If law firms adopt these simple rules to social media, I have a feeling it might have stopped Alexander Carter Silk and Clive O’Connell’s from making such a hash of it.
1) The document provides 5 rules for not sucking at Twitter: focus on quality over quantity interactions; engage in two-way conversations rather than just pushing content; never directly sell things; avoid lazy automated direct messages; and focus on benefiting others rather than just yourself.
2) It explains that Twitter is about engaging with others through networking rather than just broadcasting one's own content or ego.
3) One's engagement and experiences with others on Twitter will define their success or failure on the platform.
The document provides 5 tips for new Twitter users:
1. Customize your profile by adding a profile picture, name, location, and bio. Change the background to add personality.
2. Don't expect celebrities to follow you back, as they rarely do. This can hurt your follow back ratio, which impacts your Twitter ranking.
3. Start by following friends and ask them to follow you back to establish your account before following others. Following unknown accounts with no followers could label you as a spammer.
4. Once you have some followers, search interests and use advanced search to follow more people in your interests.
5. Engage with others by starting conversations, saying thanks for follows, and
The document discusses cyber bullying and provides information on what it is, how it can occur, and what to do if it happens. Cyber bullying involves being harassed or threatened online through means such as social media, texting, or messaging. It advises telling a trusted adult or contacting authorities if cyber bullying occurs. The presentation also warns about scams online and encourages never accepting or downloading anything from strangers on the internet.
Social Media: The Good, The Bad, The CluelessRoom 214
Social Media: The Good, The Bad, The Clueless - Avoiding the 7 Deadly Sins of Social Media. James Clark, co-founder Room 214 presentation to Colorado Ski Country
Sexting refers to sending sexually explicit photos, videos or messages via digital devices. It can have serious consequences as images intended to be private can quickly become publicly shared without consent. Sexting constitutes child pornography and can lead to bullying, predatory behavior, and in some cases suicide. While peer pressure, flirting or dares can motivate sexting, parents should have open discussions, build trust, monitor devices, and teach children not to share explicit content or personal information online for their safety and legal protection.
The document discusses several tips for staying safe while using a cell phone, including:
1) Be cautious about responding to unknown numbers texting you and asking personal questions, as it could expose you to safety risks.
2) Do not post private information like your name, phone number, social security number, or embarrassing photos online, as anything posted can be seen by anyone worldwide.
3) Do not engage in cyberbullying by sending mean texts or messages, and tell an adult if you are being cyberbullied yourself.
Threat landscape, strategies, and resources for cyber safety. Presented at Johanna Perrin Middle School, Fairport, New York as part of the Fairport STAR parents program.
Twitter is an open, accessible, searchable global platform where any tweet can go viral. Its 140 characters can be so powerful that they can have a log term impact on your brand.
Considering the potentiality of Twitter, it is very important think before you tweet. If you go wrong, your efforts can have more of a negative impact.
Here are 10 things not to do on Twitter :
1) The document provides 5 rules for not sucking at Twitter: focus on quality over quantity interactions; engage in two-way conversations rather than just pushing content; never directly sell things; avoid lazy automated direct messages; and focus on benefiting others rather than just yourself.
2) It explains that Twitter is about engaging with others through networking rather than just broadcasting one's own content or ego.
3) One's engagement and experiences with others on Twitter will define their success or failure on the platform.
The document provides 5 tips for new Twitter users:
1. Customize your profile by adding a profile picture, name, location, and bio. Change the background to add personality.
2. Don't expect celebrities to follow you back, as they rarely do. This can hurt your follow back ratio, which impacts your Twitter ranking.
3. Start by following friends and ask them to follow you back to establish your account before following others. Following unknown accounts with no followers could label you as a spammer.
4. Once you have some followers, search interests and use advanced search to follow more people in your interests.
5. Engage with others by starting conversations, saying thanks for follows, and
The document discusses cyber bullying and provides information on what it is, how it can occur, and what to do if it happens. Cyber bullying involves being harassed or threatened online through means such as social media, texting, or messaging. It advises telling a trusted adult or contacting authorities if cyber bullying occurs. The presentation also warns about scams online and encourages never accepting or downloading anything from strangers on the internet.
