My portion of the Mythbusting Media: Expert Tips and Techniques for Effectively Using Social and Digital Media panel discussion at Educause 2012 annual conference.
This document discusses plagiarism, including its definition, prevalence among students, and types. It notes that over half of students surveyed admitted to some level of plagiarism. Plagiarism includes presenting others' words, ideas, or creative work as one's own without proper citation. There are unintentional forms, such as poor paraphrasing or documentation, and intentional forms like copying others' work. The document outlines excuses students give and consequences of plagiarism, such as dismissal from school or loss of career opportunities. It emphasizes the importance of citing sources to avoid plagiarism.
Este documento aprova a readequação curricular do curso de Sistemas de Informação do Campus Luiz Meneghel de Bandeirantes da Universidade Estadual do Norte do Paraná (UENP). A readequação foi aprovada pelo Colegiado do Curso, Pró-Reitoria de Graduação e Conselho Universitário Provisório da UENP, e homologada pelo Reitor da universidade. A nova proposta curricular passará a valer a partir de 2011, com 40 vagas anuais no turno noturno.
O Reitor da Universidade Estadual do Norte do Paraná convoca uma reunião extraordinária do Conselho de Administração para o dia 30 de novembro de 2010 para discutir a aprovação da ata da reunião anterior, gratificação para plantão docente e comunicações dos conselheiros.
Este documento apresenta o Regimento Interno da Faculdade de Ciências Econômicas da Universidade Federal do Rio Grande do Sul, definindo sua estrutura administrativa e normas de funcionamento. O Regimento descreve a missão e objetivos da Faculdade, sua organização em Departamentos, Comissões e outros órgãos, além das atribuições e composição do Conselho da Unidade, órgão máximo de administração.
010 10 - autorização curso espanhol - ad referendumProjeto Rondon
Esta resolução (1) autoriza a oferta do curso de Letras/Espanhol no Centro de Letras, Comunicação e Artes do Campus de Jacarezinho da Universidade Estadual do Norte do Paraná, (2) considerando que o processo teve início na antiga FAFIJA e foi aprovado pelo colegiado do curso de letras e pela comissão de graduação, (3) e entra em vigor na data de publicação com efeitos retroativos a 12 de maio de 2009.
Este documento discute os determinantes do preço da terra para pastagem no Estado de São Paulo. Analisa como variáveis macroeconômicas como inflação, crédito rural e infraestrutura influenciam os preços. Mostra que a terra não necessariamente se valoriza com a inflação e que sua precificação depende de fatores como demanda agropecuária e especulativa.
O documento propõe a implementação de uma Gestão Tributária Integrada (GTI) com foco em: 1) gestão de processos, integração e atendimento; 2) aumento da arrecadação e redução de custos; 3) melhoria no atendimento ao contribuinte. A GTI integrará as bases de dados municipais em uma plataforma única, com bases corporativas de pessoas, objetos, produtos/serviços e operações/eventos.
This document discusses plagiarism, including its definition, prevalence among students, and types. It notes that over half of students surveyed admitted to some level of plagiarism. Plagiarism includes presenting others' words, ideas, or creative work as one's own without proper citation. There are unintentional forms, such as poor paraphrasing or documentation, and intentional forms like copying others' work. The document outlines excuses students give and consequences of plagiarism, such as dismissal from school or loss of career opportunities. It emphasizes the importance of citing sources to avoid plagiarism.
Este documento aprova a readequação curricular do curso de Sistemas de Informação do Campus Luiz Meneghel de Bandeirantes da Universidade Estadual do Norte do Paraná (UENP). A readequação foi aprovada pelo Colegiado do Curso, Pró-Reitoria de Graduação e Conselho Universitário Provisório da UENP, e homologada pelo Reitor da universidade. A nova proposta curricular passará a valer a partir de 2011, com 40 vagas anuais no turno noturno.
O Reitor da Universidade Estadual do Norte do Paraná convoca uma reunião extraordinária do Conselho de Administração para o dia 30 de novembro de 2010 para discutir a aprovação da ata da reunião anterior, gratificação para plantão docente e comunicações dos conselheiros.
Este documento apresenta o Regimento Interno da Faculdade de Ciências Econômicas da Universidade Federal do Rio Grande do Sul, definindo sua estrutura administrativa e normas de funcionamento. O Regimento descreve a missão e objetivos da Faculdade, sua organização em Departamentos, Comissões e outros órgãos, além das atribuições e composição do Conselho da Unidade, órgão máximo de administração.
