SlideShare a Scribd company logo
1 of 38
Spark Twitter: The
beginning of the end
• David Strom
• March 2023
• Find these slides here:
http://slideshare.net/davidstrom
Today’s lesson
• The demise of Twitter
• Other notable failures
• How to listen better
• Lessons learned, dos and don’ts
• Moving beyond Twitter: Snap, Mastodon
This is the real reason
we are in this mess
The demise of Twitter:
from town square to town dump
• 2006: Began operations
• 2008: Strom joins up
• 2010: Media assignment editor, along with
the global town square (Arab Spring)
• 2012: The place for shaming; Verified Checkmark
first put in place
• 2022: Elon begins his crusade, FTC fines Twitter
$150M for security violations
• 2023: Elon continues to be Chief Troll
How to listen
better
20
http://strominator.com
21 http://strominator.com
This 2021 documentary
features commentary by
Monica Lewinsky
Some lessons learned
• Think twice (or more) before you post anything
• Do you want your mom (or teacher) to read this?
• Stay away from sex, religion, and politics – even
on your personal accounts (sorry Elon!)
• Know what time of day/week to post for best
responses
• Listen more than post to develop your voice
• Use social management tools
26
Key social media to-dos
• Follow the right people in your
area/community
• Don’t get too caught up in tweeting your
every movement
• Look at what businesses that you care about
are doing with it
• Use it to start conversations with people you
want to get to know
• Don’t take yourself too seriously
http://strominator.com
http://strominator.com 27
Some other No-nos
• Don’t put non-professional items in
your status updates anywhere once
you start your business
• Don’t obsess about the number of
connections and build them slowly
over time
• Really, steer clear of politics, esp. now
Twitter protection strategies
• Examine the account name, photo and handle
and make sure they make sense
• Verify the account age, past
tweets/interactions. Lack of history should be
suspicious
• Be skeptical
when asked for money.
Beyond Twitter
Recognize any of these fails?
Pay
attention!
Blog.avast.com
/stay-
protected-
vishing-scams
http://strominator.com 36
(c) David Strom Inc.
http://strominator.com
38
David Strom, david@strom.com
Blog.strom.com
These slides can be found here:
http://slideshare.net/davidstrom

More Related Content

Similar to Spark Twitter fails Mar2023

Yammer's Social Media Policy
Yammer's Social Media PolicyYammer's Social Media Policy
Yammer's Social Media PolicyYammer
 
Understanding Social Media Spring 2014
Understanding Social Media Spring 2014Understanding Social Media Spring 2014
Understanding Social Media Spring 2014Yadira Galindo
 
Tweet & Pin It!
Tweet & Pin It!Tweet & Pin It!
Tweet & Pin It!ldoughty
 
Thinking and Working Digital First in College PR
Thinking and Working Digital First in College PRThinking and Working Digital First in College PR
Thinking and Working Digital First in College PRSteve Buttry
 
How journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterHow journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterSteve Buttry
 
SDSU Osher social media class 2
SDSU Osher social media class 2SDSU Osher social media class 2
SDSU Osher social media class 2Yadira Galindo
 
Public Affairs Council Twitter Presentation
Public Affairs Council Twitter PresentationPublic Affairs Council Twitter Presentation
Public Affairs Council Twitter PresentationMolly Nichelson
 
Utilizing New Media & Social Media to Build Support For Your Organization & Y...
Utilizing New Media & Social Media to Build Support For Your Organization & Y...Utilizing New Media & Social Media to Build Support For Your Organization & Y...
Utilizing New Media & Social Media to Build Support For Your Organization & Y...Molly Nichelson
 
Debunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media ExecutivesDebunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media ExecutivesNeil Foote
 
Twitter presentation
Twitter presentationTwitter presentation
Twitter presentationMaria Pitsaki
 
Understanding business uses of social media
Understanding business uses of social mediaUnderstanding business uses of social media
Understanding business uses of social mediaDavid Strom
 
Digital First Thinking and Working
Digital First Thinking and WorkingDigital First Thinking and Working
Digital First Thinking and WorkingSteve Buttry
 
