Social media allows people to connect with friends and family but it may also prevent certain interactions and invade privacy. It provides new ways to find and connect with people but can also be used anonymously to bully. Everything posted is very public and seen by more than just friends, which could lead users to become paranoid and forgo sharing personal information to protect themselves. Discarding social media may be necessary to go back to only sharing lives with close friends and family offline instead of all of the internet.
1) Coaches discuss establishing social media guidelines for their teams that prohibit detrimental or unethical posts and emphasize representing the program positively.
2) Coaches monitor their players' social media and emphasize the impact posts can have on college recruitment and careers. Consequences are given for violations.
3) Some coaches use social media to engage fans and build excitement for their programs by posting scores, photos and schedules on platforms like Twitter and Instagram.
The document provides social media tips for empowering and protecting women online. It recommends using social media to learn from mentors, but also cautions that not everyone should be emulated and to avoid unsafe interactions. Specific safety tips include not sharing personal details or photos with identifying information. The document also advises establishing a strong online persona by thoughtfully curating social media profiles to reflect interests and values while maintaining privacy. The goal is to benefit from social media connections and information while staying safe.
1) When using social media, journalists should consider everything they post as public, even if on a closed network, and presume it could become publicly associated with their real name.
2) Journalists should either use their real name or fully disclose their identity on social media and check with editors on appropriate expressions of opinion.
3) Information on social media should be verified and treated cautiously as some posts contain false or exaggerated claims.
4) Journalists should maintain separate personal and professional social media profiles and discuss guidelines with editors on appropriate discussions of work matters.
This document provides guidance on effective social media engagement. It recommends businesses listen to conversations, monitor their brand, and investigate trending topics. It advises responding to feedback, engaging with users both online and offline, and acting on problems directly. The document warns against just broadcasting messages and using social media like a "blunderbuss". It suggests adding value for users, being brave but respectful, and encouraging brand advocates. Companies are advised not to expect immediate attention, spam users, hijack hashtags, or threaten legal action against critics. The overall message is that social media requires active listening, engagement, and providing value to communities rather than one-way broadcasting.
The document provides an overview of getting started with social media for organizations. It discusses choosing a name for social media accounts, setting up profiles on key platforms like Twitter and Facebook, best practices for using hashtags and engaging followers, and tips for creating regular social media content like sharing news, photos and questions. The goal is to help organizations use social media authentically to engage with stakeholders and spread their message.
Social media is a great way to reach your market, position your message and network with like minded entrepreneurs
To get the most out of your efforts with social media there are do's and don'ts on getting the most out of your efforts. .
This document discusses responsible social media use and online leadership. It provides tips for social media including only posting content you're comfortable being public, being consistent in posts, and adding value through statements. Potential negative impacts of social media like cyberbullying and job termination are covered. Ways to use social media positively include censoring posts based on truth, helpfulness, inspiration, necessity and kindness. Profiles can be privatized to control who sees and interacts with content. The conclusion emphasizes that someone is always watching social media posts so users should think before acting.
Social media allows people to connect with friends and family but it may also prevent certain interactions and invade privacy. It provides new ways to find and connect with people but can also be used anonymously to bully. Everything posted is very public and seen by more than just friends, which could lead users to become paranoid and forgo sharing personal information to protect themselves. Discarding social media may be necessary to go back to only sharing lives with close friends and family offline instead of all of the internet.
1) Coaches discuss establishing social media guidelines for their teams that prohibit detrimental or unethical posts and emphasize representing the program positively.
2) Coaches monitor their players' social media and emphasize the impact posts can have on college recruitment and careers. Consequences are given for violations.
3) Some coaches use social media to engage fans and build excitement for their programs by posting scores, photos and schedules on platforms like Twitter and Instagram.
The document provides social media tips for empowering and protecting women online. It recommends using social media to learn from mentors, but also cautions that not everyone should be emulated and to avoid unsafe interactions. Specific safety tips include not sharing personal details or photos with identifying information. The document also advises establishing a strong online persona by thoughtfully curating social media profiles to reflect interests and values while maintaining privacy. The goal is to benefit from social media connections and information while staying safe.
1) When using social media, journalists should consider everything they post as public, even if on a closed network, and presume it could become publicly associated with their real name.
2) Journalists should either use their real name or fully disclose their identity on social media and check with editors on appropriate expressions of opinion.
3) Information on social media should be verified and treated cautiously as some posts contain false or exaggerated claims.
4) Journalists should maintain separate personal and professional social media profiles and discuss guidelines with editors on appropriate discussions of work matters.
