Leverage on social media to engage with your stakeholders. A presentation at the PR Society of Indonesia 2011 conference in dec, 2011.
Additional slides with video content have been removed.
The ppt gives you an overview of digital marketing, its characteristics, its history, how it is different from traditional marketing and the strategies of digital marketing
The ppt gives you an overview of digital marketing, its characteristics, its history, how it is different from traditional marketing and the strategies of digital marketing
Chapter 1 Consumer Behavior: Its Origins & Strategic ApplicationsNishant Agrawal
Overview of Consumer Behavior
The Marketing Concept
The Marketing Mix and Relationships
Consumer Behavior: Its Origins & Strategic Applications
Overview of Consumer Behavior
Deloitte CrowdIN: Social Media Strategy & DeliveryPatrick Boonstra
The Deloitte CrowdIN: Social Media Strategy & Delivery approach translates Business goals into a social media strategy, gives you Audience insights, as well as takes the organizational setup into account into implementation plans & roadmap. The Delivery phase tackles Social Media in an integrated approach, linked to your previously set (social media) goals. Lastly; don't forget to manage & grow your social media initiatives.
Deviprasad Goenka Management college of Media Studies
http://www.dgmcms.org.in/
Subject:BRAND BUILDING
Lesson : BRAND LEVERAGING
Faculty Name: Vishal Desai
A comprehensive presentation that emphasizes the importance of stakeholder view in social media. It includes examples of Dell, Starbucks, Suzlon Energy etc.
Chapter 1 Consumer Behavior: Its Origins & Strategic ApplicationsNishant Agrawal
Overview of Consumer Behavior
The Marketing Concept
The Marketing Mix and Relationships
Consumer Behavior: Its Origins & Strategic Applications
Overview of Consumer Behavior
Deloitte CrowdIN: Social Media Strategy & DeliveryPatrick Boonstra
The Deloitte CrowdIN: Social Media Strategy & Delivery approach translates Business goals into a social media strategy, gives you Audience insights, as well as takes the organizational setup into account into implementation plans & roadmap. The Delivery phase tackles Social Media in an integrated approach, linked to your previously set (social media) goals. Lastly; don't forget to manage & grow your social media initiatives.
Deviprasad Goenka Management college of Media Studies
http://www.dgmcms.org.in/
Subject:BRAND BUILDING
Lesson : BRAND LEVERAGING
Faculty Name: Vishal Desai
A comprehensive presentation that emphasizes the importance of stakeholder view in social media. It includes examples of Dell, Starbucks, Suzlon Energy etc.
23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...David Nihill
As they clock up the 10,000 hours that Malcolm Gladwell says make a master, comedians learn a lot the hard way. Here are their top tips so you don't have to.
1. Use the Rule of 3
2. Draw Upon Your Real-Life Experiences
3. Identify the Key Part and Get There Fast
4. Find the Funny in Pain Points
5. Think Fails and Firsts
6. Listen and repeat.
7. Think Fun Over Funny
8. Screen Your Jokes
9. Tell a Joke
10. Like Jerry Seinfeld Does, Use Inherently Funny Words
11. Paint a Picture for Others to See
12. Do Something Memorable
13. Jokes are: 1, 2 … 4!
14. Use the Art of Misdirection
15. Put the Word the Joke Hinges on at the End of the Sentence
16. Use Tension
17. Avoid Ever Going Blank Onstage
18. Use Your Hands
19. Use Metaphors and Analogies Combined With Hyperbole (Exaggeration)
20. If the Energy Is Down, Bring It Up
21. Trust Your Funny Bits
22. Proper Planning Prevents Poor Performance
And last but not least, from Irish comedian Dylan Moran:
23. Don’t Rely on Potential
“Don’t do it! Stay away from your potential,” Moran says. “You’ll mess it up. It’s potential; leave it. Anyway, it’s like your bank balance–you always have a lot less than you think.”
As Mark Twain said, “The human race has only one really effective weapon and that is laughter.” That type of arms race may be one worth all our time. Most presentations are really boring. With applications of these tips, yours will not be.
These tips are taken from the bestselling book Do You Talk Funny and Hacking Public Speaking. http://hackingpublicspeaking.com/
This is an educational presentation exploring humanity's water use and the emerging worldwide water shortage. It is designed to act as a stand-alone presentation. Enjoy!
