SlideShare ist ein Scribd-Unternehmen logo
1 von 147
Workshop 2: Listening and Web Presence,[object Object],Day 1: Listening Tools and Privacy Best PracticesDay 2: Strategic Internet Presence:  Web Sites and Blogs,[object Object],This project is managed by Institute for International Institute for Education (IIE)Sponsored by the U.S. Department of State Middle East Partnership Initiative (MEPI),[object Object]
          Program Overview,[object Object]
Day One:  Agenda,[object Object],OUTCOMES,[object Object],AGENDA,[object Object],Leave the room ready to use listening tools and adjust the privacy settings so you can do so safely.,[object Object],Introduction, Overview, and Icebreaker,[object Object],Listening : Why and What,[object Object],Basic Listening,[object Object],More Listening Tools,[object Object],Listening:  The Work Flow,[object Object],Introduction To Privacy and Security ,[object Object],Reflection,[object Object],FRAMING,[object Object],[object Object]
Don’t have to implement all social tools to be successful
Wide range of skills and knowledge in the room
Everyone will participate,[object Object]
To  introduce a simple method for using free or low cost listening tools
To provide an overview of online privacy and security issues and to understand how to use Facebook privacy settings,[object Object]
Title,[object Object],Text,[object Object]
Icebreaker,[object Object],Share Pairs:  For Each Question, Find A Different Person in the Room ,[object Object],What is one thing you already know  or want to learn about listening and social media?,[object Object],What is one thing you already know or want to learn about privacy and security on social networks?,[object Object]
Step 1:  Why Listen?  Link Listening to Strategy Decision-Making or Learning,[object Object],Listening on social media channels means you'll be looking at a lot of data and unstructured information.  If you don't have a clear goal and  identify who want to listen to, you can get quickly overwhelmed. ,[object Object]
Listening Goals:  Examples,[object Object],To know what's happening online, to have a starting point for an issue or a campaign,[object Object],To get to know your audience, supporter, networks,[object Object],To start realize/observe patterns and have baseline so that you can optimize your online work,[object Object],To know general trends about civil society,[object Object],To know what the government is doing online,[object Object]
Exercise:   Review Your Strategy/Identify Goals,[object Object],Share Pair:   Find a partner.   Using your social media strategy template, discuss what your goals and audience are for listening.    Share your goals.  ,[object Object]
Keywords:  Brainstorm A List,[object Object],The basic keywords you'll want to monitor are:Other nonprofit names in your spaceProgram, services, and event namesCEO or well-known personalities associated with your organizationOther nonprofits with similar program namesYour brand or taglineURLs for your blog, web site, online communityIndustry terms or other phrases that illustrate need,[object Object]
Examples,[object Object],These examples should be localized …. ,[object Object]
Keywords,[object Object],E-Mediat Tunisia,[object Object],Emediat Tunisia,[object Object],NGO,[object Object],NGO and Social Media,[object Object],Civil Society and NGO,[object Object],ChemaGargouri,[object Object]
California Shakespeare Theater,[object Object],California Shakespeare Theatre,[object Object],California Shakespeare Festival,[object Object],Cal Shakes,[object Object],Jonathan Moscone  (name of director),[object Object],Susie Falk  (name of artist),[object Object],As the season approaches -- the names of that season's directors and productions.,[object Object],Misspellings ,[object Object]
Share Pair: Identify Your Words,[object Object],Share Pair:   Find a different partner. Brainstorm a list of keywords.  Make notes on the social media strategy template.   Write down your keywords on sticky notes and place on the wall.,[object Object]
Group Discussion and Share,[object Object],What are your listening goals?,[object Object],What are your keywords?,[object Object]
Basic Listening: Google Alerts,[object Object],The easiest way to do listening is to use Google Alerts and with keyword searches.    It monitors the web for anything that has been published with your keywords.,[object Object],Google Alerts can be delivered to your email box, but you are going to learn how to read them in iGoogle.  ,[object Object],Let’s do a demo,[object Object]
Basic Listening: Google Alerts,[object Object],http://www.google.com/alerts,[object Object]
Basic Listening:  Type in Your Keywords ,[object Object],Type in Keywords,[object Object]
Basic Listening: Preview Results,[object Object],Preview results and review,[object Object]
Basic Listening:  Select Type and Volume,[object Object]
Basic Listening:   Select Feed,[object Object]
Basic Listening: Click on the Orange RSS Symbol,[object Object]
Basic Listening: Cut and Paste URL into Word,[object Object]
Basic Listening:  Google Alerts,[object Object],Exercise:    Create Google Alerts based on your goals and keywords.   Cut and paste the feed URL into a word document for later.    Here are some examples.,[object Object],Debrief:   What Google Alerts did you set up and why?,[object Object]
A Few More Listening Tools,[object Object]
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
Remember,[object Object],Where and how you search on SocialMention depends on your goals!,[object Object],Don’t create too many searches at first, you will adjust as you go,[object Object]
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
Exercise ,[object Object],Practice your keyword searches with Google Alerts,  Social Mention, Twitter, and/or Ice Rocket.   Remember to cut and paste URLs of searches that you want to use into a word document.   ,[object Object]
  Demo:  Setting Up Your Dashboard,[object Object],iGoogle is a dashboard that lets you read new content on the web using RSS.    RSS allows information published on the social web to be read or published in another place – like your iGoogle dashboard.  The benefit is that it doesn't add extra emails and gives you a specific place to do your social media listening.   Also, you don’t have to constantly check for new content.     There are many other RSS readers available, most are free, but we’re going to use iGoogle because it is easy and simple.,[object Object]
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
Repeat for all your searches,[object Object]
Full Screen View,[object Object]
E-Mediat:  Workshop 2
E-Mediat:  Workshop 2
As you add more keyword search feeds, you may want to edit the layout of your iGoogle dashboard to include more columns or more tabs,[object Object]
E-Mediat:  Workshop 2
Lunch ,[object Object],Flickr photo by Littlelakes,[object Object]
Hands-On Time:  Setting Up Your iGoogle Dashboard,[object Object],Photo Source:  E-Mediat Yemen,[object Object]
 Listening Work Flow:  Who?,[object Object],Set Up,[object Object],Team or Solo,[object Object],1-2 Hours Per Week,[object Object]
Doing the Work:    Reading Tips,[object Object],Set up aside a small block of time to read your feeds everyday,[object Object],Clean house often, RSS subscriptions and searches tend to pile up,[object Object],Don't feel like you have to read every that comes through in detail,[object Object],Keep your feeds organized on iGoogle,[object Object],Start with a small, select number of feeds,[object Object],Review feeds as part of your routine,[object Object],Open interesting links in new tabs,[object Object],Read and follow interesting links in comments,[object Object],Subscribe to new feeds,[object Object],Revise keywords as you go,[object Object],Identify mission critical keywords,[object Object]
Doing the Work: Analyzing Tips,[object Object],Look for patterns and trends over time. This requires stepping back.,[object Object],Once a week, create a one-page report that includes a summary of mentions.  You can include the title, url, and a sentence describing the article.  ,[object Object],Share report with others in your organization. ,[object Object],Use the “email” option to share mentions with other people in your organization  ,[object Object]
Doing the Work:   Responding Tips,[object Object],What if no one is talking about your organization? That means it is time to start engaging. ,[object Object],Once you have a policy around who will respond, you will get down to commenting and engaging in conversation on blogs or Twitter  ,[object Object],Add value to the conversation,[object Object],Don’t be afraid to disagree,[object Object],Keep to the point of the topic,[object Object],Point to relevant sources if you have more information,[object Object],Watch the conversation develop,[object Object]
Share Pair:  Doing the Work,[object Object],Share Pair:   Find a partner.  Discuss how you will do the work.  ,[object Object],Group Report:   How will your organization do the listening work? ,[object Object]
  Privacy and Security:  How To Use Social Media Safely,[object Object],Flickr Photo by photolab,[object Object]
Security:   Use Strong Passwords ,[object Object],Think of a phrase, rather than a single word.,[object Object],Make your passphrases twelve or more characters long; this makes it harder to crack.,[object Object],Use a combination of symbols, numbers, uppercase and lowercase letters. ,[object Object],Don’t use the same password for every account,[object Object],Change your passwords every 3 months or more often if you use internet cafe systems or computers other than your own.,[object Object],If you have problems remembering passwords, use a secure encrypted program like KeePass to keep track of them.,[object Object],Some accounts are compromised via lost password recovery systems. Be sure your security questions and answers for your accounts are not simple and easy to guess.,[object Object]
Security:  Tool To Test Password Strength,[object Object]
Security:  Tool To Store Passwords,[object Object]
Security Basics:   Know The Difference Between HTTP and HTTPS,[object Object],What It Means:,[object Object],The extra S on the end signifies that your computer has opened a secure connection to the website. You may also notice a 'lock' symbol, either in the address bar or in the status bar at the bottom of your browser window. These are clues to let you know that anyone who might be monitoring your Internet connection will no longer be able to eavesdrop on your communication with that particular website.,[object Object],Technical Information:,[object Object],As opposed to HTTPURLs that begin with "http://" and use port 80 by default, HTTPS URLs begin with "https://" and use port 443 by default.,[object Object]
Security Basics: Use A Secure Web Browser and Add-Ons,[object Object],https://security.ngoinabox.org/firefox_main,[object Object]
Security:   Firefox Browser Add-On for HTTPS,[object Object],http://www.eff.org/https-everywhere,[object Object]
HTTPS Everywhere:  Limitations,[object Object],HTTPS Everywhere depends entirely on the security features of the individual web sites that you use; it activates those security features, but it can't create them if they don't already exist. If you use a site not supported by HTTPS Everywhere or a site that provides some information in an insecure way, HTTPS Everywhere can't provide additional protection for your use of that site. ,[object Object]
Use “End-to-End Encryption” on Free Email Services ,[object Object],In Hotmail, click Options, and then click More options.,[object Object],Under Managing your account, click Account details.,[object Object],You may be asked to provide your password.,[object Object],Under Other options, click Connect with HTTPS. ,[object Object],Click Use HTTPS automatically, and then click Save.,[object Object],X XX,[object Object]
Security Checklist for Gmail: ,[object Object],https://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488,[object Object]
  Use Secure IM Software,[object Object]
  Use VoIP Software,[object Object]
Understand Internet Filters Work,[object Object],Source: https://security.ngoinabox.org/en/chapter_8_1,[object Object]
Circumvention ,[object Object],Regardless of what filtering methods are present, it is nearly always possible to evade them by relying on intermediary computers, outside your country, to reach blocked services for you. This process is often called circumvention, and the intermediary computers are called proxies. ,[object Object]
Anonymity Networks and Basic Proxy Server,[object Object],Anonymity networks typically 'bounce' your Internet traffic around between various secure proxiesin order to disguise where you are coming from and what you are trying to access.  This can significantly reduce the speed at which you are able to load websites and other Internet services. In the case of Tor , however, it also provides a reliable, secure and public means of circumvention that saves you from having to worry about whether or not you trust the individuals who operate your proxies and the websites you visit. As always, you must ensure that you have an encrypted connection, HTTPS, to a secure website before exchanging sensitive information, such as passwords and emails, through a browser.,[object Object]
TOR:  What,[object Object],Tor is software, people, and protocol to help people protect their privacy online. ,[object Object],https://www.torproject.org/,[object Object]
TOR:  Who – Citizens – Journalists - Activists,[object Object],Protect from unscrupulous marketers and identity thieves and irresponsible corporations. ,[object Object],Access Internet information that is behind a national firewall.,[object Object],Protect children (IP addresses tracked to location),[object Object],Anonymity gives a voice to the voiceless.,[object Object]
TOR: How To Install and Use,[object Object]
  Privacy on Social Networks,[object Object],Ask these questions:,[object Object],[object Object]
Who controls and owns the information I put into a social networking site?
What information about me are my contacts passing on to other people?
Will my contacts mind if I share information about them with other people?
Do I trust everyone with whom I’m connected?,[object Object]
Privacy on Facebook,[object Object]
  Privacy Settings Tips on Facebook,[object Object],Have everything set as “Friends Only” (meaning only friends have access to your page.,[object Object],Turn off Public Search,[object Object],Set it so only friends  of friends can find you,[object Object],Set it so only friends can see your friend list, education, location, likes,[object Object],Let only friends see your photo’s tagged photo’s     OR,[object Object],Only allow “me” to see tagged photos of yourself,[object Object],Check your PRIVACY SETTING at least ONCE A MONTH for Facebook changes ,[object Object],Keep your Facebook account securitized and professional at all times!  ,[object Object]
Change the Default Privacy Settings on Facebook,[object Object],1,[object Object],2,[object Object],This is the default privacy settings which makes a lot of your content available publically.   Is that what you want?  Change to Friends Only,[object Object]
  “Friends Only” Settings for Connections,[object Object]
  Profile Preview,[object Object]
  “Friends Only” Settings for Connections,[object Object]
 Friends Only Privacy Settings,[object Object]
 Friends Only Privacy Settings,[object Object]
 Remove from Public Search and Turn Off Instant Personalization,[object Object]
 Remove from Public Search and Turn Off Instant Personalization,[object Object]
Hands-On Time:  Explore Your Facebook Privacy Settings,[object Object],Debrief:   What Facebook privacy settings did you change and why?,[object Object]
Reflection & Closing,[object Object],    Share Pairs,[object Object],    Circle Closing,[object Object]
Workshop 2: Web Presence,[object Object],Day 2: Strategic Internet Presence:  Web Sites and Blogs,[object Object],This project is managed by Institute for International Institute for Education (IIE)Sponsored by the U.S. Department of State Middle East Partnership Initiative (MEPI),[object Object]
          Program Overview,[object Object]
Day Two:  Agenda,[object Object],OUTCOMES,[object Object],AGENDA,[object Object],Leave the room ready to blog and/or make improvements to your web site,[object Object],Introduction, Overview, and Icebreaker,[object Object],Strategic Online Presence,[object Object],Blogging:  Why, What, How,[object Object],Reflection,[object Object],FRAMING,[object Object],[object Object]
Don’t have to implement all social tools to be successful
Wide range of skills and knowledge in the room
Everyone will participate,[object Object]
To understand how to write effective blog posts and build community
To  set up a simple organizational blog on the blogger platform,[object Object]
Write on a sticky note and place on the wall when done:,[object Object],What was your takeaway from yesterday?	,[object Object],Overnight Reflections,[object Object]
Icebreaker:  Share Pair,[object Object],What is one thing you already know  or  want to learn about establishing an effective web presence?,[object Object],What is one thing you already know or want to learn about blogging?,[object Object]
Home and Outposts,[object Object]
Home Base:  Blogs and Web Sites  ,[object Object],We are moving towards having the organization's web presence be less static information and more interactive or social.  Not every NGO needs a separate web site and a blog, some organizations consolidate.  The blog is part of the web site.    Free blogging platforms like blogger give you an easy way to update your content and if you already have a web site, you can easily add it as an interactive part of your web site.  You need to think about how to link or integrate your social media outposts.,[object Object]
Web Site or Blog or Both? ,[object Object],Benefits of a blog ,[object Object],[object Object]
 Improves  with your search engine results
 Easy way to keep content updated and fresh
 Gives your NGOs brand visibility,[object Object]
  Your current web site is a few static pages
  Your web site is not being updated,[object Object]
Examples:   NTEN Outpost,[object Object],http://www.nten.org,[object Object]
Examples:   NTEN  Blog,[object Object],http://www.nten.org,[object Object]
Examples:   NTEN – Outpost,[object Object],http://www.nten.org,[object Object]
Examples:  E-Mediat  Home Base ,[object Object]
Examples:  E-Mediat  Home Base ,[object Object]
Examples:  E-Mediat  Jordan ,[object Object]
Examples:  E-Mediat Jordan Outposts,[object Object]
Examples:  Nasawiya,[object Object]
Examples: Nasawiya,[object Object]
Examples:  Insert Example from your Country,[object Object],Insert a screen capture from an NGO in your country that has a web site/blog and social outposts,[object Object]
What makes an effective  NGO home base?,[object Object],Consistent organizational branding,[object Object],Intuitive/ logical navigation and structure,[object Object],Short content that is fresh and updated regularly,[object Object],Good visual designLinks and integrates social outposts,[object Object]
An Effective Home Base for an NGO,[object Object]
Indianapolis Museum of Art,[object Object]
Examples:  Insert Examples from your Country,[object Object],Insert a screen capture from an NGO in your country that has an effective home base.,[object Object]
Home Base: Improving Your Home Base,[object Object],Small Group Exercise:    Participants will work in groups to evaluate their home base using the home base worksheet.,[object Object],Group Debrief:   ,[object Object],What ideas did you get on how to improve your home base?What works well?,[object Object],How might your organization integrate a blog?,[object Object]
Blogging Overview,[object Object],Types of blogs,[object Object],Editorial Focus,[object Object],Listening As Research for Blogging Stories,[object Object],Types of Blog Content: Form and Style,[object Object],Who will do the work?,[object Object],Measuring Success,[object Object]
Types of Blogs: Organizational Blog,[object Object]
Types of Blogs: Organizational Blog,[object Object]
Types of Blogs: Organizational Blog,[object Object]
Types of Blogs:  Voice of Organizational Leader,[object Object]
Types of Blogs:   Newsletter,[object Object]
Blogging:  What is your editorial focus?,[object Object],[object Object]
   How will it support your social media strategy objective?
   How can you balance writing about your organization vs larger issues or topics?
   What will be useful to your audience?
   How often will you publish blog posts?
   Answer all these questions in a brief, written editorial mission statement,[object Object]
What’s your editorial focus?,[object Object],Share Pair:  Work with a partner and discuss the questions about editorial mission.  Write a brief editorial mission statement. ,[object Object]
Blogging: Listening and Engaging,[object Object],[object Object]
   Are there keywords and phrases that you want to track on your listening dashboard to help guide your blogging content?
  Comment on blogs and link to them in your posts,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

