SlideShare a Scribd company logo
1 of 10
Eternal sunshine for spotless minds: Seven warnings for networking online
Katherine Watson, Coastline Community College, Fountain Valley, CA 92708
Bizarrissime@gmail.com
Born into an information-abundant world enhanced by access to multiple forms of media, more
than half of today’s college students take regular advantage of electronic access to “news”,
whether personal, public, or private, using audio, video, or text (Dean, 2012). Indeed, in an
epoch when the university has become not so much a marketplace of intellectual, professorial
or institutionally-generated ideas as it has become a sunny, “learner-driven bazaar” (Squires,
2007), the school that would remain not only “relevant” but societally integrated is expected to
retain both an “ordinary online presence” and a “socially mediated” one, with updated, efficiently
delivered news and data made available continuously via multiple media.
Thus, it has become clear not only that the lion’s share of the world’s college undergraduates
seeking degrees in the twenty-first century have grown up in a multimedia-mediated world. As
well, the new, learner-driven “marketplace” of education, these students typically demand the
flexibility, self-pacedness, and ease of access defining what they see as the most convenient,
online curriculum. Indeed, millions of new acolytes have been joining academe exclusively
online since the early 2000’s, particularly in Asia and Africa (Sawahel, 2013), where recently
improved fiber-optic connectivity and readily available “self-paced e-learning products” have
rendered learning not only possible in places where it never was in the past but practicable and
practical in ways unheard-of before 2005.
But many newly connected individuals, whether they be self-directed students or academic
officials, still fail to realize how important or enduring are the electronic communications that
support the online learning process. In particular, their increasing exploitation of such “social
media” as Twitter, Facebook, Instagram, YouTube, and LinkedIn, to name a few, has led to
misunderstanding and confusion in many cases, and to embarrassment and scandal in others.
Indeed, the Florida (Usa)-based Poynter Institute suggests that anyone who would post any
information online in any format or through any medium (e.g., audio, video, text) consider seven
reminders before tapping the “enter” key:
1. Assume that everything is public and perennial
2. Keep things professional, with a purpose
3. Give information rather than simple reactions
4. Avoid flooding the network
5. Keep things concise
6. Acknowledge sources/resources
7. Interact in a timely way
1
These seven points should be considered before, during, and after information is posted,
advises Poynter. Each point comprises communicative impact, and each connects, both
figuratively and literally, to the next.
Assume that everything is public and perennial: What’s out there stays out there
Although popular, if not universal, wisdom holds that one can find out just about anything about
just about anything in the wide-open world of online information transmission, many users of
such electronic social networks as Twitter and Facebook retain “a level of comfort” with these
services and their so-called “privacy settings” that facilitates---in fact, encourages---a belief that
all communication that takes place in these realms is at once private, harmlessly entertaining,
secure, and immutable to changes that may be fabricated by others. As Fincham (2012) has
written for The Poynter Institute, however, users must beware: Social media postings are
frequently evaluated or criticized in ways not necessarily planned by their posters. Notably,
Weddle (2013) reports, “…over a third of HR professionals have visited social networking sites
to look for information about employment candidates. Personal info and videos posted on
Facebook, Twitter, YouTube, and other sites are now considered fair game when employers
conduct ‘background checks’ on job seekers.” Weddle advises social networkers to “represent
themselves well”, attending to the public image being conveyed. Even the seemingly short,
insignificant posting comprises a tool for outsider evaluation. And Fincham (2012) counsels
twenty-first century educational institutions to remind students as well as staff that, while
“(Some people) think it doesn’t matter what they say, we need to change that mindset…Twitter
(and Facebook) are a permanent public record (and) will be around a long, long time.”
Fincham (2012) cites new-media journalism professors as having become particularly
assiduous in promoting public-minded “future-thinking”; journalistic social networkers in
particular are invited to imagine a world ten years from now: “Will this get me in trouble?” they
must ask themselves. And if there is any question, then they should keep their thoughts to
themselves. Indeed, the wait-awhile test might well be applied to all social media postings, even
though posters may think that they absolutely must comment instantly on things; often, even a
short wait can be educational, enlightening, perspective-giving.
Waiting a moment before clicking “enter” can also help to warn social media users of a too-
infrequently considered distinction about keeping not-to-be-made-public thoughts to themselves
in a twenty-first century world where boundaries of time and space scarcely exist. That is, users
must remain alert that the divergence separating public from private is not the same one that
distinguishes anonymous v. recognized. Appreciation of the former differentiation permits
people to yammer loudly on cellphones in public even while retaining “private” conversational
intimacy. Attention to the latter, for its part, calls for awareness of one’s audience; the user of
social media must remain conscious that receivers of his message may not share his sense of
humor, his point of view, his notion of what is significant or insignificant, casual or calculated.
Keep things professional, with a purpose: Remember why
It is seductive to retain the notion that electronic social media are indeed just casual, harmless,
and social. Fincham (2012) reports that even in many schools of journalism in the United States,
2
students still “only see (the network) as a private messaging service to use with close friends”.
But in an era when, as Weddle (2013) notes, employers have come to exploit electronic social
media as extra, enlightening, modern-era tools for ordinating innumerable applicants, students
should keep in mind that, as Fincham (2012) reports from the world of professional journalism,
Twitter and Facebook accounts “…will generally be seen as reflective …”. Thus, we are
counseled to bear in mind not only that everything is public online but also that subtle, often
unstated societal differences still exist not only between the aforementioned public and private,
anonymous and recognized but between the formal v. informal and the professional v.
unprofessional. Indeed, Fincham (2012) continues, social networkers must recognize that such
services as Facebook, Twitter, YouTube, and Instagram can cast new light upon themselves;
users must remain on top of their multimedia (inter)activity so as to “add value” and not detract
from the image they wish to retain or broadcast professionally. As Thornton (2012) states, “It is
so not about what you had for lunch or what color your nails are…” Users of social networks
must remember that the networks themselves use no culling tools; the banal and the vital may
lie side-by-side, with neither accorded more or less social media ‘weight’”. Like a new tattoo, the
image that one exhibits online has no background/foreground, nor any really effective way of
de-imaging an image.
Fincham (2012) points out that as more and more professionals take advantage of electronic
media, it is becoming increasingly important for users to attend to something beyond the simple
image or to the collage of images comprising Facebook or Twitter histories; ethics must be
considered, too. Each post must be evaluated before it is dispatched, not only for its adherence
to principles of humane behavior but for its effect upon outsiders’ trust. As the Stanford
Encyclopedia of Philosophy has noted, “social networking ethics” in the twenty-first century
concern “…virtually every type of significant social bond or role: friend-to-friend, parent-to-child,
co-worker-to co-worker, employer-to-employee, teacher-to-student, neighbor-to-neighbor, seller-
to-buyer, and doctor-to-patient, to offer just a partial list” (2013). Just as journalism professionals
advise young writers to imagine a world ten years on as a test of whether or not a particular
posting is a good idea in a socially mediated world, so should anyone who would tap “enter”
consider the posting from the viewer’s or reader’s perspective. The “visitor from another planet”
test might well be applied in the case of social media ethics: Imagine yourself as such a visitor
reading/viewing your Facebook postings, your Twitter tweets, or the like, and then decide if you
should really click “enter”…or not.
And finally, it must be recalled that retaining a professional tone is important in all
communication, whether in formal writing, in speaking, or online. As Weddle (2013) suggests,
those social networkers who would respond to others’ postings should “follow the lead” of the
original poster before making their own remarks, as long as the “lead” in question merits
following. In short, as has been advocated earlier, social media users would do well to wait and
weigh possible consequences before posting their remarks too quickly or reactively.
Give information, rather than simple reactions: Remember when & what
The speed and the lively nature of multimedia communication can easily trigger rapid, often
unthinking, responses that may be categorized as automatic, trigger-happy reactions more than
3
as well-considered, communication-rich replies. Too, just as social media messaging tone is
most effective and least offensive when it remains professional, so must the message-maker
remind himself that the tone of a reaction tends more often than not to be self-interested,
subjective, rather than constructively objective. That is, for instance, the outsider---or, indeed,
the aforementioned visitor from another planet-- who would read the reactive post will find out
more about the person doing the posting than he will discover about the matter that is