Social Media: The Good, The Bad, The CluelessRoom 214
Social Media: The Good, The Bad, The Clueless - Avoiding the 7 Deadly Sins of Social Media. James Clark, co-founder Room 214 presentation to Colorado Ski Country
Sexting refers to sending sexually explicit photos, videos or messages via digital devices. It can have serious consequences as images intended to be private can quickly become publicly shared without consent. Sexting constitutes child pornography and can lead to bullying, predatory behavior, and in some cases suicide. While peer pressure, flirting or dares can motivate sexting, parents should have open discussions, build trust, monitor devices, and teach children not to share explicit content or personal information online for their safety and legal protection.
The document discusses several tips for staying safe while using a cell phone, including:
1) Be cautious about responding to unknown numbers texting you and asking personal questions, as it could expose you to safety risks.
2) Do not post private information like your name, phone number, social security number, or embarrassing photos online, as anything posted can be seen by anyone worldwide.
3) Do not engage in cyberbullying by sending mean texts or messages, and tell an adult if you are being cyberbullied yourself.
Threat landscape, strategies, and resources for cyber safety. Presented at Johanna Perrin Middle School, Fairport, New York as part of the Fairport STAR parents program.
Twitter is an open, accessible, searchable global platform where any tweet can go viral. Its 140 characters can be so powerful that they can have a log term impact on your brand.
Considering the potentiality of Twitter, it is very important think before you tweet. If you go wrong, your efforts can have more of a negative impact.
Here are 10 things not to do on Twitter :
Kirstin gives a presentation on internet safety at her middle school. She outlines several guidelines for students to follow, including never sharing personal information online, avoiding sexting which is illegal, using virus protection software to prevent computer harm, not flaming or spamming others in anger, and being wary of online predators by not meeting strangers in person. Kirstin emphasizes the importance of thinking carefully before taking actions on the internet that could have serious consequences.
Sexting refers to sending sexually explicit photos, videos or messages via digital devices. The document outlines reasons why sexting is problematic for teens. Sexting photos intended to be private can quickly become widely shared, sometimes resulting in legal consequences. It can also enable bullying, open teens to predators, and in rare cases has led to suicide. The document provides tips for parents on discussing sexting risks and establishing trust so teens will feel comfortable coming to them with problems.
The document discusses several tips for staying safe while using a cell phone, including:
1) Be cautious about responding to unknown numbers texting you and asking personal questions, as it could expose you to safety risks.
2) Do not post private information like your name, phone number, social security number, or embarrassing photos online, as anything posted can be seen by anyone worldwide.
3) Do not engage in cyberbullying by sending mean online messages, and tell an adult if you are being cyberbullied yourself.
Cyber bullying involves mean or untrue things being said about someone online or embarrassing photos being shared without consent. To stay safe online, only add people you know on social media, keep your profiles private, don't open suspicious emails, scan USB drives for viruses, avoid giving out personal information, and never meet strangers alone. If cyber bullied, tell an adult, save evidence, don't respond to bullies, and report the behavior to the site or police. People bully for different reasons, so stand up for yourself and know who your real friends are.
The document provides cyber safety tips for parents, teachers, children, and women. It discusses various types of cyber crimes and recommends keeping computers in open areas, monitoring online activity, using strong passwords, not sharing personal information online, and reporting any inappropriate content or harassment. The tips emphasize having open conversations about internet safety, supervising internet use, and exercising caution when sharing information or meeting online contacts.
This document provides safety tips for using social media and interacting with others online. It advises setting social media accounts to private, not sharing personal information with strangers, and telling an adult if anything strange or uncomfortable occurs online. Blocking or reporting strangers who send strange messages is also recommended. The goal is to educate about maintaining privacy and avoiding potential dangers when using social media.
This document provides guidelines for safe online behavior, recommending not sharing any personal details, bullying others, or posting inappropriate pictures. It warns that anything posted online can potentially be found even after deletion and that people may not be who they claim, so users should be cautious when sharing information or adding unknown people online to avoid potential risks from internet predators.
This document discusses internet safety and strategies for coping with inappropriate online content and behavior. It covers topics like trusting others online and sharing too much personal information, as well as dealing with cyberbullying, grooming, and exposure to inappropriate websites. The document also describes signs that a child may be experiencing online abuse or using technology inappropriately. It suggests holding group discussions about examples of this and what individuals have done to address it. Finally, it discusses web monitoring software options for improving safety.
