The document provides best practices for using social media platforms like Facebook, blogs, and Twitter for Army public affairs and engagement. It outlines guidelines for setting up official profiles and pages, including using .mil domains when possible and maintaining OPSEC. The document advises having a strategic plan, committing resources to maintain a presence, and being willing to engage with audiences. It also provides examples of effective military leaders' social media pages.
This document provides an introduction and overview of Army social media. It discusses how the communication revolution and rise of social media has changed how information spreads and how the Army has adopted a proactive approach to social media engagement. It defines Army social media as including social networking sites, media sharing sites, blogs, and microblogs used to communicate with larger audiences faster. The document explains that Army social media impacts all members of the Army family as an important tool for messaging and outreach both within installations and to external audiences.
This document discusses the use of social media by the military. It begins by defining key concepts like social influence, social media, weapons, and memes. It then outlines the social media landscape and how the US military and NATO are using platforms like Facebook, Twitter, and websites. The document performs a SWOT analysis of social media and identifies requirements like resources, training, and trust. It concludes that while social media is not a magic solution, it can be operationally relevant if properly analyzed, assessed, and resourced.
This document discusses psychological warfare tactics such as propaganda and disinformation used to undermine an enemy's will to resist. It describes how military psyops target the morale of enemy soldiers and civilians. The document then outlines how Marxist revolutionaries and cultural Marxists have used psychological warfare techniques like spreading propaganda through media and education to promote their ideologies and undermine Western societies from within over the long term. It warns that through these psyops tactics, societies can become indoctrinated, distracted, depressed, degraded, divided, and ultimately defeated without direct military confrontation.
Body Image and Social Media - An important area for wellbeing and mental health. Presentation at the Royal College of Psychiatrists, London, UK, for Mental Health Awareness Week.
This document provides an overview of counterintelligence, including defining it as efforts to protect intelligence operations from hostile nations. It outlines the three types of counterintelligence - collection, defensive, and offensive. It describes how intelligence is safeguarded internally and issues around classifying information. Key terms like defector, double agent, and mole are defined. Historical spies like Aldrich Ames, Robert Hanssen, and Jonathan Pollard are also mentioned.
Week 1 Media and Information Literacy.pptxLeoDioneda1
This document outlines a lesson plan on media and information literacy. It includes 4 learning tasks: 1) tracking personal media use, 2) imagining a world without modern technology through role playing, 3) evaluating the credibility of online news, and 4) comparing concepts through a Venn diagram. Key terms are defined, such as media literacy, information literacy, and technology literacy. The objectives are to understand how media influences communication, identify the similarities and differences between various literacies, and discuss responsible media and information use.
This document provides an overview of propaganda, including its definition, types, characteristics, and techniques. It defines propaganda as the planned use of communication to influence groups for a specific purpose. There are three main types: overt vs covert based on transparency, and white, grey, and black based on the perceived source. Key characteristics include the use of selective information, examination of intentions, and appeals to emotion over intellect. Common mediums are television, radio, print, and now the internet. Seven key techniques are also discussed: name-calling, glittering generalities, euphemisms, transfer, testimonials, plain folks appeal, and bandwagon effect.
Media and Information Literacy (MIL) 4. Types of Media (Part 3)- Understandin...Arniel Ping
Learners will be able to…
define propaganda;
1. discuss how to identify propaganda materials;
2. analyze the spread of propaganda in social media;
3. evaluate the dangers of propaganda; and
4. value the importance of understanding propaganda.
I- Propaganda
A.Definitions
B.Importance of Understanding Propaganda
C.How to Spot Propaganda
D.Propaganda in the Digital World
II- Performance Task: Written Work
III- Assignment
IV- Agreement
This document provides an introduction and overview of Army social media. It discusses how the communication revolution and rise of social media has changed how information spreads and how the Army has adopted a proactive approach to social media engagement. It defines Army social media as including social networking sites, media sharing sites, blogs, and microblogs used to communicate with larger audiences faster. The document explains that Army social media impacts all members of the Army family as an important tool for messaging and outreach both within installations and to external audiences.
This document discusses the use of social media by the military. It begins by defining key concepts like social influence, social media, weapons, and memes. It then outlines the social media landscape and how the US military and NATO are using platforms like Facebook, Twitter, and websites. The document performs a SWOT analysis of social media and identifies requirements like resources, training, and trust. It concludes that while social media is not a magic solution, it can be operationally relevant if properly analyzed, assessed, and resourced.
This document discusses psychological warfare tactics such as propaganda and disinformation used to undermine an enemy's will to resist. It describes how military psyops target the morale of enemy soldiers and civilians. The document then outlines how Marxist revolutionaries and cultural Marxists have used psychological warfare techniques like spreading propaganda through media and education to promote their ideologies and undermine Western societies from within over the long term. It warns that through these psyops tactics, societies can become indoctrinated, distracted, depressed, degraded, divided, and ultimately defeated without direct military confrontation.
Body Image and Social Media - An important area for wellbeing and mental health. Presentation at the Royal College of Psychiatrists, London, UK, for Mental Health Awareness Week.
This document provides an overview of counterintelligence, including defining it as efforts to protect intelligence operations from hostile nations. It outlines the three types of counterintelligence - collection, defensive, and offensive. It describes how intelligence is safeguarded internally and issues around classifying information. Key terms like defector, double agent, and mole are defined. Historical spies like Aldrich Ames, Robert Hanssen, and Jonathan Pollard are also mentioned.
Week 1 Media and Information Literacy.pptxLeoDioneda1
This document outlines a lesson plan on media and information literacy. It includes 4 learning tasks: 1) tracking personal media use, 2) imagining a world without modern technology through role playing, 3) evaluating the credibility of online news, and 4) comparing concepts through a Venn diagram. Key terms are defined, such as media literacy, information literacy, and technology literacy. The objectives are to understand how media influences communication, identify the similarities and differences between various literacies, and discuss responsible media and information use.
This document provides an overview of propaganda, including its definition, types, characteristics, and techniques. It defines propaganda as the planned use of communication to influence groups for a specific purpose. There are three main types: overt vs covert based on transparency, and white, grey, and black based on the perceived source. Key characteristics include the use of selective information, examination of intentions, and appeals to emotion over intellect. Common mediums are television, radio, print, and now the internet. Seven key techniques are also discussed: name-calling, glittering generalities, euphemisms, transfer, testimonials, plain folks appeal, and bandwagon effect.
Media and Information Literacy (MIL) 4. Types of Media (Part 3)- Understandin...Arniel Ping
Learners will be able to…
define propaganda;
1. discuss how to identify propaganda materials;
2. analyze the spread of propaganda in social media;
3. evaluate the dangers of propaganda; and
4. value the importance of understanding propaganda.
I- Propaganda
A.Definitions
B.Importance of Understanding Propaganda
C.How to Spot Propaganda
D.Propaganda in the Digital World
II- Performance Task: Written Work
III- Assignment
IV- Agreement
Internet censorship is a controversial issue. In China, the government strictly censors the internet, blocking over 18,000 websites including Wikipedia, YouTube, and Facebook. Certain search terms are also blocked and people have been imprisoned for their anti-government online activities. While China censors the internet, Australia also engages in some level of internet censorship. There are arguments both for and against internet censorship, with concerns around restricting access to information versus protecting citizens.
The document discusses the military perspective on state formation and the significance of war. It argues that states form primarily through war making and the organization of violence. According to the perspective, the state consists of individuals with weapons who claim a monopoly on their use, with the army and police serving as the initial embodiment of the state. Maintaining military might is a key concern for states from this viewpoint.
This document discusses the role of media in terrorism. It begins by defining terrorism and outlining its history. It then examines how terrorists now exploit technology and media to advance their causes. Terrorists utilize communication devices like cell phones and laptops to plan attacks more easily. They also leverage the internet and software to develop and execute their plans. The document argues that modern technology has amplified the threats and horrors of terrorism, and that terrorists misuse engineering fields like electronics and biotechnology to create havoc in the world.
This document discusses key questions about war and security, including the causes and justifications of war. It examines the security dilemma concept that states' efforts to increase their own security can paradoxically make others feel less secure and more likely to prepare for conflict. The document also explores different levels of analysis for explaining war, including characteristics of individual leaders, domestic politics and societal factors, and the structure of the international system. It outlines historical trends in warfare and different types of wars. Approaches for managing international security from both liberal and realist perspectives are also summarized.
