Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Workshop 2: Listening and Web Presence Day 1: Listening Tools and Privacy Best Practices Day 2: Strategic Internet Presenc...
Program Overview
Day One:  Agenda AGENDA OUTCOMES <ul><li>Small steps work best </li></ul><ul><li>Don’t have to implement all social tools ...
<ul><li>To understand and think through how information collected through listening can inform social media strategy decis...
Day  1: Trainer Introductions Insert your photos and names here Day One: Trainer Introductions
<ul><li>Share Pairs: For each question, find a different person in the room  </li></ul><ul><li>What is one thing you alrea...
Step 1: Why Listen? Link Listening to Strategy Decision-Making or Learning Listening on social media channels means you'll...
Listening Goals: Examples <ul><li>To know what's happening online, to have a starting point for an issue or a campaign </l...
Exercise: Review Your Strategy and  Identify Your Goals Share Pair:  Find a partner. Using your social media strategy temp...
Keywords: Brainstorm A List <ul><li>Basic keywords you'll want to monitor are: </li></ul><ul><li>Other nonprofit names in ...
These examples should be localized ….  Examples Examples
<ul><li>Keywords </li></ul><ul><li>E-Mediat Tunisia </li></ul><ul><li>E-Mediat Tunisia </li></ul><ul><li>NGO </li></ul><ul...
California Shakespeare Theater California Shakespeare Theatre California Shakespeare Festival Cal Shakes Jonathan Moscone ...
Share Pair: Identify Your Words Share Pair:  Find a different partner. Brainstorm a list of keywords. Make notes on the so...
<ul><li>What are your listening goals? </li></ul><ul><li>What are your keywords? </li></ul>Group Discussion and Share Grou...
Basic Listening: Google Alerts <ul><li>The easiest way to do listening is to use Google Alerts and with keyword searches. ...
http://www.google.com/alerts Basic Listening: Google Alerts Basic Listening: Google Alerts
Basic Listening:  Type in Your Keywords  Type in Keywords Basic Listening: Type in Your Keywords
Basic Listening: Preview Results Preview results and review Basic Listening: Preview Results
Basic Listening:  Select Type and Volume Basic Listening: Select Type and Volume
Basic Listening: Select Feed Basic Listening: Select Feed
Basic Listening: Click on the Orange RSS Symbol Basic Listening:  Click on Orange RSS Symbol
Basic Listening: Cut and Paste URL into Word Basic Listening:  Cut and Paste url into Word
Basic Listening: Google Alerts Exercise:  Create Google Alerts based on your goals and keywords. Cut and paste the feed UR...
Few More Listening Tools Few More Listening Tools
 
 
 
 
 
 
 
<ul><li>Where and how you search on Social Mention depends on your goals! </li></ul><ul><li>Don’t create too many searches...
 
 
 
 
 
 
 
Exercise  Practice your keyword searches with Google Alerts, Social Mention, Twitter, and/or Ice Rocket. Remember to cut a...
Demo:  Setting Up Your Dashboard iGoogle is a dashboard that lets you read new content on the web using RSS.  RSS allows i...
 
 
 
 
Repeat for all your searches
Full Screen View
 
 
As you add more keyword search feeds, you may want to edit the layout of your iGoogle dashboard to include more columns or...
 