This document discusses various internet safety issues and provides advice. It warns about Follow-You-Fiona who stalks people online, Spamazoid who sends unwanted messages and viruses, Numbut who spends too much time online, Hot-Head who makes rude comments, and Oogle who asks for personal information to sell to others. The key advice is to not talk to strangers, not give out passwords or personal information, report inappropriate behavior, and avoid being online too much.
This document discusses different social media genres and their characteristics. It begins by defining Twitter, Instagram, and Vine. Twitter uses hashtags to group topics and allow people to join discussions. Instagram focuses on photos and uses likes to gauge popularity. Vine shares short videos, often comedic, that aim to garner many likes. The document then poses a series of questions about how these genres are used, what types of content they feature, and their cultural impacts. It explores how social media can be used for entertainment but may not reflect users' true personalities. Celebrities' needs are best served by Twitter and Instagram for building large followings, while average people can find fame on Vine through creative videos. Inequalities exist between those who gain large
Social Media Basics (as we do it at Curaprox Slovakia) + videosDávid Tvrdoň
This document provides tips and best practices for using social media effectively. It discusses the rise of major social platforms and their large user bases. The key recommendations are to be human, personal, and relevant in social posts. Specific advice includes knowing your audience, showing faces behind brands, asking questions to engage followers, and experimenting with different content types and platforms. The overall message is that social media should be fun and help build connections by sharing experiences in a way that reflects a brand's true identity.
This presentation takes you through various scenarios where online activities have resulted in physical harm. Learn how to protect yourself online and offline.
How The C-Suite Use Social Media [With a focus on Twitter]Jeph Maystruck
This document discusses the importance of social media engagement for business leaders and CEOs. It notes that 70% of consumers do online research before purchases and over 75% use smartphones to help with shopping. Over 80% of moms do online research after seeing TV ads. The document seeks to address common myths about social media, including that it takes too much time, people have nothing valuable to share, or that it could damage professional reputation or privacy. It provides examples of how CEOs and leaders are effectively using social platforms like Twitter to engage with customers and employees. The overall message is that social media can be a cost-effective way for business leaders to connect with audiences if certain myths are addressed.
Social Media Disclosure & Ethics for Big BrandsSocialMedia.org
Ethics is the foundation of word of mouth and social media success — because no one is going to share your message if they don’t trust you and respect you. Just as important: It’s the law. Government agencies are enforcing honesty and disclosure rules — if bloggers don’t catch you first.
In this presentation, SocialMedia.org and WordofMouth.org CEO Andy Sernoviz teaches you how to do the right thing and stay out of trouble with proper disclosure, social media policies, and training.
A digital footprint is all of the information a person posts online through social media. This information can be seen by friends and family but is also accessible to everyone. It is important to understand how a digital footprint can affect one's life, as things that are deleted can still be retrieved by others. Examples of a digital footprint include social media profiles, and a negative footprint could include photos or information that prevent someone from getting into university or a job. To have a positive digital footprint, one should be careful about what they post and respect other people's digital footprints.
A digital footprint is all of the information a person posts online through social media. This information can be seen by friends and family but is also accessible to everyone. It is important to understand how a digital footprint can affect one's life, as things that are deleted can still be retrieved by others. Examples of a digital footprint include profiles on Facebook or accounts on Twitter and Instagram. A negative digital footprint could be a photo online that prevents someone from getting into university, while a positive footprint respects others and avoids inappropriate posts that could impact future opportunities.
This document provides safety tips for being online and using technology. It discusses acting responsibly online, not sharing personal information, avoiding cyberbullying by blocking or deleting unknown contacts, and not downloading suspicious pop-ups. Tips are also given for safe social media and mobile phone use such as only connecting with known people and thinking before sending messages or images. The document warns about potential online dangers like providing personal details, accepting offers that seem too good to be true, and clicking pop-up viruses.
Mike Schaffer gave a presentation on using social networking tools for career development. He discussed what social media is and isn't, the major social networking sites like Facebook, LinkedIn, and Twitter. He covered six rules for using social media safely, such as maintaining privacy, avoiding rash posts, and protecting personal information. Schaffer also discussed how social media impacts job seekers, current employees, and employers when it comes to networking, online profiles, and company policies. The presentation provided guidance on leveraging social media effectively and avoiding potential pitfalls.