The Knowledge Gap Hypothesis proposes that as the mass media disseminates information to a social system, those with higher socioeconomic status will acquire and understand the information faster and more thoroughly than those with lower socioeconomic status, widening the gap in knowledge between the two groups. The hypothesis was first proposed in 1970 and suggests this gap is more likely to occur on topics of general interest covered by mass media, like public affairs and science, rather than more specialized topics. Factors that can contribute to the knowledge gap include differences in communication skills, previous knowledge, social contacts, and how the mass media system is oriented.
This document provides guidance on analyzing media messages about sport. It discusses that media analysis can uncover bias, power dynamics, and perspectives presented. It recommends using operational definitions and consistency when analyzing content by measuring elements like word count, images, or air time. Questions are provided to guide analysis of the message source, purpose, values, and presentation of identities.
Body image refers to how one sees and feels about their own body. It involves perceptions of appearance as well as feelings of connectedness. Body image is shaped by various factors and influenced heavily by media which often portrays thin, flawless bodies that are unattainable for many. This can lead to negative body image among women and consequences like depression, eating disorders, and unhealthy behaviors. Treatment focuses on recognizing irrational thoughts and developing a greater appreciation for one's body.
The document discusses the debate around whether violence in mass media promotes real-world violence. Some research has found correlations between viewing media violence and increased aggression, citing theories like social learning. However, other research argues this relationship has not been proven and other factors better predict violence. The author concludes that mass media may increase violence in some instances for susceptible individuals, but has not been shown to universally cause violence in all viewers, and other predictors like genetics also influence aggression.
Information Operations: What It Is and Why It MattersJeffrey Malone
I delivered this presentation at the EW Asia 2014 conference in Kuala Lumpur, Malaysia. The presentation was directed primarily at an EW audience, in order to demonstrate the significance of Information Operations (as an integrative warfighting concept) to EW/spectrum operations professionals (as a core information-related capability within the Information Operations construct). The presentation concludes with an alert for the upcoming (August 2014) Association of Old Crows Australian Chapter Conference, to be held in Adelaide.
The document discusses 6 reasons why militaries have been slow to adopt social media from the perspective of an information operations officer. It notes that there is a generation gap between decision makers and the target audience for social media. Militaries are also structured differently than the collaborative nature of social media platforms. Militaries require well detailed plans while social media operates at a faster speed. Information sharing through social media also poses operational security risks that militaries aim to avoid.
The document discusses how information and communication technologies (ICTs) like social media can empower citizens and enable social change in developing nations. It provides examples of how platforms like Facebook and online petitions were used to disseminate information and garner support during important events in Philippine history like the EDSA Revolution and in the aftermath of disasters like Typhoon Yolanda. The document also outlines the concepts of digital citizenship, digital access, and online safety and ethics that are important for citizens to practice when using digital tools and platforms.
Structural violence refers to harm that results from social structures or institutions that prevent groups from meeting their basic needs. Johan Galtung introduced the concept to describe indirect violence built into social, political and economic systems that disadvantages individuals and populations. The document discusses examples of structural violence like unequal access to resources causing hunger, mismanagement of water leading to drought, corporatization of agriculture disadvantaging small farmers, public-private partnerships draining health budgets, and cultural practices like female genital mutilation harming women's health and rights. Structural violence is invisible and normalized, but has severe impacts on human well-being and development.
Media and Information Literacy: Media & Information Literate IndividualJustin Cariaga
This document discusses criteria for assessing quality of life, including improved health, security, freedom, education, work opportunities, political participation, protection of the environment, and overcoming crises. It also describes how greater media and information literacy can promote lifelong learning, democratic participation, economic opportunities in a knowledge-based market, and more cohesive social units.
This document discusses the concept of public diplomacy. It defines public diplomacy as a government's efforts to influence foreign audiences and engage in cultural and information exchange. The document outlines some key aspects of public diplomacy, including its role in international relations alongside diplomatic, economic, and military tools. It also discusses the difference between "hard power" which uses threats or coercion, and "soft power" which uses attraction and persuasion to achieve goals. The effectiveness of public diplomacy depends on appealing to foreign audiences through credible information and ideas.
Armed conflicts have severe consequences for human rights and society. They often result in direct violence that claims millions of lives, especially of women and children. Conflicts also lead to widespread displacement of populations, leaving many as refugees. Additionally, conflicts are associated with increased sexual violence and exposure to HIV. Beyond physical impacts, conflicts also have psychological impacts and undermine family and social structures. Overall, armed conflicts violate human rights, destroy economies and infrastructure, and can promote a culture of violence.
This document discusses information warfare (IW) and contains 27 sections covering various aspects of the topic. IW is defined as using and managing information technology to gain a competitive advantage over an opponent through activities like collecting tactical information, spreading propaganda, and undermining the quality of an opposing force's information. It is linked to psychological warfare and overlaps with electronic warfare, cyber warfare, and information assurance. The document discusses IW tools like social media, the role of WikiLeaks, different understandings of information, and how perceptions can be manipulated to control the "infosphere" in IW.
GRADE 12 Responsible use of media PPT.pptxJoanaLungay
The document discusses responsible use of media and information. It provides examples of responsible and irresponsible behaviors related to checking the accuracy of online news, sharing unverified information on social media, using collaborative tools like Google Drive for schoolwork, validating the source of social media posts before sharing, and sharing unverified videos without fact checking. Responsible media use includes refraining from bullying, understanding network etiquette, avoiding piracy, posting only factual information, and treating online interactions the same as real life.
Public opinion and the mass media powerpointeschott
Public opinion is shaped by many factors including family, education, mass media, peers, and historic events. It is measured through polls, elections, and interest groups. The mass media functions to entertain, report news, and socialize while also providing a public forum. There are various types of media such as print, radio, television, cable, and the internet which can contribute to both the diversity and polarization of public opinion. Older media types are declining as audiences fragment across new platforms.
Introduction to Media and Information LiteracyDawn Dy
This document provides an introduction to media and information literacy. It defines media and information literacy as the ability to access, analyze, and create media. It discusses the benefits of media literacy, including enhancing knowledge, imparting understanding of media's democratic functions, and fostering independent media. The document outlines skills required to enjoy these benefits, including considering literacy holistically and ensuring equal access to information. It then defines and discusses the concepts of media literacy, information literacy, and digital/technology literacy, outlining their importance and key components.
The document provides best practices guidelines for Army personnel engaging in social media. It discusses policies around social media use and outlines tactics for implementing platforms like blogs, Facebook, and Twitter. The key points are:
1) Army personnel must maintain professional conduct online and remember policies around operations security and the Uniform Code of Military Justice.
2) Effective social media use requires planning, resources to maintain sites, and engagement with audiences.
3) Platforms like blogs and Facebook should present an official perspective and engage communities through content and comments.
4) Personnel must identify their Army affiliation online and make their commander aware of any personal blogs or profiles. Operations security and policies still apply to personal sites.
5 Tips for Better Social Media Community ManagementNGMS
This document provides 5 tips for improving social media community management: 1) Establish terms of use and commenting policies; 2) Set reasonable expectations for monitoring by learning posting habits and dedicating specific hours; 3) Use tools like Facebook settings and free programs to filter content and flag problematic posts; 4) Draft common responses to frequently asked questions; 5) Remain professional and calm when interacting with users.
Internet censorship is a controversial issue. In China, the government strictly censors the internet, blocking over 18,000 websites including Wikipedia, YouTube, and Facebook. Certain search terms are also blocked and people have been imprisoned for their anti-government online activities. While China censors the internet, Australia also engages in some level of internet censorship. There are arguments both for and against internet censorship, with concerns around restricting access to information versus protecting citizens.
The document discusses the military perspective on state formation and the significance of war. It argues that states form primarily through war making and the organization of violence. According to the perspective, the state consists of individuals with weapons who claim a monopoly on their use, with the army and police serving as the initial embodiment of the state. Maintaining military might is a key concern for states from this viewpoint.
