The document discusses social media strategies for emergency management organizations. It covers definitions of social media, the growth of social media, how communication has changed from traditional press conferences to real-time sharing on social media during emergencies. It also discusses listening to social media conversations, engaging with the public, responding to issues, and measuring social media strategies. The key message is that emergency managers must have a social media strategy to effectively communicate and engage with the public during emergencies in today's digital world.
Social Media-Interacting With Your StakeholdersReginaPhelps
The document discusses how social media can be used for interaction with stakeholders in emergency management. It begins with definitions of key terms like social media, Twitter, hashtags and trends. It then discusses the historical context, providing an example of how information spread during the 1989 Loma Prieta earthquake compared to more recently. A case study examines how within 30 seconds of the 2011 Virginia earthquake, thousands were tweeting about it. The rest of the document outlines demographics of social media users, steps for engagement, ways to interact through tools like LinkedIn, Facebook, YouTube and blogs, and emphasizes that interaction is a two-way conversation.
OEM Presentation - IA and Emergency ResponseNoreen Whysel
An introduction to Information Architecture and Emergency Response technologies presented at the NYC Office of Emergency Management for the Women's History Month Breakfast. This presentation is a companion to my IA Summit presentation Information Architecture and Emergency Response, which goes into more detail on the kinds of technologies used in Emergency Response.
The document proposes a community program called SAFETY NET that utilizes cell phones and civilian awareness to more quickly detect and respond to emerging crisis situations through basic data collection and analysis, with the goal of preventing violence, abuse, and crime. The program could be implemented at nearly no cost while providing benefits to both community users and service providers. It aims to address issues like domestic abuse, gang activity, and terrorism by getting to the root causes within families and communities.
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
The document discusses using human psychology to improve security compliance, focusing on how people's perceptions of risk often differ from actual risks, and how compliance can be increased by appealing to different personality types and motivations. Various case studies are presented that leveraged psychological techniques like social comparison, gamification, and role-based messaging to successfully boost security awareness and adherence to policies. Effective word choices and framing issues in a positive light are emphasized as important strategies.
The intranet as actor: the role of the intranet in knowledge sharingHazel Hall
Hazel Hall's paper presented to the International workshop on understanding sociotechnical action, Edinburgh, 3-4 June 2004. The manuscript for the published version of this paper is available from http://drhazelhall.files.wordpress.com/2013/01/2004_hall_sociotech_edin.pdf. The material presented here draws on the findings of Hazel Hall's doctoral research, the full details of which are available from http://hazelhall.org/publications/phd-the-knowledge-trap-an-intranet-implementation-in-a-corporate-environment/
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
This document discusses rallying youth against cyber crime through awareness and prevention. It proposes a three-pronged strategy focusing on prevention, preparedness, and awareness creation. This would involve conducting forums to educate youth, promoting cyber safety drills, and lobbying for legal changes. The strategy argues that youth are well-positioned to catalyze change given their role as major users of technology. By making youth aware of the serious financial and social impacts of cyber crimes, this approach could drastically reduce such incidents worldwide.
Asia Pacific Civil-Military Centre for Excellence CMIS 2011Heather Blanchard
Heather Blanchard, Co Founder of CrisisCommons presents Social Media in Disasters to CMIS 2011 hosted by the Asia Pacific Civil-Military Centre for Excellence in Sydney, Australia on November 9, 2011
The document provides an update on the H1N1 global situation in October 2009. It states that the virus has spread to 191 countries and infected over 5,000 people worldwide. While the virus has remained mild, those most at risk are younger people under 25, pregnant women, and those with preexisting health conditions. The US has begun experiencing widespread disease, and a priority vaccine distribution list has been established to target high risk groups as limited supplies become available. Monitoring of the virus continues for drug resistance and mutations.
Social Media-Interacting With Your StakeholdersReginaPhelps
The document discusses how social media can be used for interaction with stakeholders in emergency management. It begins with definitions of key terms like social media, Twitter, hashtags and trends. It then discusses the historical context, providing an example of how information spread during the 1989 Loma Prieta earthquake compared to more recently. A case study examines how within 30 seconds of the 2011 Virginia earthquake, thousands were tweeting about it. The rest of the document outlines demographics of social media users, steps for engagement, ways to interact through tools like LinkedIn, Facebook, YouTube and blogs, and emphasizes that interaction is a two-way conversation.
OEM Presentation - IA and Emergency ResponseNoreen Whysel
An introduction to Information Architecture and Emergency Response technologies presented at the NYC Office of Emergency Management for the Women's History Month Breakfast. This presentation is a companion to my IA Summit presentation Information Architecture and Emergency Response, which goes into more detail on the kinds of technologies used in Emergency Response.
