The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while reminding personnel to adhere to federal law, avoid classified information, and not imply endorsement. Personnel are personally responsible for content and advised to use good judgment in discussions.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
hello world: the 2010 web and the enterpriseDenise Howell
This document discusses how social media has evolved beyond just a personal communication tool and is now widely used for commercial, business, educational, and other purposes. It notes that distinguishing between different contexts and arenas for social media use can be difficult. It provides advice on appropriate social media use and potential legal issues to consider, such as security, identity theft, intellectual property protection, and differing legal standards globally. It emphasizes the importance of having simple social media policies and training in place, as well as being prepared for potential crises.
Secure social networking involves both benefits and risks. While it allows connecting with friends and family, personal information shared could get into the wrong hands. To protect yourself, only share information with trusted friends and use strong passwords. Parents should talk to children about keeping private details private and being wary of strangers online. Setting privacy levels high, supervising internet use, and checking profiles helps protect kids on social media.
emerging technologies for the ass'n of legal administratorsDenise Howell
The document discusses the changing nature of social media and its implications. It notes that distinctions between personal, educational, and commercial use of social media are breaking down. It warns that one should be careful about posting confidential information or engaging in criminal behavior online. It also addresses issues like security, identity theft, intellectual property, defamation, and differing legal standards globally. The presentation suggests having clear policies on social media use and being prepared to respond quickly to any crises.
The document discusses various online participatory tools and technologies, including social networking sites, file sharing platforms, virtual worlds, blogs, podcasts, and more. It outlines what each tool is, potential benefits of using it, and some risks or issues to consider. The goal is to raise awareness of these technologies and discuss implications for extension services.
A presentation made to the 2008 New Media Institute fellows to help content makers understand social aspects of the web and how to approach user generated content.
Social web refers to how people communicate and connect online through social media sites like Facebook, Twitter, YouTube, Myspace, Gmail, Google, and Yahoo mail. Different social media sites allow sharing of different types of content such as photos, videos, messages, and email. Using social media safely depends on how private or public users make their information and what they share about themselves.
If utilized properly, online platforms can be informative and entertaining, provide feedback from peers, let us connect with others and network with them, and be used for so much more. BUT, Think before entering any content through any platform that may prove to be embarrassing, inappropriate, etc.
Remember, information, photos, opinions, etc. placed online: are often seen by unintended viewers (“frenemies,” potential employers, etc.), have a very long shelf life (even after items are taken down) – posters and bloggers can be relentless, may be placed online without your knowledge or permission, may pop up in a Google search if anyone wants to learn more about you.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
hello world: the 2010 web and the enterpriseDenise Howell
This document discusses how social media has evolved beyond just a personal communication tool and is now widely used for commercial, business, educational, and other purposes. It notes that distinguishing between different contexts and arenas for social media use can be difficult. It provides advice on appropriate social media use and potential legal issues to consider, such as security, identity theft, intellectual property protection, and differing legal standards globally. It emphasizes the importance of having simple social media policies and training in place, as well as being prepared for potential crises.
Secure social networking involves both benefits and risks. While it allows connecting with friends and family, personal information shared could get into the wrong hands. To protect yourself, only share information with trusted friends and use strong passwords. Parents should talk to children about keeping private details private and being wary of strangers online. Setting privacy levels high, supervising internet use, and checking profiles helps protect kids on social media.
emerging technologies for the ass'n of legal administratorsDenise Howell
The document discusses the changing nature of social media and its implications. It notes that distinctions between personal, educational, and commercial use of social media are breaking down. It warns that one should be careful about posting confidential information or engaging in criminal behavior online. It also addresses issues like security, identity theft, intellectual property, defamation, and differing legal standards globally. The presentation suggests having clear policies on social media use and being prepared to respond quickly to any crises.
The document discusses various online participatory tools and technologies, including social networking sites, file sharing platforms, virtual worlds, blogs, podcasts, and more. It outlines what each tool is, potential benefits of using it, and some risks or issues to consider. The goal is to raise awareness of these technologies and discuss implications for extension services.
A presentation made to the 2008 New Media Institute fellows to help content makers understand social aspects of the web and how to approach user generated content.
Social web refers to how people communicate and connect online through social media sites like Facebook, Twitter, YouTube, Myspace, Gmail, Google, and Yahoo mail. Different social media sites allow sharing of different types of content such as photos, videos, messages, and email. Using social media safely depends on how private or public users make their information and what they share about themselves.
If utilized properly, online platforms can be informative and entertaining, provide feedback from peers, let us connect with others and network with them, and be used for so much more. BUT, Think before entering any content through any platform that may prove to be embarrassing, inappropriate, etc.
Remember, information, photos, opinions, etc. placed online: are often seen by unintended viewers (“frenemies,” potential employers, etc.), have a very long shelf life (even after items are taken down) – posters and bloggers can be relentless, may be placed online without your knowledge or permission, may pop up in a Google search if anyone wants to learn more about you.
The document discusses the differences between the author's public and private selves. The author's private self is described as distant, cold, and angry looking, while their public self is all business and analytical. Some similarities between the two selves include caring about responsibilities and communicating effectively. The author aims to be more approachable publicly by smiling more, loosening up, and engaging others in more meaningful conversations.