supposedly under discussion. The social networker who would take professional, useful
advantage of the systems would do well to retain as objective an air as possible in his postings,
using concrete, specific terms, unbiased language, and genuine information, data, or facts.
Opinions, if they are posted, should be marked as such. And naturally, as the Oxford University
Press Social Networking Guidelines state, networkers should “stick to what (they) know when
writing”, avoiding posts that may misrepresent or give an inaccurate image, especially in the
literal sense.
Twitter and Facebook provide easy systems for sharing images or links, videos or audio. And
as Newell (2013) states, “We can post everything that comes down the pike, and so we do.”
But, Newell continues, “The trick is to post the relevant, but not the annoying.” But, as Fincham
(2012) adds, remarks, photos, and URLs are really useful “only when they add value to an
online identity”, rather than serving as wordless, simplistic reactions or elliptical rejoinders. And
as the Huffington Post has pointed out, Twitter and Instagram seem even to invite hashtags,
those “#” symbols preceding what someone has decided are single-word labels for “trending
topics”; the hashtag user’s goal is to lead others into a (usually-Twitter-based) search of
commentary on the topic in question. But with no accepted rules on how to use them, hashtags
can be attached to things that posters may wish to call their own but that may not exactly be
their own, just to attract more comments to their postings and grow their groups of “followers.”
Kelly (2012) is one of numerous multiple-media mavens to warn, however, that using three or
more such tags in a 140-character post tends to be frustrating, distracting, and frequently
counter-productive, referring the reader more often away from the original posting that into it.
“Clues” must be given within the tweet or social media posting, suggests Fincham (2012), so
that readers will be able to know the gist of the post without having to click or scroll. Too,
Fincham (2012) adds, each social medium must be recognized “as part of a bigger picture”; the
media altogether can have “a volumizing effect”, she notes, wherein the very quantity of data
can influence, or even determine, evaluation of its information-bearing quality.
Indeed, no matter the quantity, the effective, high-quality information transmission must always
be accurate and clear, as Gates (2011) summarizes, if it is to retain value. “Detailed,
appropriate data” and “clear focus” must remain the bywords of communication, so that social
messaging does not become “just talk” or network noise. Often, re-reading one’s prospective
posting can be revealing; before tapping the “enter” key, one would do well to proofread, even
set aside a draft of the post before putting it online for everyone on the network to see.
Avoid “flooding” the network: Enough is enough
Network flooding can come in more than one way, but it is always a frustration to fellow Internet
users. That is, as has been noted, neither Facebook nor Twitter is awfully excellent at
4
separating the wheat from the chaff, the significant postings from the trivial. Too, excessive
remarks on a subject can give that subject a seeming significance that it does not have in
reality, while a more important matter has been washed over. In fact, as Fincham (2012) warns,
too many postings on a particular subject by a particular individual can “make their regular
followers feel spammed.” Newell (2013) warns: “None of us want one (other) person
monopolizing the Twitter feeds”, adding: “If anyone posts too many times…bam! They’ll be
dropped…effectively silenc(ed) forever.”
Indeed, as Newell (2013) suggests, users of the vastly and continuously expanding social
network would do well to “find the sweet spot between abandonment and inundation”,
commenting pertinently, neither ad nauseam nor ad infinitum upon postings made by others
and labeling their own postings meaningfully, rather than with cutesy, or in-group, or otherwise
obtuse tags. Fincham (2012) suggests that users of Twitter, in particular, sometimes seem to
imagine that this social network comprises a combination of a storytelling tool and a global
information network ripe for everyone’s interactive commentary. She suggests that users who
plan to be tweeting a lot during a particular period of time would do well to “give followers a
heads-up with an introductory tweet, (making them) ready for a lot of tweets from you in a short
period.” In such a manner, Fincham (2012) suggests, users’ “friends” or “followers” can choose
for themselves whether or not to attend to a temporary flood.
Keep things concise: When in doubt, leave it out
Along with avoiding a network flood, Weddle (2013) notes as well that baffling with bull is never
as successful as is wowing with wisdom, even in social media: “Multi-syllable words and
complex thoughts don’t influence as much as clearly expressed ….simple, accurate
(presentations).” Concision also means clarity, with words and phrases selected carefully so as
not to be misunderstood by anyone not in the message-sender’s cognoscenti; ambiguity will
usually annoy. As Oxford University Press Social Media Guidelines (2013) point out, the use of
industry jargon or of social media/tech lingo is not beneficial to understanding, but neither is it
smart to attempt to write/comment about areas beyond one’s expertise. Happily, Twitter’s 140-
character limit does help posters to keep things concise, but the service’s “extremely high
signal-to-noise ratio”, as the Oxford University Press (OUP) calls it, tends to make posters feel
they must cry out or repeat themselves, so as to attract interest. OUP suggests no more than
three to five tweets per day, so that the system will retain its utility as an effective broadcasting,
sharing, or advertising tool. And Fincham (2012) adds that the Twitter design of 140-characters-
or-fewer offers users an excellent opportunity to train themselves in how to write short and well.
Tenore (2012) calls Twitter “a powerful tool for writers…an electronic editor that forces us to find
a focus and make every word count—a constant reminder that it’s often harder to write short
than it is to write long.” Tweets can show that short writing can demonstrate depth, significant
weight, and strong writing in a short space, Tenore (2012) observes, giving pithy immediacy as
well as insightful outlooks on the work of others.
Acknowledge sources and resources: Give credit where/when it is due
Social networkers can be so eager to get their own words out, their own insights into the
network, that they neglect to acknowledge what triggered these words. Happily for users of
5
Twitter, the re-tweet exists, automatically making reference to a previous remark, and Facebook
posts discussion threads. But many users seem to feel, as Fincham (2012) notes, that they can
show their creativity or novel modes of thought by pretending to be the first to post something,
when in fact they are neither the first nor the very interesting. As Oxford University Press Social
Media Guidelines (2013) suggest, “active engagement” with social media will make a good
impression only when rules of “Netiquette”, social etiquette online, are attended to; users must
acknowledge sources and give credit where it is due.
In “How Not to Steal People’s Content on the Web”, Endon (2012) observes, most social media
users are eager to see that their material has been commented upon, re-tweeted, or otherwise
noticed by others. The problem arises, however, when users fail to notice whether or not
“copying is okay”; Endon warns that those who fail to notice such things may---and should—“…
receive threatening E-mails or letters and even demand that you pay them for using (their
content.” Endon offers advice on how to cite content in blog posts, on Twitter, and on Facebook,
LinkedIn, Google+, and Pinterest, with examples and citations of his own. Notably, he includes
through his blog posting on this matter certain pertinent questions, such as “Are you taking
steps to ensure you give credit where credit’s due with shared content on the internet?” and
“Like what you’ve read? Click here to subscribe…”. As Oxford University Press Social Media
Guidelines (2013) assert and reassert, copyrighted material must never be posted as one’s
own, and even in blogs and YouTube postings, copyrights can often be found. Indeed, and
once again, as has been suggested in other areas of this present discussion of the uses and
utility of various social media, putting oneself in the position of the audience will prove valuable
here; asking oneself how it might feel to see one’s carefully chosen words, one’s well-conceived
notion or layout, picture or commentary, set forth on another person’s homepage as if it
originated with that person can prove more than frustrating.
Interact in a timely way: Do it now
In an era of speed and concision, not to mention dissolution of ordinary time zones, it is not only
inventions and innovations, but the effective exploitation of those novelties, that is expected. As
Klein (2010) has suggested, most of what has generated the touted boom of “social networking”
has been “1% inspiration and 99% timeliness.” In like manner, those who exploit such
networking have grown up in an epoch of instantaneity, where waiting is not an option; updates
to Facebook and Twitter, message threads, tags, and links happen each within less than a
minute of the last, with no attention to time zone. As Gates (2011) suggests, “week-old, even
day-old information, no matter how quickly distributed, is still old information.” And as Newell
(2013) reminds, although quality, timeliness, and volume may be the evaluable measures of
blogging or other electronic communications, it is timeliness alone that remains the nec plus
ultra of the social network. No one likes to have to wait, time seems limitless online, and, as
Tenore (2012) observes, one of the particular advantages of Twitter in its recent common use
as a tool for delivering world news is its ability to transmit quick, present-tense, especially timely
immediacy. Too, access to Twitter and other social media via portable communication devices
can take advantage both of the “always-on” nature of electronic updating mechanisms and of
the ease of transmitting graphics, video, audio, and text simultaneously. “Own the media now;
the minute you stop telling your story, the media tells it for you”, advise Chang et al. (2012).
6