The document proposes a community program called SAFETY NET that utilizes cell phones and civilian awareness to more quickly detect and respond to emerging crisis situations through basic data collection and analysis, with the goal of preventing violence, abuse, and crime. The program could be implemented at nearly no cost while providing benefits to both community users and service providers. It aims to address issues like domestic abuse, gang activity, and terrorism by getting to the root causes within families and communities.
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
The document discusses using human psychology to improve security compliance, focusing on how people's perceptions of risk often differ from actual risks, and how compliance can be increased by appealing to different personality types and motivations. Various case studies are presented that leveraged psychological techniques like social comparison, gamification, and role-based messaging to successfully boost security awareness and adherence to policies. Effective word choices and framing issues in a positive light are emphasized as important strategies.
The intranet as actor: the role of the intranet in knowledge sharingHazel Hall
Hazel Hall's paper presented to the International workshop on understanding sociotechnical action, Edinburgh, 3-4 June 2004. The manuscript for the published version of this paper is available from http://drhazelhall.files.wordpress.com/2013/01/2004_hall_sociotech_edin.pdf. The material presented here draws on the findings of Hazel Hall's doctoral research, the full details of which are available from http://hazelhall.org/publications/phd-the-knowledge-trap-an-intranet-implementation-in-a-corporate-environment/
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
This document discusses rallying youth against cyber crime through awareness and prevention. It proposes a three-pronged strategy focusing on prevention, preparedness, and awareness creation. This would involve conducting forums to educate youth, promoting cyber safety drills, and lobbying for legal changes. The strategy argues that youth are well-positioned to catalyze change given their role as major users of technology. By making youth aware of the serious financial and social impacts of cyber crimes, this approach could drastically reduce such incidents worldwide.
Asia Pacific Civil-Military Centre for Excellence CMIS 2011Heather Blanchard
Heather Blanchard, Co Founder of CrisisCommons presents Social Media in Disasters to CMIS 2011 hosted by the Asia Pacific Civil-Military Centre for Excellence in Sydney, Australia on November 9, 2011
The document provides an update on the H1N1 global situation in October 2009. It states that the virus has spread to 191 countries and infected over 5,000 people worldwide. While the virus has remained mild, those most at risk are younger people under 25, pregnant women, and those with preexisting health conditions. The US has begun experiencing widespread disease, and a priority vaccine distribution list has been established to target high risk groups as limited supplies become available. Monitoring of the virus continues for drug resistance and mutations.
The document discusses crisis communications plans and the role of social media. It emphasizes that all organizations need a crisis communications plan to respond to situations that threaten their reputation. It covers how social media has influenced crisis response, the importance of creating a crisis communications toolkit including assembling a core team and response protocols. Examples from Tylenol and Southwest Airlines are provided. Tips for navigating a crisis on social media include listening, maintaining transparency, and showing empathy.
This document provides information on hurricane preparedness. It discusses what hurricanes are, their risks like storm surge, wind, inland flooding and tornadoes. It advises getting ready well before a storm by assembling a family emergency kit with supplies like food, water, batteries, medication and pet supplies. The document outlines hurricane categories based on wind speed and expected damage. It stresses the importance of having an emergency plan and kit ready well before a hurricane threatens.
The guide provides an overview of message mapping and its benefits for risk communication during crises. Message mapping is a process that identifies stakeholders, their potential questions, and develops key messages and facts to address those questions ahead of time. This preparation allows risk communicators to effectively address mental noise or confusion that arises during crises when the public has reduced ability to process information. The guide outlines the steps to develop message maps, including identifying stakeholders, questions, common concerns, key messages, supporting facts, testing messages, and delivering maps through appropriate channels.
Leadership during good times can be difficult enough; during a disaster, it can be a matter of life or death for your people, your company, and your shareholders. When a major emergency or crisis occurs, what happens to your leaders? Do they provide clear direction and instill confidence in the employees and stockholders? Or do they wobble when their strength is needed the most? We will explore recent examples where dubious and uncertain leadership shook public confidence and rattled citizens to their core.
Incident Command System in the Private Sector - An OverviewReginaPhelps
The document discusses the Incident Command System (ICS), an organizational structure for managing emergencies and incidents. It describes the key components of ICS including the five main teams (Command, Operations, Planning/Intelligence, Logistics, Finance), their roles, and the benefits of using a standardized ICS structure. The presentation provides an overview of ICS and examples of how different organizations have implemented ICS teams within their own structures.
