Internet Use in  4‐H Activities2010 Western Regional 4-H Leaders Forum    Fahzy Abdul-RahmanFamily Resource Management    ...
Outline• Motivation: Why the Internet  – Risks – Safety  – Why work … we have good program• Internet as tools:  1. Marketi...
Whatwe Plan  to CoverToday!          3
Types of Social Media Marketing              (SMM)a. Content-based   c. Interest-basedb. Personality-    d. Fantasy-based ...
a. Content-based SMM                                Content sites• Focuses on the content to  be posted and passed  around...
b. Personality-based SMM• Consumer  companies create  character profiles,  but may not be the  best marketing for IT  comp...
c. Interest-based SMM• Communities form      IT marketers must get into  around topics of       these conversations  inte...
d. Fantasy-based SMM• Virtual worlds, inhabited  by avatars, allow fantasy  lives that marketers wish  to be part of—Apple...
Note: marketers can safely ignore kids• MARKETING: As  kids get  savvy, retailers aim  to hook em early                   ...
Note: marketers can safely ignore kids                                     10
Motivation 1: Expansion                          11
Motivation 2: High Returns on Investment                                     13
Local Twitter Success Story• By Davonna Lowry, Bernalillo county 4-H  Leader:  – Set up a twitter account for our family b...
Local Twitter Success Story• Thanks 4-H students - they did a great job  decorating KKD-themed cakes! Come by the  new fac...
Embrace the Chaos!                     17
Where and whatdo you see your  role here? Social MediaMarketing Funnel                  18
Social media marketing can be planned• Choose interesting  topics for your stories—  just like good old public  relations•...
Training           20
Training• Telstra: 40,000+ Employee Company Trains its  Employees on Social Media  – Intro & 3R• University of the People ...
NMSU-supported   •   Centra   •   Second Life   •   YouTube   •   Second Life                     22
Training: Centra • Virtual or "live" classroom events • Live limited interactive     – Internet speed! • May be recorded •...
Training: Centra                   24
Training: iTunes•   Recorded•   Less Interactive•   High-quality video•   Demonstration    If you need assistance with iTu...
Training: iTunes                   26
Training: Youtube– Ratings– Inputs– Correct formatting – e.g. MP4                                  27
Training: Second Life                        28
Risks and Safety• Invasion of Privacy  – Repackaging of user data – hot commodity for    commercial purposes  – A typical ...
pleaserobme.com“The danger is publicly telling people where you  are. This is because it leaves one place youre  definitel...
Risks and Safety• For content that is covered by intellectual property rights, like  photos and videos ("IP content"), you...
Internet Use in     4‐H Activities   2010 Western Regional 4-H Leaders Forum         Fahzy Abdul-Rahman    Family Resource...
Social Media Use in 4‐H Activities
Social Media Use in 4‐H Activities
Social Media Use in 4‐H Activities
Upcoming SlideShare
Loading in...5
×

Social Media Use in 4‐H Activities

282

Published on

Why Social Media?

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
282
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Friday, March 12; 3:30 – 5:00 pm
  • The best way to reach a large segment of the youth population is via internet given that children are probably the most tech‐savvy population in New Mexico and other states/provinces. This workshop will demonstrate to participants ways to use the internet as marketing, communication, and training tools for 4‐H programs
  • http://www.usatoday.com/tech/webguide/internetlife/2009-01-28-online-generations_N.htm From business to fun: What different generations do online
  • Youth are special groups. They are not like us when we were younger. In general, they are more tech-savvy and quick to make decisions (short attention span).Use facebook, utilizes i-phone, you-tubing, like to feel in-control, and like interactive sessions. Idea: Utilize the youths interest in Fantasy Football or Poker for fantasy investment … updated in facebook or myspace. Unique ads: Table outside movie shows, viral marketing, product placement (ask athletes to wear clothes with our website), Teens as “consumer in training”Sow the seed to children Brand loyalty often develops in adolescenceTeens exert a big influence on the purchase decisions of their parents. Many become the shoppers for the home because of working parents.