Lunch  Flickr photo by Littlelakes
Hands-On Time: Setting Up Your iGoogle Dashboard Photo Source: E-Mediat Yemen Hands-On Time:  Setting Up Your iGoogle Dash...
Listening Work Flow: Who? 1-2 Hours Per Week Set Up Team or Solo Listening Work Flow: Who?
Doing the Work: Reading Tips <ul><li>Set aside a small block of time to read your feeds everyday </li></ul><ul><li>Clean h...
Doing the Work: Analyzing Tips <ul><li>Look for patterns and trends over time. This requires stepping back. </li></ul><ul>...
Doing the Work: Responding Tips <ul><li>What if no one is talking about your organization? That means it is time to start ...
Share Pair: Doing the Work Share Pair:  Find a partner. Discuss how you will do the work.  Group Report:  How will your or...
Privacy and Security:  How To Use Social Media Safely Flickr Photo by photolab
Security: Use Strong Passwords <ul><li>Think of a phrase, rather than a single word. </li></ul><ul><li>Make your passphras...
Security: Tool to Test Password Strength
Security: Tool To Store Passwords
What It Means: The extra  S  on the end signifies that your computer has opened a secure connection to the website. You ma...
Security Basics: Use a Secure Web Browser and Add-Ons https://security.ngoinabox.org/firefox_main
Security: Firefox Browser Add-On for HTTPS http://www.eff.org/https-everywhere
HTTPS Everywhere: Limitations HTTPS Everywhere  depends entirely on the security features of the individual web sites that...
Use “End-to-End Encryption”  on Free Email Services In Hotmail, click Options, and then click More options. Under Managing...
Security Checklist for Gmail https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488
Use Secure IM Software
Use VoIP Software
Understand How Internet Filters Work Source: https://security.ngoinabox.org/en/chapter_8_1
Regardless of what filtering methods are present, it is nearly always possible to evade them by relying on intermediary co...
Anonymity Networks and  Basic Proxy Servers Anonymity networks typically 'bounce' your Internet traffic around between var...
TOR:  What Tor is software, people, and protocol to help people protect their privacy online.  https://www.torproject.org/
TOR:  Who Citizens – Journalists - Activists <ul><li>Protect from unscrupulous marketers and identity thieves and irrespon...
TOR: How To Install and Use
Privacy on Social Networks <ul><li>Ask these questions: </li></ul><ul><li>Who can access the information I am putting onli...
Social Network Privacy and Security Tips <ul><li>Don’t rely on social platforms as the single host for your information, i...
Privacy on Facebook
Privacy Settings Tips on Facebook <ul><li>Have everything set as “Friends Only” (meaning only friends have access to your ...
Change the Default Privacy Settings on Facebook This is the default privacy settings which makes a lot of your content ava...
“ Friends Only” Settings for Connections
Profile Preview
“ Friends Only” Settings for Connections
Friends Only Privacy Settings
Friends Only Privacy Settings
Remove from Public Search and Turn Off Instant Personalization
Remove from Public Search and  Turn Off Instant Personalization
Hands-On Time:  Explore Your Facebook Privacy Settings Debrief: What Facebook privacy settings did you change and why?
<ul><li>Share Pairs </li></ul><ul><li>Circle Closing </li></ul>Reflection & Closing
Workshop 2: Web Presence Day 2: Strategic Internet Presence:  Web Sites and Blogs This project is managed by Institute for...
Program Overview
Day Two:  Agenda AGENDA OUTCOMES <ul><li>Small steps work best </li></ul><ul><li>Don’t have to implement all social tools ...
Day Two: Learning Objectives <ul><li>To understand the basics of establishing a web presence or home base that links to st...
