Summary of Wild West 2.0

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Wild West 2.0 book summary
Start getting smarter:
or see our plans

Rating

8 Overall

9 Applicability

7 Innovation

7 Style

Recommendation

Although the Internet is the greatest information resource and connectivity medium the world has ever seen, it is still remarkably wild and woolly. Millions of shady characters inhabit it, lurking to steal your shirt and sell it back to you at twice the original price. Some online con artists set up phony rating sites where they publish scathing reviews of companies’ products and then extort heavy fees from those firms to remove the negative reviews. Malevolent liars use the Internet anonymously to ruin people’s reputations or corporations’ standings with blog attacks and negative postings. Reputation management consultants Michael Fertik and David Thompson examine these fraudulent activities and more in this disturbing but timely book, and they outline steps you can take to protect your online reputation or the good name of your business. Though the book is somewhat repetitive, Fertik and Thompson have created a solid, useful manual on safeguarding your good name online. getAbstract recommends it to anyone who has to fight back against online slurs, and to anyone who has a good reputation and wants to keep it.

In this summary, you will learn

  • How slanderers can ruin your online reputation,
  • How to conduct an online reputation audit and
  • How to protect and restore your reputation on the Web.
 

About the Authors

Michael Fertik is founder and CEO of a reputation management consultancy where David Thompson is general counsel. Fertik also serves on the advisory board of The Internet Keep Safe Coalition, which protects the safety of children online.

 

Summary

The Virtual Territory of the Digital Desperadoes
The Internet is a dangerous “digital frontier” where anything goes. Malicious online criminals can trash your reputation by spreading vile lies and outrageous smears without having to worry about the consequences. Anonymous attacks against...

Get the key points from this book in 10 minutes.

For you

Find the right subscription plan for you.

For your company

We help you build a culture of continuous learning.

 or log in

Comment on this summary

More on this topic

By the same authors

Customers who read this summary also read

More by category