Workshop 2: Listening and Web Presence Day 1: Listening Tools and Privacy Best Practices Day 2: Strategic Internet Presence: Websites and Blogs This project is managed by Institute for International Institute for Education (IIE) Sponsored by the U.S. Department of State Middle East Partnership Initiative (MEPI)
Don’t have to implement all social tools to be successful
Wide range of skills and knowledge in the room
Everyone will participate
FRAMING Leave the room ready to use listening tools and adjust the privacy settings so you can do so safely. Introduction, Overview, and Icebreaker Listening : Why and What Basic Listening More Listening Tools Listening: The Work Flow Introduction To Privacy and Security Reflection
Share Pairs: For each question, find a different person in the room
What is one thing you already know or want to learn about listening and social media?
What is one thing you already know or want to learn about privacy and security on social networks?
Step 1: Why Listen? Link Listening to Strategy Decision-Making or Learning Listening on social media channels means you'll be looking at a lot of data and unstructured information. If you don't have a clear goal and identify who want to listen to, you can get quickly overwhelmed.
To know what's happening online, to have a starting point for an issue or a campaign
To get to know your audience, supporter, networks
To start to realize and observe patterns and have baseline so that you can optimize your online work
To know general trends about civil society
To know what the government is doing online
Listening Goals: Examples
Exercise: Review Your Strategy and Identify Your Goals Share Pair: Find a partner. Using your social media strategy template and discuss what your goals and audience are for listening. Share your goals.
California Shakespeare Theater California Shakespeare Theatre California Shakespeare Festival Cal Shakes Jonathan Moscone (name of director) Susie Falk (name of artist) As the season approaches -- the names of that season's directors and productions. Misspellings
Share Pair: Identify Your Words Share Pair: Find a different partner. Brainstorm a list of keywords. Make notes on the social media strategy template. Write down your keywords on sticky notes and place on the wall. Share Pair: Identify Your Words
Basic Listening: Click on the Orange RSS Symbol Basic Listening: Click on Orange RSS Symbol
Basic Listening: Cut and Paste URL into Word Basic Listening: Cut and Paste url into Word
Basic Listening: Google Alerts Exercise: Create Google Alerts based on your goals and keywords. Cut and paste the feed URL into a word document for later. Here are some examples: Debrief: What Google Alerts did you set up and why? Goal What to set up in Google Alerts News articles about our organization Keyword = Organization Name Type = News Who is linking to our organization’s web site Keyword= Web site URL Type=Everything Who is blogging about our organization Keyword=Organization Name and/or URL Type=Blogs ADD YOURS
Few More Listening Tools Few More Listening Tools
Exercise Practice your keyword searches with Google Alerts, Social Mention, Twitter, and/or Ice Rocket. Remember to cut and paste urls of searches that you want to use into a word document. Exercise
Demo: Setting Up Your Dashboard iGoogle is a dashboard that lets you read new content on the web using RSS. RSS allows information published on the social web to be read or published in another place – like your iGoogle dashboard. The benefit is that it doesn't add extra emails and gives you a specific place to do your social media listening. Also, you don’t have to constantly check for new content. There are many other RSS readers available, most are free, but we’re going to use iGoogle because it is easy and simple. Demo: Setting up Your Dashboard
What It Means: The extra S on the end signifies that your computer has opened a secure connection to the website. You may also notice a 'lock' symbol, either in the address bar or in the status bar at the bottom of your browser window. These are clues to let you know that anyone who might be monitoring your Internet connection will no longer be able to eavesdrop on your communication with that particular website. Technical Information: As opposed to HTTP URLs that begin with "http://" and use port 80 by default, HTTPS URLs begin with "https://" and use port 443 by default. Security Basics: Know The Difference Between HTTP and HTTPS
Security Basics: Use a Secure Web Browser and Add-Ons https://security.ngoinabox.org/firefox_main
Security: Firefox Browser Add-On for HTTPS http://www.eff.org/https-everywhere
HTTPS Everywhere: Limitations HTTPS Everywhere depends entirely on the security features of the individual web sites that you use; it activates those security features, but it can't create them if they don't already exist. If you use a site not supported by HTTPS Everywhere or a site that provides some information in an insecure way, HTTPS Everywhere can't provide additional protection for your use of that site.
Use “End-to-End Encryption” on Free Email Services In Hotmail, click Options, and then click More options. Under Managing your account, click Account details. You may be asked to provide your password. Under Other options, click Connect with HTTPS. Click Use HTTPS automatically, and then click Save. X X X
Security Checklist for Gmail https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488
Understand How Internet Filters Work Source: https://security.ngoinabox.org/en/chapter_8_1
Regardless of what filtering methods are present, it is nearly always possible to evade them by relying on intermediary computers, outside your country, to reach blocked services for you. This process is often called circumvention, and the intermediary computers are called proxies. Circumvention
Anonymity Networks and Basic Proxy Servers Anonymity networks typically 'bounce' your Internet traffic around between various secure proxies in order to disguise where you are coming from and what you are trying to access. This can significantly reduce the speed at which you are able to load websites and other Internet services. In the case of Tor , however, it also provides a reliable, secure and public means of circumvention that saves you from having to worry about whether or not you trust the individuals who operate your proxies and the websites you visit. As always, you must ensure that you have an encrypted connection, HTTPS , to a secure website before exchanging sensitive information, such as passwords and emails, through a browser.
TOR: What Tor is software, people, and protocol to help people protect their privacy online. https://www.torproject.org/
Workshop 2: Web Presence Day 2: Strategic Internet Presence: Web Sites and Blogs This project is managed by Institute for International Institute for Education (IIE) Sponsored by the U.S. Department of State Middle East Partnership Initiative (MEPI)
We are moving towards turning the organization's web presence from static to more interactive or social. Not every NGO needs a separate website and a blog, some organizations consolidate. The blog is part of the web site. Free blogging platforms like “blogger” give you an easy way to update your content, and if you already have a web site, you can easily add it as an interactive part of your web site. You need to think about how to link or integrate your social media outposts. Home Base: Blogs & Websites
Our NGO blog will publish stories about our organization’s program and related topics in our country. Our social media strategy objective is to raise awareness of our organization’s work and to be regarded by others as a leader on the topic.
Our NGO blog will have 50% of our posts about our programs and 50% about the topic in general. The latter will include how to posts, tips, case studies, and summarize important research.
Our NGO will publish three blog posts per week that will be written by people on staff and occasional guest bloggers.
Blogging: Editorial Mission Statements
Share Pair: Work with a partner and discuss the questions about editorial mission. Write a brief editorial mission statement. Blogging: What’s Your Editorial Focus?