Cyberbullying involves insults or harassment directed at someone through digital platforms such as social media, texting, or other online means. Some signs of cyberbullying include unkind posts on Facebook, Twitter, or other social media. If someone is being cyberbullied, they should tell a trusted adult, save evidence of the bullying, and avoid engaging with or spreading the bully's messages. Additional resources are available online to provide more information on dealing with and stopping cyberbullying.
Social media allows for multi-directional interactions around online content. A social network specifically allows direct interactions between users on topics of mutual interest. People spend a significant amount of time on social media, with over 22% of online time spent on social networks like Facebook, which has over 500 million active users who are connected through on average 130 friends. It is important for parents to be aware of their children's social media use and online activities to keep them safe from potential dangers.
Kirstin gives a presentation on internet safety at her middle school. She outlines several guidelines for students to follow, including never sharing personal information online, avoiding sexting which is illegal, using virus protection software to prevent computer harm, not flaming or spamming others in anger, and being wary of online predators by not meeting strangers in person. Kirstin emphasizes the importance of thinking carefully before taking actions on the internet that could have serious consequences.
Sexting refers to sending sexually explicit photos, videos or messages via digital devices. The document outlines reasons why sexting is problematic for teens. Sexting photos intended to be private can quickly become widely shared, sometimes resulting in legal consequences. It can also enable bullying, open teens to predators, and in rare cases has led to suicide. The document provides tips for parents on discussing sexting risks and establishing trust so teens will feel comfortable coming to them with problems.
The document discusses several tips for staying safe while using a cell phone, including:
1) Be cautious about responding to unknown numbers texting you and asking personal questions, as it could expose you to safety risks.
2) Do not post private information like your name, phone number, social security number, or embarrassing photos online, as anything posted can be seen by anyone worldwide.
3) Do not engage in cyberbullying by sending mean online messages, and tell an adult if you are being cyberbullied yourself.
Cyber bullying involves mean or untrue things being said about someone online or embarrassing photos being shared without consent. To stay safe online, only add people you know on social media, keep your profiles private, don't open suspicious emails, scan USB drives for viruses, avoid giving out personal information, and never meet strangers alone. If cyber bullied, tell an adult, save evidence, don't respond to bullies, and report the behavior to the site or police. People bully for different reasons, so stand up for yourself and know who your real friends are.
The document provides cyber safety tips for parents, teachers, children, and women. It discusses various types of cyber crimes and recommends keeping computers in open areas, monitoring online activity, using strong passwords, not sharing personal information online, and reporting any inappropriate content or harassment. The tips emphasize having open conversations about internet safety, supervising internet use, and exercising caution when sharing information or meeting online contacts.
This document provides safety tips for using social media and interacting with others online. It advises setting social media accounts to private, not sharing personal information with strangers, and telling an adult if anything strange or uncomfortable occurs online. Blocking or reporting strangers who send strange messages is also recommended. The goal is to educate about maintaining privacy and avoiding potential dangers when using social media.
This document provides guidelines for safe online behavior, recommending not sharing any personal details, bullying others, or posting inappropriate pictures. It warns that anything posted online can potentially be found even after deletion and that people may not be who they claim, so users should be cautious when sharing information or adding unknown people online to avoid potential risks from internet predators.
This document discusses internet safety and strategies for coping with inappropriate online content and behavior. It covers topics like trusting others online and sharing too much personal information, as well as dealing with cyberbullying, grooming, and exposure to inappropriate websites. The document also describes signs that a child may be experiencing online abuse or using technology inappropriately. It suggests holding group discussions about examples of this and what individuals have done to address it. Finally, it discusses web monitoring software options for improving safety.
This document discusses various internet safety issues and provides advice. It warns about Follow-You-Fiona who stalks people online, Spamazoid who sends unwanted messages and viruses, Numbut who spends too much time online, Hot-Head who makes rude comments, and Oogle who asks for personal information to sell to others. The key advice is to not talk to strangers, not give out passwords or personal information, report inappropriate behavior, and avoid being online too much.