This document discusses the role of media in terrorism. It begins by defining terrorism and outlining its history. It then examines how terrorists now exploit technology and media to advance their causes. Terrorists utilize communication devices like cell phones and laptops to plan attacks more easily. They also leverage the internet and software to develop and execute their plans. The document argues that modern technology has amplified the threats and horrors of terrorism, and that terrorists misuse engineering fields like electronics and biotechnology to create havoc in the world.
This document discusses key questions about war and security, including the causes and justifications of war. It examines the security dilemma concept that states' efforts to increase their own security can paradoxically make others feel less secure and more likely to prepare for conflict. The document also explores different levels of analysis for explaining war, including characteristics of individual leaders, domestic politics and societal factors, and the structure of the international system. It outlines historical trends in warfare and different types of wars. Approaches for managing international security from both liberal and realist perspectives are also summarized.
The Knowledge Gap Hypothesis proposes that as the mass media disseminates information to a social system, those with higher socioeconomic status will acquire and understand the information faster and more thoroughly than those with lower socioeconomic status, widening the gap in knowledge between the two groups. The hypothesis was first proposed in 1970 and suggests this gap is more likely to occur on topics of general interest covered by mass media, like public affairs and science, rather than more specialized topics. Factors that can contribute to the knowledge gap include differences in communication skills, previous knowledge, social contacts, and how the mass media system is oriented.
This document provides guidance on analyzing media messages about sport. It discusses that media analysis can uncover bias, power dynamics, and perspectives presented. It recommends using operational definitions and consistency when analyzing content by measuring elements like word count, images, or air time. Questions are provided to guide analysis of the message source, purpose, values, and presentation of identities.
Body image refers to how one sees and feels about their own body. It involves perceptions of appearance as well as feelings of connectedness. Body image is shaped by various factors and influenced heavily by media which often portrays thin, flawless bodies that are unattainable for many. This can lead to negative body image among women and consequences like depression, eating disorders, and unhealthy behaviors. Treatment focuses on recognizing irrational thoughts and developing a greater appreciation for one's body.
The document discusses the debate around whether violence in mass media promotes real-world violence. Some research has found correlations between viewing media violence and increased aggression, citing theories like social learning. However, other research argues this relationship has not been proven and other factors better predict violence. The author concludes that mass media may increase violence in some instances for susceptible individuals, but has not been shown to universally cause violence in all viewers, and other predictors like genetics also influence aggression.
Information Operations: What It Is and Why It MattersJeffrey Malone
I delivered this presentation at the EW Asia 2014 conference in Kuala Lumpur, Malaysia. The presentation was directed primarily at an EW audience, in order to demonstrate the significance of Information Operations (as an integrative warfighting concept) to EW/spectrum operations professionals (as a core information-related capability within the Information Operations construct). The presentation concludes with an alert for the upcoming (August 2014) Association of Old Crows Australian Chapter Conference, to be held in Adelaide.
The document discusses 6 reasons why militaries have been slow to adopt social media from the perspective of an information operations officer. It notes that there is a generation gap between decision makers and the target audience for social media. Militaries are also structured differently than the collaborative nature of social media platforms. Militaries require well detailed plans while social media operates at a faster speed. Information sharing through social media also poses operational security risks that militaries aim to avoid.
The document discusses how information and communication technologies (ICTs) like social media can empower citizens and enable social change in developing nations. It provides examples of how platforms like Facebook and online petitions were used to disseminate information and garner support during important events in Philippine history like the EDSA Revolution and in the aftermath of disasters like Typhoon Yolanda. The document also outlines the concepts of digital citizenship, digital access, and online safety and ethics that are important for citizens to practice when using digital tools and platforms.
Structural violence refers to harm that results from social structures or institutions that prevent groups from meeting their basic needs. Johan Galtung introduced the concept to describe indirect violence built into social, political and economic systems that disadvantages individuals and populations. The document discusses examples of structural violence like unequal access to resources causing hunger, mismanagement of water leading to drought, corporatization of agriculture disadvantaging small farmers, public-private partnerships draining health budgets, and cultural practices like female genital mutilation harming women's health and rights. Structural violence is invisible and normalized, but has severe impacts on human well-being and development.
Media and Information Literacy: Media & Information Literate IndividualJustin Cariaga
This document discusses criteria for assessing quality of life, including improved health, security, freedom, education, work opportunities, political participation, protection of the environment, and overcoming crises. It also describes how greater media and information literacy can promote lifelong learning, democratic participation, economic opportunities in a knowledge-based market, and more cohesive social units.
This document discusses the concept of public diplomacy. It defines public diplomacy as a government's efforts to influence foreign audiences and engage in cultural and information exchange. The document outlines some key aspects of public diplomacy, including its role in international relations alongside diplomatic, economic, and military tools. It also discusses the difference between "hard power" which uses threats or coercion, and "soft power" which uses attraction and persuasion to achieve goals. The effectiveness of public diplomacy depends on appealing to foreign audiences through credible information and ideas.
Armed conflicts have severe consequences for human rights and society. They often result in direct violence that claims millions of lives, especially of women and children. Conflicts also lead to widespread displacement of populations, leaving many as refugees. Additionally, conflicts are associated with increased sexual violence and exposure to HIV. Beyond physical impacts, conflicts also have psychological impacts and undermine family and social structures. Overall, armed conflicts violate human rights, destroy economies and infrastructure, and can promote a culture of violence.
This document discusses information warfare (IW) and contains 27 sections covering various aspects of the topic. IW is defined as using and managing information technology to gain a competitive advantage over an opponent through activities like collecting tactical information, spreading propaganda, and undermining the quality of an opposing force's information. It is linked to psychological warfare and overlaps with electronic warfare, cyber warfare, and information assurance. The document discusses IW tools like social media, the role of WikiLeaks, different understandings of information, and how perceptions can be manipulated to control the "infosphere" in IW.
GRADE 12 Responsible use of media PPT.pptxJoanaLungay
The document discusses responsible use of media and information. It provides examples of responsible and irresponsible behaviors related to checking the accuracy of online news, sharing unverified information on social media, using collaborative tools like Google Drive for schoolwork, validating the source of social media posts before sharing, and sharing unverified videos without fact checking. Responsible media use includes refraining from bullying, understanding network etiquette, avoiding piracy, posting only factual information, and treating online interactions the same as real life.
Public opinion and the mass media powerpointeschott
Public opinion is shaped by many factors including family, education, mass media, peers, and historic events. It is measured through polls, elections, and interest groups. The mass media functions to entertain, report news, and socialize while also providing a public forum. There are various types of media such as print, radio, television, cable, and the internet which can contribute to both the diversity and polarization of public opinion. Older media types are declining as audiences fragment across new platforms.
Introduction to Media and Information LiteracyDawn Dy
This document provides an introduction to media and information literacy. It defines media and information literacy as the ability to access, analyze, and create media. It discusses the benefits of media literacy, including enhancing knowledge, imparting understanding of media's democratic functions, and fostering independent media. The document outlines skills required to enjoy these benefits, including considering literacy holistically and ensuring equal access to information. It then defines and discusses the concepts of media literacy, information literacy, and digital/technology literacy, outlining their importance and key components.
The document provides best practices guidelines for Army personnel engaging in social media. It discusses policies around social media use and outlines tactics for implementing platforms like blogs, Facebook, and Twitter. The key points are:
1) Army personnel must maintain professional conduct online and remember policies around operations security and the Uniform Code of Military Justice.
2) Effective social media use requires planning, resources to maintain sites, and engagement with audiences.
3) Platforms like blogs and Facebook should present an official perspective and engage communities through content and comments.
4) Personnel must identify their Army affiliation online and make their commander aware of any personal blogs or profiles. Operations security and policies still apply to personal sites.
5 Tips for Better Social Media Community ManagementNGMS
This document provides 5 tips for improving social media community management: 1) Establish terms of use and commenting policies; 2) Set reasonable expectations for monitoring by learning posting habits and dedicating specific hours; 3) Use tools like Facebook settings and free programs to filter content and flag problematic posts; 4) Draft common responses to frequently asked questions; 5) Remain professional and calm when interacting with users.