Of course, the need for timeliness should be weighed against the aforementioned warning not to
enter electronic information into the network in a simple signal-response, reactive way. It is not
in military operations alone that “the first report is always wrong,” as Bratt, et al. (2010) state,
adding that the second report is often frequently wrong, too. Thus, just as the social media user
is advised to find the sweet spot between abandonment and inundation with respect to quality
and quantity of his postings, so should he seek the temporal sweet spot lying between too-quick
and too-slow.
Conclusions and consequences
The Poynter Institute’s Kelly Fincham (2012) warns that one of most problematic features of
social networking, apart from its ease of use and convenience, is its tendency to be considered,
particularly among young people, as fleeting, not serious, not really “significant” or “legitimate.”
Alternatively, universities have accepted, almost begrudgingly, that they “have no choice but to
integrate these platforms into their marketing and communications plans” (Klamm, 2011).
Indeed, Klamm (2011) points out, “a recent study showed that an astounding 100% of
universities have a social media presence.” And so it appears, although “the 18-to-24-year old
college student demographic”, as Klamm calls it, would use social media regularly for quick,
not-always-significant minor acquaintance-connecting, the older, college-educated
administrative demographic has come to take these media with major seriousness.
Unfortunately, institutional staff seems more often than not to have failed to understand what to
do and how to do it online, as Pidaparthy (2011) reports. Pidaparthy describes institutional
Websites with outdated faculty and staff lists, curricula that are not offered, and images not
representative of the schools in question. Thus, it seems, although institutions may “have an
online presence”, that presence is not always as effective or as interactive as it might be.
Tilsley (2012) notes survey results indicating that more than three quarters of current and
prospective students “check their Facebook at least once a day”, and more than two thirds of
those surveyed “use social media to research colleges”, but these are probably not sufficient
reasons for institutions simply to “have a social media presence” alongside an online one.
Rather, Tilsley notes, it is what the entire institutional staff does with social media that really
counts, not just to prospective students but to currently enrolled ones and to the staff that would
interact with them. Indeed, as Pidaparthy (2011) reports, “…a robust social media campaign,
along with such creative features as student-run blogs, can lure…while a stale online presence
can turn off.” In fact, Pidaparthy adds, the organization Student Advisor.com has created a
ranking of the “Top 100 Social Media Colleges” to classify institutions “on how well they use
social media.” But even though the Pidaparthy and Tilsley pieces quote students as saying that
they “like” or even prefer to get information about colleges through social media, stating that
such information is easier to access, faster to peruse, and even “more reliable” than might be
the traditional slick marketing tools of the past, these same institutions are, for the most part,
using the social media only for advertising themselves (Osborne, 2012).
With all the interest in new media and institutions’ most effective exploitation of them, it might be
asked if the communication/media tail is wagging the communicated/information dog. Using an
alternative metaphor, Pidaparthy points out that once an institution does decide to join
7
Facebook, Twitter, YouTube, Pinterest, or another social medium, that institution is opening a
very active can of worms whose worms must be tended to regularly. “Students will make a
judgment about a university if it is not current and responsive online. When their post doesn’t
get answered, they aren’t interested anymore.” Socially mediated attention spans are
notoriously ephemeral. It therefore appears that, in the twenty-first century as in epochs past,
we recognize often without realizing it that structural changes are taking place in our affairs that
have been provoked by new modes of message transmission. McLuhan’s 1964 observations
that new media can play with the conceptions of speed and time so that a world of sequence
and connections can be transformed into a universe of creative configuration and structure are
indeed being re-echoed more than five decades on. .
References
Bratt, E., Domeshek, E., and Durlach, P. (2010). The first report is always wrong, and other ill-
defined aspects of the army battle captain domain. Stanford University, Stottler-Henke
Associates, Inc. Retrieved
http://godel.stanford.edu/twiki/pub/Public/SemlabPublications/first_report_wrong_illdef_its10.pdf
Bryant, J. and Oliver, M. (2009). Media effects: Advances in theory and research. New York:
Taylor and Francis.
Chang, H., Dailide, A., and Walker, S. (2012). Communication in crisis: Social media and
emergency communication in the Green River Valley. Retrieved
http://depts.washington.edu/mitigate/papers/Communication%20in%20Crisis.pdf
Dean, J. (2012). Smartphone user survey: A glimpse into the mobile lives of college students.
Retrieved http://testkitchen.colorado.edu/projects/reports/smartphone/smartphone-survey/
Endon, C. (2012). How to not steal people’s content on the Web. HubSpot’s Marketing Blog.
Retrieved http://blog.hubspot.com/blog/tabid/6307/bid/33098/How-Not-to-Steal-People-s-
Content-on-the-Web.aspx
Fincham, K. (2012). What every young journalist should know about using Twitter. Poynter.org.
Retrieved http://www.poynter.org/how-tos/journalism-education/188408/what-every-young-
journalist-should-know-about-using-twitter/
Gates, J. (2011). There’s talk, and there’s communication. Govloop. Retrieved
http://www.govloop.com/profiles/blogs/there-s-talk-and-there-s-communication
Grimm, J. (2013). What skills do journalists need to build online communities? Poynter.org.
Retrieved http://www.poynter.org/how-tos/career-development/ask-the-recruiter/200589/live-
chat-today-what-skills-do-journalists-need-to-build-online-communities/
Huffington Post (2013). Hate-filled hashtag reveals new behavior.
http://quebec.huffingtonpost.ca/2013/02/03/ungaymort-le-hashtag-haineux-samedi-soir-revele-
nouveaux-comportements-twittos_n_2610301.html?ncid=edlinkusaolp00000009
8
Kelly, K. (2012). Don’t use too many hashtags. Retrieved
http://kevinkellyohio.wordpress.com/2012/07/19/dont-use-too-many-hashtags/
Klamm, D. (2011). 6 best practices for universities embracing social media. Mashable.
Retrieved http://mashable.com/2011/10/10/universities-social-media/
Klein, E. (2010). Facebook: Where genius was 1% inspiration, 99% timeliness. In The
Washington Post, Post Business. 9 October. Retrieved http://www.washingtonpost.com/wp-
dyn/content/article/2010/10/08/AR2010100804303.html
McLuhan, M. (1964). Understanding media: The extensions of man. London: Routledge.
Newell, G. (2013). Social networking --- The thin line between informing and annoying. 602
Communications. Retrieved http://602communications.com/2010/10/social-networks-the-thin-
line-between-informing-and-annoying/
Osborne, C. (2012). How do universities use social media successfully? ZDNet. Retrieved
http://www.zdnet.com/blog/igeneration/how-do-universities-use-social-media-successfully/15059
Oxford University Press. (2013). Marketing and social media. Retrieved
http://www.oup.co.uk/academic/authors/salesandmarketing/socialmedia/
Oxford University Press (2013). Social media guidelines. Retrieved
http://www.oup.com/us/corporate/authorresources/socialmedia/?view=usa
Pidaparthy, U. (2011). How colleges use and misuse social media. CNN Special Reports.
Retrieved http://www.cnn.com/2011/10/20/tech/social-media/universities-social-media
Sawahel, W. (2013). Africa is the most dynamic e-learning market on the planet. University
World News. Retrieved http://www.universityworldnews.com/article.php?
story=20130125105755921
Squires, L. (2007). College students in multimedia relationships: Choosing, using, and fusing
multimedia technologies. Retrieved
http://aladinrc.wrlc.org/bitstream/handle/1961/5232/wpsquires.pdf?sequence=1
Stanford Encyclopedia of Philosophy (2013). http://plato.stanford.edu/entries/ethics-social-
networking/
Tenore, M. (2012). What Twitter teaches us about writing short & well. Retrieved
http://www.poynter.org/how-tos/newsgathering-storytelling/186371/what-twitter-teaches-us-
about-writing-short-well/
Tilsley, A. (2012). Social networks and college choices. Inside Higher Ed. 24 September.
Retrieved http://www.insidehighered.com/news/2012/09/24/survey-examines-how-prospective-
students-use-social-media-research-colleges
9
Weddle, P. (20013). Three simple rules for E-mailing potential employers. CareerCast.
Retrieved http://www.careercast.com/career-news/three-simple-rules-emailing-potential-
employers
APPENDIX
Social media best practices, summarized from Oxford University Press
Here are a few things to bear in mind as you develop your presence on the social web.
DOs DON'Ts
• Showcase thought/ideas leadership.
• Post frequent updates: A good rule of
thumb is weekly+ for
blogs/YouTube/Facebook, and daily+
for Twitter.
• Be friendly and casual: Social posts will
appear among posts from users' friends
and family.
• Be human: Have a (consistent & clear)
perspective and voice.
• Be concise: Get to the point before
losing readers' interest.
• Be timely: Respond to comments and
queries as soon as possible, but in a
well-considered way; avoid simply
“reacting”.
• Use social etiquette: acknowledge
sources and give credit where it's due
via. attributions, retweets, and so on;
follow others and they may follow you!
• Stick to what you know: when writing a
blog article, stick to your areas of
expertise.
• Use overly familiar or potentially offensive language.
• Use industry or social media/tech jargon.
• Sound like a different person on different
channels/media.
• Be overly promotional of yourself or your work.
• Post too frequently; this can be seen as 'spamming'
or ‘flooding’.
• Write about topics outside your area of expertise.
• Misrepresent yourself or your qualifications.
• Post copyrighted material without proper clearance
and attribution.
• Underestimate the resources—in terms of content
and time—required to launch and maintain a social
presence over the long term. Don’t forget: (a) to
update; (b) to realize that first reports are generally
wrong/inaccurate/incomplete
10