The document discusses various online participatory tools and applications, including social networking sites, file sharing platforms, VoIP services, social bookmarking, RSS feeds, WiFi networks, collaborative documents, blogging, and their benefits and risks. It provides examples of popular tools for each category and encourages the reader to experiment with the technologies and consider their implications for extension work.
This document discusses social media and its pros and cons. It provides statistics on popular social media platforms and their users. Some benefits of social media include staying connected with others, sharing information and resources, and forming online communities. However, risks include identity theft, inappropriate contact from strangers, and information being publicly available forever. The document concludes by offering tips for parents to help children safely navigate social media, such as maintaining open communication, setting guidelines, and using parental controls and content filters.
This is the PPT I gave in Charlotte. Many people have asked me for it. I do hope the videos uploaded also. If not, I will try to re-do those. Warning: this presentation uses copyright protected materials used under the Multimedia guidelines and fair use exemptions of the U.S Copyright law. Further use is prohibited.
The document summarizes a study of the "rec. motorcycles" online forum from 2000. It discusses how forum members establish credibility through detailed responses using technical jargon. It also notes how anonymity online can reduce inhibitions, allowing "trolls" to disrupt discussions. Finally, it compares individual and group behaviors, suggesting online forums resemble "groups" where people act differently than alone due to less accountability.
Impact of social networking sites- advantages and disadvantagesNi
Social networking sites allow users to create profiles and form relationships with other users. They provide advantages like fast communication, sharing interests and information with friends. However, they also have disadvantages such as lacking emotional connection, decreasing face-to-face skills, and reducing family closeness. Social networking sites also enable users to communicate directly but can facilitate laziness and create distractions.
Blogs are websites maintained by an individual with regular entries of commentary and media posts. There are many types of blogs including personal blogs, media blogs, and genre-focused blogs. Blogging became popular in the 1990s and early pioneers included Justin Hall and Jerry Pournelle. Legal issues can arise from employment blogging, and bloggers have faced termination or fines for discussing work or criticizing employers. Creating and maintaining a blog requires a computer, internet access, and hosting platform.
Facebook is a social networking website launched in 2004 by Mark Zuckerberg and his Harvard classmates. It allows users to chat, share photos and videos, play games, and connect through groups and events. The document provides tips for staying safe on Facebook, such as keeping private information private, using strong passwords, and adjusting privacy settings. It also lists additional resources for internet safety. Facebook allows free communication between friends and for finding people with shared interests, though it should be used in moderation and for positive purposes only.
As part of a workshop series in Serbia July 2015 focused on "New Media, Practical Skills" I presented this discussion captured in this powerpoint. The original was created in Keynote.
The document discusses cyber bullying, including defining it as bullying that occurs over digital devices. It then lists the most common places cyber bullying occurs such as social media and text messages. The document also discusses the effects of cyber bullying and how to prevent it, including talking to children and setting rules. Finally, it outlines five types of cyberbullying like harassment, flaming, and masquerading.
Delicious pinterest and other social bookmarking and news toolsUWSMC2012
This document provides information on social bookmarking and social news tools, including Delicious, Digg, Reddit, Pinterest, and StumbleUpon. It includes a table comparing the sites on key metrics like audience demographics, year launched, Alexa global and US traffic ranks, pros and cons. It also defines what an Alexa traffic rank measures and how it is calculated based on page views and users over a rolling three month period.
The document discusses cyber bullying, defining it as bullying that occurs through digital devices. It outlines the most common places cyber bullying occurs, such as social media, texts, and email. The document also discusses how to prevent cyber bullying by educating children and setting rules, and describes the effects of cyber bullying like anxiety and depression. Finally, it identifies five types of cyberbullying: harassment, flaming, exclusion, outing, and masquerading.
Social networking websites have evolved significantly since early sites in the 1990s. Modern sites allow users to connect through sharing content, messages, and activities. While social media makes communication easier and allows networking on a large scale, there are also criticisms such as privacy and security issues. Successful founders like Mark Zuckerberg created hugely popular sites like Facebook and showed how social media can be profitable. However, overuse of social media may encourage antisocial behaviors and vague assumptions about others. Overall social networking provides benefits of easy connections but also risks if not used carefully.
The document provides an outline of key topics covered in a lecture on the foreign exchange market. It discusses:
- The main participants in the FX market such as banks, corporations, investors, and central banks.
- The types of FX transactions including spots, forwards, swaps, and cross-currency transactions.
- How FX rates are quoted, including direct and indirect quotes, and how to calculate forward rates from spots.
- How triangular arbitrage can be used to profit from temporary price discrepancies between currencies.
- How to calculate the appreciation or depreciation of one currency relative to another from changes in exchange rates over time.
Vopak provides storage and logistics services for oil, chemicals, and other products. They operate tank terminals that are integrated into industrial parks and chemical clusters. Vopak's terminals offer storage, transport, blending, and other services to major oil and chemical companies. The document discusses Vopak's role in facilitating global product flows and their focus on developing ports and terminals that have strategic locations, infrastructure to handle large volumes and vessel sizes, and connections to hinterland transport networks. It also highlights opportunities for port development in Indonesia given its strategic location for regional trade.