010 10 - autorização curso espanhol - ad referendumProjeto Rondon
Esta resolução (1) autoriza a oferta do curso de Letras/Espanhol no Centro de Letras, Comunicação e Artes do Campus de Jacarezinho da Universidade Estadual do Norte do Paraná, (2) considerando que o processo teve início na antiga FAFIJA e foi aprovado pelo colegiado do curso de letras e pela comissão de graduação, (3) e entra em vigor na data de publicação com efeitos retroativos a 12 de maio de 2009.
Este documento discute os determinantes do preço da terra para pastagem no Estado de São Paulo. Analisa como variáveis macroeconômicas como inflação, crédito rural e infraestrutura influenciam os preços. Mostra que a terra não necessariamente se valoriza com a inflação e que sua precificação depende de fatores como demanda agropecuária e especulativa.
O documento propõe a implementação de uma Gestão Tributária Integrada (GTI) com foco em: 1) gestão de processos, integração e atendimento; 2) aumento da arrecadação e redução de custos; 3) melhoria no atendimento ao contribuinte. A GTI integrará as bases de dados municipais em uma plataforma única, com bases corporativas de pessoas, objetos, produtos/serviços e operações/eventos.
The document provides tips for parents on engaging with children and younger siblings on social media. It discusses how social media is an important part of youth culture and offers advice on learning the technologies children use, using technology to bond with kids, researching the sites they engage with, setting a good example by also using social media, and monitoring kids' online activities and intervening if there are signs of cyberbullying or inappropriate content. The document emphasizes engagement over fighting technology and the importance of education and open communication between parents and kids regarding their online lives.
Raising Children of Character www.mannrentoy.comMann Rentoy
This document discusses the importance of character formation for youth in today's society. It argues that parents and teachers must work harder than past generations to develop good character due to societal changes. These include a culture of softness, increased peer influence, and more time spent with media and technology. The document provides tips for parents, such as limiting screen time, modeling good values, and teaching delayed gratification. It emphasizes the role of the family in shaping a child's conscience and advocates for countercultural parenting to develop strong character.
The Coevolution of Language & Social TechnologiesRoland Smart
1. Social technology is a primary driver of language evolution as it augments language and becomes part of language over time.
2. As language and social technology coevolve, social technologies add new symbols, words, norms and behaviors to everyday languages.
3. As this coevolution continues, there will be more intermediation between language and social technology such as analyzing language patterns and metadata to infer insights about relationships and interests.
Giving Students the Freedom to Find Their SentenceLisa Nielsen
Creating schools that empower students to find their passion by embracing new technologies and social media. Schools should prepare students for the real world by allowing them to use the tools they will need, like social networks, rather than banning or restricting technologies. When schools empower students to have a voice and find their interests, it leads to more engaged, motivated learners.
This document discusses social media use among kids and teens. It provides information on the most popular social media platforms and their key features. Some of the main issues covered include privacy and control concerns, the prevalence of cyberbullying, and the effects of social media on mood, self-esteem and relationships. Research is presented on topics like cyberbullying perpetrators and victims, and how platforms and messaging influence bullying risk. Guidelines are offered for parents to have open conversations with youth about responsible social media use.
This document discusses the permanence and visibility of children's digital footprints online. It notes that many children have computers in their bedrooms and spend 2-3 hours per day online. However, 41% of children ages 8 to 17 include personal information like email addresses and phone numbers in visible social media profiles. The document warns that anything posted online can create a "digital tattoo" that is highly visible and hard to remove.
Social Media for Youth Leaders, May 2014, for @c_of_eBex Lewis
A new course for youth leaders who want to learn about how social media can be used positively.
As a youth leader, you may feel the responsibility for helping keep the children that you work with stay safe online, but also want to know how they - and you - can use it to its full advantage. In this day course, developed from Raising Children in a Digital Age (Lion Hudson, 2014), internet scare stories and distorted statistics are put into context, and clear and sensible guidelines are offered. You’ll have the opportunity to discuss your hopes, fears and experiences with others in a similar situation, and study examples of how others have used social media successfully with youth. We’ll discuss understanding privacy, permanency, identity, values and relationships in a digital age (including cyber-bullying)
http://www.churchcommstraining.org/smtyouthleaders.php
Social Media Teen Safety Seminar Training #SocialSavvyFamily Pam Moore
It is critical we help our entire family become socially savvy. Being socially savvy includes being smart about the social networks, knowing the risks, knowing how to get out of trouble when it happens and having fun! Communication is critical to success from the start to help it be an enjoyable experience for all.
This presentation was delivered as part of a social media training seminar in partnership with CrossPointe church Orlando.
Feel free to leverage content with full attribution to source with link to http://www.themarketingnutz.com and http://www.pammarketingnut.com. No copy/paste or duplication of content is permitted. Protected by Copyright 2014.
