Tapping Twitter

Twitter is quite possibly the most intimidating and risky form of social media for federal managers. The idea of sharing work-related comments with a broad audience in an off-the-cuff manner seems incompatible with the training that senior feds rely on to be successful in their jobs. But Twitter, when used properly, can provide an invaluable opportunity to share mission goals with stakeholders and to collaborate across agencies. 

There are many different strategies for being effective on Twitter, but a few basic guidelines can help keep you on track and out of trouble. First, there are two possible roles managers can play in their Twitter life. Many maintain purely personal Twitter accounts, often with disclaimers in their profiles such as “the opinions expressed here are mine alone.” 

The more productive option might to be a representative for your office and agency in the digital space. This usually requires sign-off from a superior or the public affairs office. In maintaining a professional Twitter account, there is a clear line delineating appropriate tone and content. Managers should speak to their followers the way they would address an audience at a conference or town hall meeting of stakeholders or fellow managers in and outside their agencies. 

On Twitter, managers have the opportunity to tout their successes, provide updates on projects, and solicit help or best practices advice on any roadblocks. They can field questions and offer advice to fellow managers facing similar challenges. Twitter is a real-time social network, so the timeliness of what is shared should be a top priority. 

Another reason to consider a professional rather than personal account is credibility. Research has shown tweets from sources that broad audiences consider reliable—such as major newspapers, well-known corporate executives and government officials—are most likely to be retweeted or shared verbatim by other Twitter users. Most articles and experts recommend sharing information from a reliable source. But as a senior government official discussing the business of your office, you are the reliable source. 

To boost reliability, however, consider showing your work or sharing sources. If promoting a draft regulation put out by your office, discuss the interactions you had with affected parties and the process you went through to solicit their input. Consider sharing the results of an internal survey or audit that helped drive the decision-making process. This sort of transparency helps followers feel invested in the project and lends credibility to your actions and your office’s decisions. 

Without a doubt, Twitter provides an opportunity to spread the word about your accomplishments as an organization and individually as a manager. The most successful tweeters, however, won’t hog the digital microphone. Just like in real life, listeners are bound to tune out someone who rambles on without engaging the audience. You must be willing to interact with your followers. Accept questions and answer as candidly as possible, even if the response is “I don’t know” or “we’re looking into that.” Retweet information from those you find helpful and promote the good work of fellow federal managers. 

As unnatural and risky as Twitter might seem, federal managers should view it as an opportunity to share with a broader audience the type of information they’d love to exchange in person. Government leaders are doing good work and asking good questions; Twitter is one place to share that work and find answers that might lead to innovative solutions.

Elizabeth Newell covered management, human resources and contracting at Government Executive for three years.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.