How to break the internet
How to break the internetHow to break the internet
How to break the internetPaul Johnston
 
RLC London - Alan Whitford Abtech
RLC London - Alan Whitford AbtechRLC London - Alan Whitford Abtech
RLC London - Alan Whitford AbtechTALiNT Partners
 
Trainer Guide Workshop 1
Trainer Guide Workshop 1Trainer Guide Workshop 1
Trainer Guide Workshop 1E-Mediat
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalNuuko, Inc.
 
Social media 101 Class
Social media 101 ClassSocial media 101 Class
Social media 101 ClassDave Shockley
 
EPA Greenversations Slide Makeover (original)
EPA Greenversations Slide Makeover (original)EPA Greenversations Slide Makeover (original)
EPA Greenversations Slide Makeover (original)Mike Pulsifer
 
SEO Bootcamp: Writing for SEO
SEO Bootcamp: Writing for SEOSEO Bootcamp: Writing for SEO
SEO Bootcamp: Writing for SEOJonah A Berger
 
Twitter How To Set Up An Account
Twitter How To Set Up An AccountTwitter How To Set Up An Account
Twitter How To Set Up An AccountBrad Sage
 

Was ist angesagt? (13)

How to break the internet
How to break the internetHow to break the internet
How to break the internet
 
LinkedIn Primer
LinkedIn PrimerLinkedIn Primer
LinkedIn Primer
 
RLC London - Alan Whitford Abtech
RLC London - Alan Whitford AbtechRLC London - Alan Whitford Abtech
RLC London - Alan Whitford Abtech
 
Trainer Guide Workshop 1
Trainer Guide Workshop 1Trainer Guide Workshop 1
Trainer Guide Workshop 1
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.final
 
Social media 101 Class
Social media 101 ClassSocial media 101 Class
Social media 101 Class
 
Blogging In Education
Blogging In EducationBlogging In Education
Blogging In Education
 
Microsoft presentation
Microsoft presentationMicrosoft presentation
Microsoft presentation
 
EPA Greenversations Slide Makeover (original)
EPA Greenversations Slide Makeover (original)EPA Greenversations Slide Makeover (original)
EPA Greenversations Slide Makeover (original)
 
SEO Bootcamp: Writing for SEO
SEO Bootcamp: Writing for SEOSEO Bootcamp: Writing for SEO
SEO Bootcamp: Writing for SEO
 
The Beginner's Guide to Twitter
The Beginner's Guide to TwitterThe Beginner's Guide to Twitter
The Beginner's Guide to Twitter
 
How to use Buffer
How to use BufferHow to use Buffer
How to use Buffer
 
Twitter How To Set Up An Account
Twitter How To Set Up An AccountTwitter How To Set Up An Account
Twitter How To Set Up An Account
 

Andere mochten auch

Taiex study visit rtp33119 dossier
Taiex study visit rtp33119 dossierTaiex study visit rtp33119 dossier
Taiex study visit rtp33119 dossierMiguel Mares
 
414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...
414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...
414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...The Skolkovo Foundation
 
Formular-recensamant-octombrie-2011-7
Formular-recensamant-octombrie-2011-7Formular-recensamant-octombrie-2011-7
Formular-recensamant-octombrie-2011-7Cristiana Toma
 
F 5 stepdeck09-r
F 5 stepdeck09-rF 5 stepdeck09-r
F 5 stepdeck09-rdeckguy
 
ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015Riaan Bellingan
 
Proposed Cost Reduction Strategy
Proposed Cost Reduction StrategyProposed Cost Reduction Strategy
Proposed Cost Reduction StrategyA Afkari
 
Sf performances listening report may 21
Sf performances listening report may 21Sf performances listening report may 21
Sf performances listening report may 21Beth Kanter
 
06 Как собрать миллион долларов на краудфандинге?
06 Как собрать миллион долларов на краудфандинге?06 Как собрать миллион долларов на краудфандинге?
06 Как собрать миллион долларов на краудфандинге?Startupvillage2015
 
唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗Yvonne 99
 
Presentation2
Presentation2Presentation2
Presentation2sanjoveze
 
JDS Academy: Shiny Objects
JDS Academy: Shiny ObjectsJDS Academy: Shiny Objects
JDS Academy: Shiny ObjectsLisa Colton
 
A Road Map for Managing Reputation 101314 PRSA presentation
A Road Map for Managing Reputation 101314 PRSA presentationA Road Map for Managing Reputation 101314 PRSA presentation
A Road Map for Managing Reputation 101314 PRSA presentationMark David Richards
 
Стартапы и инвестиции, Д.Калаев
Стартапы и инвестиции, Д.КалаевСтартапы и инвестиции, Д.Калаев
Стартапы и инвестиции, Д.КалаевBusiness incubator HSE
 

Andere mochten auch (20)

Taiex study visit rtp33119 dossier
Taiex study visit rtp33119 dossierTaiex study visit rtp33119 dossier
Taiex study visit rtp33119 dossier
 
414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...
414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...
414 приказ № 414 пр об утверждении положения об отборе инновационных проектов...
 