Less is more town of cardston, ab
Less is more   town of cardston, abLess is more   town of cardston, ab
Less is more town of cardston, abRuth Seeley
 
2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-Profit2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-ProfitCarol Spencer
 
Reporting with social media
Reporting with social media Reporting with social media
Reporting with social media Steve Buttry
 
The Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effectThe Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effectClayton Wehner
 
twitter Presentation ‫‬
twitter Presentation ‫‬twitter Presentation ‫‬
twitter Presentation ‫‬akram marzoq
 

Similar to Spark Twitter fails Mar2023 (20)

Yammer's Social Media Policy
Yammer's Social Media PolicyYammer's Social Media Policy
Yammer's Social Media Policy
 
Understanding Social Media Spring 2014
Understanding Social Media Spring 2014Understanding Social Media Spring 2014
Understanding Social Media Spring 2014
 
Tweet & Pin It!
Tweet & Pin It!Tweet & Pin It!
Tweet & Pin It!
 
02. Twitter
02. Twitter02. Twitter
02. Twitter
 
eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015
 
Thinking and Working Digital First in College PR
Thinking and Working Digital First in College PRThinking and Working Digital First in College PR
Thinking and Working Digital First in College PR
 
How journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterHow journalists can use Facebook and Twitter
How journalists can use Facebook and Twitter
 
SDSU Osher social media class 2
SDSU Osher social media class 2SDSU Osher social media class 2
SDSU Osher social media class 2
 
Public Affairs Council Twitter Presentation
Public Affairs Council Twitter PresentationPublic Affairs Council Twitter Presentation
Public Affairs Council Twitter Presentation
 
All about Twitter
All about TwitterAll about Twitter
All about Twitter
 
Utilizing New Media & Social Media to Build Support For Your Organization & Y...
Utilizing New Media & Social Media to Build Support For Your Organization & Y...Utilizing New Media & Social Media to Build Support For Your Organization & Y...
Utilizing New Media & Social Media to Build Support For Your Organization & Y...
 
Debunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media ExecutivesDebunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media Executives
 
Twitter presentation
Twitter presentationTwitter presentation
Twitter presentation
 
Understanding business uses of social media
Understanding business uses of social mediaUnderstanding business uses of social media
Understanding business uses of social media
 
Digital First Thinking and Working
Digital First Thinking and WorkingDigital First Thinking and Working
Digital First Thinking and Working
 
Less is more town of cardston, ab
Less is more   town of cardston, abLess is more   town of cardston, ab
Less is more town of cardston, ab
 
2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-Profit2011: Using Social Media for Your Non-Profit
2011: Using Social Media for Your Non-Profit
 
Reporting with social media
Reporting with social media Reporting with social media
Reporting with social media
 
The Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effectThe Social Media Phenomenon: How to leverage it to best effect
The Social Media Phenomenon: How to leverage it to best effect
 
twitter Presentation ‫‬
twitter Presentation ‫‬twitter Presentation ‫‬
twitter Presentation ‫‬
 

More from David Strom

Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity JobDavid Strom
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacyDavid Strom
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsDavid Strom
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking backDavid Strom
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media worldDavid Strom
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of ThingsDavid Strom
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersDavid Strom
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches David Strom
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)David Strom
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosDavid Strom
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter failsDavid Strom
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingDavid Strom
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportDavid Strom
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and nowDavid Strom
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakesDavid Strom
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkDavid Strom
 

More from David Strom (20)

Getting Your First Cybersecurity Job
Getting Your First Cybersecurity JobGetting Your First Cybersecurity Job
Getting Your First Cybersecurity Job
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Protecting your digital and online privacy
Protecting your digital and online privacyProtecting your digital and online privacy
Protecting your digital and online privacy
 
AI and cyber security: new directions, old fears
AI and cyber security: new directions, old fearsAI and cyber security: new directions, old fears
AI and cyber security: new directions, old fears
 
The legalities of hacking back
The legalities of  hacking backThe legalities of  hacking back
The legalities of hacking back
 
How to market your book in today's social media world
How to market your book in today's social media worldHow to market your book in today's social media world
How to market your book in today's social media world
 