More Related Content

What's hot

Social media in education advantages & disadvantages
Social media in education advantages & disadvantagesSocial media in education advantages & disadvantages
Social media in education advantages & disadvantagesej-luna
 
Why schools are spooked by social media
Why schools are spooked by social mediaWhy schools are spooked by social media
Why schools are spooked by social mediaDenis Masseni
 
Negative impacts of social media as my space and facebook on teenagers in th...
Negative impacts of social media as my space and facebook on teenagers  in th...Negative impacts of social media as my space and facebook on teenagers  in th...
Negative impacts of social media as my space and facebook on teenagers in th...GeorgeDolezal
 
the effect of social media in our daily life
the effect of social media in our daily lifethe effect of social media in our daily life
the effect of social media in our daily lifeSudipta Saha
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youthDeepti Kulkarni
 
Social Media & Mobile Marketing: Recruitment Strategy Opportunities
Social Media & Mobile Marketing: Recruitment Strategy OpportunitiesSocial Media & Mobile Marketing: Recruitment Strategy Opportunities
Social Media & Mobile Marketing: Recruitment Strategy OpportunitiesBob Johnson, Ph.D.
 
Socialmediaeducation
SocialmediaeducationSocialmediaeducation
Socialmediaeducationjoban sandhu
 
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSIMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSbhazz
 
Social media-in-the-workplace
Social media-in-the-workplaceSocial media-in-the-workplace
Social media-in-the-workplaceVirginia Bautista
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
MarketResearchEssay (1)
MarketResearchEssay (1)MarketResearchEssay (1)
MarketResearchEssay (1)Tyler Horowitz
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...Kasthuripriya Nanda Kumar
 
disadvantages of Social networking
 disadvantages of Social networking  disadvantages of Social networking
disadvantages of Social networking shrikant5
 

What's hot (19)

Social media in education advantages & disadvantages
Social media in education advantages & disadvantagesSocial media in education advantages & disadvantages
Social media in education advantages & disadvantages
 
Why schools are spooked by social media
Why schools are spooked by social mediaWhy schools are spooked by social media
Why schools are spooked by social media
 
Negative impacts of social media as my space and facebook on teenagers in th...
Negative impacts of social media as my space and facebook on teenagers  in th...Negative impacts of social media as my space and facebook on teenagers  in th...
Negative impacts of social media as my space and facebook on teenagers in th...
 
the effect of social media in our daily life
the effect of social media in our daily lifethe effect of social media in our daily life
the effect of social media in our daily life
 
Effect of social media on youth
Effect of social media on youthEffect of social media on youth
Effect of social media on youth
 
Effects of Social Media
Effects of Social MediaEffects of Social Media
Effects of Social Media
 
Nabelon
NabelonNabelon
Nabelon
 
Social Media & Mobile Marketing: Recruitment Strategy Opportunities
Social Media & Mobile Marketing: Recruitment Strategy OpportunitiesSocial Media & Mobile Marketing: Recruitment Strategy Opportunities
Social Media & Mobile Marketing: Recruitment Strategy Opportunities
 
Surya
SuryaSurya
Surya
 
Socialmediaeducation
SocialmediaeducationSocialmediaeducation
Socialmediaeducation
 
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTSIMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
IMPACT OF SOCIAL NETWORKING SITES AMONG STUDENTS
 
Social media-in-the-workplace
Social media-in-the-workplaceSocial media-in-the-workplace
Social media-in-the-workplace
 
FaceBook_Effects edited
FaceBook_Effects editedFaceBook_Effects edited
FaceBook_Effects edited
 
Assignment 5
Assignment 5Assignment 5
Assignment 5
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
MarketResearchEssay (1)
MarketResearchEssay (1)MarketResearchEssay (1)
MarketResearchEssay (1)
 
vijayalaxmi.sn
vijayalaxmi.snvijayalaxmi.sn
vijayalaxmi.sn
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
 
disadvantages of Social networking
 disadvantages of Social networking  disadvantages of Social networking
disadvantages of Social networking
 

Viewers also liked

Niso dn l13eternalgoingppf
Niso dn l13eternalgoingppfNiso dn l13eternalgoingppf
Niso dn l13eternalgoingppfkatherine watson
 
Niso dn lg13inindividualizationncollabf
Niso dn lg13inindividualizationncollabfNiso dn lg13inindividualizationncollabf
Niso dn lg13inindividualizationncollabfkatherine watson
 
Iniciar bien el dia escritura
Iniciar bien el dia escrituraIniciar bien el dia escritura
Iniciar bien el dia escrituraminatista
 
Automated Test Design: Single Use Vs Reusable Tests
Automated Test Design: Single Use Vs Reusable TestsAutomated Test Design: Single Use Vs Reusable Tests
Automated Test Design: Single Use Vs Reusable TestsJosh Grant
 
Managing systems change @ LSE
Managing systems change @ LSEManaging systems change @ LSE
Managing systems change @ LSEAmy Warner
 
¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...
¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...
¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...Sendoa Ballesteros Peña
 
Datalift, une plateforme Linked Data, Retour d'expériences
Datalift, une plateforme Linked Data, Retour d'expériencesDatalift, une plateforme Linked Data, Retour d'expériences
Datalift, une plateforme Linked Data, Retour d'expériencesSemWebPro
 
As epidemias mais mortais da história
As epidemias mais mortais da históriaAs epidemias mais mortais da história
As epidemias mais mortais da históriaDoug Caesar
 
Niso dnl13 individualizationcollabf
Niso dnl13 individualizationcollabfNiso dnl13 individualizationcollabf
Niso dnl13 individualizationcollabfkatherine watson
 
Posiciones señaladas en física i 2
Posiciones señaladas en física i 2Posiciones señaladas en física i 2
Posiciones señaladas en física i 2rafayeomans
 

Viewers also liked (16)

Leadership
LeadershipLeadership
Leadership
 
Niso dn l13eternalgoingppf
Niso dn l13eternalgoingppfNiso dn l13eternalgoingppf
Niso dn l13eternalgoingppf
 
Venkat resume (venk)
Venkat resume (venk)Venkat resume (venk)
Venkat resume (venk)
 
Niso dn lg13inindividualizationncollabf
Niso dn lg13inindividualizationncollabfNiso dn lg13inindividualizationncollabf
Niso dn lg13inindividualizationncollabf
 
Iniciar bien el dia escritura
Iniciar bien el dia escrituraIniciar bien el dia escritura
Iniciar bien el dia escritura
 
Gbi power point
Gbi power pointGbi power point
Gbi power point
 
Actividad 3
Actividad 3Actividad 3
Actividad 3
 
7 consejos
7 consejos7 consejos
7 consejos
 
Automated Test Design: Single Use Vs Reusable Tests
Automated Test Design: Single Use Vs Reusable TestsAutomated Test Design: Single Use Vs Reusable Tests
Automated Test Design: Single Use Vs Reusable Tests
 
Managing systems change @ LSE
Managing systems change @ LSEManaging systems change @ LSE
Managing systems change @ LSE
 
¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...
¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...
¿INFLUYE EL ESMALTE DE UÑAS EN LOS VALORES DE SATURACIÓN DE OXÍGENO EN PACIEN...
 