This document provides guidance on effective social media engagement. It recommends businesses listen to conversations, monitor their brand, and investigate trending topics. It advises responding to feedback, engaging with users both online and offline, and acting on problems directly. The document warns against just broadcasting messages and using social media like a "blunderbuss". It suggests adding value for users, being brave but respectful, and encouraging brand advocates. Companies are advised not to expect immediate attention, spam users, hijack hashtags, or threaten legal action against critics. The overall message is that social media requires active listening, engagement, and providing value to communities rather than one-way broadcasting.
The document provides an overview of getting started with social media for organizations. It discusses choosing a name for social media accounts, setting up profiles on key platforms like Twitter and Facebook, best practices for using hashtags and engaging followers, and tips for creating regular social media content like sharing news, photos and questions. The goal is to help organizations use social media authentically to engage with stakeholders and spread their message.
Social media is a great way to reach your market, position your message and network with like minded entrepreneurs
To get the most out of your efforts with social media there are do's and don'ts on getting the most out of your efforts. .
This document discusses responsible social media use and online leadership. It provides tips for social media including only posting content you're comfortable being public, being consistent in posts, and adding value through statements. Potential negative impacts of social media like cyberbullying and job termination are covered. Ways to use social media positively include censoring posts based on truth, helpfulness, inspiration, necessity and kindness. Profiles can be privatized to control who sees and interacts with content. The conclusion emphasizes that someone is always watching social media posts so users should think before acting.
The document discusses several dangers that Instagram poses to children and teens. It notes that teens often share personal information publicly like their name, birthday, and location. This can expose them to identity theft, communication from strangers, and cyberbullying. The document also warns about risks like sexting, cyberbullying through rating photos, and children unintentionally revealing their location. It concludes by advising parents to educate their kids about online safety and monitor their Instagram use.
This document outlines 8 etiquette rules for using social media:
1. Use an accurate profile picture that represents you
2. Only send friend requests to people you know personally
3. Don't over-communicate and spam others by posting irrelevant content
4. Be considerate when tagging friends in photos as others can now see the photos
5. Be aware that others can see your wall posts and private messages if friends interact with them
6. Avoid using vulgar language and berating others who have different views
7. Give credit when sharing third-party content by including the author
8. Thank people for commenting on your posts, sharing your content, or sharing your photos.
Washington University Libraries: Twitter and Professional Developltodd818
This document provides guidance on using Twitter for professional development and career networking. It discusses Twitter basics like hashtags and retweets. It recommends following professional organizations and verifying the authenticity of accounts to follow. The document also discusses using lists to organize contacts, managing one's online reputation, and tips for job hunting and conferencing using Twitter.
The document provides an overview of a social media bootcamp presented by Sarah Evans. It covers key topics like social network overviews, PR and marketing on social platforms, social media news releases, influencers, crisis management, monitoring and analytics. The bootcamp also discusses goals, strategies and tactics for various social networks including Twitter, Facebook, Foursquare, YouTube and using social media for PR outreach. Case studies are presented on how brands like Old Spice and news organizations have effectively used social media. Advice is provided on engaging audiences, responding to crises and connecting with journalists on social platforms. Tools for different social networks are also highlighted.
This document discusses social media etiquette and the risks of using social media carelessly. It provides examples of people who were fired due to inappropriate social media posts, including a teacher who referenced "teaching chitlins in the ghetto" and a professor who asked about finding a hitman. The document then offers tips on how to safely use platforms like Facebook, Twitter, Instagram and texting to avoid these risks, such as using privacy settings, thinking before posting, and being mindful of location data. Overall, the key message is to never post anything online that you wouldn't want seen publicly or by your employer.
This document provides guidance on avoiding social media landmines and getting value from social media interactions. It discusses how journalists use social media, how to appropriately pitch to journalists online, maintaining professional relationships, addressing negative comments, copyright issues, and strategies for avoiding regrettable posts. Key topics include maintaining control of emotions, choosing words carefully, and acting as if anything posted could be made public.
Social media etiquette refers to the customs and rules for polite behavior when using social media. Some key etiquettes include having an appropriate profile picture, not oversharing content, thinking before posting, giving credit when sharing others' content, avoiding vulgar language, and thanking people for engaging with your posts. Using social media can help with job searching by making you more visible to recruiters on sites like LinkedIn, allowing you to build your professional network, and engage with potential employers. Diplomatic communication involves sticking to the subject, avoiding judgments, choosing words carefully, listening, and communicating in an open but respectful manner.
This document contains interview questions for several experts on the topic of social media: a psychology teacher, counselor, IT technician, policeman, and members of the general public. The questions are focused on opinions about social media, its impacts and dangers, and educational or relationship-building potential. By interviewing people from different backgrounds, the document aims to get a balanced perspective on social media for a school project.