5 Social Media Tips for Military Leaders-Fort Sam HoustonTmitcht
This document provides information about the editorial staff and publication details of the News Leader newspaper. It lists the commander, public affairs chief, and other staff of the 502nd Air Base Wing/JBSA. It provides contact information for the newspaper office and for submitting stories. It describes the News Leader as an authorized Air Force publication and discusses policies regarding equal opportunity and endorsement of advertising. Social media links for Joint Base San Antonio are also provided.
This document provides basic social computing guidelines for service members and government staff to consider when using social networks and blogs. It outlines 7 key considerations: 1) individuals maintain their right to free speech but must represent their organization appropriately; 2) be aware of all information security, operations security, and IT policies; 3) identify your affiliation and include a disclaimer for official comments; 4) only comment on topics you are knowledgeable about; 5) do not discuss any information that could compromise operations security; 6) only post information you would feel comfortable sharing with your family; and 7) be cognizant of how your personal social media represents your organization.
This document provides guidance on using social media for the Air Force. It includes tips for leaders, Airmen, families and an introduction to common social media platforms and trends. Leaders are encouraged to use social media to connect with audiences and share stories. Airmen should represent core values and be cautious of sensitive information. Families can use social media to support Airmen but should avoid oversharing details. The document also covers hashtags, geotagging and telling the Air Force story on social media.
This document provides guidance on using social media for the Air Force. It discusses social media use for Air Force leaders, Airmen, and families. It also covers common social media platforms and tips, including how to use hashtags to tell the Air Force story. The document encourages sharing experiences as an Airman or family member while maintaining security and following Air Force policies.
The U.S. Navy Facebook page aims to increase public understanding of the Navy's mission and rationale. The primary audience includes those interested in joining the Navy as well as veterans and supporters. Content on the page should educate audiences about the Navy's activities while encouraging enthusiasm. Administrators are responsible for monitoring the page, responding to comments, and removing any inappropriate posts according to the commenting policy. Metrics and lessons learned will be used to improve future content planning for the page.
The document provides an introduction to social media networking and advocacy uses of different social media platforms. It discusses top social media sites like Facebook, LinkedIn, and Twitter. It then gives examples of how advocacy groups have used social media for campaigns, including posting on Facebook, tweeting, blogging, and uploading videos to YouTube. The document concludes by listing suggested reading materials about social media.
This document provides an overview of social media and public relations. It discusses how social media has changed PR from a one-way broadcast model to a two-way conversation. It then provides tips and best practices for using various social media platforms like blogs, Twitter, Facebook, and LinkedIn for PR purposes. Case studies of how companies have effectively used social media for PR in times of crisis are also presented.
The document outlines Wisconsin Council on Children and Families' (WCCF) social media policy for employees. It provides guidelines for appropriate personal and professional social media use when identifying as a WCCF employee. The policy addresses setting up accounts, respecting confidentiality, transparency, copyright, balancing work and social media, addressing controversies respectfully, correcting mistakes, and avoiding partisan content as a 501(c)(3) organization. It aims to promote responsible, honest social media use that respects audiences, coworkers and WCCF.
The document provides an overview of Army social media and its various platforms. It discusses how social media has revolutionized communication and that the Army has embraced social media to connect with audiences. It then summarizes the key Army social media platforms: the Army homepage which provides news and access to other platforms; Army Live blog which is the official Army blog; Facebook where the Army page aims to connect the Army community; Flickr and YouTube where the Army shares photos and videos; and Twitter where the Army communicates concise messages. The document encourages participation in Army social media to tell the Army story.
The document discusses the evolution of online discussions from early discussion boards to modern platforms like Facebook groups and Twitter chats. It also covers social bookmarking sites like Pinterest and the use of news aggregation and question/answer sites for marketing. Discussion boards started as a way for people with common interests to exchange messages and developed a sense of community. Now discussions occur across many platforms, while social bookmarking and commerce are being integrated into sites like Pinterest and Facebook. Marketers can build expertise and engage customers by participating constructively in online discussions, curating content on news sites, and answering questions on Q&A forums.
This document provides guidance on using social media to promote the 2010 Special Olympics USA National Games. It includes an overview of platforms like Twitter and Facebook, guidelines for organizational social media use, examples of promotional posts and links, and suggestions for engaging with and following the Games online and in person through mobile devices. The overall goal is to encourage effective yet responsible social media use to share messaging about the Games.
The document provides tips and guidance for journalists on using social media platforms like LinkedIn, Twitter, Facebook and email to develop their professional network and find new opportunities. It discusses how to create profiles, engage with contacts, share updates and find relevant industry people on each platform. Guidelines are given for an appropriate online presence and best practices for leveraging social networks.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while reminding personnel to adhere to federal law, avoid classified information, and not imply endorsement. Personnel are personally responsible for content and advised to use good judgment in discussions.
The document provides guidance from the Department of the Navy (DON) regarding unofficial internet posts by DON personnel. It encourages responsible engagement online about Navy and Marine Corps topics while maintaining operational security and following all applicable laws and regulations. DON personnel are advised to use good judgment, identify themselves appropriately, and not share classified or sensitive information in any unofficial internet posts.
This document provides information and guidance about safe and responsible use of social media for military personnel. It discusses Department of Defense social media policies, how to represent the military professionally online, and risks like identity theft and security breaches. Specific tips are given around privacy settings, avoiding sharing sensitive personal details or locations. Resources and contacts are provided to help military members learn about social media best practices.
The document provides tips and etiquette for using social media as a lawyer, including engaging with others rather than just posting content, gradually building social media presence, and not overposting. It recommends resources for learning social media best practices and tools for managing multiple social media accounts, scheduling posts, and backing up content.
This document discusses invasive species and their impacts. It acknowledges that invasive species pose significant challenges for the Department of Defense (DoD) by threatening military training lands and activities. The document provides background on invasive species and their costs, outlines key issues for military installation commanders to consider regarding invasive species, and summarizes Executive Order 13112 which created the National Invasive Species Council and reinforces DoD's role in addressing invasive species.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) leveraging innovation through cyber workforce development. The strategy aims to organize, train, and equip DoD to operate effectively in cyberspace while addressing growing cyber threats from state and non-state actors.
The document outlines the Department of Defense's strategy for operating in cyberspace. It discusses 5 strategic initiatives: 1) treating cyberspace as an operational domain; 2) employing new defense operating concepts like active cyber defense and network resilience; 3) partnering with other government agencies and the private sector; 4) building international partnerships; and 5) developing an exceptional cyber workforce through training and innovation. The strategy aims to help the DoD organize for, defend, and leverage opportunities in cyberspace while managing threats from state and non-state actors.
The Department of Defense cares about endangered species for two main reasons: 1) to comply with the Endangered Species Act and avoid critical habitat designations that could restrict military training, and 2) to meet the requirements of the Sikes Act which mandates that DoD assess natural resources, complete management plans, and coordinate with wildlife agencies to manage habitat for species. The DoD natural resources mission is to enable military training while providing habitat, achieving both national defense and conservation goals through extensive stewardship efforts across military lands.
The document provides a national security space strategy for the United States. It outlines that space is becoming increasingly congested, contested, and competitive as more countries develop space capabilities. The strategy aims to promote responsible use of space, provide improved US space capabilities, partner with other responsible entities, prevent aggression against US space infrastructure, and prepare for degraded space operations. It will implement these strategic approaches through coordinated planning across government agencies to maintain US advantages in space.
Strengthening Our Military Families - Meeting America's Commitment January 2011Department of Defense
The document outlines the US government's plan to strengthen support for military families. The first priority is to enhance the overall well-being and psychological health of military families. Initiatives include increasing behavioral health services through prevention and community integration, improving awareness of psychological fitness, protecting families from financial exploitation, eliminating homelessness, ensuring substance abuse treatment, and making courts more responsive to military families' needs.
FY 2010 MULTIDISCIPLINARY UNIVERSITY RESEARCH INITIATIVE (MURI) – SELECTED PR...Department of Defense
This document lists 30 research topics that received MURI (Multidisciplinary University Research Initiative) funding. Each topic includes the lead research institution, participating institutions, and the principal investigator. The topics cover a wide range of scientific areas including optics, autonomous systems, biofuels, polymers, computer vision, and more. The projects involve collaboration between universities, with some including international partners, to conduct fundamental research.