October 2014 Patent Luncheon Slides
October 2014 Patent Luncheon SlidesOctober 2014 Patent Luncheon Slides
October 2014 Patent Luncheon Slides
 
Datalift, une plateforme Linked Data, Retour d'expériences
Datalift, une plateforme Linked Data, Retour d'expériencesDatalift, une plateforme Linked Data, Retour d'expériences
Datalift, une plateforme Linked Data, Retour d'expériences
 
As epidemias mais mortais da história
As epidemias mais mortais da históriaAs epidemias mais mortais da história
As epidemias mais mortais da história
 
Niso dnl13 individualizationcollabf
Niso dnl13 individualizationcollabfNiso dnl13 individualizationcollabf
Niso dnl13 individualizationcollabf
 
Posiciones señaladas en física i 2
Posiciones señaladas en física i 2Posiciones señaladas en física i 2
Posiciones señaladas en física i 2
 

Similar to Niso dn l13eternalgoing socialff

Impact Of Social Media On Youth And Education
Impact Of Social Media On Youth And EducationImpact Of Social Media On Youth And Education
Impact Of Social Media On Youth And EducationKimberly Williams
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt Sudhanshu Sandhir
 
Social Media in Education
Social Media in EducationSocial Media in Education
Social Media in EducationOnasanya2014
 
Media Affecting Relations .docx
Media Affecting Relations                                         .docxMedia Affecting Relations                                         .docx
Media Affecting Relations .docxARIV4
 
Social Media in Education
Social Media in EducationSocial Media in Education
Social Media in EducationOnasanya2014
 
eduWeb 2009
eduWeb 2009eduWeb 2009
eduWeb 2009TargetX
 
Science Of Friendship
Science Of FriendshipScience Of Friendship
Science Of Friendshipalyshansmith
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracksglairerabida
 
What is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdfWhat is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdfDavid Due
 
Privacy Matters
Privacy MattersPrivacy Matters
Privacy MattersJames Kane
 
Social media is beneficial
Social media is beneficialSocial media is beneficial
Social media is beneficialDeiondre Coleman
 
social media usage impact on youth .docx file
social media usage impact on youth .docx filesocial media usage impact on youth .docx file
social media usage impact on youth .docx fileSudhanshu Sandhir
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputationJoann Noel
 

Similar to Niso dn l13eternalgoing socialff (19)

Impact Of Social Media On Youth And Education
Impact Of Social Media On Youth And EducationImpact Of Social Media On Youth And Education
Impact Of Social Media On Youth And Education
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
 
Social Media for Disseminating Research
Social Media for Disseminating ResearchSocial Media for Disseminating Research
Social Media for Disseminating Research
 
Social media
Social media Social media
Social media
 
Social Media in Education
Social Media in EducationSocial Media in Education
Social Media in Education
 
Social Media in Education
Social Media in EducationSocial Media in Education
Social Media in Education
 
Media Affecting Relations .docx
Media Affecting Relations                                         .docxMedia Affecting Relations                                         .docx
Media Affecting Relations .docx
 
Social Media in Education
Social Media in EducationSocial Media in Education
Social Media in Education
 
Growing Up Wired
Growing Up WiredGrowing Up Wired
Growing Up Wired
 
eduWeb 2009
eduWeb 2009eduWeb 2009
eduWeb 2009
 
Science Of Friendship
Science Of FriendshipScience Of Friendship
Science Of Friendship
 
Social Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional TracksSocial Media - Empowerment Tech: ICT for Professional Tracks
Social Media - Empowerment Tech: ICT for Professional Tracks
 
What is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdfWhat is social media_ The impact of social media.pdf
What is social media_ The impact of social media.pdf
 
Privacy Matters
Privacy MattersPrivacy Matters
Privacy Matters
 
How does it feel to participate in public?
How does it feel to participate in public?How does it feel to participate in public?
How does it feel to participate in public?
 
Social media is beneficial
Social media is beneficialSocial media is beneficial
Social media is beneficial
 
How does it feel to participate in public?
How does it feel to participate in public?How does it feel to participate in public?
How does it feel to participate in public?
 
social media usage impact on youth .docx file
social media usage impact on youth .docx filesocial media usage impact on youth .docx file
social media usage impact on youth .docx file
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputation
 

More from katherine watson

Hi lg18a da vinci code 6innof
Hi lg18a da vinci code 6innofHi lg18a da vinci code 6innof
Hi lg18a da vinci code 6innofkatherine watson
 
Ccc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatfCcc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatfkatherine watson
 
Fr180handbook ccc2016 rmb (2)
Fr180handbook ccc2016 rmb (2)Fr180handbook ccc2016 rmb (2)
Fr180handbook ccc2016 rmb (2)katherine watson
 
Ccc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatfCcc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatfkatherine watson
 
Fr180handbook ccc2016 rm bkwat
Fr180handbook ccc2016 rm bkwatFr180handbook ccc2016 rm bkwat
Fr180handbook ccc2016 rm bkwatkatherine watson
 
Jax16 lg15fallcar aacara29novff
Jax16 lg15fallcar aacara29novffJax16 lg15fallcar aacara29novff
Jax16 lg15fallcar aacara29novffkatherine watson
 
Lg15stem whaddaya know29octf
Lg15stem whaddaya know29octfLg15stem whaddaya know29octf
Lg15stem whaddaya know29octfkatherine watson
 
Lg15fall whaddaya knowb 27octf
Lg15fall whaddaya knowb 27octfLg15fall whaddaya knowb 27octf
Lg15fall whaddaya knowb 27octfkatherine watson
 
Lg15fall cara à cara30octf
Lg15fall cara à cara30octfLg15fall cara à cara30octf
Lg15fall cara à cara30octfkatherine watson
 
Nisod ja15fuzznfinessefour wayspptff
Nisod ja15fuzznfinessefour wayspptffNisod ja15fuzznfinessefour wayspptff
Nisod ja15fuzznfinessefour wayspptffkatherine watson
 
Nisod lg15inno sizemattpptf
Nisod lg15inno sizemattpptfNisod lg15inno sizemattpptf
Nisod lg15inno sizemattpptfkatherine watson
 
Lg stem14what’s to like5nov
Lg stem14what’s to like5novLg stem14what’s to like5nov
Lg stem14what’s to like5novkatherine watson
 
Lg stem14gauging engagement four waysp26octf
Lg stem14gauging engagement four waysp26octfLg stem14gauging engagement four waysp26octf
Lg stem14gauging engagement four waysp26octfkatherine watson
 

More from katherine watson (20)

Hi lg18a da vinci code 6innof
Hi lg18a da vinci code 6innofHi lg18a da vinci code 6innof
Hi lg18a da vinci code 6innof
 
Hi 17pragmaticprejudice6
Hi 17pragmaticprejudice6Hi 17pragmaticprejudice6
Hi 17pragmaticprejudice6
 
Ccc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatfCcc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatf
 
Fr180handbook ccc2016 rmb (2)
Fr180handbook ccc2016 rmb (2)Fr180handbook ccc2016 rmb (2)
Fr180handbook ccc2016 rmb (2)
 
Ccc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatfCcc frenchstudenthandbook185 canvas_rm_bkwatf
Ccc frenchstudenthandbook185 canvas_rm_bkwatf
 
Fr180handbook ccc2016 rm bkwat
Fr180handbook ccc2016 rm bkwatFr180handbook ccc2016 rm bkwat
Fr180handbook ccc2016 rm bkwat
 
Jax16 lg15fallcar aacara29novff
Jax16 lg15fallcar aacara29novffJax16 lg15fallcar aacara29novff
Jax16 lg15fallcar aacara29novff
 
Jax16 lg15stewhatstoknowf
Jax16 lg15stewhatstoknowfJax16 lg15stewhatstoknowf
Jax16 lg15stewhatstoknowf
 
Jax16 lg15whaknowf
Jax16 lg15whaknowfJax16 lg15whaknowf
Jax16 lg15whaknowf
 
Jax16 lg15fallcar aecarof
Jax16 lg15fallcar aecarofJax16 lg15fallcar aecarof
Jax16 lg15fallcar aecarof
 
Lg15stem whaddaya know29octf
Lg15stem whaddaya know29octfLg15stem whaddaya know29octf
Lg15stem whaddaya know29octf
 
Lg15fall whaddaya knowb 27octf
Lg15fall whaddaya knowb 27octfLg15fall whaddaya knowb 27octf
Lg15fall whaddaya knowb 27octf
 
Lg15fall cara à cara30octf
Lg15fall cara à cara30octfLg15fall cara à cara30octf
Lg15fall cara à cara30octf
 
Lg15fall car aacara21octf
Lg15fall car aacara21octfLg15fall car aacara21octf
Lg15fall car aacara21octf
 
Nisod ja15fuzznfinessefour wayspptff
Nisod ja15fuzznfinessefour wayspptffNisod ja15fuzznfinessefour wayspptff
Nisod ja15fuzznfinessefour wayspptff
 
Nisod lg15inno sizemattpptf
Nisod lg15inno sizemattpptfNisod lg15inno sizemattpptf
Nisod lg15inno sizemattpptf
 
Lg stem14what’s to like5nov
Lg stem14what’s to like5novLg stem14what’s to like5nov
Lg stem14what’s to like5nov
 
Lg stem14gauging engagement four waysp26octf
Lg stem14gauging engagement four waysp26octfLg stem14gauging engagement four waysp26octf
Lg stem14gauging engagement four waysp26octf
 