Day  1: Trainer Introductions Insert your photos and names here Day Two: Trainer Introductions
Overnight Reflections Write on a sticky note and place on the wall when done: What was your takeaway from yesterday?
<ul><li>What is one thing you already know or want to learn about establishing an effective web presence? </li></ul><ul><l...
Home and Outposts
We are moving towards turning the organization's web presence from static to more interactive or social. Not every NGO nee...
<ul><li>Benefits of a blog  </li></ul><ul><li>Easy integration with social outposts </li></ul><ul><li>Improves with your s...
<ul><li>Consider a blog if …. </li></ul><ul><li>You don’t have a website or web presence </li></ul><ul><li>Your current we...
Example: NTEN http://www.nten.org
http://www.nten.org NTEN Outpost
Examples: NTEN  Blog http://www.nten.org NTEN Blog
http://www.nten.org NTEN Outpost
Example: E-Mediat
E-Mediat Outpost
E-Mediat Jordan Outpost
E-Mediat Jordan Outposts
Example: Nasawiya
Example: Nasawiya
Insert a screen capture from an NGO in your country that has a web site/blog and social outposts Example: Insert from Your...
<ul><li>Consistent organizational branding </li></ul><ul><li>Intuitive / logical navigation and structure </li></ul><ul><l...
Effective Home Base
Example: Indianapolis Museum of Art
Insert a screen capture from an NGO in your country that has an effective home base. Insert an Example from Your Country
<ul><li>Small Group Exercise:   Participants will work in groups to evaluate their home base using the home base worksheet...
<ul><li>Types of blogs </li></ul><ul><li>Editorial focus </li></ul><ul><li>Listening as research for blogging stories </li...
Types of Blogs: Organizational Blog
Types of Blogs: Organizational Blog
Types of Blogs: Organizational Blog
Types of Blogs: Voice of a Leader Blog
Types of Blogs: Newsletter
<ul><li>What are you going to write about? </li></ul><ul><li>How will it support your social media strategy objective? </l...
<ul><li>Our NGO blog will publish stories about our organization’s program and related topics in our country. Our social m...
Share Pair:  Work with a partner and discuss the questions about editorial mission. Write a brief editorial mission statem...
<ul><li>Who are the important NGOs, bloggers, media platforms and thought leaders covering your topic? </li></ul><ul><li>A...
<ul><li>Instructional </li></ul><ul><li>Informational </li></ul><ul><li>Research </li></ul><ul><li>Interviews </li></ul><u...
Blog Post Examples: Informational
Blog Post Examples: Instructional
Blog Post Examples: Research Summary
Blog Post Examples: Interviews
Blog Post Examples: Case Study
Blog Post Examples: Tips
Blog Post Examples: Lists
Blog Post Examples: Guest Post
<ul><li>250-750 words, sometimes longer </li></ul><ul><li>Use creative commons images or your own photos to give interest ...
<ul><li>A picture is worth a 1,000 word-posts. Blogs with pictures tell a far more interesting story than those without </...
<ul><li>Logos of organizations you're writing about </li></ul><ul><li>Screen captures if you are talking about a web-based...
<ul><li>You can take your own with a digital camera, don't need anything fancy </li></ul><ul><li>Screen capture software l...
Blogging: The Workflow
Blogging: Measuring Success
<ul><li>Set up your organization’s blog in Blogger </li></ul><ul><li>Practice writing different types of posts </li></ul><...
<ul><li>Share Pairs </li></ul><ul><li>Circle Closing </li></ul>Reflection & Closing
You are free to use this work as long you attribute  The E-Mediat Project.  Rules For Using This Content Creative Commons ...
Upcoming SlideShare
Loading in …5
×