The document describes a firearms training simulator called the SMS. The SMS allows for beginner, intermediate, and advanced simulated firearms training indoors. It provides a safe way for trainees to practice shooting scenarios, decision making, and develop skills like target acquisition. The portable system uses lasers and video projection to simulate live fire training anywhere without needing to transport trainees to a range.
Are you considering hydroponic or aquaponic indoor growing? Here's a presentation to a Horticulture class at Triton College in Illinois that will answer some questions. Continue the conversation on Facebook - Root 66 Aquaponics.
Online radio monetization is a reality, though the market is fragmented with thousands of players. While the top 3 national radios get 95% of radio investments in Spain, regional and local stations have tremendous untapped audiences and influence potential with just 5% of investments. Formats without borders like audio and video podcasts are growing. Social networks are important for branding and audiences aggregation. New technologies and consumption habits continue evolving the ecosystem. "
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
The document discusses the differences between the author's public and private selves. The author's private self is described as distant, cold, and angry looking, while their public self is all business and analytical. Some similarities between the two selves include caring about responsibilities and communicating effectively. The author aims to be more approachable publicly by smiling more, loosening up, and engaging others in more meaningful conversations.
The document discusses various online participatory tools and applications, including social networking sites, file sharing platforms, VoIP services, social bookmarking, RSS feeds, WiFi networks, collaborative documents, blogging, and their benefits and risks. It provides examples of popular tools for each category and encourages the reader to experiment with the technologies and consider their implications for extension work.
This document discusses social media and its pros and cons. It provides statistics on popular social media platforms and their users. Some benefits of social media include staying connected with others, sharing information and resources, and forming online communities. However, risks include identity theft, inappropriate contact from strangers, and information being publicly available forever. The document concludes by offering tips for parents to help children safely navigate social media, such as maintaining open communication, setting guidelines, and using parental controls and content filters.
This is the PPT I gave in Charlotte. Many people have asked me for it. I do hope the videos uploaded also. If not, I will try to re-do those. Warning: this presentation uses copyright protected materials used under the Multimedia guidelines and fair use exemptions of the U.S Copyright law. Further use is prohibited.
The document summarizes a study of the "rec. motorcycles" online forum from 2000. It discusses how forum members establish credibility through detailed responses using technical jargon. It also notes how anonymity online can reduce inhibitions, allowing "trolls" to disrupt discussions. Finally, it compares individual and group behaviors, suggesting online forums resemble "groups" where people act differently than alone due to less accountability.
Impact of social networking sites- advantages and disadvantagesNi
Social networking sites allow users to create profiles and form relationships with other users. They provide advantages like fast communication, sharing interests and information with friends. However, they also have disadvantages such as lacking emotional connection, decreasing face-to-face skills, and reducing family closeness. Social networking sites also enable users to communicate directly but can facilitate laziness and create distractions.
Blogs are websites maintained by an individual with regular entries of commentary and media posts. There are many types of blogs including personal blogs, media blogs, and genre-focused blogs. Blogging became popular in the 1990s and early pioneers included Justin Hall and Jerry Pournelle. Legal issues can arise from employment blogging, and bloggers have faced termination or fines for discussing work or criticizing employers. Creating and maintaining a blog requires a computer, internet access, and hosting platform.
Facebook is a social networking website launched in 2004 by Mark Zuckerberg and his Harvard classmates. It allows users to chat, share photos and videos, play games, and connect through groups and events. The document provides tips for staying safe on Facebook, such as keeping private information private, using strong passwords, and adjusting privacy settings. It also lists additional resources for internet safety. Facebook allows free communication between friends and for finding people with shared interests, though it should be used in moderation and for positive purposes only.
As part of a workshop series in Serbia July 2015 focused on "New Media, Practical Skills" I presented this discussion captured in this powerpoint. The original was created in Keynote.
The document discusses cyber bullying, including defining it as bullying that occurs over digital devices. It then lists the most common places cyber bullying occurs such as social media and text messages. The document also discusses the effects of cyber bullying and how to prevent it, including talking to children and setting rules. Finally, it outlines five types of cyberbullying like harassment, flaming, and masquerading.
Delicious pinterest and other social bookmarking and news toolsUWSMC2012
This document provides information on social bookmarking and social news tools, including Delicious, Digg, Reddit, Pinterest, and StumbleUpon. It includes a table comparing the sites on key metrics like audience demographics, year launched, Alexa global and US traffic ranks, pros and cons. It also defines what an Alexa traffic rank measures and how it is calculated based on page views and users over a rolling three month period.
The document discusses cyber bullying, defining it as bullying that occurs through digital devices. It outlines the most common places cyber bullying occurs, such as social media, texts, and email. The document also discusses how to prevent cyber bullying by educating children and setting rules, and describes the effects of cyber bullying like anxiety and depression. Finally, it identifies five types of cyberbullying: harassment, flaming, exclusion, outing, and masquerading.
Social networking websites have evolved significantly since early sites in the 1990s. Modern sites allow users to connect through sharing content, messages, and activities. While social media makes communication easier and allows networking on a large scale, there are also criticisms such as privacy and security issues. Successful founders like Mark Zuckerberg created hugely popular sites like Facebook and showed how social media can be profitable. However, overuse of social media may encourage antisocial behaviors and vague assumptions about others. Overall social networking provides benefits of easy connections but also risks if not used carefully.
