SlideShare a Scribd company logo
WebPR for PR Professionals Melissa Attree  ׀  Social Media Strategist  ׀   Blogger  ׀   WebPR specialist
i. Web 2.0 ii. The conversation & WebPR
i. Web 2.0
[object Object],[object Object],[object Object],[object Object]
“ User-generated content”
“ Freedom of expression”
“ Someone like me”
“ Markets are conversations”
“ Shared Intelligence”
EPIC 2015
[object Object],[object Object],“ Web 2.0”
“ Web 2.0”
“ The web is us/ing us”
“ Weblog”
“ The wisdom of crowds” CC wiki
“ The wisdom of crowds”
“ Social bookmarking”
“ Social bookmarking”
“ RSS” CC rss
“ RSS”
[object Object],[object Object],[object Object],[object Object],“ RSS”
“ RSS”
“ RSS”
“ Content is king” Offline & Online integration Wider applications - live-blog / micro-blog etc.
 
 
 
Mobile
ii. The conversation & WebPR
Somewhere, someone has something to say about your brand…shouldn’t you be listening?
Listen  / strategise / engage
In 2005, an American blogger by the name of Jeff Jarvis bought a machine from Dell, the giant American computer manufacturer. Jarvis paid a considerable amount of money for the four year in home service and support plan. A while later he had to have the machine seen to, but was told to return it, leaving him without a computer for 10 days. It took only a six line blog post about the poor service to generate 253 comments within a few days. Ten follow-up posts and 2800 comments later the blog sparked so much opinion that it gave birth to a colloquial term for a shocking service situation.  The expression, Dell Hell, has since become a household term. “ Dell Hell”
In 1992 a bicycle enthusiast magazine published an article on the ease of lock picking, and a review of the better locks, and lock systems for bicycle security. The article pointed out the obvious design flaw of the tubular pin tumbler locking system. In 2004 videos began circulating on the Internet which showed how to open these types of locks with a ball point pen. Most of the lock manufacturers had long since opted to drop the lock mechanism for something with more integrity. However, Kryptonite, a lock manufacturer that was predominantly featured in the videos, was not on the ball and ended up facing class action lawsuits in the US and Canada for negligence.  In the end not only was Kryptonite forced to sacrifice shelf space, but it's relationship with retailers and consumers nationwide was significantly compromised.  “ Kryptonite locks”
Google does  not  forget. You are who Google says you are
I found a place, where we can boogie.
 
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Social rules of engagement”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ What conversation?”
[object Object]
 
Online media room
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WebPR process
[object Object],[object Object],[object Object],[object Object],[object Object],Makhulu Polane Standard Bank Pro20 series
 
 
 
 
 
 
[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Web 2.0 Design Concepts & Their Application to the Enterprise
Web 2.0 Design Concepts & Their Application to the EnterpriseWeb 2.0 Design Concepts & Their Application to the Enterprise
Web 2.0 Design Concepts & Their Application to the Enterprise
Rick Ladd
 
EOI Web 20
EOI Web 20EOI Web 20
Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0
davidsc13
 
2012 04-10 Main Street Meet-Up
2012 04-10 Main Street Meet-Up2012 04-10 Main Street Meet-Up
2012 04-10 Main Street Meet-Up
Internet Marketing Muscle
 
Rebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social SoftwareRebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social Software
James Dellow
 
Web 1.0 vs web 2.0
Web 1.0 vs web 2.0Web 1.0 vs web 2.0
Web 1.0 vs web 2.0
Tricia Slechta
 
Interaction 2013: Making Sense of your Intranet Landscape by Richard Hare
Interaction 2013: Making Sense of your Intranet Landscape by Richard HareInteraction 2013: Making Sense of your Intranet Landscape by Richard Hare
Interaction 2013: Making Sense of your Intranet Landscape by Richard Hare
Richard Hare
 
Adam Park on Web 2.0
Adam Park on Web 2.0Adam Park on Web 2.0
Adam Park on Web 2.0
adampark
 
Web2 0 Ppt
Web2 0 PptWeb2 0 Ppt
Web2 0 Ppt
surenth
 
What is web2.0?
What is web2.0?What is web2.0?
What is web2.0?
Simon Revell
 
Implementing Wikis In The Enterprise
Implementing Wikis In The EnterpriseImplementing Wikis In The Enterprise
Implementing Wikis In The Enterprise
James Dellow
 
