Social media badges

jroberts

Are social media badges, such as those used in Foursquare, on their way out? And what's next in motivating and engaging users?

Answer this Question

Answers

3 total
Christopher Nerney
Vote Up (9)

 

jroberts,

 

As far as what's next in motivating and engaging users, it could be more gamification techniques. Here's a blog post I wrote for CITEworld about a startup that uses "emergent gamification metrics" as part of its software designed to help enterprises motivate employees and improve enterprise productivity. One would assume that gamification techniques that work on employees could be adapted to work on users and customers. The CEO of Social Lair, Padmanabh Dabke, talks about the hierarchy of gamification techniques in the company's blog (it's the second post from the top). In his hierarchy, "activity-based rewards" such as points and badges are on the lowest rung, so it stands to reason that the higher-rung techniques could be what's "next."

 

 

 

jnaze
Vote Up (9)

Interesting research from Yahoo research, circa 2011
Badges in Social Media: A Social Psychological Perspective
http://research.yahoo.com/pub/3469

Abstract: Representing achievements as badges or trophies is a standard practice in online gaming. Awarding badges has also become a key ingredient in “gamifying” online social media experiences. Social systems such as Foursquare, StackOverflow, and Wikipedia have popularized badges as a way of engaging and motivating users. In this paper we deconstruct badges and present five social psychological functions for badges in social media contexts: goal setting, instruction, reputation, status/affirmation, and group identification. We argue that future research should further explore these five functions and their application in specific contexts.

Link to PDF:
http://research.yahoo.com/files/Antin%20&%20Churchill%20-%20Badges%20in%...

jimlynch
Vote Up (8)

I think they have become so ubiquitous that many people have become blind to them. I doubt we'll see them suddenly disappear totally, but their effectiveness may decline over time. Sites still want social media traffic though, so the badges will still be around.

Ask a question

Join Now or Sign In to ask a question.
Borrowing a page from the recently revised Microsoft playbook, development tools maker Telerik has released as open source the bulk of its Kendo software library of components for building Web and mobile applications
A Space X Falcon rocket lifted off Friday afternoon for the International Space Station (ISS) from the Cape Canaveral Air Station in Florida.
Advanced Micro Devices doesn't want its chips in low-priced tablets, and is eager to avoid a battle with Intel or ARM, whose chips have driven tablet prices down to under US$100.
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
Tech workers suing over an alleged no-poaching agreement among Silicon Valley firms are fighting an attempt by defendants to ban evidence that might portray Steve Jobs as a bad guy.
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK.
The U.S. Federal Communications Commission will reserve a significant amount of spectrum in its upcoming auctions of the television band for unlicensed uses such as Wi-Fi, agency officials said Friday.
Can plastic materials morph into computers? A research breakthrough published this week brings such a possibility closer to reality.
Even four months after the Mac Pro's initial release, Apple appears to be having problems making enough of the high-end cylindrical desktop computer. The company's store currently shows shipping times of 4-5 weeks for all Mac Pro models, even the stock versions without additional customizations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.

White Papers & Webcasts

See more White Papers | Webcasts