This Webinar was presented as the first in a series exploring issues important to youth mentoring programs on August 17, 2010. Social media and networking offer numerous ways to professionally engage with youth, serving both program needs and youth adaptability. However, technology can also bring up questions about safety, boundaries, and appropriateness. Social Media and Mentoring: Policies, Gaps, and Boundaries explores social media and networking options and provides space for dialogue to explore safety and ethical considerations.
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
This document summarizes a presentation on children, the church, and the digital age. The presentation covers topics such as fears about technology, digital communication tools, online friendships and relationships, cyberbullying, online risks like pornography and grooming, and opportunities presented by digital media. It provides exercises for discussing these topics with children and developing organizational social media policies. The overall message is that digital technology is integrated into daily life and both risks and opportunities exist, so churches should educate children to engage constructively and critically with the digital world.
This document discusses issues related to children and youth's use of technology and social media. It provides statistics on how much time youth spend online and what activities they engage in. It also discusses privacy and safety concerns like oversharing personal information, cyberbullying, and exposure to inappropriate content. The document advocates teaching digital literacy and citizenship skills to help youth navigate these challenges and harness the benefits of technology.
Beginner's guide to surviving with social media crazed teensAdam Kruszynski
Adam Kruszynski draws on his wealth of experience as a digital marketer, teacher, sociologist, and parent as he speaks on social media, how teenagers use these new tools to communicate, and how parents can utilize social media to its full potential. He will also explore how this new technology is shaping our future, changing the way we communicate, and reinventing the way teenagers interact with each other. Adam speaks from the heart, and knows first hand how involved teenage children are in using social media sites.
Social Media #getresults (for parent fundraising)Susan T. Evans
This presentation offers ideas for using social media to get results for parent fundraising in education institutions. The presentation was a general session at the 27th Annual Parent Fundraising Conference in August 2012.
Tara Hunt held a workshop on applying the concept of "whuffie", which is a measure of social capital and reputation within online communities. The workshop consisted of 3 sections: an introduction to whuffie and social media trends, a discussion of how whuffie works, and an exercise session where participants developed strategies for applying whuffie principles to their business. Some key ideas discussed were focusing on qualitative over quantitative metrics, embracing chaos to be more open, making deposits to build social capital through generosity and helping others, and creating experiences that deliver notable value to core customers.
The document discusses the gap between business values and community values online. While most businesses view communities as opportunities for promotion and sales, true engagement requires embracing human values like generosity, compassion, and authenticity. The document advocates for businesses to move beyond just observing online communities as "tourists" and to become active members that give value through openness, stories over statistics, and flexibility over rigid rules.
Tatiana Kolovou, Lynda.com
Being a good listener is a critical skill, whether you are interviewing a candidate or leading a team. However, very few of us have had any formal training in listening effectively and often times we miss important opportunities to use that skill. In this session, you will learn how "high-impact listening" will help you become a better communicator and leader and walk away with a formula for listening success. Some specifics we will cover in the session include:
The 5 different reasons to listen.
The exact non-verbals to show your speaker that you are present.
Ways to avoid common pitfalls.
Following these steps to becoming a better listener will help you thrive as an interpersonal communicator and boost your professional brand.
Check out the best of Talent Connect: http://bit.ly/2e5ojNe
The document discusses cyber bullying and provides advice on preventing and responding to it. It defines cyber bullying as using technology like mobile phones or the internet to deliberately upset someone. It emphasizes the importance of having a shared understanding of cyber bullying across the school community and reviewing policies. Key steps to preventing cyber bullying include educating students on safe technology use, providing reporting methods, and using technology to promote self-esteem and relationships. Responding involves supporting the target, investigating, working with the bully, and potentially involving service providers or police.
Building a company with the help of IT is really necessary as most.docxjasoninnes20
Building a company with the help of IT is really necessary as most of the daily things are running via technology these days and while using technology you must have some minimum criteria for all of those who are using it. Usually, the company must make some policies for internal use and external use, so that where someone crosses the line, they are able to catch hold of them and take a severe action as per the business policies. Now this is really important because due to an error from one person there are other people who would get affected, and there are multiple stages to those areas, that checks the severity of all of those mistakes.
Here some of them that is general while making policies, such as visiting pornographic web sites using company computer is not allowed, disrupting another’s data or computer system and sharing corporate database information. When employees make any of these mistakes, then companies have authorities to terminate employees from the business. Usually every employee is supposed work as per the basic rules or you can say acceptable usage policy. While using company materials and internet, because most of the office work is done over the internet, like using cloud or any other online applications. This allows you to have full access to outside world, but you must know what are the DO’s and Don’t’s. This will help you stick to the company for long time and also grow with the company as much as possible (Information Resources Management Association. International Conference).