The document provides an outline of key topics covered in a lecture on the foreign exchange market. It discusses:
- The main participants in the FX market such as banks, corporations, investors, and central banks.
- The types of FX transactions including spots, forwards, swaps, and cross-currency transactions.
- How FX rates are quoted, including direct and indirect quotes, and how to calculate forward rates from spots.
- How triangular arbitrage can be used to profit from temporary price discrepancies between currencies.
- How to calculate the appreciation or depreciation of one currency relative to another from changes in exchange rates over time.
Vopak provides storage and logistics services for oil, chemicals, and other products. They operate tank terminals that are integrated into industrial parks and chemical clusters. Vopak's terminals offer storage, transport, blending, and other services to major oil and chemical companies. The document discusses Vopak's role in facilitating global product flows and their focus on developing ports and terminals that have strategic locations, infrastructure to handle large volumes and vessel sizes, and connections to hinterland transport networks. It also highlights opportunities for port development in Indonesia given its strategic location for regional trade.
The document describes a firearms training simulator called the SMS. The SMS allows for beginner, intermediate, and advanced simulated firearms training indoors. It provides a safe way for trainees to practice shooting scenarios, decision making, and develop skills like target acquisition. The portable system uses lasers and video projection to simulate live fire training anywhere without needing to transport trainees to a range.
Are you considering hydroponic or aquaponic indoor growing? Here's a presentation to a Horticulture class at Triton College in Illinois that will answer some questions. Continue the conversation on Facebook - Root 66 Aquaponics.
Online radio monetization is a reality, though the market is fragmented with thousands of players. While the top 3 national radios get 95% of radio investments in Spain, regional and local stations have tremendous untapped audiences and influence potential with just 5% of investments. Formats without borders like audio and video podcasts are growing. Social networks are important for branding and audiences aggregation. New technologies and consumption habits continue evolving the ecosystem. "
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
Mobile future-in-focus-report-2013 copyjustincorbett
The document discusses the rapidly changing mobile landscape in the United States. Smartphone adoption surged nearly 30% to over 120 million owners in 2012, while tablets reached nearly 50 million owners. This widespread adoption of smartphones and tablets has ushered in a "Brave New Digital World" where 1 in 3 minutes of digital media consumption now occurs on mobile devices beyond personal computers. This multi-platform consumption is fragmenting audiences and disrupting traditional business models.
A set of slides showing a range of workplace texts that can be used as basis for discussion with new care workers to explore reading and conversation skills.
Farm tanks are constructed to harvest rainwater in rural areas. The construction involves digging an area and lining it with a polythene sheet called agrifilm to create a water collection area. The site should be appropriately sized and located to collect rainwater and runoff but avoid areas that are too stony or salty. The embankment around the tank should be high enough to allow access and the depth of the tank should be between 3 to 5 meters to reduce pressure on the bottom. Agrifilm is anchored around the sides and trenches are dug to hold it in place and prevent weeds from growing to effectively collect and store water for small farm needs in a cost effective manner.
The document provides information on prepositional phrases with "at", "in", and "on", subjects and objects in sentences, popular activities in the US, how to use "have to" and "want to" in affirmative, negative, and interrogative sentences, and examples of invitations using "want to" and "would like to".
We have learned about 'Iron' in detail in the previous presentation: 'Materials Part I'. In part II, we will study about other metals like Copper, Aluminum, their advantages etc. We will also learn about other materials like wood, cement, their advantages, disadvantages and uses etc.
L'Associazione Pro Loco di Maenza promuove la prima edizione del festival “MaenzAcustica”, dedicato alla musica unplugged.
Il festival vuole valorizzare particolarmente i musicisti, singoli o gruppi, che producono musica originale nello stile e nell’interpretazione, attenti a definire un proprio percorso artistico ed una propria identità musicale e favorendo la valorizzazione non solo a livello locale.
This document advertises a product that provides the full text of the new Family Procedure Rules along with commentary and a thematic case index, all accessible on a laptop, for only £85 per year including updates and support.
This document provides vocabulary and grammar lessons about asking and describing things in English. It covers asking what something is using "What's this?" and "What are these?". Possessive adjectives like "my", "your", "our" are explained. Questions using "Where" and locations like "in my pocket" are discussed. Descriptions of personality, appearance, and clothing are provided. Colors and articles of clothing are also covered. The document teaches how to ask and describe the weather.
The document appears to be a set of questions and answers related to automotive brands and companies. It includes questions about the Society of Automotive Engineers, Tata Indica, Maruti Suzuki models, Toyota vehicles, and logos of companies like Boeing, Yamaha, Mercedes-Benz and others. The questions test knowledge of origins of company names, sales milestones, and executive careers in contexts related to the automotive industry.
Essential for Living the Christ-like LifeDanny Thomas
Paul exhorts the Colossians to continue in prayer that is faithful, watchful, and thankful. He asks them to pray for him that God may open doors for him to preach about Christ. Paul also instructs them to walk wisely among outsiders and redeem the time, and to let their speech be gracious and thoughtful. If these three exhortations about prayer, conduct, and speech are followed, it can powerfully impact one's life and allow Christ to transform every aspect of who they are.