Mike Schaffer gave a presentation on using social networking tools for career development. He discussed what social media is and isn't, the major social networking sites like Facebook, LinkedIn, and Twitter. He covered six rules for using social media safely, such as maintaining privacy, avoiding rash posts, and protecting personal information. Schaffer also discussed how social media impacts job seekers, current employees, and employers when it comes to networking, online profiles, and company policies. The presentation provided guidance on leveraging social media effectively and avoiding potential pitfalls.
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Themtanyajhall
Clint Greenleaf, CEO of Greenleaf Book Group, describes ten common errors made in today’s ever-expanding social media landscape—and how to avoid them. He shares easy-to-implement tips to use when promoting a product or brand using social media, without breaking the unspoken rules of Web 2.0 etiquette.
10 Most Common Mistakes in Social Media Marketing and How to Avoid Themgreenleaf
Clint Greenleaf, CEO of Greenleaf Book Group, describes ten common errors made in today’s ever-expanding social media landscape—and how to avoid them. He shares easy-to-implement tips to use when promoting a product or brand using social media, without breaking the unspoken rules of Web 2.0 etiquette.
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLCSPOKE Communications, LLC
Protecting your personal and professional brand through Social Media is a hot topic these days. SPOKE Communications provides the following presentation as a brief guide to setting up accounts securely as well as business best practices for social media marketing.
Additional information on business best practices for digital marketing, go to our Web site: www.SPOKEcom.com
This document provides etiquette and best practices for using various social media platforms including Facebook, Twitter, Pinterest, and LinkedIn. It outlines dos and don'ts such as listening to followers, avoiding self-promotion, and respecting others' privacy. General tips are given such as maintaining a professional tone, engaging with followers, varying content, and using social media to build relationships. Guidelines for competitions and legal terms are also covered.
This document discusses statistics related to social media usage and provides examples of how social media can impact people. It notes that social networking sites can help improve relationships and connect employers to job seekers. However, it also cites a study that found students who used social media while studying scored lower on tests. The document then relates the story of a 15-year-old girl who committed suicide after being sexually assaulted at a party and having photos of the incident posted online, leading to cyberbullying. It poses questions about social media usage and experiences with bullying online.
IFPR Communications 5 things to understand when pitching bloggersVitamine
Bloggers work independently and make their own publishing decisions. Pitching bloggers requires first following and engaging with their content to understand their interests before pitching. Bloggers value sharing content that attracts readers, so help promote their posts. Be sensitive when pitching as bloggers can publicly respond to bad pitches. Aim to establish long-term relationships with bloggers through consistent, quality engagement and sharing of relevant information over time.
Utilizing social media to build your programSarah K Miller
The document discusses how to utilize social media to sustain emergency management programs. It provides an overview of major platforms like Facebook, Twitter, Instagram and LinkedIn and how to use them effectively. The presenter emphasizes setting strong privacy and security settings, creating engaging content regularly, and measuring engagement through analytics. Guidelines are given for both dos and don'ts of social media use for these programs. The document also demonstrates making posts on different platforms with the event hashtag #CCLS16 and creating a meme to share.
Social Media can be a powerful tool for reporters. In Social Media 101, Robin J Phillips explains how doing nothing is not an option.
She offers tips to reporters on ways to set up their Twitter and Facebook accounts and how to start using them.
The document provides tips for using social media successfully for organizations. It discusses defining goals for social media use, making a plan, sharing content like photos and stories, acting personally online, contributing meaningful content, building loyalty with followers, providing good customer service to address complaints, collaborating with others, and starting small with social media efforts. The document emphasizes setting goals, allocating needed resources of time and potentially funding, and asking for help.
Original PostJoe LybergerJoseph Lyberger posted Feb 16, 20.docxgerardkortney
Original Post
Joe Lyberger
Joseph Lyberger posted Feb 16, 2018 9:56 PM
Subscribe
PreviousNext
This page automatically marks posts as read as you scroll.
Adjust automatic marking as read setting
What is your opinion of social media? Does it empower or exploit?
I think that social media does both empower and exploit. Social media is a great way to get connected to friends and with current trends. It allows you to follow certain interest and can empower you to accomplish goals. When you are on social media you must realize that all the information you put out becomes public. Where people become exploited is when companies collect and analyze that information. The can build assumptions on you based on the data you provide. Some of this information people would want to keep private.
Is social media really worth the kind of money that investors are paying?
I think that social media is worth what people are willing to pay for it. Companies can reach mass amounts of potential customers through social media. Also, social media is a great way to get your business name out to the public. We see all the time how one retweet by a celebrity is enough to make a company go “viral.”
Explain what “Likeing” someone’s post on Facebook means to you.