These are made by looking at the history, because most of the employees have made some worst things in the history for personal benefits and ended sharing company details with outsiders, and hampered own company value. Using such valuable data, someone from outside can take over the company or misuse the data or they can do anything that can hurt the business directly. When the business owners are going under loss, the company can take actions against such activity or people who are committing those mistakes.
References
Information Resources Management Association. International Conference. Challenges of Information Technology Management in the 21st Century:
Primary Source Document
with Questions (DBQs)
E X C E R P T S F R O M I N S T R U C T I O N S T O M Y D A U G H T E R
By Song Siyŏl
Introduction
Song Siyŏl (1607‐1689) was a prominent scholar and official. This piece was written for his oldest daughter on the
occasion of her marriage and subsequently became an important tutelary text that circulated among elite families.
By the time this text was written, the patterns of patrilocal residence and patrilineal descent advocated by Neo‐
Confucian reformers early in the Chosŏn dynasty had become well established.
Document Excerpt with Questions (Longer selection follows this section)
From Sources of Korean Tradition, edited by Yŏng‐ho Ch’oe, Peter H. Lee, ...
Sometimes the best-laid plans aren’t really well made at all.
About a year ago, Louisiana Tech University had a group of students who were tasked with providing video and photo content to be used across all communication channels. An enviable position, right?
Problem was, the team didn’t have a strategic direction. They had equipment and some knowledge, but feedback and guidance were lacking. What was the best way to help this team of humans who really wanted to make a difference for the university find their direction in terms of recruiting and sharing brand messaging?
Tom and Tonya will tell you how they helped the team gel into a cohesive customer-oriented group of creatives who now make beautiful videos for the entire campus. These students developed a purpose and learned to serve as shepherds for the University brand – some of them are even considering making marketing and communication their life’s work as a result.
The document provides tips for parents on engaging with children and younger siblings on social media. It discusses how social media is an important part of youth culture and offers advice on learning the technologies children use, using technology to bond with kids, researching the sites they engage with, setting a good example by also using social media, and monitoring kids' online activities and intervening if there are signs of cyberbullying or inappropriate content. The document emphasizes engagement over fighting technology and the importance of education and open communication between parents and kids regarding their online lives.
Raising Children of Character www.mannrentoy.comMann Rentoy
This document discusses the importance of character formation for youth in today's society. It argues that parents and teachers must work harder than past generations to develop good character due to societal changes. These include a culture of softness, increased peer influence, and more time spent with media and technology. The document provides tips for parents, such as limiting screen time, modeling good values, and teaching delayed gratification. It emphasizes the role of the family in shaping a child's conscience and advocates for countercultural parenting to develop strong character.
The Coevolution of Language & Social TechnologiesRoland Smart
1. Social technology is a primary driver of language evolution as it augments language and becomes part of language over time.
2. As language and social technology coevolve, social technologies add new symbols, words, norms and behaviors to everyday languages.
3. As this coevolution continues, there will be more intermediation between language and social technology such as analyzing language patterns and metadata to infer insights about relationships and interests.
Giving Students the Freedom to Find Their SentenceLisa Nielsen
Creating schools that empower students to find their passion by embracing new technologies and social media. Schools should prepare students for the real world by allowing them to use the tools they will need, like social networks, rather than banning or restricting technologies. When schools empower students to have a voice and find their interests, it leads to more engaged, motivated learners.
This document discusses social media use among kids and teens. It provides information on the most popular social media platforms and their key features. Some of the main issues covered include privacy and control concerns, the prevalence of cyberbullying, and the effects of social media on mood, self-esteem and relationships. Research is presented on topics like cyberbullying perpetrators and victims, and how platforms and messaging influence bullying risk. Guidelines are offered for parents to have open conversations with youth about responsible social media use.
This document discusses the permanence and visibility of children's digital footprints online. It notes that many children have computers in their bedrooms and spend 2-3 hours per day online. However, 41% of children ages 8 to 17 include personal information like email addresses and phone numbers in visible social media profiles. The document warns that anything posted online can create a "digital tattoo" that is highly visible and hard to remove.
Social Media for Youth Leaders, May 2014, for @c_of_eBex Lewis
A new course for youth leaders who want to learn about how social media can be used positively.
As a youth leader, you may feel the responsibility for helping keep the children that you work with stay safe online, but also want to know how they - and you - can use it to its full advantage. In this day course, developed from Raising Children in a Digital Age (Lion Hudson, 2014), internet scare stories and distorted statistics are put into context, and clear and sensible guidelines are offered. You’ll have the opportunity to discuss your hopes, fears and experiences with others in a similar situation, and study examples of how others have used social media successfully with youth. We’ll discuss understanding privacy, permanency, identity, values and relationships in a digital age (including cyber-bullying)
http://www.churchcommstraining.org/smtyouthleaders.php
Social Media Teen Safety Seminar Training #SocialSavvyFamily Pam Moore
It is critical we help our entire family become socially savvy. Being socially savvy includes being smart about the social networks, knowing the risks, knowing how to get out of trouble when it happens and having fun! Communication is critical to success from the start to help it be an enjoyable experience for all.
