Is Groupon the small business saviour?

Does the deal of the day change the way we do business?

Since Google’s rejected offer of $6 billion dollars to buy deal of the day website Groupon, there’s been a lot of discussion of just what Groupon and the hundreds of similar services mean to online commerce and small business.

Groupon’s CEO, Andrew Mason, even went as far as to declare his organisation the “saviour of small business” on the Charlie Rose show.

John Battelle, founder of The Industry Standard and co-founding editor of Wired, examines Groupon’s business model on his Searchblog and concludes it will be the small business platform for the mobile Internet just as Google are to the web and Yellow Pages were to the telephone.

The problem with these ideas is scale. If every small business had the capacity and wanted to be on Groupon, the service simply couldn’t cope and the model breaks down.

In my area there are, according to the Yellow Pages, 115 hairdressers in my district. Even if Groupon were able to geographically target me to my neighbourhood, they’d need a third of the year just to cover hair stylists which is tough luck for the lawn mowing services, plumbers, patisseries and other small businesses that may also want to advertise on Groupon.

Which takes us to customer motivation, when I’m looking for a haircut, hedge clipping, cleared drain or chocolate gateaux I’m not particular driven by finding a bargain – if I do that’s great – but it’s not my motivation to buy.

Groupon, and the other deal of the day sites, are driven by customers looking for discounts, and the key to business survival – particularly in retail – is not to depend on discounts to drive your business. So business models that rely on discount hungry customers, or cashflow desperate merchants, are always going to be limited.

Groupon is a great business and it may well turn out to be worth $6 billion or even $36 billion. The barriers to entry are not so low as anyone who thinks executing an idea like this is “easy” doesn’t understand the work involved in building a local sales team like those of Groupon or Yellow Pages.

It could well be that Google wanted to buy Groupon simply for that sales team. The failure of Google to properly execute on their terrific local search product has baffled me for some time and the only explanation I can put down to it is what Silicon Alley Insider’s Ron Burk attributes to Cash Cow Disease, where companies like Google and Microsoft find themselves paralysed by the rivers of cash flowing into their businesses.

Deal of the day sites have an important role to play for businesses looking at demand management or clearing inventory and Groupon is a good business just like Clipper Magazine or Shop-A-Dockets, but to claim they are going to be the next great revolution for small business is giving too much importance to these channels.

There’s no doubt though that small businesses will be the big winner when we get local search on the web right. When we get it right we’ll probably see the hyperlocalisation model for the media start to take off as well. So it could save two industries.

Groupon though is not the small business messiah we’re looking for.

Password safety

Taking a layered approach to online security is the best policy

Online news and gossip publisher Gawker Media was hacked last weekend with nearly 200,000 usernames and passwords released to the world.

The Wall Street Journal’s Digits Column tabulated the results and listed the top 50 passwords used by Gawker’s subscribers.

At first view, the reaction is to think what sort of idiot would use a password like 12345678 and would only confirm most IT and security professionals’ view that most computer users don’t protect their online details very well.

But on reflection, is using a weak password on a site like Gawker so bad? Most of the users listed have only created accounts to make a comment on one of Gawker’s websites, they aren’t using their Gawker account for anything vital and should their Gawker account be accessed the only thing the bad guys can do is post under the account name.

So if we assume that most of the 3,000 odd people that used the password 12345678 only do so for “disposable” accounts like the Gawker comments stream, then they probably haven’t risked anything at all.

In fact it makes sense to do so rather than to use a strong password which also happens to be your banking login or work account.

On my IT Queries site we suggest using a layered approach to passwords where services like Gawker, where it doesn’t really matter if the password is compromised, get a simple and easy password while sites where there are serious consequences like your online banking get strong and secure passwords.

We should always keep in mind that accidents do happen and that there are a lot of clever bad guys out there who are keen to exploit weaknesses when they see them. So security mistakes like Gawker’s will occur from time to time. The best we can do is to arrange our security so that when bad luck strikes us, the effects can be contained.