Crisis Communications_Plans and ExercisesReginaPhelps
The document discusses effective communication strategies during emergencies. It defines crisis management and reputation management. It discusses different types of communities like small towns, big cities, and online communities. It emphasizes the importance of a communication matrix and templates to facilitate timely communication with stakeholders during incidents. It also promotes practicing communication through exercises.
Developing your Core Marketing Messaging - A One-Page Framework, by Maggie BarrKat & Mouse Co.
This presentation gives you the steps for developing the key marketing messages you will use for your entire companies marketing materials, or for an entire campaign's marketing materials. Steps include: defining your target customer, understand their options, researching competition, developing your competitive positioning, and writing a messaging framework.
If you would like more information about Kat and Mouse Co. and our internet marketing services, please contact us at www.katandmouse.com, or call us at 408-647-2327.
The Message Map is a visual aid. It allows you to prepare and to organize answers to the questions you are most likely to hear from the news media and from the public during a crisis. It is based on research that looked into how people process information when they are under stress.
Ten Disruptions and Why They Are ImportantUpstarts.tv
This document discusses 10 disruptions that have changed the world: desire lines and search, search and social media, Cluetrain conversations, small worlds and the 6 degrees of separation, folksonomy and the wisdom of crowds, longtail, abandoning the news, ecosystem vs castles, cloud technologies, and free revolution. It argues that these disruptions have made markets conversations, empowered users through tagging and social networks, shifted media to open source, and shown the power of free business models and microtrends. The future is one of constant change driven by new technologies where business must participate in online conversations.
Technology as a Cultural Practice - UX AustraliaRachel Hinman
How do you design a mobile money service for people in rural Uganda who’ve never had a bank account? How do you test the usability of a mobile phone’s address book for users in rural India who’ve never had an address… yet alone an analog address book?
As cheap PCs and inexpensive mobile phones flood the global market, usability and user experience professionals will encounter more and more questions like these – questions that challenge not only our research tools and methodologies, but our fundamental assumptions about how people engage with technology. In this talk, Rachel will share insights she’s gained through creating experiences that must scale across vastly different cultures. She’ll share her thoughts on the challenges and opportunities designing for global markets will present to the user experience industry in the years to come.
Webinar: How to Get Leadership Support for Your Disaster Recovery Plan Malika Bennett
1) The webinar discussed how to get leadership support for disaster recovery plans. Eileen Unger of Emergency Preparedness Partnerships presented on stakeholder analysis and engagement to overcome obstacles.
2) Stakeholder analysis identifies key stakeholders, their interests, influence, and importance. The most important stakeholders require different engagement approaches.
3) Effective disaster recovery planning requires commitment from leadership, allocation of resources, and clear ownership of the process. Stakeholder management is key to gaining support and overcoming obstacles.
The document summarizes lessons learned about crisis communication from the September 11th attacks and discusses how communication has changed in the past 10 years. It notes that mobile technology and social media have significantly advanced, creating new challenges and opportunities for crisis notification. While regulation and preparedness have improved, fully addressing human factors and meeting evolving public expectations remains difficult. The presentation concludes by emphasizing the importance of testing emergency response plans that incorporate modern communication strategies and channels.
This document discusses emerging trends in media and technology. It notes that paradigms are shifting as broadcast media integrates with social media to create personal media. It also discusses how Moore's Law is driving increases in speed, connectivity, mobility and lowering costs. Finally, it suggests next generation thinkers value technology, expression, peer production and critical thinking over stored knowledge.
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
This document provides a summary of a presentation by Raoul Chiesa on cybercrime trends from the past to present. It discusses how hacking has evolved from curiosity-driven activities by bored teens to profit-motivated crimes by adults. Reasons for the rise of cybercrime include the increasing number of internet users and victims, economic incentives, availability of hacking tools, recruitment of inexperienced people, and lack of consequences. The presentation also notes how media portrayal has changed perceptions of who hackers are.
From Demographics to Psychographics to Behaviorgraphics - PivotCon 2011 - Jod...PeopleBrowsr
The document discusses how big data and social media are enabling new types of analysis about human behavior and influence ("Behaviorgraphics"). It describes how social media conversations can be filtered and analyzed to understand communities and measure the influence of different accounts. As an example, it explains how analyzing social mentions of TV shows can reveal demographic information about different audiences and potentially replace Nielsen ratings. Billions of social conversations are being archived, forming "Identity Archives" and enabling new insights about human behavior and networks of influence on a massive scale.
THE ARCHITECT’S ROLE IN ADDRESSING URBAN VULNERABILITY AND DISASTER RESPONSE ...HabitatNorway
THE ARCHITECT’S ROLE IN ADDRESSING URBAN VULNERABILITY AND DISASTER RESPONSE
Is the profession trained to play a role in addressing the most pressing contemporary urban challenges?