Lg stem14fiancésf (1)
Lg stem14fiancésf (1)Lg stem14fiancésf (1)
Lg stem14fiancésf (1)
 
Nisod14 signsff
Nisod14 signsffNisod14 signsff
Nisod14 signsff
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Niso dn l13eternalgoing socialff

  • 1. Eternal sunshine for spotless minds: Seven warnings for networking online Katherine Watson, Coastline Community College, Fountain Valley, CA 92708 Bizarrissime@gmail.com Born into an information-abundant world enhanced by access to multiple forms of media, more than half of today’s college students take regular advantage of electronic access to “news”, whether personal, public, or private, using audio, video, or text (Dean, 2012). Indeed, in an epoch when the university has become not so much a marketplace of intellectual, professorial or institutionally-generated ideas as it has become a sunny, “learner-driven bazaar” (Squires, 2007), the school that would remain not only “relevant” but societally integrated is expected to retain both an “ordinary online presence” and a “socially mediated” one, with updated, efficiently delivered news and data made available continuously via multiple media. Thus, it has become clear not only that the lion’s share of the world’s college undergraduates seeking degrees in the twenty-first century have grown up in a multimedia-mediated world. As well, the new, learner-driven “marketplace” of education, these students typically demand the flexibility, self-pacedness, and ease of access defining what they see as the most convenient, online curriculum. Indeed, millions of new acolytes have been joining academe exclusively online since the early 2000’s, particularly in Asia and Africa (Sawahel, 2013), where recently improved fiber-optic connectivity and readily available “self-paced e-learning products” have rendered learning not only possible in places where it never was in the past but practicable and practical in ways unheard-of before 2005. But many newly connected individuals, whether they be self-directed students or academic officials, still fail to realize how important or enduring are the electronic communications that support the online learning process. In particular, their increasing exploitation of such “social media” as Twitter, Facebook, Instagram, YouTube, and LinkedIn, to name a few, has led to misunderstanding and confusion in many cases, and to embarrassment and scandal in others. Indeed, the Florida (Usa)-based Poynter Institute suggests that anyone who would post any information online in any format or through any medium (e.g., audio, video, text) consider seven reminders before tapping the “enter” key: 1. Assume that everything is public and perennial 2. Keep things professional, with a purpose 3. Give information rather than simple reactions 4. Avoid flooding the network 5. Keep things concise 6. Acknowledge sources/resources 7. Interact in a timely way 1
  • 2. These seven points should be considered before, during, and after information is posted, advises Poynter. Each point comprises communicative impact, and each connects, both figuratively and literally, to the next. Assume that everything is public and perennial: What’s out there stays out there Although popular, if not universal, wisdom holds that one can find out just about anything about just about anything in the wide-open world of online information transmission, many users of such electronic social networks as Twitter and Facebook retain “a level of comfort” with these services and their so-called “privacy settings” that facilitates---in fact, encourages---a belief that all communication that takes place in these realms is at once private, harmlessly entertaining, secure, and immutable to changes that may be fabricated by others. As Fincham (2012) has written for The Poynter Institute, however, users must beware: Social media postings are frequently evaluated or criticized in ways not necessarily planned by their posters. Notably, Weddle (2013) reports, “…over a third of HR professionals have visited social networking sites to look for information about employment candidates. Personal info and videos posted on Facebook, Twitter, YouTube, and other sites are now considered fair game when employers conduct ‘background checks’ on job seekers.” Weddle advises social networkers to “represent themselves well”, attending to the public image being conveyed. Even the seemingly short, insignificant posting comprises a tool for outsider evaluation. And Fincham (2012) counsels twenty-first century educational institutions to remind students as well as staff that, while “(Some people) think it doesn’t matter what they say, we need to change that mindset…Twitter (and Facebook) are a permanent public record (and) will be around a long, long time.” Fincham (2012) cites new-media journalism professors as having become particularly assiduous in promoting public-minded “future-thinking”; journalistic social networkers in particular are invited to imagine a world ten years from now: “Will this get me in trouble?” they must ask themselves. And if there is any question, then they should keep their thoughts to themselves. Indeed, the wait-awhile test might well be applied to all social media postings, even though posters may think that they absolutely must comment instantly on things; often, even a short wait can be educational, enlightening, perspective-giving. Waiting a moment before clicking “enter” can also help to warn social media users of a too- infrequently considered distinction about keeping not-to-be-made-public thoughts to themselves in a twenty-first century world where boundaries of time and space scarcely exist. That is, users must remain alert that the divergence separating public from private is not the same one that distinguishes anonymous v. recognized. Appreciation of the former differentiation permits people to yammer loudly on cellphones in public even while retaining “private” conversational intimacy. Attention to the latter, for its part, calls for awareness of one’s audience; the user of social media must remain conscious that receivers of his message may not share his sense of humor, his point of view, his notion of what is significant or insignificant, casual or calculated. Keep things professional, with a purpose: Remember why It is seductive to retain the notion that electronic social media are indeed just casual, harmless, and social. Fincham (2012) reports that even in many schools of journalism in the United States, 2
  • 3. students still “only see (the network) as a private messaging service to use with close friends”. But in an era when, as Weddle (2013) notes, employers have come to exploit electronic social media as extra, enlightening, modern-era tools for ordinating innumerable applicants, students should keep in mind that, as Fincham (2012) reports from the world of professional journalism, Twitter and Facebook accounts “…will generally be seen as reflective …”. Thus, we are counseled to bear in mind not only that everything is public online but also that subtle, often unstated societal differences still exist not only between the aforementioned public and private, anonymous and recognized but between the formal v. informal and the professional v. unprofessional. Indeed, Fincham (2012) continues, social networkers must recognize that such services as Facebook, Twitter, YouTube, and Instagram can cast new light upon themselves; users must remain on top of their multimedia (inter)activity so as to “add value” and not detract from the image they wish to retain or broadcast professionally. As Thornton (2012) states, “It is so not about what you had for lunch or what color your nails are…” Users of social networks must remember that the networks themselves use no culling tools; the banal and the vital may lie side-by-side, with neither accorded more or less social media ‘weight’”. Like a new tattoo, the image that one exhibits online has no background/foreground, nor any really effective way of de-imaging an image. Fincham (2012) points out that as more and more professionals take advantage of electronic media, it is becoming increasingly important for users to attend to something beyond the simple image or to the collage of images comprising Facebook or Twitter histories; ethics must be considered, too. Each post must be evaluated before it is dispatched, not only for its adherence to principles of humane behavior but for its effect upon outsiders’ trust. As the Stanford Encyclopedia of Philosophy has noted, “social networking ethics” in the twenty-first century concern “…virtually every type of significant social bond or role: friend-to-friend, parent-to-child, co-worker-to co-worker, employer-to-employee, teacher-to-student, neighbor-to-neighbor, seller- to-buyer, and doctor-to-patient, to offer just a partial list” (2013). Just as journalism professionals advise young writers to imagine a world ten years on as a test of whether or not a particular posting is a good idea in a socially mediated world, so should anyone who would tap “enter” consider the posting from the viewer’s or reader’s perspective. The “visitor from another planet” test might well be applied in the case of social media ethics: Imagine yourself as such a visitor reading/viewing your Facebook postings, your Twitter tweets, or the like, and then decide if you should really click “enter”…or not. And finally, it must be recalled that retaining a professional tone is important in all communication, whether in formal writing, in speaking, or online. As Weddle (2013) suggests, those social networkers who would respond to others’ postings should “follow the lead” of the original poster before making their own remarks, as long as the “lead” in question merits following. In short, as has been advocated earlier, social media users would do well to wait and weigh possible consequences before posting their remarks too quickly or reactively. Give information, rather than simple reactions: Remember when & what The speed and the lively nature of multimedia communication can easily trigger rapid, often unthinking, responses that may be categorized as automatic, trigger-happy reactions more than 3