This document provides an overview of social media and guidelines for its appropriate use by service members. It discusses how social media can be harnessed for command information and media outreach but notes that OPSEC and UCMJ still apply online. Specific tips are provided, such as staying within one's area of expertise, being mindful of what is said about the chain of command, and educating family on privacy settings. Popular social media platforms like Facebook, Twitter, YouTube and Flickr are also described.
The U.S. Department of State's Bureau of Educational and Cultural Affairs provides safety tips for using social networks, email, and the internet. The tips include never sharing private contact information publicly, carefully managing privacy settings, considering how content may be perceived before posting, being wary of third party applications accessing profile information, reporting any site abuses, and exercising caution with unsolicited emails or requests for private information. Basic computer security practices like scanning removable media and attachments are also recommended.
The document is a briefing from the Department of State's Bureau of Diplomatic Security about social networking cyber security awareness. It discusses what social networking is, security concerns with social networking, examples of security issues in the news, and provides guidance on how to protect the Department and oneself while using social networking. The briefing covers topics like maintaining privacy settings, securing accounts, avoiding phishing attacks, and being aware of what is posted online.
Here are the key steps to using Twitter summarized in 3 sentences:
To tweet, enter text in the text box on your homepage and click "Tweet"; to delete a tweet, scroll over it and click "delete." Retweeting allows you to share another user's tweet by typing "RT" and their username. Direct messages allow private communication with other users by starting a message with "D" and their username.
1) Twitter is a free social media platform that allows users to post short messages called tweets. Tweets can be up to 140 characters in length.
2) Users follow other accounts and see their tweets in their timeline. When a user posts a tweet, it goes out to their followers.
3) To create an account, a user provides a username, display name, email, profile photo and other optional information like location in their profile settings.
The document provides tips for using YouTube's video editor to combine, trim, and add soundtracks to multiple uploaded videos. It describes how to drag and drop clips into the editing bar, trim videos using scissors icons, and add audio tracks from YouTube's library. Statistics on views, demographics, and video popularity can be found using the Insight tool. The document also includes recommendations for video formats, resolutions, frame rates, and codecs for optimal uploading and playback on YouTube. General tips suggest having relevant content, producing your own videos, adding subtitles, and updating videos weekly.
Customizing your YouTube channel involves adjusting settings, themes, modules, and featured content. You can add a name, tags, and background image. Modules allow selecting what sections to display like comments and subscribers. Featured content includes choosing a featured video and whether to display videos in player or grid view. Comments for both channels and videos can be set to require moderator approval.
The document discusses how different military organizations use YouTube. The 129th Rescue Wing uploads videos of combat exercises with international partners. The 3rd Brigade Special Troops Battalion uploaded a slideshow of promotions. The 26th Marine Expeditionary Unit subscribes to other Marine videos to create contacts and foster community. The Navy JAG office uses their channel to showcase self-produced videos depicting real life as a JAG.
This document discusses how social technologies can enable open innovation in government in three key ways:
1) Crowdsourcing, by allowing governments to distribute problems to the public to drive innovation from diverse sources. Examples given are IdeaScale and UserVoice tools.
2) Intra-government collaboration, by enhancing speed, scope and reliability of information sharing between agencies through wikis, collaborative tools and immersive virtual environments.
3) Citizen science, by engaging the public to help analyze and apply government data through applications, mashups and analytical tools built from open data on sites like Data.gov. Social technologies will play a critical role in maximizing the value of open government data.
This document provides instructions for creating an official YouTube channel and uploading videos. It outlines how to create a YouTube account, set up a channel profile and privacy settings, create playlists, upload and describe videos, and add videos to playlists. The goal is to help users effectively organize and share videos on YouTube.
The document provides tips and examples for how military services can creatively use Facebook pages. It describes how the 24th Marine Expeditionary Unit posts photos from humanitarian missions and how the 28th Bomb Wing Commander answers base questions. Other examples include the 1st Infantry Division advertising events, a Naval Medical Center announcing a contest, and a Marine Forces Reserve advertising bonuses. It then provides best practices such as grouping related content, keeping discussions centered around posted content, and cross-promoting across websites and social media platforms.
This document provides guidance on designing a Facebook fan page, including:
1. Adding basic information like a logo, customizing the wall and tabs, and setting the URL.
2. Adding applications and features like events, RSS feeds, polls, and a boxes tab with Static FBML to customize the page.
3. Using Insights to learn more about your fans and monitor your page's performance.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Army Social Media
1. Online and Social Media Division
6/15/09
Social Media Best Practices (Tactics, Techniques, Procedures)
The Internet has changed the way we communicate. Increasingly, individuals are looking to the
web as their primary source of news and information. As an Army, we have an obligation to tell
our story in the spaces and places where our community is already engaging.
The following pages outline basic best practices guidelines to consider when choosing to
implement social media strategies as a part of our public affairs mission. This is by no means a
comprehensive break-down, and we encourage you to look to the Web for more resources and
information about engaging in the social media sphere.
Background:
The Basics:
What is the policy?
There are no policies which directly refer to the use of the major social networking sites such as
Facebook, Flickr, You Tube, etc. As regulation currently stands, it is important for Soldiers as
well as public affairs professionals to remember the two guiding documents that apply to all
public communication: Operations Security and the Uniform Code of Military Justice. As
regulation is written, Soldiers must maintain professional conduct and good order and discipline
in the virtual world in the same ways they would in the real world. Special care should be taken
to ensure that public facing profiles, to include Facebook pages and sites, present an appropriate
picture of Army life.
AR 530-1, Operations Security policy, states that Soldiers who blog and identify their affiliation
with the Army must let their commander know they’re blogging.
What do I need to know before I get started?
Planning/Strategy: Have a plan, and think strategically. Think about each platform before you
decide to establish a profile and ensure it meets the needs of your organization. Just because the
sites are out there doesn’t mean your organization needs to be on all of them.
Manpower: Will you have the resources to manage and maintain the sites? If you can’t commit
to updating your social media sites at least once per week, or providing enough new content to
keep users coming back, that platform is probably not a good idea for your organization.
Messaging: Social media is all about taking your identity or messaging and turning over control
to your community. A Facebook wall and a Flickr comments stream are places for positive
comments, as well as negative ones. If you’re not willing to lose control of the message, and give
some of the power to your community, social media is not for you.
Once you get started:
Engage your community through posts and content that solicits feedback. A blog without a
comments section isn’t a blog: it’s a message board. A You Tube channel without any views
isn’t an effective outreach platform. Once you begin engaging, evaluate what works and what
doesn’t, and don’t hesitate to adjust fire and change course.
1
2. Online and Social Media Division
6/15/09
Basic social computing guidelines for Soldiers, Army Civilians and Army staff to consider:
Social networks and blogs are an increasingly popular means of communicating. They open
incredible doors for Soldiers, Army civilians and contractors to communicate both at work and
during combat deployments. They also open up increased risk that sensitive information will be
released that puts our Soldiers in danger. In recognition of this fact it is important that
organizations across the Army implement responsible social computing guidelines. Below is a
basic outline of key considerations in social computing.
1. Whether or not to participate in social computing is an individual’s personal decision.
Soldiers maintain their First Amendment Rights and do have the right to express
themselves in a public forum. If, however, a Soldier is participating in a social
networking site where he or she is or may be identified or associated with the United
States Army they must be very cognizant of how they appear to represent their
organization and the United States of America. UCMJ and other guidelines and
regulations apply in the virtual space just as they do in any other.
2. Before engaging in any social computing space Soldiers must be aware of all pertinent
regulations including UCMJ, AR 25-1 and AR 530-1.
3. Any individual making statements on a public forum should identify him or herself and
their affiliation with the U.S. Army if they are commenting on U.S. Army matters or
issues. Be transparent. If an individual is not a public affairs officer speaking on behalf of
the U.S. Army he or she should make it clear that the statements are their own and do not
represent an official U.S. Army stance (Example: This statement is my own and does not
constitute an endorsement or opinion of the U.S. Army or Department of Defense).
4. Stay in your lane. It applies in public forums as much as it applies to conversations with
the media. If you’re not the best person to comment on a topic, you shouldn’t do so in an
official capacity.