The real moral for all of us from the Gawker password hack is to take security seriously and not to use the same password on every site we visit.

What businesses should learn from Wikileaks

Cablegate forces us to question computer security and the stability of the Internet

The Wikileaks Cablegate affair has been entertaining us now for two weeks as we see diplomats and politicians around the world squirming with embarrassment as we learn what US diplomats really think about the foreign powers they deal with.

Both the leak of the cables and the treatment of Wikileaks and its founder, Julian Assange, by various Internet companies raises some important questions about the Internet, cloud computing and office security in the digital era.

Security

It’s believed the source of the leaked cables is Private First Class Bradley Manning, who is alleged to be responsible for leaking the Iraq tapes released by Wikileaks earlier this year.

The lesson is don’t give junior staff unrestricted access to your data, access to important information such as bank account details, staff salaries and other matters best kept confidential needs to be protected.

You can stop data leaving the building by locking USB ports, CDs and DVDs through either software or hardware settings on your computers and you should ask your IT support about this, keep in mind that locking down systems may affect some of your staff’s productivity.

Locking the physical means though doesn’t stop the possibility of data being sent across the Internet and access logs may only tell you this has happened after the fact. So it’s important to review your organisation’s acceptable use policy. Check with your lawyers and HR specialists that your staff are aware of the consequences of accessing company data without permission.

Incidentally, the idea that Pfc Manning was just one US Army staffer of thousands who were able to access these cables raises the suspicion that the information Wikileaks is now releasing was long ago delivered to the desks of interested parties in London, Moscow, Tel Aviv, Beijing and cave hideouts in remote mountain ranges.

Don’t rely on one platform

Wikileaks found itself hounded from various web hosting and payment providers. As we’ve discussed previously, relying on other people’s services to deliver your product raises a number of risks. Make sure you have alternatives should one of your service providers fail and never allow an external supplier to become your single point of failure.

Concerns about the cloud

This column has been an unabashed fan of cloud computing, but the Wikileaks saga shows the cloud is not necessarily secure or trustworthy. Not only is there the risk of a PFC Manning working at the data center compromising your passwords or data, but the arbitrary shutdown of Wikileaks’ services is a stark lesson of relying on another company’s Terms of Service.

Within most terms of service are clauses that allow the provider to shut down your service if you are accused of breaking the law or straying outside of the providers’ definition of acceptable use. As we saw with Amazon’s treatment of Wikileaks, you can be cut off at any time and without notice.

Amazon’s shutting down of Wikileaks is a pivotal point in the development of cloud services. Trust is essential to moving your operations to the cloud, and Amazon’s actions shown much of that trust may be misplaced.

Should you be considering moving to the cloud, you’ll need to ensure your data and services are being backed up locally and not held hostage to the arbitrary actions of your business partner.

Don’t put your misgivings in writing

So your business partner is a control freak? Great but don’t put it in writing.

Be careful of gossip and big noting

One interesting aspect of Wikileaks to date is how senior politicians like gossip and showing how worldly they are to US diplomats.

That’s great, but it probably isn’t a good idea to tell your best friend they should consider beating up your most important customer. As mentioned earlier, this little gem was probably on polished desks of the Chinese Politburo long before the cables found their way to Wikileaks.

Resist the temptation to gossip, remember your grandmother’s line about not saying anything if you can’t say something nice.

Ultimately what Wikileaks shows us is all digital communications are capable of being copied and endlessly distributed. In a digital economy, the assumption has to be that everything you do is likely to become public and you should carry out your business conduct as if you will be exposed on Wikileaks or the six o’clock news.

Wikileaks is a lesson on transparency, we are entering an era of accountability and the easiest way to deal with this is to be more honest and open. That’s the big lesson for us in our business and home lives.

What the Internet doesn’t know about us

Can the web know all about us? Should we care?