This document discusses different social media genres and their characteristics. It begins by defining Twitter, Instagram, and Vine. Twitter uses hashtags to group topics and allow people to join discussions. Instagram focuses on photos and uses likes to gauge popularity. Vine shares short videos, often comedic, that aim to garner many likes. The document then poses a series of questions about how these genres are used, what types of content they feature, and their cultural impacts. It explores how social media can be used for entertainment but may not reflect users' true personalities. Celebrities' needs are best served by Twitter and Instagram for building large followings, while average people can find fame on Vine through creative videos. Inequalities exist between those who gain large
Social Media Basics (as we do it at Curaprox Slovakia) + videosDávid Tvrdoň
This document provides tips and best practices for using social media effectively. It discusses the rise of major social platforms and their large user bases. The key recommendations are to be human, personal, and relevant in social posts. Specific advice includes knowing your audience, showing faces behind brands, asking questions to engage followers, and experimenting with different content types and platforms. The overall message is that social media should be fun and help build connections by sharing experiences in a way that reflects a brand's true identity.
This presentation takes you through various scenarios where online activities have resulted in physical harm. Learn how to protect yourself online and offline.
How The C-Suite Use Social Media [With a focus on Twitter]Jeph Maystruck
This document discusses the importance of social media engagement for business leaders and CEOs. It notes that 70% of consumers do online research before purchases and over 75% use smartphones to help with shopping. Over 80% of moms do online research after seeing TV ads. The document seeks to address common myths about social media, including that it takes too much time, people have nothing valuable to share, or that it could damage professional reputation or privacy. It provides examples of how CEOs and leaders are effectively using social platforms like Twitter to engage with customers and employees. The overall message is that social media can be a cost-effective way for business leaders to connect with audiences if certain myths are addressed.
Social Media Disclosure & Ethics for Big BrandsSocialMedia.org
Ethics is the foundation of word of mouth and social media success — because no one is going to share your message if they don’t trust you and respect you. Just as important: It’s the law. Government agencies are enforcing honesty and disclosure rules — if bloggers don’t catch you first.
In this presentation, SocialMedia.org and WordofMouth.org CEO Andy Sernoviz teaches you how to do the right thing and stay out of trouble with proper disclosure, social media policies, and training.
A digital footprint is all of the information a person posts online through social media. This information can be seen by friends and family but is also accessible to everyone. It is important to understand how a digital footprint can affect one's life, as things that are deleted can still be retrieved by others. Examples of a digital footprint include social media profiles, and a negative footprint could include photos or information that prevent someone from getting into university or a job. To have a positive digital footprint, one should be careful about what they post and respect other people's digital footprints.
A digital footprint is all of the information a person posts online through social media. This information can be seen by friends and family but is also accessible to everyone. It is important to understand how a digital footprint can affect one's life, as things that are deleted can still be retrieved by others. Examples of a digital footprint include profiles on Facebook or accounts on Twitter and Instagram. A negative digital footprint could be a photo online that prevents someone from getting into university, while a positive footprint respects others and avoids inappropriate posts that could impact future opportunities.
This document provides safety tips for being online and using technology. It discusses acting responsibly online, not sharing personal information, avoiding cyberbullying by blocking or deleting unknown contacts, and not downloading suspicious pop-ups. Tips are also given for safe social media and mobile phone use such as only connecting with known people and thinking before sending messages or images. The document warns about potential online dangers like providing personal details, accepting offers that seem too good to be true, and clicking pop-up viruses.
Mike Schaffer gave a presentation on using social networking tools for career development. He discussed what social media is and isn't, the major social networking sites like Facebook, LinkedIn, and Twitter. He covered six rules for using social media safely, such as maintaining privacy, avoiding rash posts, and protecting personal information. Schaffer also discussed how social media impacts job seekers, current employees, and employers when it comes to networking, online profiles, and company policies. The presentation provided guidance on leveraging social media effectively and avoiding potential pitfalls.
Cyberbullying involves insults or harassment directed at someone through digital platforms such as social media, texting, or other online means. Some signs of cyberbullying include unkind posts on Facebook, Twitter, or other social media. If someone is being cyberbullied, they should tell a trusted adult, save evidence of the bullying, and avoid engaging with or spreading the bully's messages. Additional resources are available online to provide more information on dealing with and stopping cyberbullying.
Social media allows for multi-directional interactions around online content. A social network specifically allows direct interactions between users on topics of mutual interest. People spend a significant amount of time on social media, with over 22% of online time spent on social networks like Facebook, which has over 500 million active users who are connected through on average 130 friends. It is important for parents to be aware of their children's social media use and online activities to keep them safe from potential dangers.