This presentation was delivered as part of a social media training seminar in partnership with CrossPointe church Orlando.
Feel free to leverage content with full attribution to source with link to http://www.themarketingnutz.com and http://www.pammarketingnut.com. No copy/paste or duplication of content is permitted. Protected by Copyright 2014.
This Webinar was presented as the first in a series exploring issues important to youth mentoring programs on August 17, 2010. Social media and networking offer numerous ways to professionally engage with youth, serving both program needs and youth adaptability. However, technology can also bring up questions about safety, boundaries, and appropriateness. Social Media and Mentoring: Policies, Gaps, and Boundaries explores social media and networking options and provides space for dialogue to explore safety and ethical considerations.
Children, Church and the Digital Age (#DigitalParenting with @drbexl)Bex Lewis
This document summarizes a presentation on children, the church, and the digital age. The presentation covers topics such as fears about technology, digital communication tools, online friendships and relationships, cyberbullying, online risks like pornography and grooming, and opportunities presented by digital media. It provides exercises for discussing these topics with children and developing organizational social media policies. The overall message is that digital technology is integrated into daily life and both risks and opportunities exist, so churches should educate children to engage constructively and critically with the digital world.
This document discusses issues related to children and youth's use of technology and social media. It provides statistics on how much time youth spend online and what activities they engage in. It also discusses privacy and safety concerns like oversharing personal information, cyberbullying, and exposure to inappropriate content. The document advocates teaching digital literacy and citizenship skills to help youth navigate these challenges and harness the benefits of technology.
Beginner's guide to surviving with social media crazed teensAdam Kruszynski
Adam Kruszynski draws on his wealth of experience as a digital marketer, teacher, sociologist, and parent as he speaks on social media, how teenagers use these new tools to communicate, and how parents can utilize social media to its full potential. He will also explore how this new technology is shaping our future, changing the way we communicate, and reinventing the way teenagers interact with each other. Adam speaks from the heart, and knows first hand how involved teenage children are in using social media sites.
Social Media #getresults (for parent fundraising)Susan T. Evans
This presentation offers ideas for using social media to get results for parent fundraising in education institutions. The presentation was a general session at the 27th Annual Parent Fundraising Conference in August 2012.
Tara Hunt held a workshop on applying the concept of "whuffie", which is a measure of social capital and reputation within online communities. The workshop consisted of 3 sections: an introduction to whuffie and social media trends, a discussion of how whuffie works, and an exercise session where participants developed strategies for applying whuffie principles to their business. Some key ideas discussed were focusing on qualitative over quantitative metrics, embracing chaos to be more open, making deposits to build social capital through generosity and helping others, and creating experiences that deliver notable value to core customers.
The document discusses the gap between business values and community values online. While most businesses view communities as opportunities for promotion and sales, true engagement requires embracing human values like generosity, compassion, and authenticity. The document advocates for businesses to move beyond just observing online communities as "tourists" and to become active members that give value through openness, stories over statistics, and flexibility over rigid rules.
Tatiana Kolovou, Lynda.com
Being a good listener is a critical skill, whether you are interviewing a candidate or leading a team. However, very few of us have had any formal training in listening effectively and often times we miss important opportunities to use that skill. In this session, you will learn how "high-impact listening" will help you become a better communicator and leader and walk away with a formula for listening success. Some specifics we will cover in the session include:
The 5 different reasons to listen.
The exact non-verbals to show your speaker that you are present.
Ways to avoid common pitfalls.
Following these steps to becoming a better listener will help you thrive as an interpersonal communicator and boost your professional brand.
Check out the best of Talent Connect: http://bit.ly/2e5ojNe
The document discusses cyber bullying and provides advice on preventing and responding to it. It defines cyber bullying as using technology like mobile phones or the internet to deliberately upset someone. It emphasizes the importance of having a shared understanding of cyber bullying across the school community and reviewing policies. Key steps to preventing cyber bullying include educating students on safe technology use, providing reporting methods, and using technology to promote self-esteem and relationships. Responding involves supporting the target, investigating, working with the bully, and potentially involving service providers or police.
Building a company with the help of IT is really necessary as most.docxjasoninnes20
Building a company with the help of IT is really necessary as most of the daily things are running via technology these days and while using technology you must have some minimum criteria for all of those who are using it. Usually, the company must make some policies for internal use and external use, so that where someone crosses the line, they are able to catch hold of them and take a severe action as per the business policies. Now this is really important because due to an error from one person there are other people who would get affected, and there are multiple stages to those areas, that checks the severity of all of those mistakes.