Lecture with Professor David Sanderson, director of the Centre for Development and
Emergency Practice in the department of architecture, Oxford Brookes University.
David Sanderson trained and worked in architecture before taking a Masters degree in Development Practice at Oxford Brookes University in 1991. Since then he has undertaken project management, training, research and consultancies in development and emergencies in over 30 countries in Africa, Asia, Latin America, Europe and the Caribbean.
In 2006 Sanderson became CENDEP’s Director. He completed his PhD by published works in 2009, which brought together research and practice undertaken between 1995-2008 in urban risk reduction and livelihoods, and was conferred Professor in 2010.
Sanderson’s professional experience lies in urban poverty, disaster risk reduction and livelihoods. He has undertaken work for the UK Government’s Department for International Development (DFID), Disasters Emergency Committee (DEC), European Commission (DiPECHO, EC), United States Agency for International Development (USAID), World Bank (EDI Section), United Nations (UNDP/UNDESA), Action by Churches Together (ACT), British Council, Christian Aid, Tear Fund and the Mott Foundation. He also sits on several NGO committees and is an external examiner at Coventry University.
This document discusses innovation in the Web 2.0 world. It notes that some of the best companies were started during tough economic times, and the best innovations often come from such periods as well. It explores key issues with Web 2.0 like intellectual property protection and open sharing. The document also discusses digital natives, the evolution from Web 1.0 to 2.0, and new opportunities that issues like copyright and privacy present if addressed with social responsibility.
Dr. Leemann faculty at Tulane University School of Public Health and Tropical Medicine has published an article in "Industrial Safety & Hygiene News" June 2012 on effective managment strategies geared toward millennials in the Environmental Health and Safety professions.
The document discusses crisis communications plans and the role of social media. It emphasizes that all organizations need a crisis communications plan to respond to situations that threaten their reputation. It covers how social media has influenced crisis response, the importance of creating a crisis communications toolkit including assembling a core team and response protocols. Examples from Tylenol and Southwest Airlines are provided. Tips for navigating a crisis on social media include listening, maintaining transparency, and showing empathy.
This document provides information on hurricane preparedness. It discusses what hurricanes are, their risks like storm surge, wind, inland flooding and tornadoes. It advises getting ready well before a storm by assembling a family emergency kit with supplies like food, water, batteries, medication and pet supplies. The document outlines hurricane categories based on wind speed and expected damage. It stresses the importance of having an emergency plan and kit ready well before a hurricane threatens.
The guide provides an overview of message mapping and its benefits for risk communication during crises. Message mapping is a process that identifies stakeholders, their potential questions, and develops key messages and facts to address those questions ahead of time. This preparation allows risk communicators to effectively address mental noise or confusion that arises during crises when the public has reduced ability to process information. The guide outlines the steps to develop message maps, including identifying stakeholders, questions, common concerns, key messages, supporting facts, testing messages, and delivering maps through appropriate channels.
Leadership during good times can be difficult enough; during a disaster, it can be a matter of life or death for your people, your company, and your shareholders. When a major emergency or crisis occurs, what happens to your leaders? Do they provide clear direction and instill confidence in the employees and stockholders? Or do they wobble when their strength is needed the most? We will explore recent examples where dubious and uncertain leadership shook public confidence and rattled citizens to their core.
Incident Command System in the Private Sector - An OverviewReginaPhelps
The document discusses the Incident Command System (ICS), an organizational structure for managing emergencies and incidents. It describes the key components of ICS including the five main teams (Command, Operations, Planning/Intelligence, Logistics, Finance), their roles, and the benefits of using a standardized ICS structure. The presentation provides an overview of ICS and examples of how different organizations have implemented ICS teams within their own structures.
Crisis Communications_Plans and ExercisesReginaPhelps
The document discusses effective communication strategies during emergencies. It defines crisis management and reputation management. It discusses different types of communities like small towns, big cities, and online communities. It emphasizes the importance of a communication matrix and templates to facilitate timely communication with stakeholders during incidents. It also promotes practicing communication through exercises.
Developing your Core Marketing Messaging - A One-Page Framework, by Maggie BarrKat & Mouse Co.
This presentation gives you the steps for developing the key marketing messages you will use for your entire companies marketing materials, or for an entire campaign's marketing materials. Steps include: defining your target customer, understand their options, researching competition, developing your competitive positioning, and writing a messaging framework.
If you would like more information about Kat and Mouse Co. and our internet marketing services, please contact us at www.katandmouse.com, or call us at 408-647-2327.