I feel that “liking” a post means that you enjoy what the person is sharing. People “like” post for a wide assort of meanings. Getting a large amount of likes on your posts makes me feel like I am making a difference. Whenever someone likes your post you can scroll through and see who enjoys what you are putting out.
Does knowing others “Like” what you “Like” influence you? Explain.
Knowing what other people like does influence me. When I was younger, it had a bigger influence on me then it does now. When I was younger, I was constantly looking at what people followed me and liked my posts. Now I am not as concerned as to what other people think. After watching the video, I could relate to how the teenagers were feeling. I understand the pressure social media can’t put on teenagers and how they value “likes” and “retweets”.
How do companies use social media to advertise?
Companies use social media to advertise by gathering data and targeting concentrated groups of potential customers. They collect information based on what potential customers post. They can also see where the most traffic is online. The use all of this information to target the correct group of potential customers. Through social media, companies can make more personalized advertisements.
Is social media empowering or exploiting teens?
I think that social media takes advantage of teenagers. The have access to a lot of information and have the ability to connect with the world anywhere with a cell phone. I think that we need to continue to educate teenagers on the importance of social media and the dangers. There are constantly stories on the news of cyber bullying. Social media can put a lot of pressure on teenagers. When watching t.
The document discusses several dangers that Instagram poses to children and teens. It notes that teens often share personal information publicly like their name, birthday, and location. This can expose them to identity theft, communication from strangers, and cyberbullying. The document also warns about risks like sexting, cyberbullying through rating photos, and children unintentionally revealing their location. It concludes by advising parents to educate their kids about online safety and monitor their Instagram use.
This document outlines 8 etiquette rules for using social media:
1. Use an accurate profile picture that represents you
2. Only send friend requests to people you know personally
3. Don't over-communicate and spam others by posting irrelevant content
4. Be considerate when tagging friends in photos as others can now see the photos
5. Be aware that others can see your wall posts and private messages if friends interact with them
6. Avoid using vulgar language and berating others who have different views
7. Give credit when sharing third-party content by including the author
8. Thank people for commenting on your posts, sharing your content, or sharing your photos.
Washington University Libraries: Twitter and Professional Developltodd818
This document provides guidance on using Twitter for professional development and career networking. It discusses Twitter basics like hashtags and retweets. It recommends following professional organizations and verifying the authenticity of accounts to follow. The document also discusses using lists to organize contacts, managing one's online reputation, and tips for job hunting and conferencing using Twitter.
The document provides an overview of a social media bootcamp presented by Sarah Evans. It covers key topics like social network overviews, PR and marketing on social platforms, social media news releases, influencers, crisis management, monitoring and analytics. The bootcamp also discusses goals, strategies and tactics for various social networks including Twitter, Facebook, Foursquare, YouTube and using social media for PR outreach. Case studies are presented on how brands like Old Spice and news organizations have effectively used social media. Advice is provided on engaging audiences, responding to crises and connecting with journalists on social platforms. Tools for different social networks are also highlighted.
This document discusses social media etiquette and the risks of using social media carelessly. It provides examples of people who were fired due to inappropriate social media posts, including a teacher who referenced "teaching chitlins in the ghetto" and a professor who asked about finding a hitman. The document then offers tips on how to safely use platforms like Facebook, Twitter, Instagram and texting to avoid these risks, such as using privacy settings, thinking before posting, and being mindful of location data. Overall, the key message is to never post anything online that you wouldn't want seen publicly or by your employer.
This document provides guidance on avoiding social media landmines and getting value from social media interactions. It discusses how journalists use social media, how to appropriately pitch to journalists online, maintaining professional relationships, addressing negative comments, copyright issues, and strategies for avoiding regrettable posts. Key topics include maintaining control of emotions, choosing words carefully, and acting as if anything posted could be made public.
Social media etiquette refers to the customs and rules for polite behavior when using social media. Some key etiquettes include having an appropriate profile picture, not oversharing content, thinking before posting, giving credit when sharing others' content, avoiding vulgar language, and thanking people for engaging with your posts. Using social media can help with job searching by making you more visible to recruiters on sites like LinkedIn, allowing you to build your professional network, and engage with potential employers. Diplomatic communication involves sticking to the subject, avoiding judgments, choosing words carefully, listening, and communicating in an open but respectful manner.
This document contains interview questions for several experts on the topic of social media: a psychology teacher, counselor, IT technician, policeman, and members of the general public. The questions are focused on opinions about social media, its impacts and dangers, and educational or relationship-building potential. By interviewing people from different backgrounds, the document aims to get a balanced perspective on social media for a school project.