Who comes first
Who comes firstWho comes first
Who comes first
 
Formular-recensamant-octombrie-2011-7
Formular-recensamant-octombrie-2011-7Formular-recensamant-octombrie-2011-7
Formular-recensamant-octombrie-2011-7
 
Giftcertificate
GiftcertificateGiftcertificate
Giftcertificate
 
CV
CVCV
CV
 
Web 2
Web 2Web 2
Web 2
 
F 5 stepdeck09-r
F 5 stepdeck09-rF 5 stepdeck09-r
F 5 stepdeck09-r
 
132333
132333132333
132333
 
ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015ACS Newsletter 20 years Feb 2015
ACS Newsletter 20 years Feb 2015
 
Proposed Cost Reduction Strategy
Proposed Cost Reduction StrategyProposed Cost Reduction Strategy
Proposed Cost Reduction Strategy
 
Sf performances listening report may 21
Sf performances listening report may 21Sf performances listening report may 21
Sf performances listening report may 21
 
06 Как собрать миллион долларов на краудфандинге?
06 Как собрать миллион долларов на краудфандинге?06 Как собрать миллион долларов на краудфандинге?
06 Как собрать миллион долларов на краудфандинге?
 
MAM2010_Rochat
MAM2010_RochatMAM2010_Rochat
MAM2010_Rochat
 
唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗唯一一隻登上時代雜誌封面的狗狗
唯一一隻登上時代雜誌封面的狗狗
 
Presentation2
Presentation2Presentation2
Presentation2
 
JDS Academy: Shiny Objects
JDS Academy: Shiny ObjectsJDS Academy: Shiny Objects
JDS Academy: Shiny Objects
 
Presentacion
PresentacionPresentacion
Presentacion
 
A Road Map for Managing Reputation 101314 PRSA presentation
A Road Map for Managing Reputation 101314 PRSA presentationA Road Map for Managing Reputation 101314 PRSA presentation
A Road Map for Managing Reputation 101314 PRSA presentation
 
Стартапы и инвестиции, Д.Калаев
Стартапы и инвестиции, Д.КалаевСтартапы и инвестиции, Д.Калаев
Стартапы и инвестиции, Д.Калаев
 

Ähnlich wie E-Mediat: Workshop 2

Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10E-Mediat
 
Workshop 2 - PowerPoint Presentation v03
Workshop 2  - PowerPoint Presentation v03Workshop 2  - PowerPoint Presentation v03
Workshop 2 - PowerPoint Presentation v03E-Mediat
 
Leveraging Social Media: Listening Conference Call 2
Leveraging Social Media: Listening Conference Call 2Leveraging Social Media: Listening Conference Call 2
Leveraging Social Media: Listening Conference Call 2Beth Kanter
 
Using Social Media to Promote YOUR Business
Using Social Media to Promote YOUR BusinessUsing Social Media to Promote YOUR Business
Using Social Media to Promote YOUR BusinessMedia Barker
 
The new literacy: strategies, tools and techniques for incorporating new media
The new literacy: strategies, tools and techniques for incorporating new media The new literacy: strategies, tools and techniques for incorporating new media
The new literacy: strategies, tools and techniques for incorporating new media Marco Campana
 
Social Media for Enterprise session 2
Social Media for Enterprise session 2Social Media for Enterprise session 2
Social Media for Enterprise session 2Steve Thompson
 
Your New Career Adventure
Your New Career Adventure Your New Career Adventure
Your New Career Adventure ClearedJobs.Net
 
Social Media and Online Tools for Your Job Search
Social Media and Online Tools for Your Job Search Social Media and Online Tools for Your Job Search
Social Media and Online Tools for Your Job Search ClearedJobs.Net
 
CSAE Redengine Presentation
CSAE Redengine PresentationCSAE Redengine Presentation
CSAE Redengine PresentationMangal11
 
Blogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBlogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBill Chamberlin
 
Integrating Social Media Into Your Website
Integrating Social Media Into Your WebsiteIntegrating Social Media Into Your Website
Integrating Social Media Into Your WebsiteTechSoup
 
Ibm Web 2 0 Goes To Work Presentation
Ibm  Web 2 0 Goes To Work PresentationIbm  Web 2 0 Goes To Work Presentation
Ibm Web 2 0 Goes To Work Presentationjward5519
 
AMA Twitter for Marketers Orlando-6-9-11
AMA Twitter for Marketers Orlando-6-9-11AMA Twitter for Marketers Orlando-6-9-11
AMA Twitter for Marketers Orlando-6-9-11Bernie Borges
 
Benefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBenefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBrayman Construction
 
Five Steps For Getting Started With Social Media Monitoring (for Alterian)
Five Steps For Getting Started With Social Media Monitoring (for Alterian)Five Steps For Getting Started With Social Media Monitoring (for Alterian)
Five Steps For Getting Started With Social Media Monitoring (for Alterian)Marcus Tewksbury
 
C20 Workshop
C20 WorkshopC20 Workshop
C20 WorkshopDave Peck
 
Council on Foundations Presentation
Council on Foundations PresentationCouncil on Foundations Presentation
Council on Foundations PresentationBeth Kanter
 
Five Steps For Getting Started With Social Media Monitoring
Five Steps For Getting Started With Social Media MonitoringFive Steps For Getting Started With Social Media Monitoring
Five Steps For Getting Started With Social Media MonitoringAlterian
 
LinkedIn - HOW TO Build A Better Profile
LinkedIn - HOW TO Build A Better ProfileLinkedIn - HOW TO Build A Better Profile
LinkedIn - HOW TO Build A Better ProfileIncept
 

Ähnlich wie E-Mediat: Workshop 2 (20)

Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10Workshop 2 - PowerPoint Presentation v10
Workshop 2 - PowerPoint Presentation v10
 
Workshop 2 - PowerPoint Presentation v03
Workshop 2  - PowerPoint Presentation v03Workshop 2  - PowerPoint Presentation v03
Workshop 2 - PowerPoint Presentation v03
 
Leveraging Social Media: Listening Conference Call 2
Leveraging Social Media: Listening Conference Call 2Leveraging Social Media: Listening Conference Call 2
Leveraging Social Media: Listening Conference Call 2
 
Using Social Media to Promote YOUR Business
Using Social Media to Promote YOUR BusinessUsing Social Media to Promote YOUR Business
Using Social Media to Promote YOUR Business
 
The new literacy: strategies, tools and techniques for incorporating new media
The new literacy: strategies, tools and techniques for incorporating new media The new literacy: strategies, tools and techniques for incorporating new media
The new literacy: strategies, tools and techniques for incorporating new media
 
Social Media for Enterprise session 2
Social Media for Enterprise session 2Social Media for Enterprise session 2
Social Media for Enterprise session 2
 
Your New Career Adventure
Your New Career Adventure Your New Career Adventure
Your New Career Adventure
 
Social Media and Online Tools for Your Job Search
Social Media and Online Tools for Your Job Search Social Media and Online Tools for Your Job Search
Social Media and Online Tools for Your Job Search
 
CSAE Redengine Presentation
CSAE Redengine PresentationCSAE Redengine Presentation
CSAE Redengine Presentation
 
How to start using Twitter
How to start using TwitterHow to start using Twitter
How to start using Twitter
 
Blogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-MeasureBlogging 101 - Research-Plan-Engage-Measure
Blogging 101 - Research-Plan-Engage-Measure
 
Integrating Social Media Into Your Website
Integrating Social Media Into Your WebsiteIntegrating Social Media Into Your Website
Integrating Social Media Into Your Website
 
Ibm Web 2 0 Goes To Work Presentation
Ibm  Web 2 0 Goes To Work PresentationIbm  Web 2 0 Goes To Work Presentation
Ibm Web 2 0 Goes To Work Presentation
 
AMA Twitter for Marketers Orlando-6-9-11
AMA Twitter for Marketers Orlando-6-9-11AMA Twitter for Marketers Orlando-6-9-11
AMA Twitter for Marketers Orlando-6-9-11
 
Benefits Communiucation Using Social Media
Benefits Communiucation Using Social MediaBenefits Communiucation Using Social Media
Benefits Communiucation Using Social Media
 
Five Steps For Getting Started With Social Media Monitoring (for Alterian)
Five Steps For Getting Started With Social Media Monitoring (for Alterian)Five Steps For Getting Started With Social Media Monitoring (for Alterian)
Five Steps For Getting Started With Social Media Monitoring (for Alterian)
 
C20 Workshop
C20 WorkshopC20 Workshop
C20 Workshop
 
Council on Foundations Presentation
Council on Foundations PresentationCouncil on Foundations Presentation
Council on Foundations Presentation
 
Five Steps For Getting Started With Social Media Monitoring
Five Steps For Getting Started With Social Media MonitoringFive Steps For Getting Started With Social Media Monitoring
Five Steps For Getting Started With Social Media Monitoring
 
LinkedIn - HOW TO Build A Better Profile
LinkedIn - HOW TO Build A Better ProfileLinkedIn - HOW TO Build A Better Profile
LinkedIn - HOW TO Build A Better Profile
 

Mehr von Beth Kanter

Nonprofits and the Age of Automation: Bots, AI, and Struggle for Humanity
Nonprofits and the Age of Automation: Bots, AI, and Struggle for HumanityNonprofits and the Age of Automation: Bots, AI, and Struggle for Humanity
Nonprofits and the Age of Automation: Bots, AI, and Struggle for HumanityBeth Kanter
 
FireSpring Webinar - Happy Healthy Fundraiser
FireSpring Webinar - Happy Healthy FundraiserFireSpring Webinar - Happy Healthy Fundraiser
FireSpring Webinar - Happy Healthy FundraiserBeth Kanter
 
Combating Distraction and Enhancing Productivity: Technology Wellness in the ...
Combating Distraction and Enhancing Productivity: Technology Wellness in the ...Combating Distraction and Enhancing Productivity: Technology Wellness in the ...
Combating Distraction and Enhancing Productivity: Technology Wellness in the ...Beth Kanter
 
Happy Healthy Nonprofit: Strategies for Impact without Burnout
Happy Healthy Nonprofit:  Strategies for Impact without BurnoutHappy Healthy Nonprofit:  Strategies for Impact without Burnout
Happy Healthy Nonprofit: Strategies for Impact without BurnoutBeth Kanter
 