In October 2010 Newsweek’s Jessica Bennett asked the the team behind the Internet service Reputation Defender to find all they could about her.

The results were startling, within half an hour they had found her US social security number and a few more hours digging revealed her address, hometown as well as many other private details.

But ultimately the picture of Jessica’s life was wrong. The team made mistakes about her personal habits, sexual orientation and the time she spends online.

The fact the profile was incorrect shows how difficult it is for computers, or people, to understand an individual based on a series of data points.

Most of us understand that making a generalisation based on single data point – say race, gender, appearance or sexual orientation – is usually incorrect, but when we add more data points things become even more difficult.

Once we get more than one data point, we have to start weighting them. Would Jessica eating at McDonalds twice a week outweigh her exercising every morning in the eyes of an insurance company assessing her risk?

That problem could be called the Google effect where a formula, known as an algorithm, becomes so complex that it becomes bogged down under the weight of its own assumptions as we saw with Tony Russo’s gaming of the search engine’s ranking system.

All of us as are steadily revealing more about ourselves onto the web, whether we know it or not. Every time we like something on Facebook, subscribe to a newsletter or make a comment on a blog post, we are giving a little something about us away on the publicly accessible Internet.

Over time, anyone can build a picture of us. However it may turn out that nobody will want to know about the detailed, complex and multi dimensional portrait each of our lives would be.

As information about all of us becomes more available, we may enter a modern version of the Mutually Assured Destruction doctrine of the Cold War as each of us find that everyone around us has enough information to bring our careers, relationships and status crashing down.

But equally we hold equally damaging data about all our peers as well and to bring anybody down based on this information we have would be to invite the wrath of many others who know about our intimate details.

We may even find that because all of us, being human, have some damaging traits and history that employers, insurers and governments only care when you start hiding them. Today we see this with security vetting procedures which are more concerned about what we hide rather than the specifics of our foibles and indiscretions.

The assumption of those security agencies is that a self admitted gambler, alcoholic or philanderer is a manageable risk while those hiding such secrets from their families and employers are the genuine threat to an organisation.

So we come back to a society where a tacit agreement exists between us all that this dangerous power is only used when someone has acted illegally or hypocritically.

Perhaps that is the future we are heading for, where the Internet knows all but we simply choose not to access it. Which assumes it’s all correct anyway.

Other peoples’ platforms

The risks in the privately owned web range from obscure terms of service to arbitrary payment problems. This is why you need to control as much of your business’ online presence as possible.

“We have successfully established an online business, but we have run into problems with Ebay (indefinite suspension – unfairly I might add)” wrote Ralph*, an old client.

“We are pretty desperate, as this is now our sole business and we are now without an income.”

The Privately Owned Web

Ralph’s problem is typical of thousands of businesses that rely on one Internet service. Some months back we looked at “Nipplegate”, the story of a Sydney jeweller who had her Facebook page closed down because of her anatomically correct dolls.

All of these services are privately owned with their own terms and conditions along with their own corporate objectives. If you choose to use their product, you have to follow their rules – just like a shopping mall management can order you off their premises because they don’t like the colour of your socks.

The most glaring example of this is Wikileaks where Amazon, Paypal, Mastercard and Visa all threw the whistleblower site off their services for allegedly breaching their terms of services in various obscure ways.

The Terms of Service Trap

A business’ Terms of Service usually feature clauses wide enough to catch even the most honest and diligent business, this is by design as it gives management the excuse to throw anyone who makes their lives difficult, which is exactly what has happened with Wikileaks.

While Ralph’s problem is nothing like the scale of Julian Assange’s, all of these stories illustrate the dangers of relying on one service for your livelihood. Should that service change the way it operates, then any business that relies on that could be broke in hours, as many businesses that rely on Google search results have found.

Most of the Internet is not a public space, almost all of it is privately run along similar lines to that shopping mall or a walled estate.