In our web 2.0 world, the business landscape has changed. Consumers refuse to be interrupted anymore - demanding that brands engage with them.
People do business with people they like, know, and trust. By utilizing the social media tools available to all of us, businesses can become human. By creating valuable content and engaging with customers where they are, businesses are creating real relationships, resulting in real trust.
This presentation offers a high-level overview to where we've been, where we are, and we're we are going in social media. It gives simple-to-follow steps to start implementing social media into a business. It's not comprehensive, but can help a business take that first step.
Content developed by Jon Thomas and M80 (m80im.com). Presentation designed by Jon Thomas at Presentation Advisors (www.presentationadvisors.com).
Most everyone has dipped their toe into the social media waters over the past few years, taking a peek at Facebook and Twitter to see what the buzz is all about. But we have learned that using social media tools isn't very difficult, however using them effectively,
particularly for social change, is challenging. Beth Kanter will lead
an interactive keynote the key principles for effective social media use that turns traditional organizations into cost-effective,far-reaching and effective Networked Nonprofits.
IBM presentation at Digital Media Barcelona- Twitter For Business Microbloggi...the bureau, digital agency
IBM presentation: Twitter for business - Microblogging goes to work by Delphine Remy-Boutant, WW Social Media Marketing Manager IBM SWG - Digital Media Barcelona event 16th September
The following presentation was made for the Illinois Department of Public Health's 2012 Minority Health Conference in Naperville, IL on April 5, 2012. #MHC2012
Social Media - What is it, why it matters, and a 3 step action plan for business
Presentation made to the KM round table at Melbourne Zoo, August 19th, 2009
Social Media Engagement - Irene Zalami presentation at Figaro DigitalARC Science
Two thirds of Britons don’t want to ‘engage’ with brands in Social Media. So why do we bother and how can we improve this statistic?
Web Liquid Sr. Account Director Irene Zalami explains, in a talk presented at Figaro Digital (November 2011).
http://www.webliquidgroup.com/blog/client-results/social-media-engagement/
Social Media Overview For GOLD Major Gift OfficersMikey Ames
I had several folks in from national fraternal associations asking how they might use social media to secure more high dollar donors and visits. I wanted to start with the basics. This presentation is a big remix of several other presentations we have seen. Credit remains on each slide.
RPV has been set up by small group of people as an Outreach Program that would focus on prevention, intervention, and education. It was also to be a new venture, complementing but not supplanting the work of other NGO’s, and offering a helping hand to those most in need.
Each person can make a difference to climate change, because one small positive act multiplied millions of times produces immense benefits.
Yayasan Tanam Pohon Indonesia (YTPI) is a non-profit voluntary organisation established in 2007, with its mission to react to problems caused by the massive and increasing levels of deforestation in Indonesia, raise awareness of environmental issues and the role forests play, take action against climate change, educate children on these issues and to PLANT TREES.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
3. 30.000.000 users
1,293,131 tweets/day
40,829,720 users
860,000 users
6 hrs/month
51% download/stream video
5,270,658 blogs and growing
Social Media Landscape in Indonesia
4. Indonesia reported the highest
penetration, with 20.8 percent of
Internet users in the country visiting
Twitter ~ comscore
5. > 40,829,720 Facebook users & GROWING…
World rank: No. 2
Penetration of population: 17%
Penetration of online population: 136.10%
12. Stakeholder Management Matrix
Identify who you should spend the most time and effort on, and collect
the names and addresses of the “Manage Closely” group
Keep Satisfied Manage Closely
Put enough work in with these
These are the people you must
people to keep them satisfied, but
not so much that they become bored fully engage and make the
with your message. greatest efforts to satisfy.
Interest
Keep Informed
Monitor Keep these people informed, and talk to
Monitor these people, but do not them to ensure that no major issues are
burden them with excessive arising. These people can often have
communication. influence in areas you are unaware of, as
seen in viral adoption.
Influence
Source: PM Hut blog
16. Qantas fleet is grounded for 48 hours
and chaos ensues
Initial tweets came from
@QantasMedia
@QantasMedia used as
“breaking news” channel
Retweeted from
@QantasAirways
Ongoing updates from
@QantasAirways
Tone was formal, accurate,
factual, and authoritative
17.
18. Framework for Engagement
Content presents
opportunities
and risks.