Creating the Ideal Workplace Culture
Creating the Ideal Workplace CultureCreating the Ideal Workplace Culture
Creating the Ideal Workplace CultureBeth Kanter
 
New Hampshire Nonprofits
New Hampshire NonprofitsNew Hampshire Nonprofits
New Hampshire NonprofitsBeth Kanter
 
Avoiding Nonprofit Collaborative Overload
Avoiding Nonprofit Collaborative OverloadAvoiding Nonprofit Collaborative Overload
Avoiding Nonprofit Collaborative OverloadBeth Kanter
 
Nonprofit Day 2017 - Keynote
Nonprofit Day 2017 - KeynoteNonprofit Day 2017 - Keynote
Nonprofit Day 2017 - KeynoteBeth Kanter
 
Forefront Conference Keynote
Forefront Conference KeynoteForefront Conference Keynote
Forefront Conference KeynoteBeth Kanter
 
IFC Master Class: Fundraiser Burnout
IFC Master Class: Fundraiser BurnoutIFC Master Class: Fundraiser Burnout
IFC Master Class: Fundraiser BurnoutBeth Kanter
 
Happy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopHappy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopBeth Kanter
 
Running Effective Virtual Meetings: Tools & Techniques for Engagement
Running Effective Virtual Meetings:  Tools & Techniques for EngagementRunning Effective Virtual Meetings:  Tools & Techniques for Engagement
Running Effective Virtual Meetings: Tools & Techniques for EngagementBeth Kanter
 
Happy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopHappy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopBeth Kanter
 
The Happy Healthy Fundraiser
The Happy Healthy FundraiserThe Happy Healthy Fundraiser
The Happy Healthy FundraiserBeth Kanter
 
Creating Resilient Nonprofit Staff from the Inside/Out
Creating Resilient Nonprofit Staff from the Inside/OutCreating Resilient Nonprofit Staff from the Inside/Out
Creating Resilient Nonprofit Staff from the Inside/OutBeth Kanter
 
Workshop at Helsinki University: Social Media and NGOS
Workshop at Helsinki University: Social Media and NGOSWorkshop at Helsinki University: Social Media and NGOS
Workshop at Helsinki University: Social Media and NGOSBeth Kanter
 
Workshop for US Embassy Finland - Finnish- American Societies
Workshop for US Embassy Finland - Finnish- American Societies Workshop for US Embassy Finland - Finnish- American Societies
Workshop for US Embassy Finland - Finnish- American Societies Beth Kanter
 
Fulbright Finland Staff Workshop
Fulbright Finland Staff WorkshopFulbright Finland Staff Workshop
Fulbright Finland Staff WorkshopBeth Kanter
 
Happy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopHappy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopBeth Kanter
 

Mehr von Beth Kanter (20)

Nonprofits and the Age of Automation: Bots, AI, and Struggle for Humanity
Nonprofits and the Age of Automation: Bots, AI, and Struggle for HumanityNonprofits and the Age of Automation: Bots, AI, and Struggle for Humanity
Nonprofits and the Age of Automation: Bots, AI, and Struggle for Humanity
 
FireSpring Webinar - Happy Healthy Fundraiser
FireSpring Webinar - Happy Healthy FundraiserFireSpring Webinar - Happy Healthy Fundraiser
FireSpring Webinar - Happy Healthy Fundraiser
 
Combating Distraction and Enhancing Productivity: Technology Wellness in the ...
Combating Distraction and Enhancing Productivity: Technology Wellness in the ...Combating Distraction and Enhancing Productivity: Technology Wellness in the ...
Combating Distraction and Enhancing Productivity: Technology Wellness in the ...
 
Happy Healthy Nonprofit: Strategies for Impact without Burnout
Happy Healthy Nonprofit:  Strategies for Impact without BurnoutHappy Healthy Nonprofit:  Strategies for Impact without Burnout
Happy Healthy Nonprofit: Strategies for Impact without Burnout
 
Creating the Ideal Workplace Culture
Creating the Ideal Workplace CultureCreating the Ideal Workplace Culture
Creating the Ideal Workplace Culture
 
New Hampshire Nonprofits
New Hampshire NonprofitsNew Hampshire Nonprofits
New Hampshire Nonprofits
 
Avoiding Nonprofit Collaborative Overload
Avoiding Nonprofit Collaborative OverloadAvoiding Nonprofit Collaborative Overload
Avoiding Nonprofit Collaborative Overload
 
Nonprofit Day 2017 - Keynote
Nonprofit Day 2017 - KeynoteNonprofit Day 2017 - Keynote
Nonprofit Day 2017 - Keynote
 
Forefront Conference Keynote
Forefront Conference KeynoteForefront Conference Keynote
Forefront Conference Keynote
 
IFC Master Class: Fundraiser Burnout
IFC Master Class: Fundraiser BurnoutIFC Master Class: Fundraiser Burnout
IFC Master Class: Fundraiser Burnout
 
Happy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopHappy Healthy Nonprofit Workshop
Happy Healthy Nonprofit Workshop
 
Running Effective Virtual Meetings: Tools & Techniques for Engagement
Running Effective Virtual Meetings:  Tools & Techniques for EngagementRunning Effective Virtual Meetings:  Tools & Techniques for Engagement
Running Effective Virtual Meetings: Tools & Techniques for Engagement
 
Happy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopHappy Healthy Nonprofit Workshop
Happy Healthy Nonprofit Workshop
 
Mini-Workshop
Mini-WorkshopMini-Workshop
Mini-Workshop
 
The Happy Healthy Fundraiser
The Happy Healthy FundraiserThe Happy Healthy Fundraiser
The Happy Healthy Fundraiser
 
Creating Resilient Nonprofit Staff from the Inside/Out
Creating Resilient Nonprofit Staff from the Inside/OutCreating Resilient Nonprofit Staff from the Inside/Out
Creating Resilient Nonprofit Staff from the Inside/Out
 
Workshop at Helsinki University: Social Media and NGOS
Workshop at Helsinki University: Social Media and NGOSWorkshop at Helsinki University: Social Media and NGOS
Workshop at Helsinki University: Social Media and NGOS
 
Workshop for US Embassy Finland - Finnish- American Societies
Workshop for US Embassy Finland - Finnish- American Societies Workshop for US Embassy Finland - Finnish- American Societies
Workshop for US Embassy Finland - Finnish- American Societies
 
Fulbright Finland Staff Workshop
Fulbright Finland Staff WorkshopFulbright Finland Staff Workshop
Fulbright Finland Staff Workshop
 
Happy Healthy Nonprofit Workshop
Happy Healthy Nonprofit WorkshopHappy Healthy Nonprofit Workshop
Happy Healthy Nonprofit Workshop
 

Kürzlich hochgeladen

Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 

Kürzlich hochgeladen (20)

Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 

E-Mediat: Workshop 2

  • 1.
  • 2.
  • 3.
  • 4. Don’t have to implement all social tools to be successful
  • 5. Wide range of skills and knowledge in the room
  • 6.
  • 7. To introduce a simple method for using free or low cost listening tools
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 37.
  • 45.
  • 46.
  • 51.
  • 52.
  • 55.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83. Who controls and owns the information I put into a social networking site?
  • 84. What information about me are my contacts passing on to other people?
  • 85. Will my contacts mind if I share information about them with other people?
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102. Don’t have to implement all social tools to be successful
  • 103. Wide range of skills and knowledge in the room
  • 104.
  • 105. To understand how to write effective blog posts and build community
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112. Improves with your search engine results
  • 113. Easy way to keep content updated and fresh
  • 114.
  • 115. Your current web site is a few static pages
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139. How will it support your social media strategy objective?
  • 140. How can you balance writing about your organization vs larger issues or topics?
  • 141. What will be useful to your audience?
  • 142. How often will you publish blog posts?
  • 143.
  • 144.
  • 145.
  • 146. Are there keywords and phrases that you want to track on your listening dashboard to help guide your blogging content?
  • 147.
  • 152. Lists
  • 153. Tips
  • 154.
  • 155.
  • 156.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163. Use creative commons images or your own photos to give interest
  • 164. Descriptive title, questions help encourage interaction
  • 165. First paragraph to state what you’re writing about
  • 166. “Chunk” your text, use headlines
  • 167.
  • 168.
  • 169.
  • 170.
  • 171.
  • 172.
  • 173.
  • 174.