Powerpoint meds 1101[1]
Powerpoint meds 1101[1]Powerpoint meds 1101[1]
Powerpoint meds 1101[1]
Halien_17
 
Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101Robert Rose
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
Ankit Saxena
 
1 Intro
1 Intro1 Intro
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
Philip Sheldrake
 
Web 2.0 and Its Effect
Web 2.0 and Its EffectWeb 2.0 and Its Effect
Web 2.0 and Its Effect
MET Technologies
 

What's hot (19)

Web 1 0 and 2-0
Web 1 0 and 2-0Web 1 0 and 2-0
Web 1 0 and 2-0
 
Web 2.0 Design Concepts & Their Application to the Enterprise
Web 2.0 Design Concepts & Their Application to the EnterpriseWeb 2.0 Design Concepts & Their Application to the Enterprise
Web 2.0 Design Concepts & Their Application to the Enterprise
 
EOI Web 20
EOI Web 20EOI Web 20
EOI Web 20
 
Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0Enhacing Collaboration Usingo Web 2.0
Enhacing Collaboration Usingo Web 2.0
 
2012 04-10 Main Street Meet-Up
2012 04-10 Main Street Meet-Up2012 04-10 Main Street Meet-Up
2012 04-10 Main Street Meet-Up
 
Rebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social SoftwareRebooting the Enterprise with Blogs, Wikis and other Social Software
Rebooting the Enterprise with Blogs, Wikis and other Social Software
 
Web 1.0 vs web 2.0
Web 1.0 vs web 2.0Web 1.0 vs web 2.0
Web 1.0 vs web 2.0
 
Interaction 2013: Making Sense of your Intranet Landscape by Richard Hare
Interaction 2013: Making Sense of your Intranet Landscape by Richard HareInteraction 2013: Making Sense of your Intranet Landscape by Richard Hare
Interaction 2013: Making Sense of your Intranet Landscape by Richard Hare
 
Adam Park on Web 2.0
Adam Park on Web 2.0Adam Park on Web 2.0
Adam Park on Web 2.0
 
Web2 0 Ppt
Web2 0 PptWeb2 0 Ppt
Web2 0 Ppt
 
What is web2.0?
What is web2.0?What is web2.0?
What is web2.0?
 
Implementing Wikis In The Enterprise
Implementing Wikis In The EnterpriseImplementing Wikis In The Enterprise
Implementing Wikis In The Enterprise
 
Powerpoint meds 1101[1]
Powerpoint meds 1101[1]Powerpoint meds 1101[1]
Powerpoint meds 1101[1]
 
Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
1 Intro
1 Intro1 Intro
1 Intro
 
Imkt120 unit1 eddy_valerie
Imkt120 unit1 eddy_valerieImkt120 unit1 eddy_valerie
Imkt120 unit1 eddy_valerie
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
Web 2.0 and Its Effect
Web 2.0 and Its EffectWeb 2.0 and Its Effect
Web 2.0 and Its Effect
 

Similar to WebPR For PR Professionals

Web Communication
Web CommunicationWeb Communication
Web CommunicationManeer Khan
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
Michelle Faina
 
Digital Natives - Session 4 - Listening to consumers
Digital Natives - Session 4 - Listening to consumersDigital Natives - Session 4 - Listening to consumers
Digital Natives - Session 4 - Listening to consumers
Bart Muskala
 
Social Networks Optimization
Social Networks OptimizationSocial Networks Optimization
Social Networks Optimization
Liran Zelkha
 
Awe Presentation
Awe PresentationAwe Presentation
Awe Presentation
Tracy Annicchiarico
 
2009 Texas CIO Summit - Web 2.0
2009 Texas CIO Summit - Web 2.02009 Texas CIO Summit - Web 2.0
2009 Texas CIO Summit - Web 2.0NIC Inc | EGOV
 
Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3
Marc Danziger
 
Web 1.0 and Web 2.0
Web 1.0 and Web 2.0Web 1.0 and Web 2.0
Web 1.0 and Web 2.0
Caroline Cerveny
 
STC Wikinomics
STC WikinomicsSTC Wikinomics
STC Wikinomics
jloughranva
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutter
Hillary Hartley
 