Mike Schaffer gave a presentation on using social networking tools for career development. He discussed what social media is and isn't, the major social networking sites like Facebook, LinkedIn, and Twitter. He covered six rules for using social media safely, such as maintaining privacy, avoiding rash posts, and protecting personal information. Schaffer also discussed how social media impacts job seekers, current employees, and employers when it comes to networking, online profiles, and company policies. The presentation provided guidance on leveraging social media effectively and avoiding potential pitfalls.
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Themtanyajhall
Clint Greenleaf, CEO of Greenleaf Book Group, describes ten common errors made in today’s ever-expanding social media landscape—and how to avoid them. He shares easy-to-implement tips to use when promoting a product or brand using social media, without breaking the unspoken rules of Web 2.0 etiquette.
10 Most Common Mistakes in Social Media Marketing and How to Avoid Themgreenleaf
Clint Greenleaf, CEO of Greenleaf Book Group, describes ten common errors made in today’s ever-expanding social media landscape—and how to avoid them. He shares easy-to-implement tips to use when promoting a product or brand using social media, without breaking the unspoken rules of Web 2.0 etiquette.
Protecting Yourself and Your Brand On Social Media | SPOKE Communications, LLCSPOKE Communications, LLC
Protecting your personal and professional brand through Social Media is a hot topic these days. SPOKE Communications provides the following presentation as a brief guide to setting up accounts securely as well as business best practices for social media marketing.
Additional information on business best practices for digital marketing, go to our Web site: www.SPOKEcom.com
This document provides etiquette and best practices for using various social media platforms including Facebook, Twitter, Pinterest, and LinkedIn. It outlines dos and don'ts such as listening to followers, avoiding self-promotion, and respecting others' privacy. General tips are given such as maintaining a professional tone, engaging with followers, varying content, and using social media to build relationships. Guidelines for competitions and legal terms are also covered.
This document discusses statistics related to social media usage and provides examples of how social media can impact people. It notes that social networking sites can help improve relationships and connect employers to job seekers. However, it also cites a study that found students who used social media while studying scored lower on tests. The document then relates the story of a 15-year-old girl who committed suicide after being sexually assaulted at a party and having photos of the incident posted online, leading to cyberbullying. It poses questions about social media usage and experiences with bullying online.
IFPR Communications 5 things to understand when pitching bloggersVitamine
Bloggers work independently and make their own publishing decisions. Pitching bloggers requires first following and engaging with their content to understand their interests before pitching. Bloggers value sharing content that attracts readers, so help promote their posts. Be sensitive when pitching as bloggers can publicly respond to bad pitches. Aim to establish long-term relationships with bloggers through consistent, quality engagement and sharing of relevant information over time.
Utilizing social media to build your programSarah K Miller
The document discusses how to utilize social media to sustain emergency management programs. It provides an overview of major platforms like Facebook, Twitter, Instagram and LinkedIn and how to use them effectively. The presenter emphasizes setting strong privacy and security settings, creating engaging content regularly, and measuring engagement through analytics. Guidelines are given for both dos and don'ts of social media use for these programs. The document also demonstrates making posts on different platforms with the event hashtag #CCLS16 and creating a meme to share.
Social Media can be a powerful tool for reporters. In Social Media 101, Robin J Phillips explains how doing nothing is not an option.
She offers tips to reporters on ways to set up their Twitter and Facebook accounts and how to start using them.
The document provides tips for using social media successfully for organizations. It discusses defining goals for social media use, making a plan, sharing content like photos and stories, acting personally online, contributing meaningful content, building loyalty with followers, providing good customer service to address complaints, collaborating with others, and starting small with social media efforts. The document emphasizes setting goals, allocating needed resources of time and potentially funding, and asking for help.
Original PostJoe LybergerJoseph Lyberger posted Feb 16, 20.docxgerardkortney
Original Post
Joe Lyberger
Joseph Lyberger posted Feb 16, 2018 9:56 PM
Subscribe
PreviousNext
This page automatically marks posts as read as you scroll.
Adjust automatic marking as read setting
What is your opinion of social media? Does it empower or exploit?
I think that social media does both empower and exploit. Social media is a great way to get connected to friends and with current trends. It allows you to follow certain interest and can empower you to accomplish goals. When you are on social media you must realize that all the information you put out becomes public. Where people become exploited is when companies collect and analyze that information. The can build assumptions on you based on the data you provide. Some of this information people would want to keep private.
Is social media really worth the kind of money that investors are paying?
I think that social media is worth what people are willing to pay for it. Companies can reach mass amounts of potential customers through social media. Also, social media is a great way to get your business name out to the public. We see all the time how one retweet by a celebrity is enough to make a company go “viral.”
Explain what “Likeing” someone’s post on Facebook means to you.