Ralph and Julian Assange have shown us the limitations and risks of the privately operated web. As citizens and business owners we have to understand these corporations’ objectives are not always the same as ours and make judgements on how we live with the risk of finding ourselves in breach of a Term of Service in our business or personal lives.

We’re still in relatively early days of the net and all of us are still learning. One lesson is clear though, we can’t allow our livelihoods to be held hostage by a small number of big technology companies. Make sure you have alternatives to your online channels.

*Ralph is not his real name

Why competition is great for Google

The SEO industry threatened to devalue search. Now things are changing.

We often talk about competition being good for consumers and, ultimately, businesses. The technology industry is a good case study.

Microsoft shows how competition forces a business to raise their game; when they won the browser wars by dispatching Netscape early in the Internet era, they let Internet Explorer stagnate until the Mozilla Firefox, Opera and Apple Safari web browsers came along.

Similarly, they allowed their flagship product Microsoft Office drift once they dominated the productivity software market. The arrival of Google Docs and some other new players forced them to refresh and redesign the Office package.

Today Google find themselves in the same position – Facebook, Microsoft’s Bing and various other search engines are reminding the leader that their position is not safe.

The Business Insider website recently took a critical look at Demand Media’s business model, a service that publishes low quality articles that tend to rank high with the aid of clever Search Engine Optimisation (SEO). As a result of Demand’s high rankings on Google searches these articles tend to attract advertisers.

In a search engine market where Google is the only noteworthy game in town, this situation would suit Google and Demand Media as both would have a nice predictable stream of advertising and neither party would have any great incentive to change things and for a while it appeared that might be the case.

With the arrival of real competition to Google such as Microsoft Bing and Facebook, all things change as now search engine results matter – the whole reason Google beat out competitors was because their search results were better than anyone else’s – if Google’s results aren’t as good then users will switch.

So Google’s been changing their algorithm, the formula they use for searches, in order to improve the results of queries on their system. So much so that my fellow Smartcompany blogger, Chris Thomas, accuses them of Attention Deficit Disorder.

This is good news for Google’s users who now get better quality search results and great news for Google’s advertisers who get better quality pages where potential buyers are likely to stay longer and click more.

Google though is the biggest winner as the better results they deliver, the more profitable and long lasting their core advertising business will be.

For Demand Media, things aren’t so good as there’s no shortage of poorly written tripe on the Internet and if they can’t get Google ranking goodness then their business model dies.

Which may show that in the new economy, bad soap doesn’t necessarily replace good soap.

The listening game

Our customers are talking about us, we need to listen

Last week’s Qantas A380 problem illustrates the power the Internet has and how businesses can’t ignore what’s being said on the various online channels.

Thankfully most of us will never have a morning where the world is told we have lost over four hundred of our staff and customers in a fiery accident as Qantas did last week.

While not a Qantas customer, I had a lot of sympathy and respect for their management and staff who had to deal with conflicting accounts while balancing their obligations to regulators, shareholders and, most importantly, the loved ones of those aboard QF32.

The initial story that went out on the media was a Reuters’ report that a Qantas A380 had crashed on taking off from Singapore. While Qantas were able to quickly deny that, they found their other assurances that no debris had fallen from the plane were quickly contradicted by online photos of the pieces in a nearby Indonesian town.

Luckily, Qantas’ communications teams appeared to be listening to these comments so were quickly able to verify their accuracy and amend the company’s position before they were embarrassed.

Today’s connected consumers armed with camera equipped, Internet enabled smart phones and can post images contradicting or confirming your message or understanding of the situation quickly. Which is exactly what happened in this instance with passengers and witnesses quickly uploading their views of the incident.

In one respect this is a threat to traditional management where controlling the message is everything, to the modern manager this is a fantastic opportunity to react quickly and positively to changing situations.

One of my favourite stories comes from the Virgin Blue checking problems in late September where staff, alerted by complaints on Twitter, were able to get water bottles out to thirsty passengers stuck in queues. It didn’t rescue Virgin from the PR battering they took, but it helped a few of their customers and just maybe won a few of them back.