Moderators need
to be guided by
training, policy,
common sense
(and a little bit of
fear…)
19. Engagement is core business.
Objectives can only be met with
strategic communications:
• Inspiring potential and current staff
• Marketing products & services
• Company branding
• Community engagement
• Government affairs
• PR and Media relations
20. 5 Steps to Engagement
1: Assess Stakeholder Needs & Interests
2: Develop Rules Of Engagement
3: Identify Right Managers For YOUR
Stakeholders
4: Establish Internal & External Process
5: Train, Equip & Deploy (TED)
21. 5 C’s Engagement
Content: ongoing narrative (stories)
which educates, inspires, informs
and connects.
Context: deep understanding of how
participants within community
engage and the tools they
use to do so.
Connectivity: connecting members of
community in mutually beneficial
ways.
Continuity: sustaining efforts over
time, ensuring that community is
healthy and productive.
Collaboration: collaborative efforts of
participants who share, co-create
and edit each others efforts.
22. Blogging
Micro
RSS
Blogging
Feeds
Message Photo
Boards Sharing
Engagement
Chat tools Video
Rooms
Sharing
Social
Networkin Podcasts
g Widgets
Source: Universal McCann Companies Study on Social Media Trends
(March 2008)
23. Twitter
• Investor‐focused
• Greatly increased outreach and accessibility
• Be approachable, encourage questions, respond to
comments, acknowledge reTweets and mentions
• Push out corporate news, industry news,
interesting articles, goodwill news about peers
• Follow the people and communities that you want
to follow you
• Respond to all questions
Follow me @poonamsagar
24. Facebook
• Community focus
• Push out feel good news, job postings, no $$
stuff
• Be innovative to draw people to site – photo
contests, etc.
Corporate Blog
• Talk about non‐material but positive
‐
information
• Expand on press releases, frequent Q&As
• Increases Google rankings
25. LinkedIn
• Encourage employees to join – spreading corporate brand,
shows you’ve got qualified, high‐quality team
‐
• Participate in discussion groups – demonstrate that the
company has something to say
• Searchable with Google
SlideShare
• Post presentations
• Can track views, searchable with Google
• SlideShare pushes out “similar information” to members
26. YouTube
• Corporate videos, project videos, interviews
• Show credibility, personality
Webcasts
• Choose conferences with webcast option
– Expanded reach
– See spokesperson in action – credibility
– Archived and accessible
• Open up to online questions as well as phone
28. Economic Success Includes
• Increasing sales
• Growing market share (or brand preference
share)
• Return on marketing investment
• Growing shareholder value or share price
• Increasing reputation and image (via external
rankings, stock price)
• Increasing the lifetime value of a customer
(brand loyalty)
29. Behavioral Change Includes:
• Raising awareness
• Shifting attitudes and change stakeholder
Perceptions
• Driving trial
• Inspiring action: Do more or Do less
• Recommending (e.g. net promoter
score)
30. Support Organizational Functions
Human Resources:
recruiting, retention, job descriptions
Internal Communications
collaboration, communication, resource sharing
Collaborative Training:
tools, processes, information-sharing
Product Development:
research, sentiment, real-time feedback
Customer Service:
Real-time reactions, listening, community feedback and support
Sales/Marketing:
engagement, lead generation, sales cycle development
http://www.flickr.com/photos/32955500@N08/3084647270/
31. Insight
Make decisions based on hard data.
• Answer questions ‘who, why and how’ first.
• Stakeholder profile: demographic
segments, activity, networks
• What content is valuable to them – how
might they share it?
• Make insight cycle perpetual using
analytics and reporting frameworks
33. Quick Tips
• Brand your pages
• Choose the right person as your social media
spokesperson
• Show your personality
• But remember this is corporate
information, not personal
• Be creative
• Copy other people’s ideas
• Try new things
36. Summary
• Empowered employees ambassadors
• Community engagement lifetime value for
multiple stakeholders
• Community managers engage Community
• TED: Train, Equip & Deploy community
TED:
managers on social platforms
• Success economic & behavioral
• Organizational implications between PR,
marketing & coordination with steering
committee
37. Your stakeholders are listening out for
you …
Building relationships:
reaching people how and
when they want.
38. Connect with me:
Poonam Sagar
Twitter: @poonamsagar
Email: poonam@infotech.co.id
Blog: poonamsagar.com
Company website: www.infotech.co.id