Hinweis der Redaktion

  1. IIE and publicly acknowledge funding by the U.S. Department of State Middle East Partnership Initiative (MEPI).Workshop 2: Listening and Web PresenceDay 1: Listening and PrivacyDay 2: Strategic Internet Presence: Blogs and/or Web Sites
  2. Give a verbal overview of the programhttp://www.emediat.org/main/program-overview/The program outcomes are: Increase CSO/NGO knowledge, access and skills to use new media effectively to advance their unique missions and strengthen their organizationsImprove communication between CSO/NGO leaders and key stakeholders and between CSO/NGOs and their communities of peers around the worldImprove communication between CSO/NGOs and governments in the MENA regionThe five-workshop agenda is an intense schedule and a lot to cover and implement in a very short time frame. While you will be exposed to many tools, and techniques, it is not an expectation that every organization will implement all tools presented in the workshops at the deepest level to reach the above outcomes.
  3. This template is from Grove Consulting.
  4. Give a brief introduction
  5. 9:00-9:30 Introduction, Agenda Overview, and IcebreakerIntroductionsReview of the Workshop 2 Agenda Day 1 Icebreaker: As people arrive, ask them to write down the answer to this question. “The one question about social media that I want an answer to is: “ Collect the sticky notes and put them on a sheet labeled “Participant Questions.” You’ll use this throughout the day to make sure questions are answered.Share pairs: Do a series of share pairs. Ask people to find a partner in the room and share the answers to these questions. Tell them that if they see you raise your hand, it is the signal to stop talking and be quiet and raise their hands. Then ask them to find another partner and discuss the next question. Repeat until you have gone through the four questions. What is one thing you already know or want to learn about listening and social media?What is one thing you already know or want to learn about privacy and security on social networks?
  6. Note that sometimes you need to search for misspellings of your organization’s name.California Shakespeare TheaterCalifornia Shakespeare TheatreCalifornia Shakespeare FestivalCal ShakesJonathan MosconeSusie FalkAs the season approaches -- the names of that season's directors and productions.
  7. Google Alerts: The easiest way to do listening is to use a free tool Google Alerts and with keyword searches. It monitors the web for anything that has published with your key words and sends an email. Demonstrate how the Google Alerts work in Google Alerts using “E-Media Tunisia” (insert your country name.) Show how results can be previewed. Explain the basics of creating a good search query. Explain and show the advanced settings. Explain that you can have it the Alert delivered to your email box, but that you’re going to have them use iGoogle to read all alerts in one place and doesn’t create more email for them to read. Show them the delivery type . Show them how to cut and paste the feed URL into a word document. Tell them they’ll need that URL for later.Ask for a volunteer to share their keywords and do the demo with their keyword. Tell participants that they will need to experiment with refining the key words. Coach them in front of the group if they need to adjust their settings or keywords to get better search results. Show them how to set it up as an email alert for now.Resources: Google Alertshttp://www.google.com/alertsGoogle Alerts Helphttp://www.google.com/support/alerts/bin/static.py?hl=en&page=guide.cs&guide=28413&rd=1Video Tutorialhttp://www.youtube.com/watch?v=13z8opWu5ZU&feature=relatedSearch Tips in Arabichttps://docs.google.com/document/d/1vBnEtuGbx-8p7TydqS8xmBOnZ2vBQnpVyT0maozwEZw/edit?hl=en#
  8. http://www.google.com/alertsHave Google Alerts in your browser and also open up a word document. You’ll be cutting and pasting the URLs of the Feed into the Word Document. You will use this later when you put the feeds into iGoogle.These are screen captures of the steps you might demo. You can use this if you don’t have Internet access or it goes down. But you can also demo this live. First demo it with keywords that you know will produce a good example. Then do it a second time with keywords from participants.Set Up Notes:You organization will need a Google account to access google alerts2. Once you set your language preferences, you can visit the Google Alerts homepage and create alerts in that language. http://www.google.com/support/alerts/bin/static.py?page=guide.cs&guide=28413&topic=28418Search Terms: This is where you type in your keywordsType: You can have it search all types or narrow your search – blogs, news. It depends on your search. If you’re want to keep up on news of your issue, you would select news.Volume: You can have a broad search and it will give you more results or narrow it. You have to experiment to see what works for your search. There is a preview results option. Deliver: You can have it go to your email, but we want to set this to “feed” – because we are going to show you have to read all your alerts in iGoogle – it will be more efficient and easier for you. We will show that later.
  9. http://www.google.com/alertsIt is very easy to set up an alert. You just type in one of your keywords.
  10. http://www.google.com/alertsIt is a good idea to preview your results – just click on preview. This way you can get a sense of what information you’ll receive before you set it up.Look at you results preview. Is it picking up the information you need with the default settings? Do you need to change your keywords? Is the search too narrow or too broad? Here are some tips on writing good queries – which are similar to posing good search engine queries. The advice here is good because it is basic:http://www.google.com/support/alerts/bin/static.py?page=guide.cs&guide=28413&topic=28416&answer=175927Three things to remember in composing good queries:quotation marks – exact phrase – will get you better resultsYou can limit the search to a specific siteTip Sheets for composing searches:https://docs.google.com/document/d/1vBnEtuGbx-8p7TydqS8xmBOnZ2vBQnpVyT0maozwEZw/edit?hl=en#SMEX Presentation on Google Search Tips (Arabic)http://www.slideshare.net/SMEXbeirut/things-to-know-using-google-search
  11. http://www.google.com/alertsHere they explain the different settings:http://www.google.com/support/alerts/bin/static.py?page=guide.cs&guide=28413&topic=28417Given an overview of each settings and ask the group what it means.Type: You can get “Everything” or select from one type – news vs blogs. It depends on the search. Sometimes it takes a little experimentation to get the right informationHow Often: Frequency. If you are working on a campaign, you might want to receive more frequent alerts.Volume: more selected or broader – You can demo this live with the preview. Delivery: You can get it sent to your email or via an RSS feed which requires a reader and we’re going to show you how to use that next.Here are the common questions:http://www.google.com/support/alerts/bin/static.py?page=guide.cs&guide=28413&topic=28418Give participants to experiment with their searches.Tip: The person doing the social media for the organization might want to receive the email more frequently than others in the organization who could get a weekly
  12. Google Alerts ben be delivered to your email box, but we’re going to show you how to use iGoogle to read all alerts in one place and it doesn’t create more email for them to read.Demo “Deliver to”Click on “Create Alert”
  13. The alert you created is here. Next, click on the orange RSS button.
  14. Cut and paste the URL into a word documentYou will need this later one when we set up iGoogle Dashboard.Be sure to describe what type of alert.
  15. Some organizations may want to a simple and “light approach” for social media, while others may need more detailed information. This is a good way to get them started.
  16. Introduction: Google Alerts is a good way for novices to get started, but it doesn’t capture everything. You might need to do more detailed listening using other search tools. Also, since it may become too much for to read in your email, setting up and use software called an RSS Reader like iGoogle will be more efficient. In this next section, we will demo the tools and you will have an opportunity to test your keyword searches on these different tools.There are many listening tools where you can keyword searches. Many of the tools are free. We only have time to focus on these few tools. If you want to learn more, here’s a list: http://socialmedia-listening.wikispaces.com/ToolsDemo each of the above search tools: “E-Mediat” (or insert your country) as your search term. Have them cut and paste the URL into a document. (It will make the next step, adding it to the iGoogle dashboard easier). (30 minutes)After the demo, have participants do their keyword searches on the different tools. Remind them to save the URL into a word document for the next step.Note: There is some overlap between what these different tools will pick up with keyword searches. Some information will be redundant. They will quickly discover which places get the best information for them. Also, since these are “free” tools sometimes there are technical glitches. If you run into a weird error, explain that and move on. Don’t get stuck.Description:Social Mention: (http://www.socialmention.com) Social Mention is social search tool that lets you enter key words and search through many different online social networks and social media, including blogs, YouTube, Twitter, and Facebook. You can combine searching through many platforms into one search or you can create individual searches. How you choose to search will depend on the volume of what the search results return, your social media strategy, and personal reading preferences. You can create an RSS Feed and add to your dashboard.Blog Search: (http://www.icerocket.com) IceRocket is a blog search tool that lets you enter keywords and search for mentions on blogs. You can create an RSS Feed and add to your dashboard.Twitter Search: (http://search.twitter.com)You don’t need to have an account on Twitter to use it for listening. This is a good first step to figure out if Twitter is useful for your strategy. Find out if people are using Twitter are talking about your issue or organization. Resources:Social MentionVideo Tutorial: (Second Half)http://www.youtube.com/watch?v=8HRu2zowt4UTwitter: How To Use Advanced Searchhttp://www.youtube.com/watch?v=0VzGIICDgs0
  17. Social Mention is a social media search engine that can search in real time across many different social media platforms. To do the simple search, simply type in your keywords. You can narrow your search by selecting the place where you want to search. If you get too many results, you may want to narrow your results. It all depends on the words you are searching on and where you want to search.
  18. This search is showing up all results from all sources, sorted by date from anytime. It is best to limit the results to get the most recent in your feed – last week is good.If your results are too broad or you’re getting results that are not related to your search, you might need to use the advanced search. I’ll show you that next.There is a lot of information here, you probably won’t use it … but “top keywords” is useful because it gives you more ideas about what keywords you might search.If this search result looks good, click on the RSS Feed Link
  19. You may need to use the “advanced search”The most useful for helping you narrow your search is to use the exact phrase vs all these words.It takes a little practice testing different keywords and combinations of keywords to get to your results.Also, you may discover that NOTHING shows up. This is good information – it gives you a base line.
  20. Social mention also lets you limit your search to one specific social media channel. For example, let’s say that part of your goal for searching was to find good YouTube videos related to your keywords so you could share them on a blog.
  21. Click on social media sources and check “YouTube” and the search results will only return videos that use the keyword.
  22. Here’s what the resulting search looks like. If are happy with the results, just click on the “RSS Feed” link and cut and paste the URL and description into your word document.If you don’t like the results and want to broaden or narrow your search – adjust the keywords and/or where you are searching.
  23. You can also set up RSS feeds of Twitter searches without setting up an accounthttp://search.twitter.comThis might be a good way to determine if you want explore Twitter.Just type in your keywords
  24. Here’s the search of what people are talking about on Twitter and using the “e-mediat”http://search.twitter.com/search?q=e-mediatIf you’re happy with this search, click on the RSS Feed link for the query .. And cut and paste into your word document
  25. http://search.twitter.com/search.atom?q=e-mediat
  26. If you want to refine your search, use the “advanced” searchYou’ll notice there is an option to search for Arabic language tweets
  27. This is a list of operators and short cuts to make your Twitter searches more efficient.
  28. IceRocket searches through blogs. On the left hand side you can narrow your resultsThis is a good way to find blogs that you might also want to follow separately – by getting their RSS feed – but you should add them slowly. As with Social Mention and Twitter, you will click on the RSS link and cut and paste the URL into your word document
  29. In addition to search feeds, you can also add RSS feeds for specific blogs that have the orange ICON and say “subscribe” – just click on subscribe and cut and paste the feed URL into your word document.
  30. Note: If there are other RSS Readers that are more in use in your country, substitute the above for those tools. Do the same demo.NOTE: You will need a Google Account to complete this exerciseOpen up iGoogle: http://www.google.com/igClick the “add stuff »” link in the upper-right-hand cornerClick the “Add feed or gadget” link in the lower-left-hand cornerCut and paste in one of the RSS feed URLs , then press the “Add” button.Close that box and return to your iGoogle home page (link in upper-left-hand corner)Demonstrate how to adjust how many searches are shown on your iGoogle dashboard.They will have time after lunch to work on adding the searches using RSS URLs they created in the morning.
  31. Note: If there are other RSS Readers that are more in use in your country, substitute the above for those tools. Do the same demo.NOTE: You will need a Google Account to complete this exerciseOpen up iGoogle: http://www.google.com/igClick the “add gadgets »” link in the upper-right-hand cornerClick the “Add feed or gadget” link in the lower-left-hand cornerCut and paste in one of the RSS feed URLs , then press the “Add” button.Close that box and return to your iGoogle home page (link in upper-left-hand corner)Demonstrate how to adjust how many searches are shown on your iGoogle dashboard.They will have time after lunch to work on adding the searches using RSS URLs they created in the morning.