The DON released guidance in June 2010 regarding unofficial internet posts by DON personnel. The guidance applies to any personal comments, photos, videos or graphics posted online by DON personnel in a non-official capacity. It encourages responsible engagement online about Navy and Marine Corps topics while advising personnel to avoid posting classified information, follow all applicable laws and regulations, and use good judgment in their online activities. The guidance provides tips on privacy, security, and legal issues for DON personnel using social media.
The document provides guidance for Department of Navy (DON) personnel regarding their use of social media and unofficial internet posts. It encourages DON personnel to responsibly engage online about Navy and Marine Corps topics, while reminding them to protect classified/sensitive information, respect privacy, and comply with all applicable laws and regulations. Personnel are personally responsible for any content they post and should make clear if expressing personal rather than official views.
Don guidance for_unofficial_posts_-_explainedBarbara Kessler
The document provides guidance for Department of Navy (DON) personnel regarding their use of social media and unofficial internet posts. It encourages DON personnel to responsibly engage online about Navy and Marine Corps topics, while reminding them to protect classified/sensitive information, respect privacy, and comply with all applicable laws and regulations. Personnel are personally responsible for any content they post and should make clear if expressing personal rather than official views.
This document provides information and guidance about safe and responsible use of social media for military personnel. It discusses Department of Defense social media policies, how to represent the military professionally online, and risks like identity theft and security breaches. Specific tips are given around privacy settings, avoiding sharing sensitive personal details or locations. Resources and contacts are provided to help military members learn about social media best practices.
The document provides best practices guidelines for Army personnel engaging in social media. It discusses policies around social media use and outlines tactics for implementing platforms like blogs, Facebook, and Twitter. The key points are:
1) Army personnel must maintain professional conduct online and remember policies around operations security and the Uniform Code of Military Justice.
2) Effective social media use requires planning, resources to maintain sites, and engagement with audiences.
3) Platforms like blogs and Facebook should present an official perspective and engage communities through content and comments.
4) Personnel must identify their Army affiliation online and make their commander aware of any personal blogs or profiles. Operations security and policies still apply to personal sites.
Navy personnel are encouraged to use social media responsibly while being aware of potential risks. The document provides guidance on safe social media use, noting that information posted online can be seen by everyone and remain forever. It lists ways to mitigate risks like using privacy settings, not discussing sensitive information, and avoiding sharing personally identifiable information. Statistics show that 75% of Sailors use social media and there are over 500 official Navy social media presences.
This document provides guidance on maintaining operational security (OPSEC) on social media. It advises avoiding sharing details about military service members' locations, units, future ship or base movements, personal information and schedules. The document outlines specific information that should not be shared, such as overseas base descriptions, unit morale or future plans. It suggests more general discussions of service, deployments and support for the military. Readers are encouraged to educate others on OPSEC and report any potential violations. Maintaining privacy settings and being cautious of online connections is also advised.
The document provides best practices for using social media platforms like Facebook, blogs, and Twitter for Army public affairs and engagement. It outlines guidelines for setting up official profiles and pages, including using .mil domains when possible and maintaining OPSEC. The document advises having a strategic plan, committing resources to maintain a presence, and being willing to engage with audiences. It also provides examples of effective military leaders' social media pages.
This document provides guidance on using social media for the Air Force. It includes tips for leaders, Airmen, families and an introduction to common social media platforms and trends. Leaders are encouraged to use social media to connect with audiences and share stories. Airmen should represent core values and be cautious of sensitive information. Families can use social media to support Airmen but should avoid oversharing details. The document also covers hashtags, geotagging and telling the Air Force story on social media.
This document provides guidance on using social media for the Air Force. It discusses social media use for Air Force leaders, Airmen, and families. It also covers common social media platforms and tips, including how to use hashtags to tell the Air Force story. The document encourages sharing experiences as an Airman or family member while maintaining security and following Air Force policies.
This document discusses operational security (OPSEC) considerations for using social media. It provides tips for safe social media use such as being careful about what personal information is posted, using privacy settings, disabling geotagging, and being aware that even seemingly harmless posts can potentially put soldiers, families and missions at risk if they provide too many details to adversaries. Specific concerns are outlined for units, families, family readiness groups and children using social media. The document emphasizes that OPSEC should always be the top priority for anyone in the Army community using social media.
U.S. Navy Command Leadership Social Media HandbookDouglas Burdett
This document provides guidelines for Navy commands regarding the use of social media. It discusses defining social media and relevant DoD and Navy policies. It provides guidance on communicating expectations to sailors regarding safe social media use and avoiding OPSEC violations. It also offers tips for commands regarding setting communication objectives, content strategies, and selecting and managing social media platforms. The overall aim is to help commands incorporate social media effectively while maintaining standards of conduct.
This document provides guidance on operations security (OPSEC) best practices for social media use. It warns that too much personal information shared online could aid adversaries by revealing details about service members, their families, units, and ship/base locations. Specific examples are given of information that should not be shared, such as deployment status, schedules, contact details, and technical or tactical military information. The document encourages educating social media followers on OPSEC and monitoring for potential violations. Overall, its message is to be cautious with personal details and only share information that is already publicly known.
Counties and new social media | Wisconsin Counties Association (WCA) Annual C...Wendy Soucie
The document discusses using social media for counties and bike tourism in Columbia County, Wisconsin. It provides guidance on developing social media policies and procedures, including having a business need, policy, procedures, and definitions. It also discusses using specific social media tools like Facebook, Twitter, YouTube and MapMyRide to promote bike tourism in Columbia County and help route US Bicycle Route 30 through the county. Speakers provided examples of using social media for emergency response and engaging partners to maximize efforts.