  • 4. as well-considered, communication-rich replies. Too, just as social media messaging tone is most effective and least offensive when it remains professional, so must the message-maker remind himself that the tone of a reaction tends more often than not to be self-interested, subjective, rather than constructively objective. That is, for instance, the outsider---or, indeed, the aforementioned visitor from another planet-- who would read the reactive post will find out more about the person doing the posting than he will discover about the matter that is supposedly under discussion. The social networker who would take professional, useful advantage of the systems would do well to retain as objective an air as possible in his postings, using concrete, specific terms, unbiased language, and genuine information, data, or facts. Opinions, if they are posted, should be marked as such. And naturally, as the Oxford University Press Social Networking Guidelines state, networkers should “stick to what (they) know when writing”, avoiding posts that may misrepresent or give an inaccurate image, especially in the literal sense. Twitter and Facebook provide easy systems for sharing images or links, videos or audio. And as Newell (2013) states, “We can post everything that comes down the pike, and so we do.” But, Newell continues, “The trick is to post the relevant, but not the annoying.” But, as Fincham (2012) adds, remarks, photos, and URLs are really useful “only when they add value to an online identity”, rather than serving as wordless, simplistic reactions or elliptical rejoinders. And as the Huffington Post has pointed out, Twitter and Instagram seem even to invite hashtags, those “#” symbols preceding what someone has decided are single-word labels for “trending topics”; the hashtag user’s goal is to lead others into a (usually-Twitter-based) search of commentary on the topic in question. But with no accepted rules on how to use them, hashtags can be attached to things that posters may wish to call their own but that may not exactly be their own, just to attract more comments to their postings and grow their groups of “followers.” Kelly (2012) is one of numerous multiple-media mavens to warn, however, that using three or more such tags in a 140-character post tends to be frustrating, distracting, and frequently counter-productive, referring the reader more often away from the original posting that into it. “Clues” must be given within the tweet or social media posting, suggests Fincham (2012), so that readers will be able to know the gist of the post without having to click or scroll. Too, Fincham (2012) adds, each social medium must be recognized “as part of a bigger picture”; the media altogether can have “a volumizing effect”, she notes, wherein the very quantity of data can influence, or even determine, evaluation of its information-bearing quality. Indeed, no matter the quantity, the effective, high-quality information transmission must always be accurate and clear, as Gates (2011) summarizes, if it is to retain value. “Detailed, appropriate data” and “clear focus” must remain the bywords of communication, so that social messaging does not become “just talk” or network noise. Often, re-reading one’s prospective posting can be revealing; before tapping the “enter” key, one would do well to proofread, even set aside a draft of the post before putting it online for everyone on the network to see. Avoid “flooding” the network: Enough is enough Network flooding can come in more than one way, but it is always a frustration to fellow Internet users. That is, as has been noted, neither Facebook nor Twitter is awfully excellent at 4
  • 5. separating the wheat from the chaff, the significant postings from the trivial. Too, excessive remarks on a subject can give that subject a seeming significance that it does not have in reality, while a more important matter has been washed over. In fact, as Fincham (2012) warns, too many postings on a particular subject by a particular individual can “make their regular followers feel spammed.” Newell (2013) warns: “None of us want one (other) person monopolizing the Twitter feeds”, adding: “If anyone posts too many times…bam! They’ll be dropped…effectively silenc(ed) forever.” Indeed, as Newell (2013) suggests, users of the vastly and continuously expanding social network would do well to “find the sweet spot between abandonment and inundation”, commenting pertinently, neither ad nauseam nor ad infinitum upon postings made by others and labeling their own postings meaningfully, rather than with cutesy, or in-group, or otherwise obtuse tags. Fincham (2012) suggests that users of Twitter, in particular, sometimes seem to imagine that this social network comprises a combination of a storytelling tool and a global information network ripe for everyone’s interactive commentary. She suggests that users who plan to be tweeting a lot during a particular period of time would do well to “give followers a heads-up with an introductory tweet, (making them) ready for a lot of tweets from you in a short period.” In such a manner, Fincham (2012) suggests, users’ “friends” or “followers” can choose for themselves whether or not to attend to a temporary flood. Keep things concise: When in doubt, leave it out Along with avoiding a network flood, Weddle (2013) notes as well that baffling with bull is never as successful as is wowing with wisdom, even in social media: “Multi-syllable words and complex thoughts don’t influence as much as clearly expressed ….simple, accurate (presentations).” Concision also means clarity, with words and phrases selected carefully so as not to be misunderstood by anyone not in the message-sender’s cognoscenti; ambiguity will usually annoy. As Oxford University Press Social Media Guidelines (2013) point out, the use of industry jargon or of social media/tech lingo is not beneficial to understanding, but neither is it smart to attempt to write/comment about areas beyond one’s expertise. Happily, Twitter’s 140- character limit does help posters to keep things concise, but the service’s “extremely high signal-to-noise ratio”, as the Oxford University Press (OUP) calls it, tends to make posters feel they must cry out or repeat themselves, so as to attract interest. OUP suggests no more than three to five tweets per day, so that the system will retain its utility as an effective broadcasting, sharing, or advertising tool. And Fincham (2012) adds that the Twitter design of 140-characters- or-fewer offers users an excellent opportunity to train themselves in how to write short and well. Tenore (2012) calls Twitter “a powerful tool for writers…an electronic editor that forces us to find a focus and make every word count—a constant reminder that it’s often harder to write short than it is to write long.” Tweets can show that short writing can demonstrate depth, significant weight, and strong writing in a short space, Tenore (2012) observes, giving pithy immediacy as well as insightful outlooks on the work of others. Acknowledge sources and resources: Give credit where/when it is due Social networkers can be so eager to get their own words out, their own insights into the network, that they neglect to acknowledge what triggered these words. Happily for users of 5
  • 6. Twitter, the re-tweet exists, automatically making reference to a previous remark, and Facebook posts discussion threads. But many users seem to feel, as Fincham (2012) notes, that they can show their creativity or novel modes of thought by pretending to be the first to post something, when in fact they are neither the first nor the very interesting. As Oxford University Press Social Media Guidelines (2013) suggest, “active engagement” with social media will make a good impression only when rules of “Netiquette”, social etiquette online, are attended to; users must acknowledge sources and give credit where it is due. In “How Not to Steal People’s Content on the Web”, Endon (2012) observes, most social media users are eager to see that their material has been commented upon, re-tweeted, or otherwise noticed by others. The problem arises, however, when users fail to notice whether or not “copying is okay”; Endon warns that those who fail to notice such things may---and should—“… receive threatening E-mails or letters and even demand that you pay them for using (their content.” Endon offers advice on how to cite content in blog posts, on Twitter, and on Facebook, LinkedIn, Google+, and Pinterest, with examples and citations of his own. Notably, he includes through his blog posting on this matter certain pertinent questions, such as “Are you taking steps to ensure you give credit where credit’s due with shared content on the internet?” and “Like what you’ve read? Click here to subscribe…”. As Oxford University Press Social Media Guidelines (2013) assert and reassert, copyrighted material must never be posted as one’s own, and even in blogs and YouTube postings, copyrights can often be found. Indeed, and once again, as has been suggested in other areas of this present discussion of the uses and utility of various social media, putting oneself in the position of the audience will prove valuable here; asking oneself how it might feel to see one’s carefully chosen words, one’s well-conceived notion or layout, picture or commentary, set forth on another person’s homepage as if it originated with that person can prove more than frustrating. Interact in a timely way: Do it now In an era of speed and concision, not to mention dissolution of ordinary time zones, it is not only inventions and innovations, but the effective exploitation of those novelties, that is expected. As Klein (2010) has suggested, most of what has generated the touted boom of “social networking” has been “1% inspiration and 99% timeliness.” In like manner, those who exploit such networking have grown up in an epoch of instantaneity, where waiting is not an option; updates to Facebook and Twitter, message threads, tags, and links happen each within less than a minute of the last, with no attention to time zone. As Gates (2011) suggests, “week-old, even day-old information, no matter how quickly distributed, is still old information.” And as Newell (2013) reminds, although quality, timeliness, and volume may be the evaluable measures of blogging or other electronic communications, it is timeliness alone that remains the nec plus ultra of the social network. No one likes to have to wait, time seems limitless online, and, as Tenore (2012) observes, one of the particular advantages of Twitter in its recent common use as a tool for delivering world news is its ability to transmit quick, present-tense, especially timely immediacy. Too, access to Twitter and other social media via portable communication devices can take advantage both of the “always-on” nature of electronic updating mechanisms and of the ease of transmitting graphics, video, audio, and text simultaneously. “Own the media now; the minute you stop telling your story, the media tells it for you”, advise Chang et al. (2012). 6