  32. Note: If there are other RSS Readers that are more in use in your country, substitute the above for those tools. Do the same demo.NOTE: You will need a Google Account to complete this exerciseOpen up iGoogle: http://www.google.com/igClick the “add gadgets »” link in the upper-right-hand cornerClick the “Add feed or gadget” link in the lower-left-hand cornerCut and paste in one of the RSS feed URLs , then press the “Add” button.Close that box and return to your iGoogle home page (link in upper-left-hand corner)Demonstrate how to adjust how many searches are shown on your iGoogle dashboard.They will have time after lunch to work on adding the searches using RSS URLs they created in the morning.
  33. Note: If there are other RSS Readers that are more in use in your country, substitute the above for those tools. Do the same demo.NOTE: You will need a Google Account to complete this exerciseOpen up iGoogle: http://www.google.com/igClick the “add gadgets »” link in the upper-right-hand cornerClick the “Add feed or gadget” link in the lower-left-hand cornerCut and paste in one of the RSS feed URLs , then press the “Add” button.Close that box and return to your iGoogle home page (link in upper-left-hand corner)Demonstrate how to adjust how many searches are shown on your iGoogle dashboard.They will have time after lunch to work on adding the searches using RSS URLs they created in the morning.
  34. A few things about how to adjust your iGoogle SettingsHow To Use Full Screenhttp://www.google.com/help/ig/videotour/#fullscreenHow To Get to iGooglehttp://www.google.com/help/ig/videotour/#backtoigoogle
  35. You see headlines only, headlines and text or make it into slide show.You can see expanded or list viewAdjust these settings so it is most comfortable for you.
  36. http://www.flickr.com/photos/littlelakes/54251489/
  37. http://e-mediat-yemen.blogspot.com/2011/05/blog-post.htmlLeave 15 minutes at the end of this time and ask participants to pull up their iGoogle Dashboards on the computers. Have participants look at each other’s iGoogle dashboards.
  38. Work Flow: Listening takes time. There is the initial time to figure out your keywords and set up your tools. But someone will need to be reading , summarizing, and sharing the information with other people who will be implementing your strategy. Listening can be done 1-2hours a week. Share Pair: Find a different partner. Discuss how you will do the work. Make notes on the listening worksheet.
  39. http://www.flickr.com/photos/photolab/77610188/You will be using the social web and Internet to communicate and share information (news reports, information, media, etc.) for NGO, but it is important to protect your privacy and security online. The extreme approach, favored by some, is not send to anything over the Internet that you are not willing to make public. There are ways to protect yourself. The following tips are based on the information in these two guides below that is specific to using email, browsing the Internet and interacting with web sites, and using social network sites. There is a lot of detailed information and many tools available to protect your privacy and security online, but we are only covering the basics.Summary of the points covered in this presentation:http://www.bethkanter.org/privacy-security/Resources:Security in A Boxhttps://security.ngoinabox.org/en/AccessNow Guidehttps://www.accessnow.org/pages/protecting-your-security-onlineLinks to Tools and Resourceshttp://emediat.wikispaces.com/Privacy+and+Security
  40. http://www.passwordmeter.com/Tips for rememberingPasswordshttps://security.ngoinabox.org/en/chapter_3_2
  41. http://keepass.info/
  42. HTTP is unsecured and is subject to man-in-the-middle and eavesdropping attacks, which can let attackers gain access to website accounts and sensitive information. HTTPS is designed to withstand such attacks and is considered secure against such attacks.If you want to use the social web securely, you want to use https.Demo a search for the phrase “https” on Google. Then insert the “s” after the http:// in the browser.The difference: http is not secure. https is secure.Not all web sites have a secure version.Technical Information:As opposed to HTTPURLs that begin with "http://" and use port 80 by default, HTTPS URLs begin with "https://" and use port 443 by default.See: http://en.wikipedia.org/wiki/HTTP_Secure#Difference_from_HTTP
  43. Itis important that your browser be as reliable as possible. Consider installing Mozilla Firefox and its security-related add-ons.Most browsers display a warning if they receive an invalid certificate. Older browsers, when connecting to a site with an invalid certificate, would present the user with a dialog box asking if they wanted to continue. Newer browsers display a warning across the entire window. Newer browsers also prominently display the site's security information in the address bar.If you type in https:// before a URL you are visiting and it isn’t a secure site, the browser will return a message that it isn’t a secure connection.Pay close attention if your browser suddenly begins to complain about invalid security certificates when attempting to access a secure webmail account. It could mean that someone is tampering with the communication between your computer and the server in order to intercept your messages. Finally, if you rely on webmail to exchange sensitive information, it is important that your browser be as reliable as possible. Consider installing Mozilla Firefox and its security-related add-ons.
  44. http://www.eff.org/https-everywhereHTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site.The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS. Sadly, many sites still include a lot of content from third party domains that is not available over HTTPS. As always, if the browser's lock icon is broken or carries an exclamation mark, you may remain vulnerable to some adversaries that use active attacks or traffic analysis. However, the effort that would be required to eavesdrop on your browsing should still be usefully increased.Frequently Asked Questionshttps://www.eff.org/https-everywhere/faq/Q. When does HTTPS Everywhere protect me? When does it not protect me?A. HTTPS Everywhere protects you only when you are using encrypted portions of supported web sites. On a supported site, it will automatically activate HTTPS encryption for all known supported parts of the site (for some sites, this might be only a portion of the entire site). For example, if your web mail provider does not support HTTPS at all, HTTPS Everywhere can't make your access to your web mail secure. Similarly, if a site (like Wikipedia) allows HTTPS for text but not images, someone might be able to see which images your browser loads and guess what you're accessing.HTTPS Everywhere depends entirely on the security features of the individual web sites that you use; it activates those security features, but it can't create them if they don't already exist. If you use a site not supported by HTTPS Everywhere or a site that provides some information in an insecure way, HTTPS Everywhere can't provide additional protection for your use of that site. Please remember to check that a particular site's security is working to the level you expect before sending or receiving confidential information, including passwords.One way to determine what level of protection you're getting when using a particular site is to use a packet-sniffing tool like Wireshark to record your own communications with the site. The resulting view of your communications is about the same as what an eavesdropper on your wifi network or at your ISP would see. This way, you can determine whether some or all of your communications would be protected; however, it may be quite time-consuming to make sense of the Wireshark output with enough care to get a definitive answer.Q. What does HTTPS Everywhere protect me against?A. On supported parts of supported sites, HTTPS Everywhere enables the sites' HTTPS protection which can protect you against eavesdropping and tampering with the contents of the site or with the information you send to the site. Ideally, this provides some protection against an attacker learning the content of the information flowing in each direction — for instance, the text of e-mail messages you send or receive through a webmail site, the products you browse or purchase on an e-commerce site, or the particular articles you read on a reference site.However, HTTPS Everywhere does not conceal the identities of the sites you access, the amount of time you spend using them, or the amount of information you upload or download from a particular site. For example, if you access http://www.eff.org/issues/nsa-spying and HTTPS Everywhere rewrites it to https://www.eff.org/issues/nsa-spying, an eavesdropper can still trivially recognize that you are accessing www.eff.org (but might not know which issue you are reading about). In general, the entire hostname part of the URL remains exposed to the eavesdropper because this must be sent repeatedly in unencrypted form while setting up the connection. Another way of saying this is that HTTPS was never designed to conceal the identity of the sites that you visit.Researchers have also shown that it may be possible for someone to figure out more about what you're doing on a site merely through careful observation of the amount of data you upload and download, or the timing patterns of your use of the site. A simple example is that if the site only has one page of a certain total size, anyone downloading exactly that much data from the site is probably accessing that page.If you want to protect yourself against monitoring of the sites you visit, consider using HTTPS Everywhere together with software like Tor.
  45. Q. When does HTTPS Everywhere protect me? When does it not protect me?A. HTTPS Everywhere protects you only when you are using encrypted portions of supported web sites. On a supported site, it will automatically activate HTTPS encryption for all known supported parts of the site (for some sites, this might be only a portion of the entire site). For example, if your web mail provider does not support HTTPS at all, HTTPS Everywhere can't make your access to your web mail secure. Similarly, if a site (like Wikipedia) allows HTTPS for text but not images, someone might be able to see which images your browser loads and guess what you're accessing.HTTPS Everywhere depends entirely on the security features of the individual web sites that you use; it activates those security features, but it can't create them if they don't already exist. If you use a site not supported by HTTPS Everywhere or a site that provides some information in an insecure way, HTTPS Everywhere can't provide additional protection for your use of that site. Please remember to check that a particular site's security is working to the level you expect before sending or receiving confidential information, including passwords.One way to determine what level of protection you're getting when using a particular site is to use a packet-sniffing tool like Wireshark to record your own communications with the site. The resulting view of your communications is about the same as what an eavesdropper on your wifi network or at your ISP would see. This way, you can determine whether some or all of your communications would be protected; however, it may be quite time-consuming to make sense of the Wireshark output with enough care to get a definitive answer.Q. What does HTTPS Everywhere protect me against?A. On supported parts of supported sites, HTTPS Everywhere enables the sites' HTTPS protection which can protect you against eavesdropping and tampering with the contents of the site or with the information you send to the site. Ideally, this provides some protection against an attacker learning the content of the information flowing in each direction — for instance, the text of e-mail messages you send or receive through a webmail site, the products you browse or purchase on an e-commerce site, or the particular articles you read on a reference site.However, HTTPS Everywhere does not conceal the identities of the sites you access, the amount of time you spend using them, or the amount of information you upload or download from a particular site. For example, if you access http://www.eff.org/issues/nsa-spying and HTTPS Everywhere rewrites it to https://www.eff.org/issues/nsa-spying, an eavesdropper can still trivially recognize that you are accessing www.eff.org (but might not know which issue you are reading about). In general, the entire hostname part of the URL remains exposed to the eavesdropper because this must be sent repeatedly in unencrypted form while setting up the connection. Another way of saying this is that HTTPS was never designed to conceal the identity of the sites that you visit.Researchers have also shown that it may be possible for someone to figure out more about what you're doing on a site merely through careful observation of the amount of data you upload and download, or the timing patterns of your use of the site. A simple example is that if the site only has one page of a certain total size, anyone downloading exactly that much data from the site is probably accessing that page.If you want to protect yourself against monitoring of the sites you visit, consider using HTTPS Everywhere together with software like Tor.
  46. The convenience, cost-effectiveness and flexibility of email and instant messaging make them extremely valuable for individuals and organizations with even the most limited access to the Internet. Unfortunately, these digital alternatives to traditional means of communication can not always be relied upon to keep sensitive information private. Of course, this is nothing new. Postal mail, telephone calls and text messages are all vulnerable as well, particularly when used by those who may have been targeted for surveillance by the authorities.One important difference between digital, Internet-based communication techniques and more traditional methods, is that the former often allow you to determine your own level of security. If you send emails, instant messages and VoIP conversations using insecure methods, they are almost certainly less private than letters or telephone calls. In part, this is because a few powerful computers can automatically search through a large amount of digital information to identify senders, recipients and specific key words. Greater resources are required to carry out the same level of surveillance on traditional communication channels. However, if you take certain precautions, the opposite can be true. The flexibility of Internet communication tools and the strength of modern encryption can now provide a level of privacy that was once available only to national military and intelligence organizations.How To Use HTTPS in Gmailhttp://mail.google.com/support/bin/answer.py?answer=74765Few webmail providers offer SSL access to your email. Yahoo, for instance, provides a secure connection while you log in, to protect your password, but your messages themselves are sent and received insecurely. In addition, Yahoo and some other free webmail providers insert the IP address of the computer you are using into all of the messages you send.Gmail accounts, on the other hand, can be used entirely through a secure connection, as long as you login to your account from https://mail.google.com (with the HTTPS), rather than http://mail.google.com . In fact, you can now set a preference that tells Gmail always to use a secure connection. And, unlike Yahoo or Hotmail, Gmail avoids revealing your IP address to email recipients. Gmail uses HTTPS by default. For Hotmail, you need to turn it on. Yahoo Mail is not secure.Gmail Security Checklisthttps://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488How To Use in Gmailhttp://mail.google.com/support/bin/answer.py?answer=74765Secure Hotmailhttp://explore.live.com/windows-live-hotmail-https-usingTo create a permanent HTTPS connection for HotmailIn Hotmail, click Options, and then click More options.Under Managing your account, click Account details.You may be asked to provide your password.Under Other options, click Connect with HTTPS. Click Use HTTPS automatically, and then click Save.