5. Operations Security is paramount. Any information that may compromise OPSEC should
not be discussed. If a person is in doubt as to whether information may violate OPSEC,
they should consult with their immediate supervisor or Operations Officer for a review.
6. Play nice. If you wouldn’t want your mother seeing it, you probably shouldn’t post it.
7. Be cognizant of how you represent yourself in personal social networking sites such as
Facebook and MySpace. If you are posting information to those sites that would reflect
poorly on the U.S. Army, reconsider. Even information posted to personal profiles lives
in the public domain. You never know who might see it. If you refer to the U.S. Army in
your personal social network profile, you are identifying yourself as a part of a large
network that includes both your colleagues and your chain of command. The information
you post there should be consistent with your role as a Soldier and representative of the
U.S. Army.
2
3. Online and Social Media Division
6/15/09
Blogging Best Practices (Tactics, Techniques and Procedures)
What is a Blog?
• A blog is a conversational web site, typically offering news or opinion on a certain topic.
• It often invites interaction through comments.
• It can be more editorial than informative, and appeals to a targeted population.
Who blogs?
• Companies, corporations and individuals all blog for various reasons.
Here is the official blog of the Office of the Chief of Public Affairs, http://armylive.dodlive.mil.
As the Army’s official blog, it provides a top-level approach on Army issues, and provides news
and updates on activities and events taking place within the U.S. Army and OCPA:
Here is an example of a unit sponsored blog, www.hammerpao.com, which is different in tone
and perspective. Written by a team of public affairs officers, it provides localized information
and news stories, but the blog adds the dimension of comments and conversation, which you
don’t get from a traditional news web site:
3
4. Online and Social Media Division
6/15/09
A commander-written blog focuses on that leader and ideally is written by him or her or takes
speeches or official statements and crafts them into a post. Maj. Gen. Mike Oates, the 10th
Mountain Division Commander, writes a blog (http://www.taskforcemountain.com/mountain-sound-
off) that is more like a web forum, consisting of open-ended questions that spark comments and
conversation from his Soldiers:
4
5. Online and Social Media Division
6/15/09
Maj. Gen. Elder Granger wrote a blog at http://www.health.mil/tmablog during his time as the
TRICARE deputy director. This blog includes a mixture of posts written from Maj. Gen.
Granger, as well as articles, information, and updates from other staff members. This is an ideal
option when a commander is unable to post consistently. It represents a joint effort between a
commander and public affairs staff. The recommendation is to be transparent on who is posting
what information. If a public affairs officer is posting a news article on the commander’s blog,
they should use a more general administrator label rather than posting everything under the
commander’s name:
What information should be posted to a blog?
• Existing information
o Internal e-mails/messages useful for a larger audience (commander’s messages,
safety updates)
o Press releases
o Comments can occasionally generate their own post
• New content
o Guest posts from other Army officials/Soldiers
o Official commentary on a topic of interest
5
6. Online and Social Media Division
6/15/09
Guidelines:
• Any content on your official blog should be just that: official. Remember UCMJ and
OPSEC.
• Whenever possible, host your blog on a .mil domain (major commands should contact
lindy.kyzer@us.army.mil to request a blog at armylive.dodlive.mil). When not possible,
look for ways to make your content stand-out as an official information source for your
installation or unit.
• Comments policy: all blogs should include a comments policy, which outlines which
comments will be removed. Recommend all official blogs include a comments policy
banning profanity, malicious comments, and off-topic comments. Also recommend all
comments be moderated and reviewed by an administrator before posting.
• Blogs should be written conversationally, and should be short – think op-ed length and e-
mail tone.
Blogging within your office or organization:
• Empower your employees to engage: they are our best spokespersons.
• Make sure your employees are aware of the risks and benefits of blogging before you
encourage them to jump in.
• Unofficial blogs written by Soldiers or representatives of your organization should
include a disclaimer stating that the blog does not represent the official opinion of the
U.S. Army.
• Per AR 530-1, all blogs written by individuals identifying themselves as employees of the
U.S. Army must be made known to that person’s commander.
• OPSEC and UCMJ still apply to personally written blog sites.
Facebook Best Practices (Tactics, Techniques and Procedures)
What is Facebook?
• www.Facebook.com is a Web site which allows individuals to post profiles (photos and
information about themselves) and connect and share with friends and family.
• For more information on how to setup a Facebook Page visit
http://www.facebook.com/FacebookPages. For help and FAQ visit
http://www.facebook.com/help.php
Signing up for Facebook:
• When you decide your organization needs a Facebook page, understand the differences
between a personal profile, a fan page and a group site.
o Personal Profile: This serves as the individual user’s profile and is limited to
certain capabilities. Do not use personal profiles for your unit, organization or as a
commander operating in a professional capacity. A personal profile should be
limited to connecting with family and friends and sharing personal information,
and should not be used in an official capacity. All friends must be approved by
6
7. Online and Social Media Division
6/15/09
you before they can see your profile. Recommend individuals host their own
profile page in order to be familiar with the site.
o Fan: This is for organizations and public figures. A fan page is the preferred
account for your organization. They are stand-alone pages where the
administrator can post videos, photos and news updates. Fans who join can post
on the wall, and the administrator cannot view the fan’s profile. Use fan pages for
your unit, organization or as a commander. Fans can join or view the site without
an administrator’s approval.
o Group: Groups are stand-alone pages that allow people with the same interests to
join. They are created by pre-existing users and are generally narrower in scope.
Groups are ideal for Family Readiness Groups, students who attended the same
school, or clubs. They also allow the administrators to approve all those who join
the group, and are more secure than a fan page.
Gen. Ray Odierno, Multi-National Force - Iraq Commander has a Facebook fan page. It includes
information about official events, travel, and milestones taking place across Iraq:
7
8. Online and Social Media Division
6/15/09
Setting up your Profile:
• Photo: Use something everyone recognizes and is unique to your organization or
command. A seal is generally used for commands and organizations - try to stay away
from something too generic which could possibly misrepresent your group.
• Contact information: Make sure it’s something you check regularly. A Facebook page
must be linked to an e-mail account, and that will be your way of getting updates and
information about activity on your page.
• About your organization: It’s imperative that you put this is in plain English. Make sure
your average Facebook user can understand what your organization does. Ensure that
before launching your site, you have filled your page with appropriate news links, photos,
articles and information.
• Settings: Below are basic settings recommended for official Facebook accounts -
o Age: Select 13+. This leaves your page open to all Facebook users.
o Wall settings: Use the default view for your wall, default landing tab for “wall”,
auto expand comments, and let fans write on the wall only—not post links or
images. Wall posts cannot be moderated by an administrator on Facebook.
Someone in your organization must be diligent about watching the wall
forinappropriate comments.
o Security: When it comes to page security, you ARE allowed to report people who
abuse your page. The Facebook administrators are the only ones who can block
the person from accessing your site, however.
o
The 4th Brigade, 1st Armored Division: They link to articles about the unit and provide updates
useful to family, friends and supporters. See what updates, photos or links have generated the
most comments and Feedback from fans, and try to post content that resonates most with fans.
8
9. Online and Social Media Division
6/15/09
Managing your page:
• Comments: Be clear about your comment policy. It’s okay to screen comments for
profanity, abusive language, and “spam”; however, visitors are entitled to their own
opinion. Don’t delete a comment simply because it’s negative.
• OPSEC and UCMJ: Exercise the same caution as you would when writing a story or
posting anything to your organization’s Web site. Ensure content posted is appropriate to
good order and discipline in your Soldiers’ ranks.
• Posting Content: Incorporate video, audio, images and print pieces into your content. A
good Facebook page has a vibrant wall with frequent status updates, photos, and video
postings.
Lt. Gen. Rick Lynch, Commanding General, III Corps and Ford Hood, has a page which is
vibrantly populated with news and information generated from official speeches and public
statements. Visit sites such as Lynch’s and Odierno’s for examples of ideal information to post to
a commander’s page.
9
10. Online and Social Media Division
6/15/09
Twitter Best Practices (Tactics, Techniques and Procedures):
What is Twitter?
• Twitter is a micro-blogging site. Micro-blogging is blogging in 140 characters or less.