The Message Map is a visual aid. It allows you to prepare and to organize answers to the questions you are most likely to hear from the news media and from the public during a crisis. It is based on research that looked into how people process information when they are under stress.
Ten Disruptions and Why They Are ImportantUpstarts.tv
This document discusses 10 disruptions that have changed the world: desire lines and search, search and social media, Cluetrain conversations, small worlds and the 6 degrees of separation, folksonomy and the wisdom of crowds, longtail, abandoning the news, ecosystem vs castles, cloud technologies, and free revolution. It argues that these disruptions have made markets conversations, empowered users through tagging and social networks, shifted media to open source, and shown the power of free business models and microtrends. The future is one of constant change driven by new technologies where business must participate in online conversations.
Technology as a Cultural Practice - UX AustraliaRachel Hinman
How do you design a mobile money service for people in rural Uganda who’ve never had a bank account? How do you test the usability of a mobile phone’s address book for users in rural India who’ve never had an address… yet alone an analog address book?
As cheap PCs and inexpensive mobile phones flood the global market, usability and user experience professionals will encounter more and more questions like these – questions that challenge not only our research tools and methodologies, but our fundamental assumptions about how people engage with technology. In this talk, Rachel will share insights she’s gained through creating experiences that must scale across vastly different cultures. She’ll share her thoughts on the challenges and opportunities designing for global markets will present to the user experience industry in the years to come.
Webinar: How to Get Leadership Support for Your Disaster Recovery Plan Malika Bennett
1) The webinar discussed how to get leadership support for disaster recovery plans. Eileen Unger of Emergency Preparedness Partnerships presented on stakeholder analysis and engagement to overcome obstacles.
2) Stakeholder analysis identifies key stakeholders, their interests, influence, and importance. The most important stakeholders require different engagement approaches.
3) Effective disaster recovery planning requires commitment from leadership, allocation of resources, and clear ownership of the process. Stakeholder management is key to gaining support and overcoming obstacles.
The document summarizes lessons learned about crisis communication from the September 11th attacks and discusses how communication has changed in the past 10 years. It notes that mobile technology and social media have significantly advanced, creating new challenges and opportunities for crisis notification. While regulation and preparedness have improved, fully addressing human factors and meeting evolving public expectations remains difficult. The presentation concludes by emphasizing the importance of testing emergency response plans that incorporate modern communication strategies and channels.
This document discusses emerging trends in media and technology. It notes that paradigms are shifting as broadcast media integrates with social media to create personal media. It also discusses how Moore's Law is driving increases in speed, connectivity, mobility and lowering costs. Finally, it suggests next generation thinkers value technology, expression, peer production and critical thinking over stored knowledge.
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
This document provides a summary of a presentation by Raoul Chiesa on cybercrime trends from the past to present. It discusses how hacking has evolved from curiosity-driven activities by bored teens to profit-motivated crimes by adults. Reasons for the rise of cybercrime include the increasing number of internet users and victims, economic incentives, availability of hacking tools, recruitment of inexperienced people, and lack of consequences. The presentation also notes how media portrayal has changed perceptions of who hackers are.
From Demographics to Psychographics to Behaviorgraphics - PivotCon 2011 - Jod...PeopleBrowsr
The document discusses how big data and social media are enabling new types of analysis about human behavior and influence ("Behaviorgraphics"). It describes how social media conversations can be filtered and analyzed to understand communities and measure the influence of different accounts. As an example, it explains how analyzing social mentions of TV shows can reveal demographic information about different audiences and potentially replace Nielsen ratings. Billions of social conversations are being archived, forming "Identity Archives" and enabling new insights about human behavior and networks of influence on a massive scale.
THE ARCHITECT’S ROLE IN ADDRESSING URBAN VULNERABILITY AND DISASTER RESPONSE ...HabitatNorway
THE ARCHITECT’S ROLE IN ADDRESSING URBAN VULNERABILITY AND DISASTER RESPONSE
Is the profession trained to play a role in addressing the most pressing contemporary urban challenges?
Lecture with Professor David Sanderson, director of the Centre for Development and
Emergency Practice in the department of architecture, Oxford Brookes University.
David Sanderson trained and worked in architecture before taking a Masters degree in Development Practice at Oxford Brookes University in 1991. Since then he has undertaken project management, training, research and consultancies in development and emergencies in over 30 countries in Africa, Asia, Latin America, Europe and the Caribbean.
In 2006 Sanderson became CENDEP’s Director. He completed his PhD by published works in 2009, which brought together research and practice undertaken between 1995-2008 in urban risk reduction and livelihoods, and was conferred Professor in 2010.
