Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks Hardcover – October 25, 2011
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Torrenzano and Davis blend a compelling narrative, killer anecdotes and page-turning prose into a sober and worrying account of what happens when the darker side of human nature harnesses the connectedness and anonymity of today's web. Their Digital Assassination should be in the hands of anyone who has a good name--or a good business--to protect. (Mike Hayden, former Director, Central Intelligence Agency; former Director, National Security Agency)
Digital Assassination provides a compass --as well as a road map-- for navigating the potholes, pitfalls and landmines of our new digital world. It is a must read from every CEO and top executive. (Dick Grasso, former Chairman & Chief Executive Officer, New York Stock Exchange)
Do you have a good reputation? Then be sure to protect it by reading "Digital Assassination" where the authors lay out seven ways you and your company can be irreparably harmed at the speed of a Twitter post. Knowledge is power, so pay heed to the keen and timely advice here. (Charlene Li, Author of Groundswell and Open Leadership, Founder of Altimeter Group)
The Net is a reflection of everything good and bad in society, and as such has a dark side. Everyone and every organization needs to manage their reputation and protect themselves when they go online. That's the critical message of Digital Assassination. (Don Tapscott, best selling author, most recently Grown Up Digital and Macrowikinomics)
Sticks and stones may break your bones, names will ruin your reputation, cost you jobs and contracts, and destroy your career--online they will. Digital Assassination represents an indispensible--and, let it be said, completely engrossing--manual of self-defense. (Peter Robinson, fellow at the Hoover Institution, founder of Ricochet.com, and former speechwriter to President Reagan)
Digital Assassination is incredibly timely. It unveils Internet attacks by invisible destructive villains, while offering actionable solutions to defend personal reputations and corporate brands. (Michael Jones, Chief Operating Office, Public Broadcasting System (PBS))
From the Inside Flap
"At laser speed, Internet attacks destroy reputations, brands, businesses...even lives."
From false Wikipedia entries to Yelp attacks, obscene fabricated images to Facebook privacy concerns, every CEO and celebrity, small business owner, entrepreneur, physician, lawyer, journalist and politician, parent and child, is at risk of digital assassination.
Two leading advisors to Fortune 500 corporations and public figures look beyond the technology to examine what social media realities, history, pop culture and futuristic science tell us about how to deal with digital assassins.
Richard Torrenzano and Mark Davis predict what the end of privacy will mean for civilization--and provide a course of actions to turn the tables on your would-be assassins. Using vivid stories pulled from history and the headlines, they illustrate the "Seven Swords of Digital Assassination"-- seven distinct forms that digital attackers assume:
- New Media Mayhem--"Gossip Girls" who pushed aside traditional media and balanced reporting
- Silent Slashers--Online damage to your business and reputation by unfelt "cuts"
- Evil Clones-- Confessions to something terrible using your name and image
- Human Flesh Search Engine--Crowd sourcing that inspires instant digital lynch mobs
- Jihad by Proxy--Moneyed interests that engage in "motive laundering" to launch deadly online attacks
- Truth Remix--Spinning a bad fact into something far worse
- Clandestine Combat--The ease with which competitors or enemies simply purloin your secrets
- These "Seven Swords of Digital Assassination" cut and slice at reputations in different ways; each can be devastating, whether singly or in combination.
In our age of instantaneous global information, Digital Assassination is a savvy, streetwise, utterly entertaining -- and essential -- read.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
This book packs it in: direct, no-nonsense reporting, great history, cautionary tales, and the motivating urge to get you out of your armchair to double-check your security settings.
A great and enjoyable read!
Today's Luddite would likely protest what the Internet has brought. In fact, the first 200 pages of Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks has enough real-life horror stories to convince a significant number of people that the Internet's technological prowess comes at too high a cost.
Numerous stories in the book describe how the Internet is being used to destroy brands, reputations, and people's well-being. These incidents range from inappropriate use of Facebook and blog postings to bogus Wikipedia entries to blatant Internet-based character assassination, and much more. The book familiarizes readers with terms such as "silent slashes," "evil clones," and "jihad by proxy" as the authors describe the "seven swords of digital assassination" that damage entities' reputations.
But the book does more than scaremongering. In chapter 11, the authors write about the "seven shields of digital assassination," or the main ways organizations can protect themselves. The authors go into great detail on how an organization should respond to online attempts at character assassination. Other valuable topics include optimizing reputation and a strategy for digital defense. The authors list many Web sites that can be used to help discover what is being said about an organization or professional on blogs, message boards, and other locations. The authors also provide an effective overview on how entities can use social media to assist in image management.
The original Luddites couldn't stop the industrial revolution, and no one can stop the digital one. The only logical response is to adapt. Just as any business executive would ensure that the company's physical perimeter is secured, so too must today's executive ensure that the company's online presence is secured. For those serious about a way to do that, this book should be required reading.