Workshop 2 - PowerPoint Presentation v03

1,050 views

Published on

1997 - 2003 Version

  • Be the first to comment

  • Be the first to like this

Workshop 2 - PowerPoint Presentation v03

  1. 1. Workshop 2: Listening and Web Presence Day 1: Listening Tools and Privacy Best Practices Day 2: Strategic Internet Presence: Websites and Blogs This project is managed by Institute for International Institute for Education (IIE) Sponsored by the U.S. Department of State Middle East Partnership Initiative (MEPI)
  2. 2. Program Overview
  3. 3. Day One: Agenda AGENDA OUTCOMES <ul><li>Small steps work best </li></ul><ul><li>Don’t have to implement all social tools to be successful </li></ul><ul><li>Wide range of skills and knowledge in the room </li></ul><ul><li>Everyone will participate </li></ul>FRAMING Leave the room ready to use listening tools and adjust the privacy settings so you can do so safely. Introduction, Overview, and Icebreaker Listening : Why and What Basic Listening More Listening Tools Listening: The Work Flow Introduction To Privacy and Security Reflection
  4. 4. <ul><li>To understand and think through how information collected through listening can inform social media strategy decisions and be actionable </li></ul><ul><li>To introduce a simple method for using free or low cost listening tools </li></ul><ul><li>To provide an overview of online privacy and security issues and to understand how to use Facebook privacy settings </li></ul>Day One: Learning Objectives
  5. 5. Day 1: Trainer Introductions Insert your photos and names here Day One: Trainer Introductions
  6. 6. <ul><li>Share Pairs: For each question, find a different person in the room </li></ul><ul><li>What is one thing you already know or want to learn about listening and social media? </li></ul><ul><li>What is one thing you already know or want to learn about privacy and security on social networks? </li></ul>Icebreaker
  7. 7. Step 1: Why Listen? Link Listening to Strategy Decision-Making or Learning Listening on social media channels means you'll be looking at a lot of data and unstructured information. If you don't have a clear goal and identify who want to listen to, you can get quickly overwhelmed.
  8. 8. Listening Goals: Examples <ul><li>To know what's happening online, to have a starting point for an issue or a campaign </li></ul><ul><li>To get to know your audience, supporter, networks </li></ul><ul><li>To start to realize and observe patterns and have baseline so that you can optimize your online work </li></ul><ul><li>To know general trends about civil society </li></ul><ul><li>To know what the government is doing online </li></ul>Listening Goals: Examples
  9. 9. Exercise: Review Your Strategy and Identify Your Goals Share Pair: Find a partner. Using your social media strategy template and discuss what your goals and audience are for listening. Share your goals.
  10. 10. Keywords: Brainstorm A List <ul><li>Basic keywords you'll want to monitor are: </li></ul><ul><li>Other nonprofit names in your space </li></ul><ul><li>Program, services, and event names </li></ul><ul><li>CEO or well-known personalities associated with your organization </li></ul><ul><li>Other nonprofits with similar program names </li></ul><ul><li>Your brand or tagline </li></ul><ul><li>URLs for your blog, web site, online community </li></ul><ul><li>Industry terms or other phrases that illustrate need </li></ul>
  11. 11. These examples should be localized …. Examples Examples
  12. 12. <ul><li>Keywords </li></ul><ul><li>E-Mediat Tunisia </li></ul><ul><li>E-Mediat Tunisia </li></ul><ul><li>NGO </li></ul><ul><li>NGO and Social Media </li></ul><ul><li>Civil Society and NGO </li></ul><ul><li>Chema Gargouri </li></ul><ul><li>1 </li></ul>
  13. 13. California Shakespeare Theater California Shakespeare Theatre California Shakespeare Festival Cal Shakes Jonathan Moscone (name of director) Susie Falk (name of artist) As the season approaches -- the names of that season's directors and productions. Misspellings
  14. 14. Share Pair: Identify Your Words Share Pair: Find a different partner. Brainstorm a list of keywords. Make notes on the social media strategy template. Write down your keywords on sticky notes and place on the wall. Share Pair: Identify Your Words
  15. 15. <ul><li>What are your listening goals? </li></ul><ul><li>What are your keywords? </li></ul>Group Discussion and Share Group Discussion and Share
  16. 16. Basic Listening: Google Alerts <ul><li>The easiest way to do listening is to use Google Alerts and with keyword searches. It monitors the web for anything that has been published with your keywords. </li></ul><ul><li>Google Alerts can be delivered to your email box, but you are going to learn how to read them in iGoogle. </li></ul><ul><li>Let’s do a demo! </li></ul>Basic Listening: Google Alerts
  17. 17. http://www.google.com/alerts Basic Listening: Google Alerts Basic Listening: Google Alerts
  18. 18. Basic Listening: Type in Your Keywords Type in Keywords Basic Listening: Type in Your Keywords
  19. 19. Basic Listening: Preview Results Preview results and review Basic Listening: Preview Results
  20. 20. Basic Listening: Select Type and Volume Basic Listening: Select Type and Volume