Examine national and local nonprofit organizations in crisis and look at ways to prepare for crisis and reduce the negative effects of crisis when present.
7 things presentation 4.1.11 slideshareSteve Radick
The document summarizes 7 things about social media that are not typically learned in college. 1) People on social media are actual individuals, not just audiences or demographics. 2) The number of social media followers or likes does not define a person. 3) Having a career solely in social media is not realistic. 4) Not everyone is suited for social media management. 5) Innovative ideas are often not as groundbreaking as thought. 6) Everything posted can be public and permanent. 7) There will be rude people online, so avoid being rude yourself.
This document discusses what happens to a person's digital assets when they die or become disabled. It notes that most people have accumulated significant "digital stuff" like photos, emails, social media accounts, finances and digital media purchases. The document outlines steps to take to plan for these digital assets, including creating an inventory, naming a "digital personal representative" and including any special instructions. It provides examples of how different social media platforms and companies handle deceased users' accounts. The document emphasizes the importance of having your wishes in writing to avoid headaches for loved ones later.
This document discusses what happens to a person's digital assets when they die or become disabled. It notes that most people have accumulated significant "digital stuff" like photos, emails, social media accounts, finances and digital media purchases. The document outlines steps to take to plan for these digital assets, including creating an inventory, naming a "digital personal representative" and including any special instructions. It provides examples of how different social media platforms and companies handle deceased users' accounts. The document emphasizes the importance of having your wishes in writing to avoid headaches for loved ones later.
The document discusses the U.S. Army's use of social media and its strategy for an official presence across various platforms. It provides background on the Department of Defense's social media policy, an overview of where the different military services are currently active on sites like Facebook, YouTube, Flickr and Twitter, and how the Army is integrating social media into its everyday communication efforts. It also explores possibilities for using social media to augment distributed learning and shares lessons learned from the Army's social media efforts.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
1. DEPARTMENT OF THE NAVY (DON)
GUIDANCE FOR UNOFFICIAL
INTERNET POSTS
SOCIAL MEDIA GUIDANCE
2. DON released guidance in June 2010
regarding unofficial internet posts
We’re going to break it
down for you…
highlighting what you
need to know
You can read it yourself here,
http://www.slideshare.net/USNavySocial
Media/don-guidance-for-unofficial-
internet-posts
SOCIAL MEDIA GUIDANCE
3. HEY—We’re talking to YOU!
“DON personnel” on
this guidance refers to
all active-duty, reserve,
and civilian
Department of the
Navy personnel to
include all Sailors and
Marines
SOCIAL MEDIA GUIDANCE
4. This applies to anything you say
(write/post/share) on the internet
that is NOT in an official Navy capacity
• Content includes, but is not limited to,
personal comments, photographs,
video, and graphics.
• Internet sites include social networking
sites, blogs, forums, photo and
video-sharing sites, and other sites to
include sites not owned, operated or
controlled by the DON or DOD. Yup, applies to this
photo, too!
SOCIAL MEDIA GUIDANCE
5. SUMMARY: We want you to engage
online, responsibly!
DON personnel are encouraged to responsibly engage in unofficial
Internet posts about the Navy and Marine Corps and DON-related topics
The Navy and Marine
Corps perform valuable Polite, helpful and
services around the world responsible
engagement!
every day and DON
personnel are often in the
best position to share the
Navy and Marine Corps’
story with domestic and
foreign publics
SOCIAL MEDIA GUIDANCE
6. 20 THINGS YOU
NEED TO KNOW
TIPS FOR KEEPING SAFE AND STAYING
OUT OF TROUBLE ONLINE
SOCIAL MEDIA GUIDANCE
7. 1. YOU arE pErSONallY
rESpONSIblE fOr YOUr acTIONS
• Ensure Navy and Marine Corps content “Use your best
judgment,
is accurate and appropriate shipmates!”
• Be thoughtful about the non-service
related content you post
• Be aware that you lose control over
content once posted on the Internet
• Always use your best judgment and
keep in mind how the content of their
posts will reflect upon yourself, your
command, and the Navy or Marine
Corps – now and in the future!
SOCIAL MEDIA GUIDANCE
8. 2. DON’T brEaK THE laW
• Adhere to Federal law, DOD, and DON
regulations and policies online
• If you violate Federal law, regulations or
policies, you are subject to disciplinary
action under the Uniform Code of
Military Justice (UCMJ)
SOCIAL MEDIA GUIDANCE
9. 3. IDENTIfY YOUrSElf
• If appropriate, identify
yourself as DON personnel,
to include your rank, military
component (e.g., Captain
Smith, USMC), and status
(active or reserve)
• If you decide not to identify
yourself as such, you should When expressing personal opinions, make clear that
not disguise, impersonate or you are speaking for yourself and not on behalf of the
otherwise misrepresent your DON when the subject deals with Navy or Marine
identity or affiliation with the Corps issues. Use a disclaimer such as: “the postings
DON on this site are my own and don’t represent
Navy/Marine Corps’ positions or opinions.”