The document discusses the responsibilities of being a good digital citizen. It identifies five personal responsibilities: 1) remember the golden rule of treating others online as you want to be treated, 2) don't spread gossip or false information, 3) keep private information private, 4) stand up to cyberbullying, and 5) be aware that anything posted online can affect your digital footprint in the future. It provides examples and advice for each responsibility to help ensure safe, responsible technology use.
The document provides internet safety guidelines for children, including rules about social media age restrictions, being careful about what personal information is shared online ("Zip It"), blocking and reporting anything suspicious ("Block It" and "Flag It"), dealing with cyberbullying, and never meeting strangers from the internet in real life. The main message is for children to be smart, safe, and ask for help from trusted adults if ever unsure about anything online.
Michael is facing a difficult situation regarding personal friendships. He observed his friend Roger beginning to date Phyllis, but Michael knows Phyllis is actually married to his other friend Daniel. Michael now must decide whether to tell Roger the truth about Phyllis' marriage, which will hurt one or both of his friends. He is also unsure whether to remain silent. The document presents this dilemma and asks who Michael owes a greater friendship to in this situation.
Digital etiquette refers to rules for proper online behavior, such as treating others with respect as you would want to be treated yourself. Following digital etiquette is especially important on social media, where bullying commonly occurs and consequences for improper posts can negatively impact scholarships, jobs, and legal issues. Cyberbullying can even lead to depression or suicide, so it is crucial to think carefully before posting anything online. Resources like BRAINPOP! can help teach digital etiquette and safety.
This document provides advice on safe usage of digital media and mobile phones. It discusses dangers of sharing personal information on platforms like Facebook and WhatsApp. It notes risks like identity theft, bullying, and data theft. The document advises setting strong privacy settings, only being friends with known people, avoiding suspicious links and downloads, and logging out of accounts properly. Overall, it emphasizes the importance of being cautious about what information is shared online and maintaining privacy to avoid potential digital dangers.
The document discusses cyberbullying and provides tips to stay safe online. It defines cyberbullying as sending mean or threatening messages via technology. Statistics show many youth experience cyberbullying. The effects on victims can include suicidal thoughts. Common forms of cyberbullying occur on social media, emails, texts, chat rooms and more. Advice includes being kind online, not sharing personal information, getting help from trusted adults, and blocking or reporting bullies. The document encourages students to discuss ways to help prevent and address cyberbullying.
BlogWell New York Social Media Ethics Briefing, presented by Andy SernovitzSocialMedia.org
The document discusses guidelines for ethical social media practices and disclosure. It provides 3+1 rules: 1) require disclosure and truthfulness, 2) monitor conversations and correct misstatements, 3) create social media policies and training, plus don't pay for endorsements. The presentation emphasizes the importance of transparency and advises that if a disclosure is needed, the social media activity is probably deceptive and should be avoided. Brands are fully liable for any misleading or non-disclosed social media posts.
Student presentation on Internet Safety-
guidelines for security percautions with social networking websites, cyberbullying, sexting, and phishing scams.
The Seven Deadly Social Media Marketing SinsArgyle Social
The document outlines the "7 Deadly Social Media Marketing Sins" which are common mistakes made by social media marketers. The sins are: 1) Reacting without a strategy, 2) Failing to plan for potential crises, 3) Over-curating content without a clear purpose, 4) Not tracking metrics that are relevant to business goals, 5) Relying too heavily on imprecise metrics, 6) Working without input from other departments, and 7) Hiding behind the brand rather than showing a personal voice. The document provides examples and advice for avoiding each sin.
This document discusses the importance of having an effective online presence for success in business and personal life. It notes that people often search for others online before meeting or working with them, and what they find can positively or negatively impact opportunities. The document provides guidelines on what information is appropriate to share online and recommends ways to optimize one's online presence and branding, such as through social media profiles, blogs, and ensuring one's name is unique and searchable. It stresses that the Internet is a public space, so only share content you'd feel comfortable sharing publicly.
Similar to Five Rules of Social Media for Law Firms (20)
Some thoughts, musings and examples of the volatility, uncertainty, complexity and ambiguity that law firms have been experiencing since the start of the COVID-19 pandemic. This brand-new talk is aimed at the UK legal sector.