  21. 21. Basic Listening: Select Feed Basic Listening: Select Feed
  22. 22. Basic Listening: Click on the Orange RSS Symbol Basic Listening: Click on Orange RSS Symbol
  23. 23. Basic Listening: Cut and Paste URL into Word Basic Listening: Cut and Paste url into Word
  24. 24. Basic Listening: Google Alerts Exercise: Create Google Alerts based on your goals and keywords. Cut and paste the feed URL into a word document for later. Here are some examples: Debrief: What Google Alerts did you set up and why? Goal What to set up in Google Alerts News articles about our organization Keyword = Organization Name Type = News Who is linking to our organization’s web site Keyword= Web site URL Type=Everything Who is blogging about our organization Keyword=Organization Name and/or URL Type=Blogs ADD YOURS
  25. 25. Few More Listening Tools Few More Listening Tools
  26. 33. <ul><li>Where and how you search on Social Mention depends on your goals! </li></ul><ul><li>Don’t create too many searches at first – you will adjust as you go </li></ul>Remember Remember
  27. 41. Exercise Practice your keyword searches with Google Alerts, Social Mention, Twitter, and/or Ice Rocket. Remember to cut and paste urls of searches that you want to use into a word document. Exercise
  28. 42. Demo: Setting Up Your Dashboard iGoogle is a dashboard that lets you read new content on the web using RSS. RSS allows information published on the social web to be read or published in another place – like your iGoogle dashboard. The benefit is that it doesn't add extra emails and gives you a specific place to do your social media listening. Also, you don’t have to constantly check for new content. There are many other RSS readers available, most are free, but we’re going to use iGoogle because it is easy and simple. Demo: Setting up Your Dashboard
  29. 47. Repeat for all your searches
  30. 48. Full Screen View
  31. 51. As you add more keyword search feeds, you may want to edit the layout of your iGoogle dashboard to include more columns or more tabs
  32. 53. Lunch Flickr photo by Littlelakes
  33. 54. Hands-On Time: Setting Up Your iGoogle Dashboard Photo Source: E-Mediat Yemen Hands-On Time: Setting Up Your iGoogle Dashboard
  34. 55. Listening Work Flow: Who? 1-2 Hours Per Week Set Up Team or Solo Listening Work Flow: Who?
  35. 56. Doing the Work: Reading Tips <ul><li>Set aside a small block of time to read your feeds everyday </li></ul><ul><li>Clean house often, RSS subscriptions and searches tend to pile up </li></ul><ul><li>Don't feel like you have to read everything that comes through in detail </li></ul><ul><li>Keep your feeds organized on iGoogle </li></ul><ul><li>Start with a small, select number of feeds </li></ul><ul><li>Review feeds as part of your routine </li></ul><ul><li>Open interesting links in new tabs </li></ul><ul><li>Read and follow interesting links in comments </li></ul><ul><li>Subscribe to new feeds </li></ul><ul><li>Revise keywords as you go </li></ul><ul><li>Identify mission critical keywords </li></ul>Doing the Work: Reading Tips
  36. 57. Doing the Work: Analyzing Tips <ul><li>Look for patterns and trends over time. This requires stepping back. </li></ul><ul><li>Once a week, create a one-page report that includes a summary of mentions. You can include the title, url, and a sentence describing the article. </li></ul><ul><li>Share report with others in your organization. </li></ul><ul><li>Use the “email” option to share mentions with other people in your organization. </li></ul>Doing The Work: Analyzing the Tips
  37. 58. Doing the Work: Responding Tips <ul><li>What if no one is talking about your organization? That means it is time to start engaging </li></ul><ul><li>Once you have a policy around who will respond, you will get down to commenting and engaging in conversation on blogs or Twitter </li></ul><ul><li>Add value to the conversation </li></ul><ul><li>Don’t be afraid to disagree </li></ul><ul><li>Keep to the point of the topic </li></ul><ul><li>Point to relevant sources if you have more information </li></ul><ul><li>Watch the conversation develop </li></ul>
  38. 59. Share Pair: Doing the Work Share Pair: Find a partner. Discuss how you will do the work. Group Report: How will your organization do the listening work?
  39. 60. Privacy and Security: How To Use Social Media Safely Flickr Photo by photolab
  40. 61. Security: Use Strong Passwords <ul><li>Think of a phrase, rather than a single word. </li></ul><ul><li>Make your passphrases twelve or more characters long; this makes it harder to crack. </li></ul><ul><li>Use a combination of symbols, numbers, uppercase and lowercase letters. </li></ul><ul><li>Don’t use the same password for every account. </li></ul><ul><li>Change your passwords every 3 months or more often if you use internet cafe systems or computers other than your own. </li></ul><ul><li>If you have problems remembering passwords, use a secure encrypted program like KeePass to keep track of them. </li></ul><ul><li>Some accounts are compromised via lost password recovery systems. Be sure your security questions and answers for your accounts are not simple and easy to guess. </li></ul>
  41. 62. Security: Tool to Test Password Strength
  42. 63. Security: Tool To Store Passwords