  47. If you are using Gmail, you can use this online resource to test your security settingsGmail Security Checklisthttps://mail.google.com/support/bin/static.py?page=checklist.cs&tab=29488
  48. http://www.pidgin.im/Much like email, instant messaging and VoIP software can be secure or insecure, depending on the tools you choose and how you use them.Securing your instant messaging softwareInstant messaging, also called 'chat,' is not normally secure, and can be just as vulnerable to surveillance as email. Luckily, there are programs that can help secure the privacy of your chat sessions. Just like with email, though, a secure communications channel requires that both you and your instant messaging contacts use the same software and take the same security precautions.There is a chat program called Pidgin that supports many existing instant messaging protocols, which means that you can easily begin using it without having to change your account name or recreate your list of contacts. In order to have private, encrypted conversations through Pidgin , you will need to install and activate the Off-the-Record OTR plug-in. Fortunately, this is a fairly simple process.https://security.ngoinabox.org/en/pidgin_main
  49. Securing your VoIP softwareVoIP calls to other VoIP users are generally free of charge. Some programs allow you to make inexpensive calls to normal phones as well, including international numbers. Needless to say, these features can be extremely useful. Some of today's more popular VoIP programs include Skype, Gizmo, Google Talk , Yahoo! Voice , and MSN Messenger .Normally, voice communication over the Internet is no more secure than unprotected email and instant messaging. Only Skype and Gizmo offer encryption for voice conversations, and then only if you are calling another VoIP user, as opposed to a mobile or landline telephone. In addition, because neither application is open-source, independent experts have been unable to test them fully and ensure that they are secure.SKYPE Security Informaitonhttp://www.skype.com/intl/en-us/security/detailed-security/
  50. https://security.ngoinabox.org/en/chapter_8_1The first step of your connection to the Internet is typically made through an Internet Service ProviderISP at your home, office, school, library or Internet cafe. The ISP assigns your computer an IPaddress, which various Internet services can use to identify you and send you information, such as the emails and webpages you request. Anyone who learns your IP address can figure out what city you are in. Certain well-connected organisations in your country, however, can use this information to determine your precise location.Your ISP will know which building you are in or which phone line you are using if you access the Internet through a modem. Your Internet cafe, library or business will know which computer you were using at a given time, as well as which port or wireless access point you were conncted to. Government agencies may know all of these details, as a result of their influence over the organisations above.At this stage, your ISP relies on the network infrastructure in your country to connect its users, including you, with the rest of the world. On the other end of your connection, the website or Internet service you are accessing has gone through a similar process, having received its own IP addresses from an ISP in its own country. Even without all of the technical details, a basic model like this can be helpful when considering the various tools that allow you get around filters and remain anonymous on the Internet.How websites are blockedEssentially, when you go to view a webpage, you are showing the site's IP address to your ISP and asking it to connect you with the webserver'sISP. And, if you have an unfiltered Internet connection, it will do precisely that. If you are in a country that censors the Internet, however, it will first consult a blacklist of forbidden websites and then decide whether or not to comply with your request.In some cases, there may be a central organisation that handles filtering in place of the ISPs themselves. Often, a blacklist will contain domain names, such as www.blogger.com, rather than IPaddresses. And, in some countries, filtering software monitors your connection, rather than trying to block specific Internet addresses. This type of software scans through the requests that you make and the pages that are returned to you, looking for sensitive key words and then deciding whether or not to let you see the results.And, to make matters worse, when a webpage is blocked you may not even know it. While some filters provide a 'block page' that explains why a particular page has been censored, others display misleading error messages. These messages may imply that the page cannot be found, for example, or that the address was misspelled.In general, it is easiest to adopt a worst-case perspective toward Internet censorship, rather than trying to research all of the particular strengths and weaknesses of the filtering technologies used in your country. In other words, you might as well assume that:Your Internet traffic is monitored for keywordsFiltering is implemented directly at the ISP levelBlocked sites are blacklisted by both their IP addresses and their *domain names *You may be given an unclear or misleading reason to explain why a blocked site fails to load. Because the most effective circumvention tools can be used regardless of which filtering methods are in place, it does not generally do any harm to make these pessimistic assumptions
  51. https://security.ngoinabox.org/chapter-8Regardless of what filtering methods are present, it is nearly always possible to evade them by relying on intermediary computers, outside your country, to reach blocked services for you. This process is often called censorship circumvention, or simply circumvention, and the intermediary computers are called proxies. Proxies, too, come in many different forms. This chapter includes a brief discussion of multiple-proxy anonymity networks followed by a more thorough description of basic circumventionproxies and how they work.Both of these methods are effective ways to evade Internet filters, although the former is most appropriate if you are willing to sacrifice speed in order to keep your Internet activities as anonymous as possible. If you know and trust the individual or organization that operates your proxy, or if performance is more important to you than anonymity, then a basic circumventionproxy might serve you better.
  52. https://security.ngoinabox.org/en/chapter_8_3Anonymity networksAnonymity networks typically 'bounce' your Internet traffic around between various secure proxiesin order to disguise where you are coming from and what you are trying to access. This can significantly reduce the speed at which you are able to load websites and other Internet services. In the case of Tor , however, it also provides a reliable, secure and public means of circumvention that saves you from having to worry about whether or not you trust the individuals who operate your proxies and the websites you visit. As always, you must ensure that you have an encrypted connection, HTTPS, to a secure website before exchanging sensitive information, such as passwords and emails, through a browser.You will have to install software to use Tor, but the result is a tool that provides anonymity as well as circumvention. Each time you connect to the Tor network, you select a random path through three secure Torproxies. This ensures that neither your ISP nor the proxies themselves know both your computer's IPaddress and the location of the Internet services you request. You can learn much more about this tool from the Tor Guide.One of Tor's strengths is that it does not just work with a browser but can be used with various types of Internet software. Email programs, including Mozilla Thunderbird,and instant messaging programs,includingPidgin, can operate through Tor, either to access filtered services or to hide your use of those services.
  53. Basic Tour Guidehttps://www.torproject.org/index.html.enThis information is also available in Arabichttps://www.torproject.org/index.html.arHow To Install Torhttp://www.slideshare.net/MaryCJoyce/how-tor-worksBackground on the Projecthttps://media.torproject.org/video/tor-internet-days-2010.mp4Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses. Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization. Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
  54. http://www.flickr.com/photos/reway2007/2269069067/Photohttps://www.torproject.org/about/torusers.html.enCitizens Use Tor for privacy from unscrupulous marketers and identity thieves and protect communications from irresponsible corporations. To protect children online There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control, Tibetan culture, or world religions is behind a national firewall.People living in poverty often don't participate fully in civil society -- not out of ignorance or apathy, but out of fear. If something you write were to get back to your boss, would you lose your job? Anonymity gives a voice to the voiceless.Journalists Journalists use Tor to research state propaganda and opposing viewpoints, to file stories with non-State controlled media, and to avoid risking the personal consequences of intellectual curiosity. Tor preserves the ability of persons behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion. ActivistsHuman rights activists use Tor to anonymously report abuses from danger zones. Internationally, labor rights workers use Tor and other forms of online and offline anonymity to organize workers in accordance with the Universal Declaration of Human Rights. Even though they are within the law, it does not mean they are safe. Tor provides the ability to avoid persecution while still raising a voice. torusers.html.en
  55. https://www.torproject.org/about/torusers.html.enHow To Install Torhttp://www.slideshare.net/MaryCJoyce/how-tor-works
  56. Social networking sites like Facebook make it easy for sensitive information about us to be made public unintentionally.   Therefore, it is important to understand how to best protect one’s own privacy as well as others. Tactical Technology’s Security in A Box suggests asking a couple of good reflective questions about your account on any online social networking platform where you set up a presence:Who can access the information I am putting online?Who controls and owns the information I put into a social networking site?What information about me are my contacts passing on to other people?Will my contacts mind if I share information about them with other people?Do I trust everyone with whom I’m connected?
  57. Publishing content on Facebook, Twitter, and other platforms has become a requirement for NGOs that want a presence and to participate on social channels.   However, it is important to understand how to use these platforms safely.
  58. http://coolcatteacher.blogspot.com/2011/03/facebook-friending-101-for-schools.htmlFriendsYour friends have access to everything you publish unless you override the settings. If you friend someone - they are in your inner circle or your FF's. Do you trust them?Friends of FriendsWhen a person has their settings as "friends of friends" then the friends of their friends can see their content and friends can share information.PublicThis is what is shared with everyone on Facebook. You can't hide your name, profile picture, network and gender (if you provide this info)." Be careful on your profile picture, many get tripped up just by posting an inappropriate profile photo. Everyone sees it.You CAN set your page to public, which means that all of Facebook's users and everyone on the web can see your page.
  59. Guide to FB Setttingshttp://www.facebook.com/privacy/explanation.phpRecommendationsHave everything set as “Friends Only” (meaning only friends have access to your page. Turn off Public Search Set it so only friends  or friends can find you Set it so only friends can see your friend list, education, location, likesAvoid stating your location or where you will be Only accept friend requests/add friends that you regularly talk toDelete any comments you make, or status update you write within a monthLimit public conversation to a minimumLet only friends see your photo’s tagged photo’s     OR Only allow “me” to see tagged photos of yourself Check your PRIVACY SETTING at least ONCE A MONTH for Facebook changes  Words of Wisdom.. Keep your Facebook account securitized and professional at all times!  
  60. If you are on Facebook, your privacy settings determine how people view your content and how people can connect to you.. Check them thoroughly and every month or so to make sure you know what is in there and UNDERSTAND them. The connecting on Facebook preview – lets you see what you profile looks like to everyone on Facebook or to specific friends.
  61. Guide to FB Setttingshttp://www.facebook.com/privacy/explanation.phpOnce you change the settings, you can preview what it looks like to everyone
  62. This is a preview of what Beth’s profile (slide before) look like to everyone on Facebook. This is an example of the minimum.
  63. Guide to FB Setttingshttp://www.facebook.com/privacy/explanation.phpYou should make these all “Friends only” The Custom settings let you adjust settings for specific areas of content and for specific friends
  64. Explain the different settings. These are the settings that control what who sees what you post on your profile. It is best to have it set to “Friends only.” You will note that Beth’s settings has “limited profile” option – I have certain “friends” that do not see these content because I do not know them very well, but are professional colleagues – and I do post some family photos, etc that I don’t feel comfortable sharing.