A presentation about how to build trust online, with smattering of doing it in the real world. You can see it delivered live at https://www.youtube.com/watch?v=_DHIKIaL0B4
This document discusses the importance of branding and emphasizes that people buy based on how you make them feel rather than what you do. It stresses that brands must communicate professionally and friendly to both visible and invisible audiences. The key is to set the right tone for your brand by being consistent, caring, compassionate and focusing on a "pay it forward" model even when no immediate reward is expected.
2017 PM Forum Annual Conference - Human vs Machine: Cognitive automation and ...Conscious Solutions
These are exciting times for marketing. Automation tools and AI technology are enabling us to harness our CRMs like never before. We can stretch existing budgets and achieve better
ROI than ever before, whilst delivering greater focus and efficiencies. But what is the true state of AI? Are the robots really about to take over the world and make us obsolete? In this presentation David Gilroy cut through the hyperbole to provide insight into exactly where we are.
Presented at Ark Group Growth Conference - London June 2017 :-
• Examining law firm sustainability (of staff, clients and marketing)
• The importance of brand purpose and clarity
• The impact of new generations in the workplace
• ‘They may forget what you said, but never how you made them feel’
• Act professional, talk friendly
Law Society National Property Conference - Marketing in a Social AgeConscious Solutions
The document appears to be a series of slides from a presentation by Conscious Solutions about marketing in the social media age. The slides discuss topics like Maslow's hierarchy of needs, social media engagement models, issues Greggs had with their logo on social media, rules for social media use, and how to create effective content and videos for social media.
Local+Mobile+Video presentation for the 2015 Law Management Section conferenceConscious Solutions
A presentation for annual conference of the Law Management Section of the Law Society. Held at Chancery Lane on 21 May 2015. This highlights the importance of local SEO, mobile and video marketing for law firms.
ETSOS & Conscious Solutions Digital Marketing CPD workshop, aimed at helping law firms increase their revenue through Digital Marketing and Social Media.
A 15 min talk presented at the Molesworth Quarterly Breakfast on 4-Mar-2015 as part of the overall title of "Now for something completely different" and no, there was no Monty Python music played, which is a bit of a mistake in hindsight!
Legalex 2014 - How not to lose your shirt with Online advertising - Dan Fallo...Conscious Solutions
Search Star Ltd is a Google Advertising agency that specializes in buying online advertisements for legal clients. They have 15 account managers with expertise in Google Analytics and Advertising. Some of their current legal clients are listed. Testimonials from long-term clients Pattinson Brewer and Withy King praise Search Star for delivering results and transforming their practices through pay-per-click advertising. The document provides 10 tips for legal firms on getting return on investment from online advertising, including focusing keywords, optimizing ad copy, using social media and remarketing, and targeting the right types of search phrases with achievable cost per lead goals.
Social media marketing involves three stages: connecting with your audience through platforms like LinkedIn and Twitter, broadcasting your message, and engaging in conversations. It is important to listen to your audience and engage with them over time to build word-of-mouth reputation. While social media requires time and commitment, the goal is to raise your professional profile through traditional relationship-building and reputation management. Measurement of results is also important to understand the impact of social media marketing efforts.
Legalex 2014 - Building digital relationships- David GilroyConscious Solutions
The document appears to be a series of messages from "Conscious Solutions" addressing an individual about their digital presence and marketing strategies. The messages provide tips on building relationships, adapting communications based on location, getting communications proofread, and avoiding common social media mistakes. They also reference a client who faced negative feedback and lost revenue due to a poorly executed social media post.
Legalex 2014 - Mastering Questioning Techniques - Peter RosenwaldConscious Solutions
Peter Rosenwald provides guidance on effective questioning techniques. He outlines how questions can be used to close deals, get out of trouble, and lead people in the right direction. Rosenwald then discusses architecting needs questions, catalyst questions, questioning funnels, and tips for building effective catalyst questions that flag interest and get the other person talking. The document concludes by emphasizing the importance of funnels and catalyst questions in conversations.
The document provides tips for improving a website, including minimizing calls to action per page, using directional clues, simplifying forms, adding staff profiles, optimizing for mobile usage, tracking website usage, doing pay-per-click advertising, creating relevant ad text, improving content marketing through blogging, content laddering, and video, using secure forms and email marketing to stay engaged with clients, and leveraging social media through profiles, engagement, and advertising.