This isn’t to say the Internet is infallible, far from it — the Internet is mankind’s gift to the ill informed ratbag and the mischevious troll — what you read on Twitter and Facebook needs to be treated with the same suspicion as what you see on Reuters and CNN.

Even when the information is downright wrong, you at least have an early warning there’s a perception problem in the community which you can quickly work upon. The key is to evaluate and recognise the credible from the silly and then be able to act on the credible while countering the silly stuff.

One big lesson from both Qantas’ problems last week and Virgin’s in September is how important it is to point all of your communications channels, including call centres to the organisation’s web site where up to date, verified information is available for the public, staff and customers.

While the net represents great challenges to business owners and managers of all organisations, it’s also a fantastic resource for getting your facts right and reacting to fast moving changes. Make sure you have the tools and the team to deal with the opportunities and threats our connected economy will throw at us.

They’re Talking About You workshop

How can your business monitor what’s being said on the net?

“They’re Talking About You” is a four hour workshop designed for business owners and managers responsible for protecting and enhancing their organisation’s reputation in an often hostile online world.

In association with Reputation Australia we’ll be holding a morning workshop in North Sydney on Friday, November 26. Contact us for pricing and venue details.

During the workshop participants will learn how to monitor what is being said about their products, deal with criticism and make use the new media channels as effective branding tools.
At the end of the workshop, participants will have an understanding of the benefits and limitations of the major online communications mediums.

Participants cover;

• the major online media channels
• identifying which platforms are appropriate
• monitoring the chatter
• dealing with problems
• disarming the critics
• effective use of online marketing methods
• using online media as a recruitment tool
• being a credible online authority.

Who should attend?
They’re Talking About You is suitable for communications professionals, managers or business proprietors wanting to maximize the use of online media and avoid unnecessary mistakes in the virtual marketplace.

Misunderstanding crowdsourcing

We need to understand the differences between outsourcing and crowdsourcing

Crowdsourcing is the idea that the wisdom of crowds can solve complex and expensive problems, with the rise of the Internet it’s become possible for groups to coalesce around a problem and resolve it.

Some good examples of crowdsourcing are The Guardian’s investigation into British MPs expense claims where dozens of the newspapers readers examined the mass of paperwork for irregularities, a task beyond the resources of the paper itself, and Wikipedia where thousands of volunteers work to compile an online encyclopaedia.

The Future of Crowdsourcing Summit recently looked at the issues and opportunities this offers for businesses. IT industry journal Computer Reseller News has an excellent summary of the day, although the emphasis on massive cost savings is probably misguided.

What sticks out in CRN’s account is many businesses are confusing crowdsourcing with outsourcing — online bidding sites such as Freelancer.com and competition sites like 99Designs are not crowdsourcers, they are outsourcing services.

Sites like Freelancer and 99 Designs are making outsourcing, which was until recently the province of large corporations, accessible to small and start up businesses. They’re revolutionising business by reducing entry barriers to entry for new enterprises and industries by allowing entrepreneurs to access skilled workers with little more than a credit card and Internet connection.

That emphasis on cost needs to be treated carefully as well. As I’ve argued about cloud computing, it’s risky to overstate savings in a new industry as there’s a risk of commoditising the market prematurely.

Larger outsourcers found in the previous decade that assuming labour rates at 10% of home market wages equate to 90% cost savings is usually flawed as there’s a number of hidden costs that come to surface when you take services off shore. Almost certainly the users of bidding sites will have the same experience.

Probably the biggest barrier to smaller businesses adopting outsourcing or crowdsourcing is that both processes require project management skills which are often undervalued in business.

We need to acknowledge the changes outsourcing and bidding services mean to our industries and society, but we shouldn’t confuse the concepts. Both are too valuable to business to be misunderstood and devalued.