You can also think of it as “hyper” text-messaging. When you send a message on Twitter,
it will go to all of the individuals who have decided to “follow” you, enabling you to send
messages to a large number of users at one time. Many people link Twitter to their cell
phones in order to update on the go.
Who uses Twitter?
• Organizations, offices, commands and commanders all use Twitter. Navy Adm. Mike
Mullen, chairman of the Joint Chiefs of Staff, is on Twitter at
www.twitter.com/thejointstaff. He posts links to news items of interest, or provides his
thoughts on a particular topic.
10
11. Online and Social Media Division
6/15/09
Before you Twitter:
• Join Twitter for yourself. Find people you know and follow organizations. Update your
Twitter. The best way to know what works is through personal experience.
• Have an idea of what you want to do with Twitter. What do you want to accomplish? Are
you trying to get more people to go to your Web site, send care packages to troops, or
write your Congressman?
Setting up your Twitter account:
• User name: Pick something that’s easy to remember and represents your unit. Avoid
complicated acronyms. If you’re using Twitter personally or as a commander, we
recommend you use your full name in order to make it easy for people to find you and
remember you. Example: MGKevinBergner or Kevin_Bergner.
• Background: Twitter allows you to customize your background. Somewhere on your
background, include the other Web presences you have (Facebook, Flickr site, unit
homepage). If you’re unsure about how to create a background,
http://www.army.mil/create has the branding kit for the U.S. Army’s social networking
sites. If you’re in doubt about your organization’s branding, feel free to replicate the
templates offered there. The branding of your site is important because it lends credibility
to your page and helps prove that you are who you say you are.
• Photo: Post a photo of yourself, and like Facebook, make it candid. Do not use the
graphics provided by Twitter – upload your own.
• Check out sites like Tweetdeck (http://tweetdeck.com) and and Tweetgrid
(http://tweetgrid.com/). These sites allow you to follow conversations about specific
topics. You can use these types of free services to follow topic threads that may be
important to your organization.
What should you Twitter about:
• Tone: If tweeting as a commander, keep your tone professional, but be personable. Be
interesting and provide real updates. No one wants to know when you’re going to the
bathroom, even if you’re a General Officer. When posting as the organization, avoid
using personal pronouns, but do engage in the conversations about your organization and
be a value-added member of the community.
• Content: New stories, changes to policy, links to multimedia are all highly encouraged.
Get creative – photos from the latest BOSS outing, FRG meetings, or the commander’s
safety message can all go on your Twitter.
• OPSEC and UCMJ: Exercise the same caution as you would when writing a story or
posting anything to your organization’s Web site. Ensure content posted is appropriate to
good order and discipline in your Soldiers’ ranks.
• Since long URLs are difficult to fit in 140 characters, URL shortening sites like bit.ly and
tiny.url compress the URLs to under 15 characters for you to copy and paste into your
Tweet. The Army is currently using bit.ly because it allows you to track how many clicks
your link has received.
11
12. Online and Social Media Division
6/15/09
Commands, units and organizations are finding unique ways to use Twitter. The 4th Battalion, 3rd
Infantry Division uses Twitter to communicate between commanders and Soldiers. Messages
include “praise tweets” or messages which chastise performance. Because most individuals using
Twitter connect it to their mobile devices, it’s a good way for commanders and leaders to
connect with their Soldiers while on the go.
When to Twitter:
• Frequency: Spread out your Tweets through the day. Posting several Tweets in rapid
succession clogs up your reader’s window.
• There isn’t a prescribed number of tweets you need to send per day or week. Simply post
regularly enough that you retain the interest of your followers, and can keep up with the
conversations taken place about your organization.
12
13. Online and Social Media Division
6/15/09
How to treat followers:
• You can respond to followers who are asking generic questions, but direct messages are
preferred for more specific matters.
• Follow people who are following you. Twitter is a conversation, and you can learn a lot
about your audience by reading their posts.
• Ask for your followers’ input on an issue or suggestions on how you can make things
better for your organization.
• If someone is abusing your Twitter site, you can block them.
Twittering from events:
• When you’re Tweeting from an event, it’s easier to label your Tweets to that event to
distinguish them from non-related Tweets. Hashtags allow you to label to your Tweets.
o Within your Tweet, add the hashtag somewhere in your post (it’s a pound sign
with whatever you want to name the label, no spaces). When you click on your
hashtag, you can then view all public Tweets with that same tag.
• When you Twitter from an event, you’ll probably be posting several Tweets in a short
time frame, and that’s expected (you can search here http://search.twitter.com/ for
hashtags like: #SupremeCourt, #WPAS, and #MacWorld)
• When you DO Twitter from events, keep the context in check and only post the important
points.
Promoting your Site:
• The best way to promote your account is to follow key individuals and send value added
information. In addition, cross-promote across your various social networking platforms
– i.e., advertise your Twitter account on your Facebook page, blog, etc.
• Some units add a plug for their social media sites at the end of news stories they place
online. This is a great way to direct your audience to your Twitter sites, Facebook pages,
and unit sites while you already have their attention.
13
14. Online and Social Media Division
6/15/09
Video Sharing: You Tube and Vimeo
Web addresses: http://www.youtube.com & http://www.vimeo.com/
What is video sharing? Video sharing allows individuals to produce their own unique video
content and host it on the web. With the rise in mobile video (uploading video from a cell phone)
and the accessibility of video recording devices, video sharing is on the rise. There are dozens of
sites which offer free hosting of user-uploaded video content. YouTube and Vimeo are two of
the largest sites and offer clear advantages and differences to users.
What does it do? YouTube and Vimeo allow for video sharing on a massive scale. YouTube
currently dominates the video sharing market and has the most name recognition of any site of its
kind. However, because YouTube is such a large and diverse community, it is inundated with
garbage video and immature users. Vimeo represents a much smaller portion of the video sharing
market. Videos posted to Vimeo should be polished and can be uploaded as high resolution
video. Vimeo’s users are accustomed to thought provoking and artistic content.
Why should I do it? Content posted on video sharing platforms will enjoy much more visibility
than if it were posted elsewhere. Increasingly today, individuals aren’t looking to official web
sites for video content, they’re going to sites like YouTube and searching for the video footage
they want. Posting video to video sharing sites also allows it the opportunity to “go viral.” An
interesting video, picked up, viewed, and linked by the right people can become an overnight
sensation. Content posted to YouTube requires little editing -- B-roll and low quality clips are
14
15. Online and Social Media Division
6/15/09
acceptable. Vimeo allows you to post lengthy and high quality video. For example, if your
organization has a television channel, this would be a good avenue for that brand of content.
How do I do it?: Go to the following links for detailed instructions on the use of the Web sites:
YouTube: http://www.google.com/support/forum/p/youtube
Vimeo: http://www.vimeo.com/help
Good Practices:
• Use a lead video on your page. This video should be updated at least twice a week. This
video will receive the most views of any video on your page, so use it to express your
most important message.
• Provide a link back to something related to your video such as an article or photos. An
html tag must be included in your video’s description or the Web site address must be
included in order to link back to other content. HTML is an acronym for HyperText
Markup Language and is the predominant markup language for web pages. It provides a
means to describe the structure of text-based information in a document by denoting
certain text as links, headings, paragraphs, lists, etc. and to supplement that text with
interactive forms, embedded images, and other objects.
HTML Tag explained:
<a href = “ This introduces a website name such as http://www.army.mil.
Close quotations Signifies the end of a Web site name.
> Introduces the way the link’s title appears on the page such as“U.S. Army Homepage”.
</a> Signifies the end of the link’s title.
Example of a HTML tag:
<a href = “http://www. army.mil” >U.S. Army Homepage</a>
Comments:
• Users have the ability to leave comments on your page. You should have a commenting
policy posted in your profile. Here is an example:
We welcome comments and discussion about our videos, but we do ask that you
follow a few guidelines when posting comments:
1) No profanity will be tolerated. Profanity in comments will result in immediate
deletion.
2) No personal attacks or derogatory remarks will be tolerated.
3) Any type of repeated spam messages may be deleted at the discretion of
Army.mil.
Failure to follow our guidelines for commenting on photos may result in your
comments being deleted without warning. Insert your organization’s name also
retains the right to delete any comments that may not be covered by these
guidelines.
