Defending The Practice Of Social Media Marketing Essay

PAGES
3
WORDS
969
Cite

How to Use Social Media Influencers to Promote Products
Social media marketing has become an important marketing strategy for companies today, as many consumers turn to social media for information on products and for their peers’ opinions on products (Lou & Yuan, 2019). Through influencers, blogs, video-sharing platforms, and messaging apps, companies can use social media to gain followers, build brand equity, and answer questions and tease coming products (Ki & Kim, 2019). Thus, companies that want to influence the consumer’s intention to purchase are looking at social media as the best way to do this (Lim, Radzol, Cheah & Wong, 2017). This paper will describe the pros and cons of social media marketing and examine an example of a practical application.

Pros and Cons of Social Media Marketing

The pros of social media marketing are that it allows the company to directly connect to consumers on platforms that consumers themselves choose to use for the purpose of getting information about products and services. Companies that use Facebook, Twitter, Instagram, YouTube and other platforms can answer questions, post videos promoting concepts or products, put out press releases, address rumors, and work to control a narrative in moments of crisis. The pros are that consumers feel connected to a company that cares about them, and the company’s brand equity can grow as consumer confidence in the company’s image increases through this level of direct engagement and interaction.

The cons are that social media marketing is not as easy to control as other forms of marketing. There is always a narrative out there being spun about a company or its products on social media, and the job of social media marketing is thus a full-time job. It is not like producing...…are more likely to go out and try them or buy them. It is a much better way of marketing than a commercial, mainly because the target market is not watching TV like in the past and the target market trusts influencers to tell them the truth about products.

Conclusion

Social media marketing is a great way for companies to leverage digital technology and the Internet for their own purposes. More people are connected than ever before thanks to online sharing platforms like Twitter and YouTube. These platforms allow users to give their favorable impressions of products and services; however, they also allow people to share their own views and this can mean that negative reviews spread more easily on social media than anywhere else. Using social media influencers to promote products is a good way for an up-and-coming company to leverage social media.

Cite this Document:

"Defending The Practice Of Social Media Marketing" (2020, October 06) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/defending-practice-of-social-media-marketing-essay-2175640

"Defending The Practice Of Social Media Marketing" 06 October 2020. Web.19 April. 2024. <
https://www.paperdue.com/essay/defending-practice-of-social-media-marketing-essay-2175640>

"Defending The Practice Of Social Media Marketing", 06 October 2020, Accessed.19 April. 2024,
https://www.paperdue.com/essay/defending-practice-of-social-media-marketing-essay-2175640

Related Documents

This focus on the positive benefits of consumer word of mouth behaviour is a natural tendency. I certainly like to think that positive comments have a greater impact on my decisions than negative comments. In fact, the respondents to the survey reported that the two factors that had the biggest impact on their airline choices were comparison-shopping on the Internet (38%) and personal recommendations from an acquaintance on Facebook

relevance of a well-developed social media policy cannot be overstated. This is more so the case given that in addition to ensuring that their public image and reputation is not tainted; organizations need to protect themselves against liabilities arising from the actions of their employees. A new employee could be overenthusiastic about their new position and deem it fit to post, blog, and tweet about the said position and

Technology and Digital Media: Media Injustice Media Injustice: Technology and Digital Media Media Injustice In his book, Couldry (2012) discusses four different types of media injustices. This text focuses on the first media injustice which occurs when a person is harmed by the media, but lacks effective means of seeking redress for, or publicizing the harm committed against them (Couldry, 2012). This media injustice is selected for a number of reasons. First, it

Although a corporation has developed successful marketing strategies to sell the products it is producing, its marketing plan will probably be a limiting factor in attaining its set objectives, this necessitates the need to have a good sales force to help in the process of acquiring able personnel to be among the corporation's future customers and boost sales. The outline includes the character, welfare, knowledge, training and inspiration of the

A in millions) Current in millions) Provided by Federal Bureau of Investigation as of September 18, 2006. www.whitehouse.gov/goodbye/3ae6b1ac94aa97e6650780f280890a7c81100e47.html" CHART: National Correctional Populations National Correctional Populations The number of adults in correctional population has been increasing. A in millions) Current million in millions) Provided by Bureau of Justice Statistics as of November 30, 2006. (Social Statistics Briefing Room, 2006) More Statistics Violence in the Media Huston and colleagues have estimated that the average 18-year-old will have viewed 200,000 acts of violence on

Social Engineering and Information Security We are in an age of information explosion and one of the most critical problems facing us is the security and proper management of information. Advanced hardware and software solutions are being constantly developed and refined to patch up any technical loopholes that might allow a hacker attack and prevent consequent breach of information security. While this technical warfare continues, hackers are now pursuing other vectors