  • http://www.youtube.com/v/6ILQrUrEWe8Social Media Revolution http://www.youtube.com/watch?v=sIFYPQjYhv8Social Media in Plain English http://www.youtube.com/watch?v=MpIOClX1jPETwitter in Plain English http://www.youtube.com/watch?v=ddO9idmax0oSocial Media ROI: Socialnomics http://www.youtube.com/watch?v=ypmfs3z8esIReturn on Investment (ROI): Social Media http://www.youtube.com/watch?v=zrhrmcGhXlsLinkedIn30 million users, strongly business-oriented, $1 Billion+ valuationFacebookAustralia recently allowed service of court documents via FB #5 top global website per Alexa132 million unique visitors/monthTwitterFastest growing social networkRecently turned down $.5 Billion buyout offer from FacebookYouTubeNow the second leading search engineBigger than YahooAccounts for 25% of all Google searches
  • http://www.youtube.com/v/6ILQrUrEWe8Social Media Revolution http://www.youtube.com/watch?v=sIFYPQjYhv8Social Media in Plain English http://www.youtube.com/watch?v=MpIOClX1jPETwitter in Plain English http://www.youtube.com/watch?v=ddO9idmax0oSocial Media ROI: Socialnomics http://www.youtube.com/watch?v=ypmfs3z8esIReturn on Investment (ROI): Social Media http://www.youtube.com/watch?v=zrhrmcGhXls
  • By Davonna Lowry, Bernalillo county 4-H Leader:In the end Bern Cty 4-H received a $500 donation for the baking projects and the members had the opportunity to showcase their talent ½Promote 4-H to the publicKKD donated $500 to the charity of the winning cakeAs the world is moving into the 21st century, I decided that is was time to get on board. I created a twitter account for our family business and began tweeting. Well, not knowing what I was doing, I did a lot of promotions to grow our business. I learned not too long after opening the account, that I was doing this all wrong. What I needed to do was create relationships through this social media avenue. I began creating relationships with various people in Albuq. I also began attending social media workshops and meeting these people face to face. Being a homeschool mom, I try to introduce my kids to all aspects of life. Danielle, who is a senior 4-H member, went with me to a workshop one evening and we met a public relations manager. After meeting the PR manager, he told me that he would put me in a different list on his twitter account and watch what I have to say since he has now met me. That night the members at the workshop encouraged Danielle to set up a twitter account promoting her cake business. She also met the PR manager, so when she set up her account, he immediately started following her.  The PR manager contacted us about a month later with an opportunity for Danielle and other 4-H members that like to do cake decorating. He told us that KrispyKreme doughnuts was coming back to Albuq. and would like to hold a cake decorating contest for their grand opening. Each 4-H member would be teamed up with a media personality and a non-profit charity. The winning cake would receive $500 for their charity and 4-H would receive $500 for the baking projects. We agreed to contact several 4-H members and get cakes started.  The grand opening took place on Dec.9th, 2009 and the 4-H members were there to represent and promote their cakes.  I have to say that if I had not try to promote my business by way of twitter, I don’t think that the 4-H members would have had that opportunity or the donation to promote the baking projects. Social media works.
  • Twitter: Top Twitter Tools Exposed & Explained at Lightning Speed!http://www.youtube.com/watch?v=UvVg8PtaGWsTwitter: iowa4h , Florida4H , Following & follower
  • The obvious primary goal of the FsA social marketing effort is to drive traffic back to eXtension.org. There are numerous social media outlets, and we will begin building our presence, and expand to new outlets: Twitter, Facebook, etc.Then we will connect to existing 3rd party partner sites, such as your university pages, or other resources for consumers. The next step is to engage the CoP.As demonstrated by a survey conducted for the 2009 AFCPE Pre-Conference the members of our CoP are building their presence and networks. The FsA CoP wants to connect with your pages. Then, We hope to enhance this trend by providing another source of leadership by directing CoP members to social media resources, inviting you to join our networks, create your own pages, and network with us.As CoP members and FsA enhance our online presence, our consumers will access our networked information, and more easily access our growing central resources of research based knowledge.