  65. These are settings that that control what other people can share on your profile or about you. I have my settings disabled because I prefer it that way. But, if people post stuff on my wall that is “embarrassing” – other people could see it. That’s why I disabled it.
  66. Make sure you are not in the public search. It is hidden. Click on edit apps and web sites.
  67. Turn both of these off.Instant personalization: Similar to how News Feed surfaces the people and things you care about, instant personalization helps you find friends and interesting content on other websites. We've partnered with a few companies, like Pandora and TripAdvisor, to make these sites more fun and useful the moment you arrive.Public search controls whether people who enter your name in a search engine will see a preview of your Facebook profile. Because some search engines cache information, some of your profile information may be available for a period of time after you turn public search off.
  68. Do a series of “Share Pairs” where people ask and answer these questions:What did you learn today?What is still isn’t clear?What do you need to move forward?What is the most important thing you want to learn tomorrow?Then gather in a circle, and have everyone share one word about they are feeling and why.
  69. IIE and publicly acknowledge funding by the U.S. Department of State Middle East Partnership Initiative (MEPI).Workshop 2: Listening and Web PresenceDay 1: Listening and PrivacyDay 2: Strategic Internet Presence: Blogs and/or Web Sites
  70. Give a verbal overview of the programhttp://www.emediat.org/main/program-overview/The program outcomes are: Increase CSO/NGO knowledge, access and skills to use new media effectively to advance their unique missions and strengthen their organizationsImprove communication between CSO/NGO leaders and key stakeholders and between CSO/NGOs and their communities of peers around the worldImprove communication between CSO/NGOs and governments in the MENA regionThe five-workshop agenda is an intense schedule and a lot to cover and implement in a very short time frame. While you will be exposed to many tools, and techniques, it is not an expectation that every organization will implement all tools presented in the workshops at the deepest level to reach the above outcomes.
  71. This template is from Grove Consulting.
  72. Give a brief introduction
  73. Photo by: http://www.flickr.com/photos/ninjawil/2205949982/
  74. 9:00-9:30 Introduction, Agenda Overview, and IcebreakerIntroductionsReview of the Workshop 2 Agenda Day 2 Share pairs: Do a series of share pairs. Ask people to find a partner in the room and share the answers to these questions. Tell them that if they see you raise your hand, it is the signal to stop talking and be quiet and raise their hands. Then ask them to find another partner and discuss the next question. Repeat until you have gone through the four questions. What is one thing you already know or want to learn about establishing an effective web presence?What is one thing you already know or want to learn about blogging?
  75. A home base is a place online that you own, that is your online ‘home’. Home is your web site or blog. Outposts are places that you have an online presence out in other parts of the web that you might not ‘own’. Outposts will mean different things to different NGOs – they select their outposts based on:-Their social media strategy-Their capacity – having an outposts takes time and effort – you want to do it well – it is better to engage deeply on one outpost and then spread yourself too thinThese ‘outposts’ are sites where you can:add contentbuild relationshipstest ideasgrow a profilelistenexperimentmake connectionstry to be usefulplayOut of this combination of activities many things come. Relationships, ideas, traffic, resources, partnerships, community and much more emerge from the outposts – much of it making yourhome base stronger.http://www.problogger.net/archives/2008/10/06/social-media-home-bases-and-outposts/
  76. We are moving towards having the organization's web presence be less static information and more interactive or social. Not everyone needs a separate web site and a blog, some organizations consolidate. Free blogging platforms like blogger give you an easy way to update your content and if you already have a web site, you can easily add as an interactive part of your web site. You need to think about how to link or integrate your social media outposts. Benefits of a blog is that it helps with your search engine resultsEasy way to keep content updated and freshGives your NGOs brand visibility
  77. - It helps your website go up in search engine rankings- It gives your NGO a human voice, a unique personality that builds a community around your cause.- You can connect easier with people in social networking sites- Spreads the word easier, cheaper and more effectively than mainstream media.- Expand brand awareness.http://twitter.com/#!/EMediatLB/status/75134799118995456Not everyone needs a web site and a blog, some organizations consolidate. You need to think about how to link or integrate your social media strategy. We are moving towards having the organization's web presence be less static information and more interactive or social.
  78. - It helps your website go up in search engine rankings- It gives your NGO a human voice, a unique personality that builds a community around your cause.- You can connect easier with people in social networking sites- Spreads the word easier, cheaper and more effectively than mainstream media.- Expand brand awareness.http://twitter.com/#!/EMediatLB/status/75134799118995456Not everyone needs a web site and a blog, some organizations consolidate. You need to think about how to link or integrate your social media strategy. We are moving towards having the organization's web presence be less static information and more interactive or social.
  79. NTEN is an organization that helps nonprofits and technology (http://www.nten.org).Their home Base (http://www.nten.org) is a web site, but they integrated a blog. They use the blog as an organizational newsletter and write about current events and activities. The blog is also shared on Facebook and Twitter and other social outposts. They also link to their social outposts on their web site.
  80. Their blog content is also cross-posted on their Facebook page automatically. They get a lot of comments and conversations from their members because their members are on Facebook – and may not come to the web site to read the blog.
  81. They also use their blog talk about the programs and summarize information about their members. They using a listening dashboard to monitor news and updates from their members and summarize them in a weekly blog post on their site.
  82. On Twitter, they promote their members web sites as well as point back to content on their blog which is promoting their events.
  83. This is the main web site for e-mediat (http://www.e-mediat.org) This is their home base. Their social outposts are on Facebook, Twitter, and Youtube. Their content strategy is to promote news and information from the in-country project sites that use blogs as their home base.
  84. They use their social channels to promote the activities of the in-country teams.They do not have a blog because each of the in-country teams has a blog.
  85. E-Mediat Jordan is using a blogger blog as its home base. They update the blog with news and information about the workshops. Their outposts include: flickr, YouTube, Twitter, and Facebook. As you can see, blogger makes is it very easy to integrate content.
  86. E-Mediat Jordan shares content on these social outposts, but it is also published on home base.
  87. http://www.nasawiya.org/web/- This is their web site. Their social channels are integrated – all at the top, but going down the right side – they use “widgets” which allow them incorporate some of the content form different channels. . They have a blog that is on the site. They use YouTube, Flickr. Facebook, Twitter, and FourSquare.
  88. Remember, home base can a web site or blog or combination. These are the principles for an effective presence.Sources:Web Site Check List:http://www.nonprofitmarketingguide.com/resources/online-marketing/10-point-basic-website-checklist-for-nonprofits/Effective Nonprofit Web Sites:http://gettingattention.org/articles/168/websites/effective-nonprofit-websites.htmlEffective Nonprofit Web Design:http://gettingattention.org/2010/06/nonprofit-website-content-above-the-fold.html 
  89. Consist organizational brandingThis is the e-mediat blog from Morocco and it is using blogger which supporters three languages.. They use the e-mediat logo and colors consistently. The url includes the project name.Intuitive/ logical navigation and structureThe navigation bars are simple and clear. Notice that the “home” is on the far left and the “contact” is on the far right. The navigation bar for different languages is very clear and easy to use. They have also include a search button so content on the blog can be searched.Short content that is fresh and updated regularlyThey are posting regularly – news about the workshops and also including a series, like these the interviews with bloggers.Good visual designThe design is pleasing and uses a lot of white space.Links and integrates social outpostsThe blogger platform makes it easy to link to your social outposts.They also have included “share on facebook” and “tweet” widgets on each post – making the content easily shared by people who visit the blog.Sources:Web Site Check List:http://www.nonprofitmarketingguide.com/resources/online-marketing/10-point-basic-website-checklist-for-nonprofits/Effective Nonprofit Web Sites:http://gettingattention.org/articles/168/websites/effective-nonprofit-websites.htmlEffective Nonprofit Web Design:http://gettingattention.org/2010/06/nonprofit-website-content-above-the-fold.html 
  90. Sources:Use the Home Base Worksheet. You can modify it to include other points.Web Site Check List:http://www.nonprofitmarketingguide.com/resources/online-marketing/10-point-basic-website-checklist-for-nonprofits/Effective Nonprofit Web Sites:http://gettingattention.org/articles/168/websites/effective-nonprofit-websites.html
  91. The Red Cross blogs covers breaking news and their programs. Each department contributes a blog post a regular schedule – so the work load is spread.
  92. The Indianapolis museum of art blog it covers their programs, but also art on the web.
  93. It has a large collaborative team on staff, plus they invite guest bloggers
  94. WaynePacelle is the executive director of the Humane Society of the US. He writes a blog on the issues. If you want your organizational leader to be the blogger, they must like writing!
  95. This blog serves as the organization regular newsletter. They blog about their programs, volunteers, and accomplishments. They have a regular schedule of writing 3 stories a week. The content is also sent out in a monthly email newsletter.
  96. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/http://blogging4learning.wikispaces.com/homeBlog posts are short – between 200-750 words, with some longer posts.InstructionalInformationalResearchInterviewsCase StudyListsTips Guest Posts
  97. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/http://e-mediat-yemen.blogspot.com/2011/05/last-session-of-1st-workshop-for-first.html
  98. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/http://e-mediat-lebanon.blogspot.com/2011/05/how-to-be-good-trainer-5-rules-that.html
  99. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/
  100. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/
  101. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/
  102. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/
  103. http://www.problogger.net/archives/2005/11/29/20-types-of-blog-posts-battling-bloggers-block/
  104. Inviting guest authors to write posts for your blog is a great way to expand your audience (and also you spread the work load)Invite people who enjoy writing and are used to writing for blogs– and might already have a followingAlso, have editorial guidelines available so you get the blog post in a format that makes it easy for you to cut and paste into your blog.
  105. How To Write Good Contenthttp://www.problogger.net/how-to-write-great-blog-content/
  106. A picture is worth a 1,000 word-post. Blogs with pictures tell a far more interesting story than those without.There are millions of posts being written, those with photos grab attentionPhotos make your posts more engaging and appeal your reader's emotional sensesHelp improve reader comprehensionPhotos add a personal touch to your blogging which invites more conversationFor those reading via a RSS readers, this encourages them to "pop" out of their reader because RSS readers are text-based designs. Scanning the images slows people down.Helps with search engine optimizationImages are good at the start of your post to draw people into reading itIt is also great to use images throughout your post for visual examples of what you're writing aboutImages may help you make your points in a stronger wayhttp://howtoblog.wikispaces.com/Session+4
  107. These are examples of how you can use logos. These can be localized.Logos of products or services or programs you're writing about: TechCrunchScreen captures if you are talking about a web-based service or something technically related: Chris BroganPhotos of yourself, the writer: Chris BroganImages that prove a point: Copy BloggerImages that show examples throughout the post: AvinashKaushikImages as Visuals For Title Copy BloggerImages to inspire: AvinashKaushikhttp://howtoblog.wikispaces.com/Session+4
  108. http://howtoblog.wikispaces.com/Session+4
  109. This is the work flow for blogging –The amount of time you spend depends on how many posts you produce per week3 posts per week should take about 3-5 hours per week.Here are the tasks.ReadingWe covered the mechanics of this in Day 1. The process steps as it relates to blogs:Read your RSS subsRead your persistent searchesResearch new topicsFollow serendipitous links from commentsScan comments on other postsLeave comments on other postsAdd your comments to the conversationUpdate your RSS subs2: WritingDraftsTo do listsThink about what moves you todayWhat would your readers like?What have you just read?ResearchFormat and word smithFind and add relevant linksFind and add relevant photos or videosPost and checkNotify others as appropriateArchive index categories3: Interacting with your readersCheck your listening post --google alertsCheck referral logsComment on reader’s postsComment back to readers on your postsEmail responses
  110. http://www.google.com/support/feedburner/Feedburner is an analytics tool for your blog RSS Feed. It will help you track the number of RSS subscribers and visitors.
  111. Do a series of “Share Pairs” where people ask and answer these questions:What did you learn today?What is still isn’t clear?What do you need to move forward?What is the most important thing you want to learn tomorrow?Then gather in a circle, and have everyone share one word about they are feeling and why.