  • 7. Of course, the need for timeliness should be weighed against the aforementioned warning not to enter electronic information into the network in a simple signal-response, reactive way. It is not in military operations alone that “the first report is always wrong,” as Bratt, et al. (2010) state, adding that the second report is often frequently wrong, too. Thus, just as the social media user is advised to find the sweet spot between abandonment and inundation with respect to quality and quantity of his postings, so should he seek the temporal sweet spot lying between too-quick and too-slow. Conclusions and consequences The Poynter Institute’s Kelly Fincham (2012) warns that one of most problematic features of social networking, apart from its ease of use and convenience, is its tendency to be considered, particularly among young people, as fleeting, not serious, not really “significant” or “legitimate.” Alternatively, universities have accepted, almost begrudgingly, that they “have no choice but to integrate these platforms into their marketing and communications plans” (Klamm, 2011). Indeed, Klamm (2011) points out, “a recent study showed that an astounding 100% of universities have a social media presence.” And so it appears, although “the 18-to-24-year old college student demographic”, as Klamm calls it, would use social media regularly for quick, not-always-significant minor acquaintance-connecting, the older, college-educated administrative demographic has come to take these media with major seriousness. Unfortunately, institutional staff seems more often than not to have failed to understand what to do and how to do it online, as Pidaparthy (2011) reports. Pidaparthy describes institutional Websites with outdated faculty and staff lists, curricula that are not offered, and images not representative of the schools in question. Thus, it seems, although institutions may “have an online presence”, that presence is not always as effective or as interactive as it might be. Tilsley (2012) notes survey results indicating that more than three quarters of current and prospective students “check their Facebook at least once a day”, and more than two thirds of those surveyed “use social media to research colleges”, but these are probably not sufficient reasons for institutions simply to “have a social media presence” alongside an online one. Rather, Tilsley notes, it is what the entire institutional staff does with social media that really counts, not just to prospective students but to currently enrolled ones and to the staff that would interact with them. Indeed, as Pidaparthy (2011) reports, “…a robust social media campaign, along with such creative features as student-run blogs, can lure…while a stale online presence can turn off.” In fact, Pidaparthy adds, the organization Student Advisor.com has created a ranking of the “Top 100 Social Media Colleges” to classify institutions “on how well they use social media.” But even though the Pidaparthy and Tilsley pieces quote students as saying that they “like” or even prefer to get information about colleges through social media, stating that such information is easier to access, faster to peruse, and even “more reliable” than might be the traditional slick marketing tools of the past, these same institutions are, for the most part, using the social media only for advertising themselves (Osborne, 2012). With all the interest in new media and institutions’ most effective exploitation of them, it might be asked if the communication/media tail is wagging the communicated/information dog. Using an alternative metaphor, Pidaparthy points out that once an institution does decide to join 7
  • 8. Facebook, Twitter, YouTube, Pinterest, or another social medium, that institution is opening a very active can of worms whose worms must be tended to regularly. “Students will make a judgment about a university if it is not current and responsive online. When their post doesn’t get answered, they aren’t interested anymore.” Socially mediated attention spans are notoriously ephemeral. It therefore appears that, in the twenty-first century as in epochs past, we recognize often without realizing it that structural changes are taking place in our affairs that have been provoked by new modes of message transmission. McLuhan’s 1964 observations that new media can play with the conceptions of speed and time so that a world of sequence and connections can be transformed into a universe of creative configuration and structure are indeed being re-echoed more than five decades on. . References Bratt, E., Domeshek, E., and Durlach, P. (2010). The first report is always wrong, and other ill- defined aspects of the army battle captain domain. Stanford University, Stottler-Henke Associates, Inc. Retrieved http://godel.stanford.edu/twiki/pub/Public/SemlabPublications/first_report_wrong_illdef_its10.pdf Bryant, J. and Oliver, M. (2009). Media effects: Advances in theory and research. New York: Taylor and Francis. Chang, H., Dailide, A., and Walker, S. (2012). Communication in crisis: Social media and emergency communication in the Green River Valley. Retrieved http://depts.washington.edu/mitigate/papers/Communication%20in%20Crisis.pdf Dean, J. (2012). Smartphone user survey: A glimpse into the mobile lives of college students. Retrieved http://testkitchen.colorado.edu/projects/reports/smartphone/smartphone-survey/ Endon, C. (2012). How to not steal people’s content on the Web. HubSpot’s Marketing Blog. Retrieved http://blog.hubspot.com/blog/tabid/6307/bid/33098/How-Not-to-Steal-People-s- Content-on-the-Web.aspx Fincham, K. (2012). What every young journalist should know about using Twitter. Poynter.org. Retrieved http://www.poynter.org/how-tos/journalism-education/188408/what-every-young- journalist-should-know-about-using-twitter/ Gates, J. (2011). There’s talk, and there’s communication. Govloop. Retrieved http://www.govloop.com/profiles/blogs/there-s-talk-and-there-s-communication Grimm, J. (2013). What skills do journalists need to build online communities? Poynter.org. Retrieved http://www.poynter.org/how-tos/career-development/ask-the-recruiter/200589/live- chat-today-what-skills-do-journalists-need-to-build-online-communities/ Huffington Post (2013). Hate-filled hashtag reveals new behavior. http://quebec.huffingtonpost.ca/2013/02/03/ungaymort-le-hashtag-haineux-samedi-soir-revele- nouveaux-comportements-twittos_n_2610301.html?ncid=edlinkusaolp00000009 8
  • 9. Kelly, K. (2012). Don’t use too many hashtags. Retrieved http://kevinkellyohio.wordpress.com/2012/07/19/dont-use-too-many-hashtags/ Klamm, D. (2011). 6 best practices for universities embracing social media. Mashable. Retrieved http://mashable.com/2011/10/10/universities-social-media/ Klein, E. (2010). Facebook: Where genius was 1% inspiration, 99% timeliness. In The Washington Post, Post Business. 9 October. Retrieved http://www.washingtonpost.com/wp- dyn/content/article/2010/10/08/AR2010100804303.html McLuhan, M. (1964). Understanding media: The extensions of man. London: Routledge. Newell, G. (2013). Social networking --- The thin line between informing and annoying. 602 Communications. Retrieved http://602communications.com/2010/10/social-networks-the-thin- line-between-informing-and-annoying/ Osborne, C. (2012). How do universities use social media successfully? ZDNet. Retrieved http://www.zdnet.com/blog/igeneration/how-do-universities-use-social-media-successfully/15059 Oxford University Press. (2013). Marketing and social media. Retrieved http://www.oup.co.uk/academic/authors/salesandmarketing/socialmedia/ Oxford University Press (2013). Social media guidelines. Retrieved http://www.oup.com/us/corporate/authorresources/socialmedia/?view=usa Pidaparthy, U. (2011). How colleges use and misuse social media. CNN Special Reports. Retrieved http://www.cnn.com/2011/10/20/tech/social-media/universities-social-media Sawahel, W. (2013). Africa is the most dynamic e-learning market on the planet. University World News. Retrieved http://www.universityworldnews.com/article.php? story=20130125105755921 Squires, L. (2007). College students in multimedia relationships: Choosing, using, and fusing multimedia technologies. Retrieved http://aladinrc.wrlc.org/bitstream/handle/1961/5232/wpsquires.pdf?sequence=1 Stanford Encyclopedia of Philosophy (2013). http://plato.stanford.edu/entries/ethics-social- networking/ Tenore, M. (2012). What Twitter teaches us about writing short & well. Retrieved http://www.poynter.org/how-tos/newsgathering-storytelling/186371/what-twitter-teaches-us- about-writing-short-well/ Tilsley, A. (2012). Social networks and college choices. Inside Higher Ed. 24 September. Retrieved http://www.insidehighered.com/news/2012/09/24/survey-examines-how-prospective- students-use-social-media-research-colleges 9
  • 10. Weddle, P. (20013). Three simple rules for E-mailing potential employers. CareerCast. Retrieved http://www.careercast.com/career-news/three-simple-rules-emailing-potential- employers APPENDIX Social media best practices, summarized from Oxford University Press Here are a few things to bear in mind as you develop your presence on the social web. DOs DON'Ts • Showcase thought/ideas leadership. • Post frequent updates: A good rule of thumb is weekly+ for blogs/YouTube/Facebook, and daily+ for Twitter. • Be friendly and casual: Social posts will appear among posts from users' friends and family. • Be human: Have a (consistent & clear) perspective and voice. • Be concise: Get to the point before losing readers' interest. • Be timely: Respond to comments and queries as soon as possible, but in a well-considered way; avoid simply “reacting”. • Use social etiquette: acknowledge sources and give credit where it's due via. attributions, retweets, and so on; follow others and they may follow you! • Stick to what you know: when writing a blog article, stick to your areas of expertise. • Use overly familiar or potentially offensive language. • Use industry or social media/tech jargon. • Sound like a different person on different channels/media. • Be overly promotional of yourself or your work. • Post too frequently; this can be seen as 'spamming' or ‘flooding’. • Write about topics outside your area of expertise. • Misrepresent yourself or your qualifications. • Post copyrighted material without proper clearance and attribution. • Underestimate the resources—in terms of content and time—required to launch and maintain a social presence over the long term. Don’t forget: (a) to update; (b) to realize that first reports are generally wrong/inaccurate/incomplete 10