Sanderson’s professional experience lies in urban poverty, disaster risk reduction and livelihoods. He has undertaken work for the UK Government’s Department for International Development (DFID), Disasters Emergency Committee (DEC), European Commission (DiPECHO, EC), United States Agency for International Development (USAID), World Bank (EDI Section), United Nations (UNDP/UNDESA), Action by Churches Together (ACT), British Council, Christian Aid, Tear Fund and the Mott Foundation. He also sits on several NGO committees and is an external examiner at Coventry University.
This document discusses innovation in the Web 2.0 world. It notes that some of the best companies were started during tough economic times, and the best innovations often come from such periods as well. It explores key issues with Web 2.0 like intellectual property protection and open sharing. The document also discusses digital natives, the evolution from Web 1.0 to 2.0, and new opportunities that issues like copyright and privacy present if addressed with social responsibility.
Dr. Leemann faculty at Tulane University School of Public Health and Tropical Medicine has published an article in "Industrial Safety & Hygiene News" June 2012 on effective managment strategies geared toward millennials in the Environmental Health and Safety professions.
2011 02-26, managing information overload, slideshareWilliam Jones
This document provides an overview of a lecture on personal information management (PIM). The lecture covers the definition of PIM and discusses how digital information is fragmented across different tools and applications. It presents a framework for PIM that includes schemes for organizing information, structures for storing information, strategies for managing time and information flow, supporting tools, and a system to integrate these elements. The framework also addresses finding and re-finding information, keeping information according to anticipated needs, maintaining and organizing information, managing privacy and information flow, measuring and evaluating the PIM system, and making sense of and using information.
Behind Every Leader Webinar - EAs Mastering the What IfsVickie Evans
hether it is the End of the World, Sandy, Katrina, or a computer crash, assistants need to be the ones running the "what ifs" and keeping calm in the eye of the proverbial storm. Expecting the unexpected and managing chaos is a job requirement for top assistants and that is exactly what BEL presenters “Be the Ultimate Assistant” author Bonnie Low-Kramen and Technology expert Vickie Sokol Evans will be talking about in their Podcast. It's all in the preparation, including having plenty of coffee available. Are you ready?
Host: Victoria Rabin, Behind Every Leader
Presenters: Bonnie Low-Kramen and Vickie Sokol Evans
Micromedia: A Global Digital Climate ChangeLindner Martin
By Martin Lindner. The Environment we're living, working and learning in is changing. Information becomes microcontent, small pieces loosely joined - and undbundled, re-mixed, aggregated, mashed-up and reloaded into the circulation.
Slides from talk to the London Community Managers Meet-Up in March 2012 on the subject of the Evolution of the Community Manager from a careers, skills and capability perspective.
Steve Ward | CloudNine Social Media & Digital Talent
"Cognitive Traps in Security Planning"Ian MacVicar
The document discusses cognitive biases and traps that can negatively impact security planning, providing examples of biases like confirmation bias and anchoring effect. It also outlines strategies for recognizing and avoiding cognitive traps through approaches like pre-programmed responses, critical thinking techniques, and immediate actions to suspicious inquiries. The goal is to take more rational decisions by recognizing inherent cognitive limitations and systematic deviations from rationality.
The document discusses preparing for volunteers in disasters and coordinating with voluntary organizations. It notes that people are self-organizing using social media to support disaster response efforts, but are often disconnected from emergency management systems. It argues that future partnerships will need to engage ad hoc volunteer networks in addition to formal organizations. The document provides examples of how social media and crowdsourced data are helping with disaster response efforts internationally. It acknowledges challenges around policy and cultural issues but outlines capabilities crowdsourced efforts can provide like managing information, problem solving, and connecting experts.
Similar to Social Media -What is Your Strategy? (20)
1. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Social Media
What is Your Strategy?
2. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Agenda
• Definitions
• Historical Perspective
• Three Communities
• Things Aren’t Always What They Seem
• Social Media Strategy
• The Steps of Engagement
• In Case of Emergency…
• What Should You Be Thinking About?
November 2011 www.ems-solutionsinc.com 2
3. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Definitions
November 2011 www.ems-solutionsinc.com 3
4. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Social Media
• Social Media: Web-based
and mobile technologies able
to turn communication into an
interactive dialogue, allowing
the creation and exchange of
user-generated content.
– Mobile.
– Interactive
– User generated.
• “By the people, for the
people.”
November 2011 www.ems-solutionsinc.com 4
5. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Social Media
November 2011 www.ems-solutionsinc.com 5
6. Out of
Danger Emergency Management & Safety Solutions
Social Media is Big –
Comes
Opportunity
and It’s Not Going Away
November 2011 www.ems-solutionsinc.com 6
7. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
How Big? BIG!