SOCIAL MEDIA GUIDANCE
10. 4. If YOU WOUlDN’T SaY IT TO
YOUr GraNDma, DON’T pOST IT
• Don’t say/post anything that
could be perceived as:
– Defamatory
– Libelous
– Obscene
– Abusive
– Threatening Quick Reference Definitions
– Racially or ethnically hateful Defamatory: (adj) injurious to someone's
name or reputation
– Otherwise offensive or illegal
Libelous: (adj) harmful and often untrue;
tending to discredit or malign
SOCIAL MEDIA GUIDANCE
11. 5. avOID SpIllaGE
• Do not post any information that is:
– Classified (Confidential, Secret, Top Secret)
– Controlled unclassified information (CUI)
– Sensitive but Unclassified (SBU) (For Official Use Only (FOUO),
Law Enforcement Sensitive (LES), Sensitive Homeland Security
Information, Security Sensitive Information (SSI), Critical
Infrastructure Information (CII), etc.)
– Or might otherwise violate operations security (OPSEC)(tactics,
troop movements, force size, weapon system details, etc)
• When in doubt, DON personnel should contact the unit operations
officer, security officer, intelligence officer, or public affairs officer
for guidance.
SOCIAL MEDIA GUIDANCE
12. 6. prOTEcT YOUr prIvacY
• Don’t share:
– Your Social Security number
– Home address
– Birthday
– Birth place
– Driver’s license number
– Other personally identifying information
• By piecing together information provided on
different websites, criminals and adversaries can
use information to, among other things, steal
your passwords and impersonate you.
http://www.fitceleb.com/node/7837
SOCIAL MEDIA GUIDANCE
13. 7. prOTEcT THE prIvacY Of
OTHErS
• Don’t post information that would infringe upon the
privacy, proprietary, or personal rights of others
• SUCH AS…
– Contact information (email address, home address, phone
numbers, etc.)
– Physical location
SOCIAL MEDIA GUIDANCE
14. 8. DON’T brEaK THE laW
(DIDN’T WE alrEaDY SaY THIS?)
• Don’t use any words, logos or
other marks if such posting would
infringe upon the trademark,
service mark, certification mark, or
other intellectual property rights of
the owners of such marks without
the permission of such owners
SOCIAL MEDIA GUIDANCE
15. 9. USE DON GrapHIcS aS
apprOprIaTE
•Use of Department of the Navy, and Marines Corps
Seals is restricted to OFFICIAL USE ONLY (SECNAVINST
5030.4A).
•Use of other Navy and Marines Corps symbols is
permissible in unofficial posts so long as the
symbols are used in a manner that does not bring
discredit upon the department, does not result in
personal financial gain, and does not give the
impression of official or implied endorsement. Any
other use requires permission. Contact your public
affairs officer if you have any questions.
•DON personnel who violate the use of DON Browse the Navy Graphics Library for
seals, posters, logos and more!
symbols are potentially subject to legal
proceedings. http://www.navy.mil/view_ggphotos.asp
SOCIAL MEDIA GUIDANCE
16. 10. DON’T SHarE INfOrmaTION
THaT IS NOT apprOvED fOr
pUblIc rElEaSE
Not memos, not e-mails, not
meeting notes, not message
traffic, not white papers, not
public affairs guidance, not
pre-decisional materials, not
investigatory information,
not proprietary
information…
“Released” = OK to post/share!
JUST DON’T DO IT!
SOCIAL MEDIA GUIDANCE
17. 11. TalK abOUT WHaT YOU
KNOW bEST
Only discuss Navy or
Marine Corps issues
related to your
professional JAG Officers
expertise, personal discussing
experiences, or what life in
personal knowledge the US Navy
JAG Corps is
like = within
their area of
expertise!
SOCIAL MEDIA GUIDANCE
18. 12. cOrrEcT
mISINfOrmaTION pOlITElY
A discussion on the U.S. Navy Facebook Page raised
concerns over OPSEC among fans. No OPSEC
• Professionally and
violation, in fact, took place and Navy responded:
respectfully correct errors
and misrepresentations
made, by others, about
the Navy or Marine Corps
• Not sure if you have
accurate information to
correct error? Refer to
the chain of command or
public affairs for guidance
SOCIAL MEDIA GUIDANCE
19. 13. DON’T GET pOlITIcal
• You can express your political opinion within DoD guidelines:
– You can express your political views on public issues or political candidates
online, but not as part of an organized communication campaign
– If your communication identifies you as a member of DoD/DON it should clearly
state the opinions are yours
– You cannot solicit votes for or against a party, candidate, cause
– You cannot participate in any interview or discussion as an advocate for or
against a party, candidate, cause
– Commissioned officers must avoid contemptuous words against the President,
Vice President, SECDEF, Dept. Secretary (i.e. SECNAV), Governor and Legislature
of any state he or she is on duty in or present (THIS IS FEDERAL LAW)
• Don’t express or imply Navy or Marine Corps endorsement of
any opinions, products or causes
Source: Department of Defense Directive 1344.10
SOCIAL MEDIA GUIDANCE
20. 14. lOOK OUT fOr baD GUYS
• Do not click links or open attachments
unless the source can be trusted!