I feel that “liking” a post means that you enjoy what the person is sharing. People “like” post for a wide assort of meanings. Getting a large amount of likes on your posts makes me feel like I am making a difference. Whenever someone likes your post you can scroll through and see who enjoys what you are putting out.
Does knowing others “Like” what you “Like” influence you? Explain.
Knowing what other people like does influence me. When I was younger, it had a bigger influence on me then it does now. When I was younger, I was constantly looking at what people followed me and liked my posts. Now I am not as concerned as to what other people think. After watching the video, I could relate to how the teenagers were feeling. I understand the pressure social media can’t put on teenagers and how they value “likes” and “retweets”.
How do companies use social media to advertise?
Companies use social media to advertise by gathering data and targeting concentrated groups of potential customers. They collect information based on what potential customers post. They can also see where the most traffic is online. The use all of this information to target the correct group of potential customers. Through social media, companies can make more personalized advertisements.
Is social media empowering or exploiting teens?
I think that social media takes advantage of teenagers. The have access to a lot of information and have the ability to connect with the world anywhere with a cell phone. I think that we need to continue to educate teenagers on the importance of social media and the dangers. There are constantly stories on the news of cyber bullying. Social media can put a lot of pressure on teenagers. When watching t.
Social Communications 101 for Volunteersguest1c57ab
What are social communications platforms? How do you get started using them? What are general rules, etiquette for these communities? (Prepared for AARP Florida Volunteer Training)
E Health; Building Bridges - Bringing clinicians and patients closer through ...JC Duarte
The document discusses using social media in healthcare to build connections between clinicians and patients. It outlines 6 reasons why social media is relevant for practitioners, including a decrease in patients searching online and an increase in community. The document then provides tips for practitioners on adopting social media, including researching needs, validating ideas, developing a strategic plan, and measuring success over time. Examples are given of how social media has been used successfully in healthcare settings.
The document discusses how to effectively use social media to engage an online community after initially establishing a presence on platforms like Facebook and Twitter. It recommends clearly defining goals and metrics, listening to audiences, and providing valuable high-quality content to foster two-way conversations. Moving forward requires evaluating messaging, consistency, and whether the organization is broadcasting or engaging. The key is to develop genuine relationships through personalized interactions.
5 Easy Steps to Social Media progress for your Non-Profit - Presented to Oakl...Dan Cohen
Five Social Media steps to take right now for your non-profit organization
Program sponsored by CARD - Collaborating Agencies Responding to Disaster & the Alameda County Public Health Department
CONNECT: Facebook for community coalitions is a presentation geared to help community prevention coalitions get up and running with facebook, and learn how to best use the tool to share their message and connect with their community.
This document summarizes a presentation about using social media for equine assisted organizations. It discusses what social media is, common objections to using it, and guidelines for an effective social media strategy. The presentation recommends establishing objectives, choosing key platforms like Facebook and Twitter, dedicating staff time, integrating social media into your website and blog, engaging followers by asking questions and responding promptly, and monitoring insights. It provides examples from the speaker's organization and advises organizations to claim their voice in online conversations through social media.
The document provides guidance on using social media for non-profits. It discusses committing to social media as it requires ongoing effort. Platforms covered include Facebook, Instagram, Twitter, YouTube, Vine, and Google+. For each platform, it provides examples of how non-profits can use them effectively and gives tips on sharing content, engaging followers, and measuring results. The document also discusses cultivating an authentic voice, crafting good posts, handling negative comments respectfully, and ways to avoid losing followers. The goal is to familiarize readers with social media possibilities and equip them to use the tools successfully.
The document outlines seven best practices for using social media effectively. The first is to listen to what customers are saying online to understand their needs and concerns. The second is to engage customers by posting relevant content that sparks conversations. The third is to position your business as a valuable source of information on your industry or products. The remaining best practices discuss being transparent about your identity, responding to customers in a timely manner, empowering supporters to promote your brand, and archiving social media posts for legal and data protection purposes.
Amanda Eyer of atLarge and Susie Bowie of the Community Foundation of Sarasota County's Nonprofit Resource Center host a basic session on social media for Sarasota & Manatee County nonprofits.
Nonprofits, Healthcare, and Social MediaBeth Kanter
Nonprofits and healthcare organizations are using social media in various ways. They are using blogs to share professional expertise, photos and videos to facilitate discussions, and social networks to connect with audiences and fundraise. Key factors for success include assessing the target audience, setting objectives, dedicating staff time, and experimenting with different platforms and strategies. Nonprofits can learn from each other by sharing successes and challenges with social media engagement.