November 2011 www.ems-solutionsinc.com 7
8. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Historical Perspective
November 2011 www.ems-solutionsinc.com 8
9. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
A More Primitive Time…
November 2011 www.ems-solutionsinc.com 9
10. Out of
Danger
Comes
Opportunity In The Old Days…
Emergency Management & Safety Solutions
Disaster Occurred…Loma Prieta
Earthquake (1989)
Responders responded…
PIO collected information…
Prepared a press release…
PIO informs the
anxious, waiting
public at a
formal press
conference
November 2011 www.ems-solutionsinc.com 10
11. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Our More Contemporary Time…
November 2011 www.ems-solutionsinc.com 11
12. Brave New Word…
Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
An F5 Tornado approaching Joplin –
Broadcast on YouTube – with over
4,271,000 views (http://tinyurl.com/43b5n35)
Within moments, people are
informing people… Tweeting, FBing,
posting images and video all in real
time
November 2011 www.ems-solutionsinc.com 12
13. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
And then…the 5.8 Virginia
earthquake
November 2011 www.ems-solutionsinc.com 13
14. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
August 23, 2011
• The 5.8 Virginia earthquake that hit last
August resulted in almost instantaneous
tweets – quake was at 1:51pm.
– First tweets noted at 1:51pm
• First tweet reached NYC 40 seconds
ahead of the quakes first shock waves.*
• Tweets peaked at 5,500 per second.
* SocialFlow
November 2011 www.ems-solutionsinc.com 14
15. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
One of the First Tweets
• One of the first people
to Tweet about the
quake was @b_mc817,
posted a mere 30
seconds after the
earthquake began, it is
most likely that this user
was typing as the
tremor was taking place
November 2011 www.ems-solutionsinc.com 15
16. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Humans as EQ Sensors: There was a clear 40-50 second warning
signal between the very start and the New York City region. This signal
manages to reach tens of thousands of people before a minute is over,
in effect, a network of human sensors that not only identifies a
November 2011 www.ems-solutionsinc.com 16
substantial event, but also passes on information in remarkable ways.
17. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Three Communities
November 2011 www.ems-solutionsinc.com 17
18. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Three Different Communities
• “Real world”:
1. Small towns.
2. Big cities.
• “Virtual” world:
3. Online communities.
November 2011 www.ems-solutionsinc.com 18
19. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Small Town
• Small population, frequent
face-to-face interactions, and
positive identification.
– There is no question who
said or did what.
• Reputation accrues not only
throughout one's lifetime, but
is passed down to one's
offspring:
– One's individual reputation
depends both on one's own
actions and one's inherited
reputation.
November 2011 www.ems-solutionsinc.com 19
20. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Big Cities
• Community members come
and go. We know a small
fraction of people compared
to the whole:
– Small subgroups provide
some implied reputation
management.
• Reputations are managed
with more formal tools:
– Laws/criminal justice
system.
– Elections/elected officials.
– Racial or ethnic prejudice.
November 2011 www.ems-solutionsinc.com 20
21. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Online Community
• Instant communication,
24x7:
– There is no hiding, covering
up, or holding back.
• Everything is available for
public comment in a
moment.
• Everyone is a “reporter” in
the virtual world.
– Cell phone photos and video
are released to a global
audience in moments.
November 2011 www.ems-solutionsinc.com 21
22. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
November 2011 www.ems-solutionsinc.com 22
23. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Things Aren’t Always
What They Seem
November 2011 www.ems-solutionsinc.com 23
24. Out of
Danger Emergency Management & Safety Solutions
Larry Ellison on Twitter –
Comes
Opportunity
Or is It?
November 2011 www.ems-solutionsinc.com 24
25. Out of
Danger Emergency Management & Safety Solutions
Sarah Palin on Twitter –
Comes
Opportunity
Or is It?
November 2011 www.ems-solutionsinc.com 25
26. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
November 2011 www.ems-solutionsinc.com 26
November 2011 www.ems-solutionsinc.com 26
27. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Soon We Will Expect To See…
November 2011 www.ems-solutionsinc.com 27
28. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
In All Building Stairwells
November 2011 www.ems-solutionsinc.com 28
29. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
What is Your SM Strategy?
November 2011 www.ems-solutionsinc.com 29
30. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Strategy – You Need One!
• If you don’t have a strategy
in place to lead the charge
into social media, you will be
at a loss when it becomes
overwhelming.
• A strategy allows you to
measure success points in
your social media journey.
– This helps when it comes to
YOU engaging THEM.