​Understanding the Internet of Things
​Understanding the Internet of Things​Understanding the Internet of Things
​Understanding the Internet of Things
 
How to make your mobile phone safe from hackers
How to make your mobile phone safe from hackersHow to make your mobile phone safe from hackers
How to make your mobile phone safe from hackers
 
Implications and response to large security breaches
Implications and response to large security breaches Implications and response to large security breaches
Implications and response to large security breaches
 
Using social networks to find your next job (2017)
Using social networks to find your next job (2017)Using social networks to find your next job (2017)
Using social networks to find your next job (2017)
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Using OpenStack to Control VM Chaos
Using OpenStack to Control VM ChaosUsing OpenStack to Control VM Chaos
Using OpenStack to Control VM Chaos
 
Notable Twitter fails
Notable Twitter failsNotable Twitter fails
Notable Twitter fails
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Listen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better SupportListen to Your Customers: How IT Can Provide Better Support
Listen to Your Customers: How IT Can Provide Better Support
 
Network security practice: then and now
Network security practice: then and nowNetwork security practice: then and now
Network security practice: then and now
 
Biggest startup mistakes
Biggest startup mistakesBiggest startup mistakes
Biggest startup mistakes
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 

Recently uploaded

fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project17mos052
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT17mos052
 
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In DubaiDubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubaikojalkojal131
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsSocioCosmos
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch17mos052
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesNetqom Solutions
 
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw DigitalTop 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digitalmacawdigitalseo2023
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
Values Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdfValues Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdfSoftServe HRM
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书saphesg8
 

Recently uploaded (11)

fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
 
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In DubaiDubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
Dubai Calls Girls Busty Babes O525547819 Call Girls In Dubai
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing Services
 
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw DigitalTop 5 Ways To Use Reddit for SEO  SEO Expert in USA - Macaw Digital
Top 5 Ways To Use Reddit for SEO SEO Expert in USA - Macaw Digital
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
Values Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdfValues Newsletter teamwork section 2023.pdf
Values Newsletter teamwork section 2023.pdf
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书
 

Spark Twitter fails Mar2023

  • 1. Spark Twitter: The beginning of the end • David Strom • March 2023 • Find these slides here: http://slideshare.net/davidstrom
  • 2.
  • 3. Today’s lesson • The demise of Twitter • Other notable failures • How to listen better • Lessons learned, dos and don’ts • Moving beyond Twitter: Snap, Mastodon
  • 4. This is the real reason we are in this mess
  • 5.
  • 6.
  • 7.
  • 8. The demise of Twitter: from town square to town dump • 2006: Began operations • 2008: Strom joins up • 2010: Media assignment editor, along with the global town square (Arab Spring) • 2012: The place for shaming; Verified Checkmark first put in place • 2022: Elon begins his crusade, FTC fines Twitter $150M for security violations • 2023: Elon continues to be Chief Troll
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 22. This 2021 documentary features commentary by Monica Lewinsky
  • 23.
  • 24.
  • 25. Some lessons learned • Think twice (or more) before you post anything • Do you want your mom (or teacher) to read this? • Stay away from sex, religion, and politics – even on your personal accounts (sorry Elon!) • Know what time of day/week to post for best responses • Listen more than post to develop your voice • Use social management tools
  • 26. 26 Key social media to-dos • Follow the right people in your area/community • Don’t get too caught up in tweeting your every movement • Look at what businesses that you care about are doing with it • Use it to start conversations with people you want to get to know • Don’t take yourself too seriously http://strominator.com
  • 27. http://strominator.com 27 Some other No-nos • Don’t put non-professional items in your status updates anywhere once you start your business • Don’t obsess about the number of connections and build them slowly over time • Really, steer clear of politics, esp. now
  • 28. Twitter protection strategies • Examine the account name, photo and handle and make sure they make sense • Verify the account age, past tweets/interactions. Lack of history should be suspicious • Be skeptical when asked for money.
  • 29.
  • 30.
  • 32.
  • 33. Recognize any of these fails?
  • 37.
  • 38. (c) David Strom Inc. http://strominator.com 38 David Strom, david@strom.com Blog.strom.com These slides can be found here: http://slideshare.net/davidstrom