Here some of them that is general while making policies, such as visiting pornographic web sites using company computer is not allowed, disrupting another’s data or computer system and sharing corporate database information. When employees make any of these mistakes, then companies have authorities to terminate employees from the business. Usually every employee is supposed work as per the basic rules or you can say acceptable usage policy. While using company materials and internet, because most of the office work is done over the internet, like using cloud or any other online applications. This allows you to have full access to outside world, but you must know what are the DO’s and Don’t’s. This will help you stick to the company for long time and also grow with the company as much as possible (Information Resources Management Association. International Conference).
These are made by looking at the history, because most of the employees have made some worst things in the history for personal benefits and ended sharing company details with outsiders, and hampered own company value. Using such valuable data, someone from outside can take over the company or misuse the data or they can do anything that can hurt the business directly. When the business owners are going under loss, the company can take actions against such activity or people who are committing those mistakes.
References
Information Resources Management Association. International Conference. Challenges of Information Technology Management in the 21st Century:
Primary Source Document
with Questions (DBQs)
E X C E R P T S F R O M I N S T R U C T I O N S T O M Y D A U G H T E R
By Song Siyŏl
Introduction
Song Siyŏl (1607‐1689) was a prominent scholar and official. This piece was written for his oldest daughter on the
occasion of her marriage and subsequently became an important tutelary text that circulated among elite families.
By the time this text was written, the patterns of patrilocal residence and patrilineal descent advocated by Neo‐
Confucian reformers early in the Chosŏn dynasty had become well established.
Document Excerpt with Questions (Longer selection follows this section)
From Sources of Korean Tradition, edited by Yŏng‐ho Ch’oe, Peter H. Lee, ...
Similar to Marketing Myths for SM Use in #highered (20)
Sometimes the best-laid plans aren’t really well made at all.
About a year ago, Louisiana Tech University had a group of students who were tasked with providing video and photo content to be used across all communication channels. An enviable position, right?
Problem was, the team didn’t have a strategic direction. They had equipment and some knowledge, but feedback and guidance were lacking. What was the best way to help this team of humans who really wanted to make a difference for the university find their direction in terms of recruiting and sharing brand messaging?
Tom and Tonya will tell you how they helped the team gel into a cohesive customer-oriented group of creatives who now make beautiful videos for the entire campus. These students developed a purpose and learned to serve as shepherds for the University brand – some of them are even considering making marketing and communication their life’s work as a result.
Tear Down the Wall - Building Relationships Through Program PromotionTonya Oaks Smith
According to the 2016 Ruffalo Noel Levitz survey of prospective students, academic program data is one of the most valuable tools we have in the recruiting arsenal. Yet much of the information they really need – job statistics, alumni information, faculty and student stories – is buried in the traditional academic hierarchy. How do we provide the information prospective students and their parents need to make smart decisions about college? How do we persuade faculty to play an active role in the promotion of their teaching and research? Take a look at how Henderson State University instituted the Academic Program of the Week promotion, the content required to produce this plan and the results from a focused effort on sharing valuable information on academic programs.
Promoting Academic Offerings - Using MarComm to Tell Your Reddie StoryTonya Oaks Smith
Henderson State's Office of Marketing and Communications manages the university's official channels of communication, working to market the university as a whole first, and then individual academic programs. The office also works to engage multiple channels of communication at once in order to create an integrated marketing campaign, as a part of the university’s strategic plan. In this session, the learner will engage in a strategic exercise focused on establishing goals and success metrics for marketing academic programs as well as learn how to prepare for a campaign that utilizes each of the channels available. The learner will also establish which key stakeholder groups are most important to achieving the academic program’s goals and what channels are available to communicate information not focused on marketing.
University communications offices have come a long way since they measured their value by reporting the number of press releases produced or the number of column inches printed in a newspaper. But what metrics are useful in illustrating the real value of the communications function today? The speaker will share her experience in changing the perception of the value of her institution’s Office of Marketing and Communications through the use of metrics.
All I Ever Needed to Know About Social Media I Learned from the Muppets - #mi...Tonya Oaks Smith
In this presentation, Tonya Oaks Smith will argue that the Muppet Show is simply a display of what we see everyday when we manage our social media presence. Take a time machine back to childhood and see how various personalities interacted on the Muppet Show – and how those very characters appear day in and day out on the social web. We’ll talk about how the Muppets serve as a microcosm for the social web, and then we’ll talk about how to deal with things when they go awry.