  • Driving traffic to our site – expertise?Create social media presenceProvide tools for 4-H membersBuilding your networkConnect your state/local networks with national [international] networkMarketers Have to Give Up ControlWe don’t control the messageThe message is changed, rebutted, parodied, and misconstrued by our audienceEven if our audience issmall, they are keyvoices to usWe must modify whatwe say in responseEvery day
  • http://www.thesocialworkplace.com/social-media-2/914/Social Monitoring ToolsEstablish which tools you want to use to capture the conversation, whether they are paid or free custom solutions. The tools you decide to use will impact the rest of the social media monitoring funnel, so choose carefully.Keyword TargetingImplement specific keywords that allow you to monitor your brand, target significant players in your organization, and keep tabs on your competition. This is also a point of entry in the funnel where you should be doing ongoing optimizations to refine your keyword data set.Noise EliminationEliminate spam sites that litter your feed and remove off topic mentions by building out negative key phrase lists. Blacklist specific sites that you do not want appearing in your feed.Refined MentionsUtilize your refined mention feed – watch the conversation. This is also an entry point of the funnel where most of the day-to-day monitoring takes place. Read, analyze and act.AnalysisApply sentiment analysis manually if your system is not doing it automatically – you need to measure the overall health of your brand if there is enough conversation going on. Group your mentions together in a holistic manner, facilitating portable data transfer within your organization.Take ActionTake action when needed – make sure the proper people inside your organization are acting and engaging the social web where your conversation is happening. If you are not applying manual analysis, then this part will be difficult. If you feel like your stream of mentions is not optimal enough, then go back through and tweak your keyword targeting at this point. Once you have constructed your plan, you will want to rinse and repeat. Read the refined mentions, analyze them and act accordingly.Source:  The Social Media Monitoring Funnel | Ignite Social Media
  • Telstra: 40,000+ Employee Company Trains its Employees on Social MediaIntro & 3RUniversity of the People (UoPeople) a tuition-free, non-profit online academic institution with a mission to democratize higher education by providing universal access to college studiesThe Wikibooks project, which began in 2003, aims to create open source, CC-licensed textbooks written by volunteers. The site now contains over 38,000 pages of free textbooks, but unfortunately many of the books remain incomplete.
  • http://www.youtube.com/watch?v=qOFU9oUF2HA
  • http://parentingteens.about.com/cs/sitesforteens/a/internetusage.htmhttp://www.youtube.com/watch?v=X7gWEgHeXcAInvasion of PrivacyChildren have the right not to give out private information to anyone, including reputable companies, for any reason without the expressed permission of their parents. This information includes, but is not limited to name, email, address, age, and school they attend. Exposure to Inappropriate MaterialThe Internet is a vast information resource... of all types of information. Sites that contain explicit sexual, violent, and hateful information can be found with little and sometimes no effort. There are also sites on how to build bombs, make designer drugs, etc. Being HarassedChat rooms and message boards are chuck full of people who are just plain nasty. This can hurt a teenagers self esteem. Also, there are those on the net that will harass in email. FinancialA teenager with a credit card can do major damage to their credit, or yours. You should not allow any purchases for anything on the Internet without your permission. Then it should only be done on a secure server and NEVER through email. Know What To Do:Obtain Safe Surfing ProgramsThe Family Internet Guide at About.com has reviewed them in her Guide To Filtering Software. It's Okay to Keep SecretsLet your teen know it is ok not to tell things to people on the Net. Teach them to protect their privacy, that things aren't always what they seem. Have an Internet ContractMake a behavior contract with your teenager. This will enable them to know what you expect of their behavior while online. One can be found here. Obtain a Free Email AccountDo not allow your teen to use your ISP email account for message boards, chat, or anything really. Obtain a free email account for them. These types of accounts keep the SPAM level down and do not point out where your teen lives, like a local ISP can. Report Sexual ExploitationIf someone sends you messages or images that are obscene, lewd, filthy, or indecent with the intent to harass, abuse, annoy, or threaten you, report it to your Internet service provider and the CyberTipline online or by calling 1-800-843-5678.Use Family Filters on the Search EnginesMany companies on the internet, especially the search engines, are getting into the swing of online safety for our kids. Check out your favorite search engines filtering capabilities before your teen uses it.