  43. 64. What It Means: The extra S on the end signifies that your computer has opened a secure connection to the website. You may also notice a 'lock' symbol, either in the address bar or in the status bar at the bottom of your browser window. These are clues to let you know that anyone who might be monitoring your Internet connection will no longer be able to eavesdrop on your communication with that particular website. Technical Information: As opposed to HTTP URLs that begin with &quot;http://&quot; and use port 80 by default, HTTPS URLs begin with &quot;https://&quot; and use port 443 by default. Security Basics: Know The Difference Between HTTP and HTTPS
  44. 65. Security Basics: Use a Secure Web Browser and Add-Ons https://security.ngoinabox.org/firefox_main
  45. 66. Security: Firefox Browser Add-On for HTTPS http://www.eff.org/https-everywhere
  46. 67. HTTPS Everywhere: Limitations HTTPS Everywhere depends entirely on the security features of the individual web sites that you use; it activates those security features, but it can't create them if they don't already exist. If you use a site not supported by HTTPS Everywhere or a site that provides some information in an insecure way, HTTPS Everywhere can't provide additional protection for your use of that site.
  47. 68. Use “End-to-End Encryption” on Free Email Services In Hotmail, click Options, and then click More options. Under Managing your account, click Account details. You may be asked to provide your password. Under Other options, click Connect with HTTPS. Click Use HTTPS automatically, and then click Save. X X X
  48. 69. Security Checklist for Gmail https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488
  49. 70. Use Secure IM Software
  50. 71. Use VoIP Software
  51. 72. Understand How Internet Filters Work Source: https://security.ngoinabox.org/en/chapter_8_1
  52. 73. Regardless of what filtering methods are present, it is nearly always possible to evade them by relying on intermediary computers, outside your country, to reach blocked services for you. This process is often called circumvention, and the intermediary computers are called proxies. Circumvention
  53. 74. Anonymity Networks and Basic Proxy Servers Anonymity networks typically 'bounce' your Internet traffic around between various secure proxies in order to disguise where you are coming from and what you are trying to access. This can significantly reduce the speed at which you are able to load websites and other Internet services. In the case of Tor , however, it also provides a reliable, secure and public means of circumvention that saves you from having to worry about whether or not you trust the individuals who operate your proxies and the websites you visit. As always, you must ensure that you have an encrypted connection, HTTPS , to a secure website before exchanging sensitive information, such as passwords and emails, through a browser.
  54. 75. TOR: What Tor is software, people, and protocol to help people protect their privacy online. https://www.torproject.org/
  55. 76. TOR: Who Citizens – Journalists - Activists <ul><li>Protect from unscrupulous marketers and identity thieves and irresponsible corporations. </li></ul><ul><li>Access Internet information that is behind a national firewall. </li></ul><ul><li>Protect children (IP addresses tracked to location) </li></ul><ul><li>Anonymity gives a voice to the voiceless. </li></ul>
  56. 77. TOR: How To Install and Use
  57. 78. Privacy on Social Networks <ul><li>Ask these questions: </li></ul><ul><li>Who can access the information I am putting online? </li></ul><ul><li>Who controls and owns the information I put into a social networking site? </li></ul><ul><li>What information about me are my contacts passing on to other people? </li></ul><ul><li>Will my contacts mind if I share information about them with other people? </li></ul><ul><li>Do I trust everyone with whom I’m connected? </li></ul>
  58. 79. Social Network Privacy and Security Tips <ul><li>Don’t rely on social platforms as the single host for your information, it is very easy for governments to block access without warning </li></ul><ul><li>Be careful about sharing too much information in your status updates – even if you “trust” your friends </li></ul><ul><li>Avoid stating your location or where you will be </li></ul><ul><li>Only accept friend requests/add friends that you know </li></ul><ul><li>Be careful about automating cross-posting from one service to another, you may be unintentionally sharing sensitive information </li></ul><ul><li>Do not share sensitive information on social network sites in private groups or private messaging </li></ul>
  59. 80. Privacy on Facebook
  60. 81. Privacy Settings Tips on Facebook <ul><li>Have everything set as “Friends Only” (meaning only friends have access to your page) </li></ul><ul><li>Turn off Public Search </li></ul><ul><li>Set it so only friends  of friends can find you </li></ul><ul><li>Set it so only friends can see your friend list, education, location, likes </li></ul><ul><li>Let only friends see your photo’s tagged photo’s     OR </li></ul><ul><li>Only allow “me” to see tagged photos of yourself </li></ul><ul><li>Check your PRIVACY SETTING at least ONCE A MONTH for Facebook changes </li></ul><ul><li>Keep your Facebook account securitized and professional at all times!   </li></ul>