Emails may appear to
come from your friends,
but beware of suspicious
emails or links like these
• Cyber criminals pretend to be people they are not in order to
deceive DON personnel into performing actions that launch
cyber attacks, download viruses, and install malware and
spyware onto computers
SOCIAL MEDIA GUIDANCE
21. 15. USE STrONG paSSWOrDS
• Whenever possible, use at least 14 characters or more.
• The greater the variety of characters in your password, the
better.
• Use the entire keyboard, not just the letters and characters
you use or see most often.
• Have a different password for every login
• Avoid:
– Dictionary words in any language.
– Words spelled backwards, common misspellings, and abbreviations.
– Sequences or repeated characters.
– Personal information.
Source: Microsoft Online Safety (http://www.microsoft.com/protect/fraud/passwords/create.aspx)
SOCIAL MEDIA GUIDANCE
22. 16. DON’T GraNT accESS TO
pEOplE YOU DON’T KNOW
• This includes “friends” and “followers” on social networks
• “Friends” and “followers” are considered relationships that
can affect your security clearance, so make sure
you only make connections with people you know well
Really?!? Do you know this guy?
SOCIAL MEDIA GUIDANCE
23. 17. cHOOSE applIcaTIONS
WISElY
• Applications (e.g. Farmville on Facebook) may
share your personal information with other
users on Facebook AND external to Facebook
• Check the settings of EACH application you
use before “allowing access”
SOCIAL MEDIA GUIDANCE
24. 18. cHEcK prIvacY SETTINGS
• Don’t accept default privacy
settings
• See guidance for minimum
Facebook privacy settings
• Make sure only your family and
friends (people you know WELL)
can see your photos, full name
and other information http://www.slideshare.net/USNavySocialMedia/reco
• Assume that all information
mmended-facebook-privacy-settings-august-2010
shared can be made public (as in
someone can find it on Google!)
SOCIAL MEDIA GUIDANCE
25. 19. lOOK OUT fOr INTrUDErS
• Notice any changes to your account that you
didn’t make?
1. Change your password
2. Think about how someone may have received access to
your site and make appropriate changes to avoid that in
the future
• Check your accounts daily for possible use or
changes by unauthorized users
SOCIAL MEDIA GUIDANCE
26. 20. USE aNTI-vIrUS aND
aNTI-SpYWarE
• Use anti-virus and anti-spyware software on your personal
computer and keep them up to date!
• DON Personnel can download free anti-virus software from Navy
Information Assurance at https://infosec.navy.mil/av/index.jsp
• There is also free software available online*:
– AVG Anti-virus: http://free.avg.com/
– Avast Anti-Virus: http://www.avast.com/
– Ad Aware Anti-Spyware: www.lavasoft.com/products/ad_aware_free.php
– Microsoft Security Essentials (Anti-Virus & Anti-Spyware):
http://www.microsoft.com/security_essentials/
* No endorsement intended, there are plenty of other free and paid for anti-virus and anti-spyware
software available online. These are just a few we found .
SOCIAL MEDIA GUIDANCE
27. For answers to social media
questions, contact your local public
affairs office or CHINFO
CDR Scott McIlnay LT Lesley Lykins
Director, Emerging Media Integration (OI-54) Deputy, Emerging Media Integration (OI-54A)
Department of the Navy, Office of Information Department of the Navy, Office of Information
Office:(703) 692-4718 Office:(703) 695-6915
Fax:(703) 692-9046 Fax:(703) 692-9046
Email: scott.mcilnay@navy.mil Email: lesley.lykins@navy.mil
FB: /scott.mcilnay FB: /lesleylykins
Twitter: @smcilnay Twitter: @lyfsgr8
SOCIAL MEDIA GUIDANCE
28. Can’t get enough?
• Responsible and Effective Use of Internet-based Capabilities, Directive Type Memorandum 09-026
(DTM 09-026)
• Joint Ethics Regulation, Department of Defense 5500.7-R
http://www.dod.mil/dodgc/defense_ethics/ethics_regulation/jer1-6.doc
• Political Activities by Members of the Armed Forces, Department of Defense Directive 1344.10
http://www.dtic.mil/whs/directives/corres/pdf/134410p.pdf
• Handling Dissident and Protest Activities Among Members of the Armed Forces, Department of
Defense Directive 1325.06 http://www.dtic.mil/whs/directives/corres/pdf/132506p.pdf
• Department of the Navy Privacy Program, Secretary of Navy Instruction 5211.5E
http://doni.daps.dla.mil/Directives/05000%20General%20Management%20Security%20and%20Safety%20Servic
es/05-200%20Management%20Program%20and%20Techniques%20Services/5211.5E.pdf
• Department of the Navy Public Affairs Policy and Regulations, Secretary of the Navy Instruction
5720.44B
http://doni.daps.dla.mil/Directives/05000%20General%20Management%20Security%20and%20Safety%20Servic
es/05-700%20General%20External%20and%20Internal%20Relations%20Services/5720.44B.pdf
• Department of the Navy Policy for Content of Publicly Accessible World Wide Web Sites, Secretary
of the Navy Instruction 5720.47B
http://doni.daps.dla.mil/Directives/05000%20General%20Management%20Security%20and%20Safety%20Servic
es/05-700%20General%20External%20and%20Internal%20Relations%20Services/5720.47B.pdf
SOCIAL MEDIA GUIDANCE