  • The site uses streams of data from Foursquare, an increasingly popular location-based social network that is based on a game-like premise. Players use smart phones or laptops to "check in" to a location, recording their position on a map for friends using the service to see.
  • For content that is covered by intellectual property rights, like photos and videos ("IP content"), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook ("IP License"). We allow advertisers to select characteristics of users they want to show their advertisements to and we use the information we have collected to serve those advertisements.We may use information about you that we collect from other Facebook users to supplement your profile (such as when you are tagged in a photo or mentioned in a status update).
  • http://parentingteens.about.com/cs/sitesforteens/a/internetusage.htmInvasion of Privacy Children have the right not to give out private information to anyone, including reputable companies, for any reason without the expressed permission of their parents. This information includes, but is not limited to name, email, address, age, and school they attend. Exposure to Inappropriate MaterialThe Internet is a vast information resource... of all types of information. Sites that contain explicit sexual, violent, and hateful information can be found with little and sometimes no effort. There are also sites on how to build bombs, make designer drugs, etc. Being HarassedChat rooms and message boards are chuck full of people who are just plain nasty. This can hurt a teenagers self esteem. Also, there are those on the net that will harass in email. FinancialA teenager with a credit card can do major damage to their credit, or yours. You should not allow any purchases for anything on the Internet without your permission. Then it should only be done on a secure server and NEVER through email. Know What To Do:Obtain Safe Surfing ProgramsThe Family Internet Guide at About.com has reviewed them in her Guide To Filtering Software. It's Okay to Keep SecretsLet your teen know it is ok not to tell things to people on the Net. Teach them to protect their privacy, that things aren't always what they seem. Have an Internet ContractMake a behavior contract with your teenager. This will enable them to know what you expect of their behavior while online. One can be found here. Obtain a Free Email AccountDo not allow your teen to use your ISP email account for message boards, chat, or anything really. Obtain a free email account for them. These types of accounts keep the SPAM level down and do not point out where your teen lives, like a local ISP can. Report Sexual ExploitationIf someone sends you messages or images that are obscene, lewd, filthy, or indecent with the intent to harass, abuse, annoy, or threaten you, report it to your Internet service provider and the CyberTipline online or by calling 1-800-843-5678.Use Family Filters on the Search EnginesMany companies on the internet, especially the search engines, are getting into the swing of online safety for our kids. Check out your favorite search engines filtering capabilities before your teen uses it.
  • Friday, March 12; 3:30 – 5:00 pm
  • Transcript of "Social Media Use in 4‐H Activities"

    1. 1. Internet Use in 4‐H Activities2010 Western Regional 4-H Leaders Forum Fahzy Abdul-RahmanFamily Resource Management Extension Specialist March 11-14, 2010 1
    2. 2. Outline• Motivation: Why the Internet – Risks – Safety – Why work … we have good program• Internet as tools: 1. Marketing and Communication 2. Training 2
    3. 3. Whatwe Plan to CoverToday! 3
    4. 4. Types of Social Media Marketing (SMM)a. Content-based c. Interest-basedb. Personality- d. Fantasy-based based 4
    5. 5. a. Content-based SMM Content sites• Focuses on the content to be posted and passed around: blogs, videos, photos, news stories, podcasts• Or bookmarks to the Bookmarking sites content• Feeds viral marketing
    6. 6. b. Personality-based SMM• Consumer companies create character profiles, but may not be the best marketing for IT companies• IT consultants create professional profiles
    7. 7. c. Interest-based SMM• Communities form  IT marketers must get into around topics of these conversations interest, such as message boards and  Maybe social specialty search bookmarking sites fit into engines this category, too 7
    8. 8. d. Fantasy-based SMM• Virtual worlds, inhabited by avatars, allow fantasy lives that marketers wish to be part of—Apple, IBM, and other companies already play• Kids have their worlds, too, but IT marketers can safely ignore them
