Government Technology

Twitter Becoming a Vital Tool for Many Businesses

Jim Jansen,
Jim Jansen,

September 10, 2009 By

Photo: Jim Jansen, associate professor of information science and technology.

Everyone, from CNN to President Obama, seems to have a Twitter account these days. Worldwide traffic to reached 10 million visitors by February 2009, up a whopping 700 percent from the same time last year, according to comScore.

Yet up until late last year, Twitter was still generally regarded as little more than a cool social novelty. Then in December 2008, Dell announced that it had generated $1 million online by posting e-commerce links to its Twitter feed. Everywhere, businesses suddenly became tweet enthusiasts and began to integrate Twitter into their business operations.

According to a new study, business strategies involving Twitter are now frequently paying off. Reportedly a whopping 20 percent of the tweets contain requests for product information or responses to the requests, according to Jim Jansen, associate professor of information science and technology in the College of Information Science and Technology (IST) at Penn State.

"People are using tweets to express their reaction, both positive and negative, as they engage with these products and services," said Jansen in a statement issued today. "Tweets are about as close as one can get to the customer point of purchase for products and services."

Jansen, along with IST doctoral student Mimi Zhang, undergraduate student Kate Sobel and Twitter chief scientist Abdur Chowdhury, investigated micro-communicating as an electronic word-of-mouth medium, using Twitter as the platform. Their results were published in the Journal of the American Society for Information Sciences and Technology.

To carry out their study, the researchers examined half a million tweets. Specifically they searched for tweets that mentioned a brand, then examined why the brand was mentioned and found that people were using tweets as a kind of "word-of-mouth" type communication to connect with the products.

And the definite trend they found was that Twitter's micro-communications of 140 characters or fewer had rapidly evolved into a significant business tool -- one that is starting to earn profits for business generally, as well as serving as a creative way to market their products. "Businesses use micro-communication for brand awareness, brand knowledge and customer relationship," Jansen said. "Personal use is all over the board."

Even though Twitter is still in its early stages of adoption, Jansen predicts it be around for a while. And he thinks the concept of micro-blogging as a whole can be just as influential as other social media channels. "It may be right up there with e-mail in terms of its communication impact," Jansen said.

With about 6 million active users daily on Twitter and predictions of more than 20 million users by the end of the year, he might well be right.

Based on the research, there clearly are lessons from the world of business that governments exploring the use of Twitter might learn from.

Now if only Twitter itself can figure out how to monetize its service, it too might get to share in the business success.


This report was compiled from news releases.


| More


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
View All

Featured Papers