Listen, Seek & Engage: Cultivate your network with social mediaDavid Crowley
This document outlines resources and strategies for nonprofits to cultivate their networks through social media. It describes a workshop presented by David Crowley of Social Capital Inc. The document provides links to social media content calendars, tips for building a Twitter following, and blogs related to nonprofit social media use. It also discusses listening on social platforms like Twitter and Facebook to identify relevant people and organizations to follow. The strategies emphasized include following hashtags, local influencers, and people met offline or at events.
1. The document discusses the 3 Rules of Epidemics: The Law of the Few, The Stickiness Factor, and The Power of Context.
2. The Law of the Few states that the success of any social epidemic depends heavily on a small number of influential people known as Connectors, Mavens, and Salespeople.
3. It also discusses how the context of ideas and behaviors spreading through mobile devices versus desktop computers can impact their transmission and engagement.
The document discusses how non-profit organizations can use social media to help raise more money. It defines social media and explains why non-profits should use platforms like blogs, Facebook, Twitter, and LinkedIn to cultivate donors, raise awareness of their cause, and potentially ask for contributions. The document provides tips on setting up and using accounts on each of these major platforms and suggests how non-profits can experiment with social media fundraising while managing expectations and integrating it with other marketing strategies.
Looking for a JOB? Applying for School or Housing? Own a Business? Are you an ARTIST? How does Social Media affect ALL these Endeavors? Here's what we teach about Social Media: ASSUMPTIONS, GUIDELINES, YOUR GOALS, BUSINESS APPLICATIONS. PLUS give you THE TOOLS to understand how people view you and establish the Profile that will get you Noticed! We will talk about the pitfalls and the benefits of what you put on the Internet and how it affects one's image. How important is your Face Book Profile? What does your profile say about you, does it reflect the image you the want the world to know? We will take the FEAR of the overwhelming feeling Social Media can have.
Social media allows for multi-directional interactions around online content. A social network specifically allows direct interactions between users on topics of mutual interest. People spend a significant amount of time on social media, with over 22% of online time spent on social networks like Facebook, which has over 500 million active users who are connected through on average 130 friends. It is important for parents to be aware of their children's social media use and online activities to keep them safe from potential dangers.
This document discusses how to identify and leverage social media influencers to boost online efforts. It defines influencers as those who can influence others' decisions or ways of thinking. It recommends identifying influencers on key networks like Facebook, Twitter, Google+, and LinkedIn who have above-average numbers of friends/followers and influence scores. The document also stresses the importance of creating great content and engaging with influencers at optimal times to encourage sharing and drive social signals that can improve search rankings.
Similar to Better social media environment for us (20)
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
2. Social Environment
FAMILY
SCHOOL
FRIENDS
5 close friends
primary source of information about sex
MEDIA
source of authority regarding what is right,
what is wrong, what is important
new surrogate parent
8-14 hours/week watching TV
CHURCH
GOVERNMENT
16. Don’t you ever wonder on Facebook?
You have 1,200
friends….
….but you only see
posts of ~50 people
everyday
17. Facebook follows a science to determine what to show you
Do you like seeing this type of posts?
Are you close with this person?
Is this popular within your network
of friends?
Is this recent news for you?
Does this topic interest you?
And other more filters….
Source: JY Ventures & Consultancy, Social Media Marketing Tool Kit
19. 1. Affinity
The more frequent a fan “engages” your page, the likely he/she will see your posts
2. Popularity
The faster you get engagement on a post, the higher the reach (and the more it
gets popular further)
3. Social Relevance
A topic that’s trending on social media (ex. Pacquiao’s win during the same hour of
his victory) will achieve higher reach
4. Post type
Photos & videos have higher reach versus pure text or links
5. Timeliness
Are your fans online during the time of posting?
Facebook: Post in favor of the newsfeed algorithm
Source: JY Ventures & Consultancy, Social Media Marketing Tool Kit
22. 1. Affinity
The more frequent a fan “engages” your page, the likely he/she will see your posts
2. Popularity
The faster you get engagement on a post, the higher the reach (and the more it
gets popular further)
3. Social Relevance
A topic that’s trending on social media (ex. Pacquiao’s win during the same hour of
his victory) will achieve higher reach
4. Post type
Photos & videos have higher reach versus pure text or links
5. Timeliness
Are your fans online during the time of posting?
Facebook: Post in favor of the newsfeed algorithm
Source: JY Ventures & Consultancy, Social Media Marketing Tool Kit
23. TIMELINESS: Post in favor of the newsfeed algorithm
86% of the week’s
posts happen on
Th and Fr
Engagement fall by
3.5% on Mon-Wed
FB’s happiness
index spikes by 10%
on Friday
24. TIMELINESS: Post in favor of the newsfeed algorithm
When is your audience usually online?