    9. 9. Note: marketers can safely ignore kids• MARKETING: As kids get savvy, retailers aim to hook em early 9
    10. 10. Note: marketers can safely ignore kids 10
    11. 11. Motivation 1: Expansion 11
    12. 12. How and Why?1. You e- inform your network2. Your network e- inform theirs3. … and so on … in minutes • Quick • Reliable messengers People + Message + Internet = social media marketing • Feedbacks creates 12 buzz
    13. 13. Motivation 2: High Returns on Investment 13
    14. 14. Local Twitter Success Story• By Davonna Lowry, Bernalillo county 4-H Leader: – Set up a twitter account for our family business – Created relationships with various people. – Attended social media workshops and meeting these people face to face. – Krispy Kreme: Back to Albuquerque – Each 4-H member would be teamed up with a media personality and a non-profit charity. 14
    15. 15. Local Twitter Success Story• Thanks 4-H students - they did a great job decorating KKD-themed cakes! Come by the new factory on Ellison and take a look! 11:18 AM Dec 8th, 2009• County 4-H program really stepped up with some great cake decorations! We will have them on display all day! 6:20 AM Dec 8th, 2009 15
    16. 16. Goals• Driving traffic to our site – expertise?• Create social media presence• Provide tools for 4-H members – Building your network• Connect your state/local networks with national [international] network 16
    17. 17. Embrace the Chaos! 17
    18. 18. Where and whatdo you see your role here? Social MediaMarketing Funnel 18
    19. 19. Social media marketing can be planned• Choose interesting topics for your stories— just like good old public relations• Use good titles and descriptions — just like <title> search marketing• Make it easy to bookmark, unless you think that’s cheesy 19
    20. 20. Training 20
    21. 21. Training• Telstra: 40,000+ Employee Company Trains its Employees on Social Media – Intro & 3R• University of the People (UoPeople) – a tuition-free, non-profit online academic institution• The Wikibooks project – began in 2003, – To create open source, CC-licensed textbooks – Over 38,000 pages of free textbooks 21
    22. 22. NMSU-supported • Centra • Second Life • YouTube • Second Life 22
    23. 23. Training: Centra • Virtual or "live" classroom events • Live limited interactive – Internet speed! • May be recorded • Together with documents, e.g. Powerpoint • http://eplace.nmsu.edu3/18/09 CES_4H Curriculum Meeting Mindy Turner 00:54:41 Playback12/11/08 CES_4-H Curriculum Update Amy Zemler 00:51:30 Playback5/21/07 CES_4H Diplomat Meeting Amy Zemler 00:00:13 Playback12/6/07 CES_4H Hall of Fame Induction Sonja Serna 00:31:27 Playback 23
    24. 24. Training: Centra 24
    25. 25. Training: iTunes• Recorded• Less Interactive• High-quality video• Demonstration If you need assistance with iTunes please contact the NMSU Help Desk at 646-1840 or help@nmsu.edu. 25
    26. 26. Training: iTunes 26
    27. 27. Training: Youtube– Ratings– Inputs– Correct formatting – e.g. MP4 27
    28. 28. Training: Second Life 28
    29. 29. Risks and Safety• Invasion of Privacy – Repackaging of user data – hot commodity for commercial purposes – A typical agreement – Where we live, interests, activities, age, based on your friends if not yours, … . – Add more data ~ survey! – boss, future employer, parents• Exposure to Inappropriate Material• Being Harassed• Financial: Credit card 29
    30. 30. pleaserobme.com“The danger is publicly telling people where you are. This is because it leaves one place youre definitely not... home.” 30
    31. 31. Risks and Safety• For content that is covered by intellectual property rights, like photos and videos ("IP content"), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook ("IP License").• We allow advertisers to select characteristics of users they want to show their advertisements to and we use the information we have collected to serve those advertisements.• We may use information about you that we collect from other Facebook users to supplement your profile (such as when you are tagged in a photo or mentioned in a status update). 31
    32. 32. Risks and Safety: What To Do1. Obtain Safe Surfing Programs2. Its Okay to Keep Secrets3. Have an Internet Contract4. Obtain a Free Email Account5. Report Sexual Exploitation6. Use Family Filters on the Search Engines 32
    33. 33. Internet Use in 4‐H Activities 2010 Western Regional 4-H Leaders Forum Fahzy Abdul-Rahman Family Resource Management Extension Specialisthttp://aces.nmsu.edu/ces/mymoney | tweet | blog 33

    ×