  61. 82. Change the Default Privacy Settings on Facebook This is the default privacy settings which makes a lot of your content available publically. Is that what you want? Change to friends only. 1 2
  62. 83. “ Friends Only” Settings for Connections
  63. 84. Profile Preview
  64. 85. “ Friends Only” Settings for Connections
  65. 86. Friends Only Privacy Settings
  66. 87. Friends Only Privacy Settings
  67. 88. Remove from Public Search and Turn Off Instant Personalization
  68. 89. Remove from Public Search and Turn Off Instant Personalization
  69. 90. Hands-On Time: Explore Your Facebook Privacy Settings Debrief: What Facebook privacy settings did you change and why?
  70. 91. <ul><li>Share Pairs </li></ul><ul><li>Circle Closing </li></ul>Reflection & Closing
  71. 92. Workshop 2: Web Presence Day 2: Strategic Internet Presence: Web Sites and Blogs This project is managed by Institute for International Institute for Education (IIE) Sponsored by the U.S. Department of State Middle East Partnership Initiative (MEPI)
  72. 93. Program Overview
  73. 94. Day Two: Agenda AGENDA OUTCOMES <ul><li>Small steps work best </li></ul><ul><li>Don’t have to implement all social tools to be successful </li></ul><ul><li>Wide range of skills and knowledge in the room </li></ul><ul><li>Everyone will participate </li></ul>FRAMING Leave the room ready to blog and/or make improvements to your web site Introduction, Overview, and Icebreaker Strategic Online Presence Blogging: Why, What, How Reflection
  74. 95. Day Two: Learning Objectives <ul><li>To understand the basics of establishing a web presence or home base that links to strategy goals and audience </li></ul><ul><li>To understand how to write effective blog posts and build community </li></ul><ul><li>To set up a simple organizational blog on the blogger platform </li></ul>
  75. 96. Day 1: Trainer Introductions Insert your photos and names here Day Two: Trainer Introductions
  76. 97. Overnight Reflections Write on a sticky note and place on the wall when done: What was your takeaway from yesterday?
  77. 98. <ul><li>What is one thing you already know or want to learn about establishing an effective web presence? </li></ul><ul><li>What is one thing you already know or want to learn about blogging? </li></ul>Icebreaker: Share Pair
  78. 99. Home and Outposts
  79. 100. We are moving towards turning the organization's web presence from static to more interactive or social. Not every NGO needs a separate website and a blog, some organizations consolidate. The blog is part of the web site. Free blogging platforms like “blogger” give you an easy way to update your content, and if you already have a web site, you can easily add it as an interactive part of your web site. You need to think about how to link or integrate your social media outposts. Home Base: Blogs & Websites
  80. 101. <ul><li>Benefits of a blog </li></ul><ul><li>Easy integration with social outposts </li></ul><ul><li>Improves with your search engine results </li></ul><ul><li>Easy way to keep content updated and fresh </li></ul><ul><li>Gives your NGOs brand visibility </li></ul>Website or Blog or Both?
  81. 102. <ul><li>Consider a blog if …. </li></ul><ul><li>You don’t have a website or web presence </li></ul><ul><li>Your current website is a few static pages </li></ul><ul><li>Your website is not being updated </li></ul>Website or Blog or Both?
  82. 103. Example: NTEN http://www.nten.org
  83. 104. http://www.nten.org NTEN Outpost
  84. 105. Examples: NTEN Blog http://www.nten.org NTEN Blog
  85. 106. http://www.nten.org NTEN Outpost
  86. 107. Example: E-Mediat
  87. 108. E-Mediat Outpost
  88. 109. E-Mediat Jordan Outpost
  89. 110. E-Mediat Jordan Outposts
  90. 111. Example: Nasawiya
  91. 112. Example: Nasawiya
  92. 113. Insert a screen capture from an NGO in your country that has a web site/blog and social outposts Example: Insert from Your Country
  93. 114. <ul><li>Consistent organizational branding </li></ul><ul><li>Intuitive / logical navigation and structure </li></ul><ul><li>Short content that is fresh and updated regularly </li></ul><ul><li>Good visual design </li></ul><ul><li>Links and integrates social outposts </li></ul>What Makes an Effective Home Base?
  94. 115. Effective Home Base
  95. 116. Example: Indianapolis Museum of Art
  96. 117. Insert a screen capture from an NGO in your country that has an effective home base. Insert an Example from Your Country
  97. 118. <ul><li>Small Group Exercise: Participants will work in groups to evaluate their home base using the home base worksheet. </li></ul><ul><li>Group Debrief: </li></ul><ul><li>What ideas did you get on how to improve your home base? </li></ul><ul><li>What works well? </li></ul><ul><li>How might your organization integrate a blog? </li></ul>Improving Your Home Base
  98. 119. <ul><li>Types of blogs </li></ul><ul><li>Editorial focus </li></ul><ul><li>Listening as research for blogging stories </li></ul><ul><li>Types of blog content: form and style </li></ul><ul><li>Who will do the work? </li></ul><ul><li>Measuring success </li></ul>Blogging Overview