15
16. Online and Social Media Division
6/15/09
• You have the capability of blocking all comments, allowing all comments, or allowing
comments with prior approval. Allowing all comments requires careful monitoring.
Recommendation is to only allow comments with prior approval.
• You should delete any vulgar comments immediately.
• Adhere to your commenting policy, whatever you decide.
Bad Practices:
• Do not post any videos that could compromise OPSEC
• Do not delete comments solely because they are negative. Users have the right to voice
their opinions. However, they do not have the right to post vulgar or obscene comments.
Removing comments simply because they are negative towards your organization
reduces your unit’s and your page’s credibility. People want to see the good with the bad!
YouTube:
• Do not post long videos. Try to keep posts less than five minutes in duration.
• Do not upload content that doesn’t belong to your organization
Vimeo:
• Do not post short, low quality videos. Reserve those for YouTube.
• Do not use Vimeo to upload advertisements of any kind.
Tube Mogul
Web address: http://www.tubemogul.com/
16
17. Online and Social Media Division
6/15/09
Description: This is a tool that can be use to upload video to both YouTube and Vimeo, as well
as many other video sharing Web sites, simultaneously. Tube Mogul has proved very useful to
organizations that have restricted access to social media platforms. You can simply create your
organization’s account at home and then upload from work via Tube Mogul. Directions for use
can be found at the following link: http://www.tubemogul.com/about/help.php
Flickr
Web address: http://www.flickr.com/
What is it?: Flickr is simply an online scrapbook for high quality photos. The Web site provides
limited photo editing capabilities. It also allows you to place your photos in individual albums or
“sets” that can be categorized however you see fit.
This is an example of sets or photo albums on the Army.mil Flickr page. Users may click any of these
icons to see all images in a set.
17
18. Online and Social Media Division
6/15/09
Why should I do it?: Having a Flickr page will not only give the media and general public a
visual window to what is going on in your organization, but it also provides you an easily
searchable repository for photos taken on your installation.
How do I do it?: Go to the following link for detailed instructions on the use of the Web site:
http://www.flickr.com/help/
Good Practices:
• Update your photos frequently.
• Post high resolution, thought provoking and dramatic content.
• Separate your photos into sets so they are more easily viewed by the event and/or
category.
• Provide a link back to something related to your photo such as an article or a video. See
the HTML section of YouTube and Vimeo.
• Users have the ability to leave comments on your page. See comments section of YouTube
and Vimeo.
Bad Practices:
• Do not post low resolution photos.
• Do not post every single photo you take of an event or subject. Only post the very best
photos.
• Do not post distasteful photos that depict any form of obscenity.
• Do not post any videos that could compromise OPSEC.
• Do not delete comments solely because they are negative. Users have the right to voice
their opinions. However, they do not have the right to post vulgar or obscene comments.
18
19. Online and Social Media Division
6/15/09
SOCIAL MEDIA CONSIDERATIONS
What is social media?
Social media refers to dialogue-based Web platforms, to include such sites as Facebook, My Space,
Flickr, YouTube, and Twitter.
What does it mean to you as a leader?
As a leader you don’t need to embrace all of these social networking platforms, but you should be aware
of them – your Soldiers are. If you don’t have accounts on the more prominent sites, consider becoming a
member so you can gauge the site’s opportunities and limitations.
What are the regulations?
• Blogging: AR 530-1 states all Soldiers who blog as active-duty Soldiers must register their blog with
their commander for an OPSEC review. That means they must let their commander know they are
blogging. Soldiers should be aware that OPSEC rules apply, and they are subject to UCMJ actions for
violations.
• Social networking sites: Soldiers do not need to register their presence on social networking sites
with their commander, but the same general rules apply. Make sure your Soldiers know OPSEC and
UCMJ must be enforced/adhered to in the cyber world in the same ways they are in the physical
world.
Leaders / Units: Leaders and units can establish official social media sites, but should do a mission
analysis and understand exactly what they are attempting to achieve before standing up a site, as well as if
they have the resources to maintain sites.
Three basic points to consider with social media:
• Presence: If you’re not there to communicate your message, someone else will do it for you.
• Relevance: A presence in social media is necessary, but not sufficient. The medium, requires value-
added content. Explore the platform before you utilize it and develop a communications strategy.
• Prominence: As you develop your social media presence consider how prominent you want to be and
tailor your profile and participation accordingly.
OFFICIAL ARMY SOCIAL MEDIA WEB SITES
Army Live (the Army’s official blog)
http://armylive.dodlive.mil/
Facebook (for social networking)
http://www.facebook.com
Twitter (for micro blogging)
http://www.twitter.com/USArmy
Flickr (for photo sharing)
http://www.flickr.com/soldiersmediacenter
YouTube (for video sharing)
http://www.youtube.com/soldiersmediacenter
Vimeo (for video sharing)
http://www.vimeo.com/usarmy
Delicious (for integrated bookmarking)
http://delicious.com/USArmyMedia
If you have questions or would like additional information,
please contact Lindy Kyzer at lindy.kyzer@us.army.mil or (703) 697-4314
19
20. Online and Social Media Division
6/15/09
A Glossary of Web 2.0 Terminology
Blogs: A frequently updated, chronologically ordered publication of personal thoughts and
opinions with permanent links to other sources, creating a historical archive. This can be
published on personal websites or institutional websites as communication tools.
Mashup: A web application that combines data from more than one source into a single
integrated tool. For example, the use of cartographic data from Google Maps to add location
information to real-estate data from Craigslist, thereby creating a new and distinct web service
that was not originally provided by either source.
Open-source software: Software developed in the public domain by multiple developers that is
available for sharing, enhancing, and various other uses. Linux and Pearl are good examples.
Peer-2-peer (P2P) computing: Allows direct sharing of files from one user PC to another user’s
PC using the web as the platform. Examples of P2P computing include BitTorrent, Gnutella, and
FreeNet. Such P2P connections between users can form large networks that can also be used to
distribute telephony in real time.
Podcasts and vlogs: Online audio and video blogs that can be downloaded to devices such as
PCs or handheld devices (wireless phones, mp3 players, iPods). These can be subscription based
or free, single-use or repeateduse content.
RSS (Really Simple Syndication): A family of web-feed formats used to push frequently
updated content such as blog entries, news headlines, or podcasts to users’ PCs or devices. An
RSS document, which is called a “feed,” “web feed,” or “channel,” contains either a summary of
content from an associated website or the full text. RSS makes it possible for people to keep up
with their favorite websites in an automated manner that’s easier than checking them manually.
Search engines: These include the ubiquitous search engine tools such as Google, Yahoo, Ask
Jeeves, etc., as well as blog search tools such as Technorati, Bloglines, etc., in addition to
specialized search tools at institutional websites.
Social networking sites: Online networking platforms that allow registered users to interact with
other users for social or professional purposes. Examples include MySpace, Facebook, and
LinkedIn.
Tagging and social bookmarking: Methods that help Internet users to store, organize, search,
and manage bookmarks of webpages. These applications allow users to create tags or
descriptions of the webpages using their own keywords, thus creating metadata (that is, data
about data). These tags and bookmarks can be shared among users.
Virtual worlds: A computer-based simulated environment intended for its users to inhabit and
interact via avatars. This habitation usually is represented in the form of two- or three-
dimensional graphical representations of humanoids (or other graphical or text-based avatars).
20
21. Online and Social Media Division
6/15/09
Most, but not all, virtual worlds allow for multiple users. The world being computer-simulated
typically appears similar to the real world, including features such as gravity, topography,
locomotion, real-time actions, and communication. Communication has, until recently, been in
the form of text, but now real-time voice communication using VoIP is available. This type of
virtual world is now most common in massively multiplayer online games. Examples include
Active Worlds, ViOS, There, Second Life—although not games per se but more like virtual
environments that can include gaming—Entropia Universe, The Sims Online, Red Light Center,
Kaneva). Particularly massively multiplayer online role-playing games include EverQuest,
Ultima Online, Lineage, World of Warcraft, RuneScape, AdventureQuest, and Guild Wars.
Wikis: Collaborative publishing technology that allows multiple users to work on and publish
documents online with appropriate version control. Wikis allow hypertext links to content in any
form, enhancing user experience and interactions.
21