Vpk Digital Marketing042009
Vpk Digital Marketing042009Vpk Digital Marketing042009
Vpk Digital Marketing042009Antti Leino
 
Making sense of web 2.0
Making sense of web 2.0Making sense of web 2.0
Making sense of web 2.0
Larry Collett
 
AJLI Presentation on Social Medi
AJLI Presentation on Social MediAJLI Presentation on Social Medi
AJLI Presentation on Social Medi
Howard Greenstein
 
Social Media – Down the Rabbit Hole
Social Media – Down the Rabbit HoleSocial Media – Down the Rabbit Hole
Social Media – Down the Rabbit Hole
Rick Mans
 
Social Media and Inclusion
Social Media and InclusionSocial Media and Inclusion
Social Media and Inclusion
Jason Scott
 
UN Women's Conference - Social listening session
UN Women's Conference - Social listening sessionUN Women's Conference - Social listening session
UN Women's Conference - Social listening sessionsusanpeich
 
The Business Value of Social Software
The Business Value of Social SoftwareThe Business Value of Social Software
The Business Value of Social Software
David Stephens
 
Trainleaders August2010
Trainleaders August2010Trainleaders August2010
Trainleaders August2010
Selling By Social
 
A Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / CluetailA Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
Jos Schuurmans
 
Social Media: Less Hype, More Help
Social Media: Less Hype, More HelpSocial Media: Less Hype, More Help
Social Media: Less Hype, More Help
Bill Sheridan, CAE
 

Similar to WebPR For PR Professionals (20)

Web Communication
Web CommunicationWeb Communication
Web Communication
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Digital Natives - Session 4 - Listening to consumers
Digital Natives - Session 4 - Listening to consumersDigital Natives - Session 4 - Listening to consumers
Digital Natives - Session 4 - Listening to consumers
 
Social Networks Optimization
Social Networks OptimizationSocial Networks Optimization
Social Networks Optimization
 
Awe Presentation
Awe PresentationAwe Presentation
Awe Presentation
 
2009 Texas CIO Summit - Web 2.0
2009 Texas CIO Summit - Web 2.02009 Texas CIO Summit - Web 2.0
2009 Texas CIO Summit - Web 2.0
 
Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3Some Fast Thoughts On Web 2 V3
Some Fast Thoughts On Web 2 V3
 
Web 1.0 and Web 2.0
Web 1.0 and Web 2.0Web 1.0 and Web 2.0
Web 1.0 and Web 2.0
 
STC Wikinomics
STC WikinomicsSTC Wikinomics
STC Wikinomics
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutter
 
Vpk Digital Marketing042009
Vpk Digital Marketing042009Vpk Digital Marketing042009
Vpk Digital Marketing042009
 
Making sense of web 2.0
Making sense of web 2.0Making sense of web 2.0
Making sense of web 2.0
 
AJLI Presentation on Social Medi
AJLI Presentation on Social MediAJLI Presentation on Social Medi
AJLI Presentation on Social Medi
 
Social Media – Down the Rabbit Hole
Social Media – Down the Rabbit HoleSocial Media – Down the Rabbit Hole
Social Media – Down the Rabbit Hole
 
Social Media and Inclusion
Social Media and InclusionSocial Media and Inclusion
Social Media and Inclusion
 
UN Women's Conference - Social listening session
UN Women's Conference - Social listening sessionUN Women's Conference - Social listening session
UN Women's Conference - Social listening session
 
The Business Value of Social Software
The Business Value of Social SoftwareThe Business Value of Social Software
The Business Value of Social Software
 
Trainleaders August2010
Trainleaders August2010Trainleaders August2010
Trainleaders August2010
 
A Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / CluetailA Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
A Corporate Approach To Social Media - by Jos Schuurmans / Cluetail
 
Social Media: Less Hype, More Help
Social Media: Less Hype, More HelpSocial Media: Less Hype, More Help
Social Media: Less Hype, More Help
 

More from Melissa Attree

Are you content with your content?
Are you content with your content?Are you content with your content?
Are you content with your content?
Melissa Attree
 
Life lessons (so far) by @MelAttree
Life lessons (so far) by @MelAttreeLife lessons (so far) by @MelAttree
Life lessons (so far) by @MelAttree
Melissa Attree
 