  99. 120. Types of Blogs: Organizational Blog
  100. 121. Types of Blogs: Organizational Blog
  101. 122. Types of Blogs: Organizational Blog
  102. 123. Types of Blogs: Voice of a Leader Blog
  103. 124. Types of Blogs: Newsletter
  104. 125. <ul><li>What are you going to write about? </li></ul><ul><li>How will it support your social media strategy objective? </li></ul><ul><li>How can you balance writing about your organization vs. larger issues or topics? </li></ul><ul><li>How will the blog be useful to your audience? </li></ul><ul><li>How often will you publish blog posts? </li></ul><ul><li>Answer all these questions in a brief, written editorial mission statement. </li></ul>Blogging: What is Your Editorial Focus?
  105. 126. <ul><li>Our NGO blog will publish stories about our organization’s program and related topics in our country. Our social media strategy objective is to raise awareness of our organization’s work and to be regarded by others as a leader on the topic. </li></ul><ul><li>Our NGO blog will have 50% of our posts about our programs and 50% about the topic in general. The latter will include how to posts, tips, case studies, and summarize important research. </li></ul><ul><li>Our NGO will publish three blog posts per week that will be written by people on staff and occasional guest bloggers. </li></ul>Blogging: Editorial Mission Statements
  106. 127. Share Pair: Work with a partner and discuss the questions about editorial mission. Write a brief editorial mission statement. Blogging: What’s Your Editorial Focus?
  107. 128. <ul><li>Who are the important NGOs, bloggers, media platforms and thought leaders covering your topic? </li></ul><ul><li>Are there keywords and phrases that you want to track on your listening dashboard to help guide your blogging content? </li></ul><ul><li>Comment on blogs and link to them in your posts. </li></ul>Blogging: Listening & Engaging
  108. 129. <ul><li>Instructional </li></ul><ul><li>Informational </li></ul><ul><li>Research </li></ul><ul><li>Interviews </li></ul><ul><li>Case Study </li></ul><ul><li>Lists </li></ul><ul><li>Tips </li></ul><ul><li>Guest Posts </li></ul>Blogging: Types of Blog Posts
  109. 130. Blog Post Examples: Informational
  110. 131. Blog Post Examples: Instructional
  111. 132. Blog Post Examples: Research Summary
  112. 133. Blog Post Examples: Interviews
  113. 134. Blog Post Examples: Case Study
  114. 135. Blog Post Examples: Tips
  115. 136. Blog Post Examples: Lists
  116. 137. Blog Post Examples: Guest Post
  117. 138. <ul><li>250-750 words, sometimes longer </li></ul><ul><li>Use creative commons images or your own photos to give interest </li></ul><ul><li>Descriptive title, questions help encourage interaction </li></ul><ul><li>First paragraph to state what you’re writing about </li></ul><ul><li>“ Chunk” your text, use headlines </li></ul><ul><li>Make it scannable </li></ul>Blogging: Style Guidelines
  118. 139. <ul><li>A picture is worth a 1,000 word-posts. Blogs with pictures tell a far more interesting story than those without </li></ul><ul><li>There are millions of posts being written, those with photos grab attention </li></ul><ul><li>Photos make your posts more engaging and appeal your reader's emotional senses </li></ul><ul><li>Photos help improve reader comprehension </li></ul><ul><li>Photos add a personal touch to your blogging which invites more conversation </li></ul><ul><li>For those reading via a RSS readers, this encourages them to &quot;pop&quot; out of their reader because RSS readers are text-based designs - scanning the images slows people down </li></ul><ul><li>Photos help with search engine optimization </li></ul><ul><li>Images are good at the start of your post to draw people into reading it </li></ul><ul><li>It is also great to use images throughout your post for visual examples of what you're writing about </li></ul><ul><li>Images may help you make your points in a stronger way </li></ul>Blogging: Use Images!
  119. 140. <ul><li>Logos of organizations you're writing about </li></ul><ul><li>Screen captures if you are talking about a web-based service or something technically related </li></ul><ul><li>Photos of yourself, the writer, or person you are interviewing </li></ul><ul><li>Images that prove a point </li></ul><ul><li>Images that show examples throughout </li></ul><ul><li>the post </li></ul><ul><li>Images as visuals for title </li></ul><ul><li>Images to inspire </li></ul>Blogging: Ways to Use Images
  120. 141. <ul><li>You can take your own with a digital camera, don't need anything fancy </li></ul><ul><li>Screen capture software like &quot;SnagIt“ </li></ul><ul><li>Social photo sharing sites like Flickr, but use Creative Commons licensed photos </li></ul>Blogging: Where to Get Images
  121. 142. Blogging: The Workflow
  122. 143. Blogging: Measuring Success
  123. 144. <ul><li>Set up your organization’s blog in Blogger </li></ul><ul><li>Practice writing different types of posts </li></ul><ul><li>Practice adding images </li></ul>Hands-On Time
  124. 145. <ul><li>Share Pairs </li></ul><ul><li>Circle Closing </li></ul>Reflection & Closing
  125. 146. You are free to use this work as long you attribute The E-Mediat Project. Rules For Using This Content Creative Commons Attribution License

×