Law Firm Services Regional Workshop - Websites for Law Firms Masterclass Pres...Conscious Solutions
Law Firm Services Regional Workshop - Websites for Law Firms Masterclass Presentation from Conscious Solutions. Great slides on website design, website conversion, online advertising, social media and more
During the budget session of 2024-25, the finance minister, Nirmala Sitharaman, introduced the “solar Rooftop scheme,” also known as “PM Surya Ghar Muft Bijli Yojana.” It is a subsidy offered to those who wish to put up solar panels in their homes using domestic power systems. Additionally, adopting photovoltaic technology at home allows you to lower your monthly electricity expenses. Today in this blog we will talk all about what is the PM Surya Ghar Muft Bijli Yojana. How does it work? Who is eligible for this yojana and all the other things related to this scheme?
AI Transformation Playbook: Thinking AI-First for Your BusinessArijit Dutta
I dive into how businesses can stay competitive by integrating AI into their core processes. From identifying the right approach to building collaborative teams and recognizing common pitfalls, this guide has got you covered. AI transformation is a journey, and this playbook is here to help you navigate it successfully.
The Genesis of BriansClub.cm Famous Dark WEb PlatformSabaaSudozai
BriansClub.cm, a famous platform on the dark web, has become one of the most infamous carding marketplaces, specializing in the sale of stolen credit card data.
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...APCO
The Radar reflects input from APCO’s teams located around the world. It distils a host of interconnected events and trends into insights to inform operational and strategic decisions. Issues covered in this edition include:
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Starting a business is like embarking on an unpredictable adventure. It’s a journey filled with highs and lows, victories and defeats. But what if I told you that those setbacks and failures could be the very stepping stones that lead you to fortune? Let’s explore how resilience, adaptability, and strategic thinking can transform adversity into opportunity.
Discover the Beauty and Functionality of The Expert Remodeling Serviceobriengroupinc04
Unlock your kitchen's true potential with expert remodeling services from O'Brien Group Inc. Transform your space into a functional, modern, and luxurious haven with their experienced professionals. From layout reconfiguration to high-end upgrades, they deliver stunning results tailored to your style and needs. Visit obriengroupinc.com to elevate your kitchen's beauty and functionality today.
Cover Story - China's Investment Leader - Dr. Alyce SUmsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
Storytelling is an incredibly valuable tool to share data and information. To get the most impact from stories there are a number of key ingredients. These are based on science and human nature. Using these elements in a story you can deliver information impactfully, ensure action and drive change.
The Steadfast and Reliable Bull: Taurus Zodiac Signmy Pandit
Explore the steadfast and reliable nature of the Taurus Zodiac Sign. Discover the personality traits, key dates, and horoscope insights that define the determined and practical Taurus, and learn how their grounded nature makes them the anchor of the zodiac.
The Steadfast and Reliable Bull: Taurus Zodiac Sign
Five Rules of Social Media for Law Firms
1. by David Gilroy
Director of Stuff & Things
http://www.conscious.co.uk
My Top Rules of
Social
Media
for Law Firms
2. Really? I did not want to know!
NEVER break Rule No.1 of social media.
No social media after a drink! I’m not sure if the person at AWG
Solicitors was drunk when they retweeted this, but either way, Emma
(whoever she is) should probably not have tweeted this!
3. Rule No.2 of social
media. It’s a private
conversation in
public
If you are “chatting” on Twitter,
everyone else can see what’s being
said. So be aware of that!
4. Rule No.3 of
social media. If
you had to tell
your mum what
you said, would
she approve?
That is my late mother in the photo.
If I was trolling on social media and
had to tell her that, would she
approve?
5. Rule No.4 if you
would not say it
to “their” face,
do not say it
online!
If you trust your lawyers &
marketers to go out in the real
world and talk to clients,
prospects etc. then why not
trust them online as well?
6. Rule No.5
The rule
of
Of every ten things you post on social media. Only 2 or 3
should be about you and your firm, the rest should be
connecting or signposting people to things they have not or
will not find for themselves.
13. £985 fine/cost and lost two jobs
"Cr**! Robin Hood airport is closed.
You've got a week and a bit to get
your s*** together otherwise I'm
blowing the airport sky high!!"
http://www.airport-int.com/news/twitter-bomb-threat-authors-conviction-is-voided.html