All I Ever Needed to Know About Social Media I Learned from the Muppets - #ps...Tonya Oaks Smith
It’s time to play the music. It’s time to light the lights. It’s time to meet the Muppets on the Muppet Show tonight. Whether or not you were a child of the 70s and 80s, you know the opening lyrics for the Muppet Show theme. You know Kermit the Frog and Fozzie Bear, Waldorf and Statler, Miss Piggy and Gonzo. The conflicts on the weekly variety show airing in the late 1970s were the stuff of legend for kids growing up at that time. What can we learn from these puppets who showed us how to be better and worse and everything in between?
All I Ever Needed to Know About Social Media I Learned from the MuppetsTonya Oaks Smith
It's time to play the music. It's time to light the lights. It’s time to meet the Muppets on the Muppet Show tonight. Whether or not you were a child of the 70s and 80s, you know the opening lyrics for the Muppet Show theme. You know Kermit the Frog and Fozzie the Bear, Waldorf and Statler, Miss Piggy and Gonzo. The Muppets were not human, but they were terribly human-like. The conflicts on the weekly variety show airing in the late 1970s were the stuff of legend for kids growing up at that time. What can we learn from these puppets who showed us how to be better and worse and everything in between?
Web governance… it’s 2013 and we’re still throwing that term around like it will solve all our problems with the web and how to develop content and manage resources and lead people. But it hasn’t and it won’t.
So the question then becomes, how do we make sense of the chaos that’s inherent in the practice of making the web? Better yet, how do we prepare for the further chaos that fragmented systems and silos, shrinking budgets, and growing requirements – both governmental and organizational – throw in our way?
Tonya Oaks Smith and Ron Bronson argue that – by embracing the basic principles of chaos theory we can improve our approach to the web and the communication and information we get from it. We’ll start by learning about what chaos is and how that idea relates to our concept of governance. Next, we’ll focus on how to embrace the disruption caused by our changing higher ed world.
Presentation for the 8 Nov 2013 faculty meeting. Teaching how to use Google Hangouts. First in a series focused on using tools inherent in Gmail.
Desired outcomes: TLW access and use UALR's preferred email interface, TLW use video and text chat in Gmail
This document appears to be a series of posts from a social media training session on making social media more human. It discusses defining interpersonal vs mass communication, relevant interpersonal rules for social media, best practices, goals and strategies. Specific topics covered include objectives, audiences, actions, benefits and evaluation for a communication plan. Human goals of being real, accurate, respectful, positive and a listener are also presented. The document encourages participants to be human on social media.
The document outlines a presentation by Shari Erwin, Aaron Rester, and Tonya Oaks Smith on strategic communication. It introduces the speakers and poses questions about strategic communication, goals, and teamwork. The presentation covers defining mission, vision, and values; setting objectives, identifying audiences, and determining actions, benefits, and evaluation for communication strategies. It discusses respecting process, sharing expertise, following media, listening to others, expanding comfort zones, and not expecting miracles when working as a team on communication.
This document discusses communicating during organizational crises. It defines a crisis as a specific, unexpected, and nonroutine event that presents both opportunities and threats. The document outlines steps organizations can take before, during, and after a crisis to respond effectively and take advantage of opportunities. These include engaging in simulations, developing strong stakeholder relationships, being open and honest during the crisis, acknowledging both problems and opportunities afterwards. The overall message is that with proper planning and communication, crises can be managed and even present opportunities for organizational improvement.
The document discusses why people pursue their passions and careers. It presents quotes from Martin Luther King Jr., Ralph Waldo Emerson, and Marian Wright Edelman about finding purpose and meaning in one's work. The document argues that passion, not money or fame, is what drives success and allows people to make a meaningful impact. It encourages the reader to see the world with curiosity, keep learning, share their motivation with others, and love what they do in order to find fulfillment.
This document discusses some of the challenges faced by communications professionals working at specialized schools within larger universities. It identifies three main problems: 1) Intrastructural conflict around limited resources and increased demands, 2) Interstructural conflict between the branding of the specialized school and the larger university, and 3) Audience conflict with having multiple, specialized audiences with different needs. Examples are provided from the University of Chicago Law School and the University of Arkansas at Little Rock William H. Bowen School of Law to illustrate these challenges. The document concludes with an invitation for others working in similar roles to connect and discuss strategies for addressing common problems.
We're Gonna Need a Bigger Boat: Web Communication Before, During and After a ...Tonya Oaks Smith
The document discusses communication strategies for organizations before, during, and after a crisis. Before a crisis, organizations should accept the possibility of crisis, determine goals, conduct simulations, build relationships, and establish leadership. During a crisis, they should communicate openly, acknowledge uncertainties, avoid denials, build responsibility cases cautiously, accept media as partners, listen to stakeholders, avoid overassurances, and advise on self-help. After a crisis, organizations should question practices, acknowledge opportunities, enable renewal, cultivate support for change, and evaluate responses to improve. The overall message is that crises can offer opportunities if handled through open communication and stakeholder cooperation.