The Impact of a Story
The Impact of a StoryThe Impact of a Story
The Impact of a Story
Melissa Attree
 
Brands & Branding - Twitter
Brands & Branding - TwitterBrands & Branding - Twitter
Brands & Branding - TwitterMelissa Attree
 
Social Media & Communities
Social Media & CommunitiesSocial Media & Communities
Social Media & Communities
Melissa Attree
 
Social Media Marketing for Business 11 June09
Social Media Marketing for Business 11 June09Social Media Marketing for Business 11 June09
Social Media Marketing for Business 11 June09
Melissa Attree
 
10 Points to consider when planning and executing a Social Media campaign
10 Points to consider when planning and executing a Social Media campaign10 Points to consider when planning and executing a Social Media campaign
10 Points to consider when planning and executing a Social Media campaign
Melissa Attree
 

More from Melissa Attree (7)

Are you content with your content?
Are you content with your content?Are you content with your content?
Are you content with your content?
 
Life lessons (so far) by @MelAttree
Life lessons (so far) by @MelAttreeLife lessons (so far) by @MelAttree
Life lessons (so far) by @MelAttree
 
The Impact of a Story
The Impact of a StoryThe Impact of a Story
The Impact of a Story
 
Brands & Branding - Twitter
Brands & Branding - TwitterBrands & Branding - Twitter
Brands & Branding - Twitter
 
Social Media & Communities
Social Media & CommunitiesSocial Media & Communities
Social Media & Communities
 
Social Media Marketing for Business 11 June09
Social Media Marketing for Business 11 June09Social Media Marketing for Business 11 June09
Social Media Marketing for Business 11 June09
 
10 Points to consider when planning and executing a Social Media campaign
10 Points to consider when planning and executing a Social Media campaign10 Points to consider when planning and executing a Social Media campaign
10 Points to consider when planning and executing a Social Media campaign
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

WebPR For PR Professionals

  • 1. WebPR for PR Professionals Melissa Attree ׀ Social Media Strategist ׀ Blogger ׀ WebPR specialist
  • 2. i. Web 2.0 ii. The conversation & WebPR
  • 4.
  • 6. “ Freedom of expression”
  • 8. “ Markets are conversations”
  • 11.
  • 13. “ The web is us/ing us”
  • 15. “ The wisdom of crowds” CC wiki
  • 16. “ The wisdom of crowds”
  • 21.
  • 24. “ Content is king” Offline & Online integration Wider applications - live-blog / micro-blog etc.
  • 25.  
  • 26.  
  • 27.  
  • 30. Somewhere, someone has something to say about your brand…shouldn’t you be listening?
  • 31. Listen / strategise / engage
  • 32. In 2005, an American blogger by the name of Jeff Jarvis bought a machine from Dell, the giant American computer manufacturer. Jarvis paid a considerable amount of money for the four year in home service and support plan. A while later he had to have the machine seen to, but was told to return it, leaving him without a computer for 10 days. It took only a six line blog post about the poor service to generate 253 comments within a few days. Ten follow-up posts and 2800 comments later the blog sparked so much opinion that it gave birth to a colloquial term for a shocking service situation. The expression, Dell Hell, has since become a household term. “ Dell Hell”
  • 33. In 1992 a bicycle enthusiast magazine published an article on the ease of lock picking, and a review of the better locks, and lock systems for bicycle security. The article pointed out the obvious design flaw of the tubular pin tumbler locking system. In 2004 videos began circulating on the Internet which showed how to open these types of locks with a ball point pen. Most of the lock manufacturers had long since opted to drop the lock mechanism for something with more integrity. However, Kryptonite, a lock manufacturer that was predominantly featured in the videos, was not on the ball and ended up facing class action lawsuits in the US and Canada for negligence. In the end not only was Kryptonite forced to sacrifice shelf space, but it's relationship with retailers and consumers nationwide was significantly compromised. “ Kryptonite locks”
  • 34. Google does not forget. You are who Google says you are
  • 35. I found a place, where we can boogie.
  • 36.  
  • 37.  
  • 38.  
  • 39.
  • 40.
  • 41.
  • 42.  
  • 44.
  • 45.
  • 46.  
  • 47.  
  • 48.  
  • 49.  
  • 50.  
  • 51.  
  • 52.