November 2011 www.ems-solutionsinc.com 30
31. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Strategy – Know Thyself
• Ask the most important question first: Why are
you doing this?
– This is the same question that drives our exercise
design (and provides most of our answers).
• What do you want to get out of it?
• What kind of commitment are you willing and
able to make?
– How much budget? How much staffing?
November 2011 www.ems-solutionsinc.com 31
32. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
The Steps of Engagement
November 2011 www.ems-solutionsinc.com 32
33. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Social Media Engagement
• Social media
engagement is Listen
comprised of four steps:
– Listen. Measure
Engage
– Engage.
– Respond.
Respond
– Measure.
November 2011 www.ems-solutionsinc.com 33
34. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Listen”
• Listening (real listening) is a learned
skill, and usually requires a mind shift for
most people (companies):
– Listen to actual customers and real people:
• One-to-one.
• One-to-many.
November 2011 www.ems-solutionsinc.com 34
35. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Listen”
• Listening is important, in a social media
context or other avenues:
– You learn something.
– Your product and services can become better
because of it.
– The interaction can be more positive and
valuable than traditional advertising.
– Your customers may get what they want.
• Everyone can win.
November 2011 www.ems-solutionsinc.com 35
36. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Listening Using SM
• A few places to start:
– Blogs (yours and others’)
– Reviews (Yelp!,
Epinions, Angieslist, etc.)
– Chat
– IM
– Facebook
– Twitter
• Key words: Monitor and
listen.
November 2011 www.ems-solutionsinc.com 36
37. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Engage”
• Engagement is not
talking at them, but
speaking with them.
– This is called a
“conversation.”
November 2011 www.ems-solutionsinc.com 37
38. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Engage”
• Engagement is:
– A two-way street – talking and listening.
• Engagement is NOT:
– A sales pitch.
• Concentrate on listening to the people who are
investing in your writing and social media presence.
– A numbers game.
• Quality is always better than quantity.
November 2011 www.ems-solutionsinc.com 38
39. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Many Ways To Engage
• The Big Four
– Facebook
– Linkedin
– Twitter
– You Tube
• Blogs
November 2011 www.ems-solutionsinc.com 39
40. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Respond”
• Once you are in conversation (and your
reputation is on the line), consider:
– Do you respond? If yes, how?
– What does that look like?
– What vehicles do you use to reach out and
spread your message?
– Do you do it alone? Do you partner with
others?
November 2011 www.ems-solutionsinc.com 40
41. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Respond”
• Engage the community:
– Don’t just push your message.
• When you speak:
– Speak as a peer, rather than just as a
spokesperson.
– People disagree with you…that is OK…
Don’t beat the troll!
November 2011 www.ems-solutionsinc.com 41
42. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Measure”
• How do you know if
what you are doing is
working?
• How do you measure
your reputation in this
“new world”?
November 2011 www.ems-solutionsinc.com 42
43. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
“Measure”
• Some of the tools
available to monitor and
manage your online
reputation:
– Blog tracking.
– Twitter/Facebook tracking.
– Link tracking.
– Google alerts.
– New and emerging apps
and services (Buzzlogic,
Radian6, etc.).
November 2011 www.ems-solutionsinc.com 43
44. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
In Case Of Emergency…You
Had Better Be Ready When
Your CEO Says…
November 2011 www.ems-solutionsinc.com 44
45. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
BP CEO Tony Hayward
– “We’re sorry for the
massive disruption it’s
caused to their lives.”
– He went on to say:
“There’s no one who
wants this thing over
more than I do….I’d like
my life back.” (May 31, 2010)
November 2011 www.ems-solutionsinc.com 45
46. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
What Should You be Thinking
About?
November 2011 www.ems-solutionsinc.com 46
47. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Anonymity in the World?
“There is no privacy.
Everyone is the media.
You can’t hide anything – don’t even think about it…
Everything you do can be exposed – so think very hard
about what you want to be in the world.”
Gary Vaynerchuk
http://reputationprofessor.com/
November 2011 www.ems-solutionsinc.com 47
48. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Your Place in the “New World”
• You should be thinking about how to
live in this “new world.”
– You are being pulled into it whether you
like it or not.
• How will you manage the onslaught in
this brave new world of constant
communication?
November 2011 www.ems-solutionsinc.com 48
49. Out of
Danger
Comes
Emergency Management & Safety Solutions
Opportunity
Thank you
Regina Phelps, CEM, RN, BSN, MPA
Emergency Management & Safety Solutions
San Francisco, California
415-643-4300
www.ems-solutionsinc.com
November 2011 www.ems-solutionsinc.com 49