The Joneses: Communication Networks to Do Your Dirty WorkTonya Oaks Smith
The document discusses how social media can be used to identify and engage opinion leaders to spread information. It defines key terms like change agencies, change agents, and opinion leaders. It also describes research on how Twitter was used during the H1N1 outbreak to communicate. The document advocates identifying opinion leaders on social media who are influential based on their social connections and engagement. It provides suggestions for how to strengthen relationships with opinion leaders and encourage them to help spread information to their own communities.
Reading list for presentation "The Joneses: Communication Networks to Do Your Dirty Work" presented 16 April 2012 at MinneWebCon: Minnesota's Web Conference.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
1. Social Media Myths
the marketing side
http://houseofgeekery.com/2012/03/07/retro-review-the-muppet-movie/
#e12_sem11p #edusocmedia Tonya Oaks Smith
2. myths?
Shari
#e12_sem11p #edusocmedia Erwin, Aaron http://www.flickr.com/photos/franlopezmarino/5214797718/
Rester, and Tonya Oaks Smith
3. @marleysmom
• Communications director at
the UALR William H. Bowen
School of Law
• Worked as a reporter,
internal comm for private
company, for central
communications, and
professional school
• Ambition: Become a true
conquistador in fabulous
shoes
Photo by @radiofreegeorgy
#e12_sem11p #edusocmedia
@marleysmom by @radiofreegeorgy
4. There’s Life Beyond
@bowenlaw
the Four-Year University
• No. 9 ranked legal writing
program, Top 50 PT WILLIAM H. BOWEN
program SCHOOL OF LAW
• 500 students, about 30 full-
time faculty
• Staff of one (me!) provides print, web, and consultation
support for: Alumni Relations & Development,
Admissions, Career Services, Clinical Programs, Dean's
Office, Events & Conferences, Student Services, three
journals, and whatever else pops up
Shari
#e12_sem11p #edusocmedia Erwin, Aaron Rester, and Tonya Oaks Smith
5. myth 1
Shari
#e12_sem11p #edusocmedia Erwin, Aaron Rester, and Tonyahttp://www.zeusfather.com
Oaks Smith
Time - it takes an enormous amount of time to do SM.
Use software and tools to monitor your online presence and make the best use of your time.
Run searches
Use Tweetdeck or hootsuite
Social mention or FB Insights
Block 10 minutes each day and just do it then
You’ll get quicker and can use your time more effectively
6. myth 2
Shari
#e12_sem11p #edusocmedia Erwin, Aaron Rester, and Tonya Oaks Smith
http://nuptialmystery.com/the-curse-of-narcissus/
IMAGE - You should have to separate yourself from your institutional brand
No. However, it is helpful to remember that you are always the brand.
You can be the face of your school or institution; that’s not bad.
(Discussion with professor about appropriateness of my twitter handle)
7. myth 3
Shari
#e12_sem11p #edusocmedia Erwin, Aaron Rester, and Tonya Oaks Smith
http://www.mlahanas.de/Greeks/Mythology/Brimo.html
ANGER - SM allows people to talk negatively about you.
I won’t dispute that it does. But so what? At least they’re talking. They’re invested. They’re gonna do it anyway. With social media, you know
what they’re saying pretty much instantly. It’s not a bad thing, and if you develop relationships with stakeholders, you have a ready group of
defenders for your school.
You can use the negative to influence the conversation.
8. wrap it up
http://www.flickr.com/photos/retail-packaging/3407193928/
#e12_sem11p #edusocmedia
Time - lots?
Image - together or separate?
Anger - negative? or can it be turned?
9. get with me
Tonya Oaks Smith
tosmith@ualr.edu
@marleysmom
501.324.9896
Editor's Notes
\n
\n
\n
\n
Time - it takes an enormous amount of time to do SM. \nUse software and tools to monitor your online presence and make the best use of your time.\nRun searches\nUse Tweetdeck or hootsuite\nSocial mention or FB Insights\nBlock 10 minutes each day and just do it then\nYou’ll get quicker and can use your time more effectively \n
IMAGE - You should have to separate yourself from your institutional brand\nNo. However, it is helpful to remember that you are always the brand.\nYou can be the face of your school or institution; that’s not bad. \n(Discussion with professor about appropriateness of my twitter handle)\n
ANGER - SM allows people to talk negatively about you. \nI won’t dispute that it does. But so what? At least they’re talking. They’re invested. They’re gonna do it anyway. With social media, you know what they’re saying pretty much instantly. It’s not a bad thing, and if you develop relationships with stakeholders, you have a ready group of defenders for your school.\nYou can use the negative to influence the conversation. \n
Time - lots?\nImage - together or separate?\nAnger - negative? or can it be turned?\n\n