25. TIMELINESS: Post in favor of the newsfeed algorithm
When are people online on Facebook?
33. First sex experience by venue of
sexual debut and gender
Venue Male Female
Home 10.1 24.6
Partner’s home 16.8 31.9
Friend/employer’s house, boarding
house, relative’s house, office
22.4 13.0
Hotel or motel, sauna/beer house 29.6 21.4
Others (car, beach, park, school
classroom, farm, field, beauty
parlor, etc)
20.1 6.9
34.
35.
36.
37.
38. What Are We Doing to Help Them?
Our Youth Actions
39. What More Do We Need To Do?
A growing number of youths are
engaging in risky behaviors
without understanding its
consequences
Our Youth Actions
40. What More Do We Need To Do?
Adults do not know how to
communicate openly about
sexuality with young people
Our Youth Actions
41. What More Do We Need To Do?
Social Media is playing a
bigger role in young lives
Our Youth Actions
44. AVOID POSERS
TOO "GLOSSY" PHOTOS
First stop is to check the profile pictures and cover photos.
To detect if the account photos is too glossy, I would
describe these photos as too good to be true for a non-
celebrity. Photos that are too perfect. "Sobrang ganda niya"
or "sobrang gwapo nito ah" to be a non-celebrity. You will
feel it. If you have that reaction, follow that lead!
45. AVOID POSERS
ORGANIC POSTS & COMMENTS
In social media, "organic" would mean real and free. Not
mechanical at all. Organic posts would be equivalent to
mundane and exciting day-to-day activities of the person. While
organic comments would mean reactions and comments from
his circle of friends, either family, barkadas, schoolmates,
classmates. People who have actually met the person. How to
know organic posts and comments, again, you will feel and
observe it. If there is none, the account is 80% fake!
46. AVOID POSERS
GROUP PHOTOS, TAGS & INTERACTION
This one is very easy to observe. Check for group photos if they are
tagged. Good if they are, this signals those in the photos are "organic"
friends of the account owner. If most of the group photos are not,
another evidence of deception! Then, check for interactions or
comments if they are again "organic". If most interactions are from
virtual circle of friends, "auto"-friends across the country/globe, then the
account is a scammer indeed! If they have lots of "thanks for the add"
wall posts with no other interaction, that's as obvious as fake.
47. AVOID POSERS
FRIENDS LIST
Since you have seen the interactions that are non-organic,
go directly to the accounts friends list. You will observe that
the fake account has so many random friends from
everywhere!
48. AVOID POSTING NEGATIVE
Remember that you represent your profile, your business or
your profession. Better post something that is positive.
Nobody wants to be with a negative individual. This rule can
be applied when giving comments to post. Be encouraging
49. TAGGING A FRIEND
Be considerate in tagging your friends, if it’s the first time you
tag someone, especially those who wore revealing clothes
during swimming party, ask them or personally message your
friend about the photo. To some people, the way they look in
the photo matters to them. So better ask them too.
50. DRAW THE LINE
What should be shared and what should be kept private?
Identify what is public and what is private in your life.
Remember that too much information may be used against
you. Your privacy can be invaded just by sharing where you
are, what you always do or where you always go. Your
security is at risk.
51. 5 MOST OBNOXIOUS KINDS OF UPDATE
1. Intentionally vague post
2. Meaningless calls to action
3. Chronic complaining
4. Over-sharing
5. Posting too frequently
54. FB penalizes exposure of posts containing the following:
1. Clickbaits (with words: like, comment, share)
2. Overly promotional content: pushing audience to buy, download,
register or enter a contest
3. Posts that include spam links or hoax
4. Text-only posts
Facebook: Post in favor of the newsfeed algorithm
Source: JY Ventures & Consultancy, Social Media Marketing Tool Kit
55. Work smart, not hard when posting on Social Media
Post all at once
+
Listen
Source: JY Ventures & Consultancy, Social Media Marketing Tool Kit
56. Work smart, not hard when posting on Social Media
Use templates
for posts
Source: JY Ventures & Consultancy, Social Media Marketing Tool Kit
57. Social media is a conversation, not a monologue.
The most effective way to utilize your social media
accounts is to post regularly.
Be genuine.
KEY POINTS
58. “Hashtags will not
change the world. We
need to start doing.”
-AIESEC Pres Gomez
“In reality, most of the time, posting and sharing photos and concerns
does not SAVE anything” – from a friend
POINTS TO PONDER
59. Better Social Media Environment for Us
Kuya Dennis Caballero|sphynxrad
https://www.facebook.com/gabaanyouthlead
https://www.facebook.com/NewgroundEvents
https://www.facebook.com/InterminablyUndefiable