SlideShare a Scribd company logo
1 of 39
Can We Be Faster 
Than Disaster? 
It’s a New Era 
Bill Boyd, Corporate Health and Safety Coordinator 
Coastal Industrial Services 
@chiefb2
Goals 
• Review: 
• History of the Technology 
• Impact of Change 
• New Expectations for 
Business/Agencies 
• Recent Examples 
• Action Steps
About Me 
@chiefb2 
http://chiefb2.com
Quantum Leaps 
0 to 4G
The New Reality 
129 million 
smartphone users
The New Realities 
• Facebook has 1.1 BILLION active users 
worldwide as of May, 2013 
• 250 million pictures uploaded daily to 
Facebook 
• 100 hours of video are uploaded to 
YouTube EVERY MINUTE 
• Twitter has 500 million active users 
worldwide
Impact 
• Explosive Growth 
• Changing work habits 
• Expectation of constant connection 
• Ability to instantly record and 
disseminate to the world 
• People walk into things
When something bad 
happens… 
• People turn to trusted sources to; 
• Share what they are experiencing 
• Validate their observations/feelings 
• Gather information 
• Seek help 
• And, they DO IT FAST!
Are you faster than 
these folks?
San Bruno Explosion 
September 9, 2010 
Photo: Paul Sakuma AP
Craig Fugate, FEMA 
Director @craigatFEMA 
"I got better situational 
awareness [from Twitter] 
before we got official 
word," he said. "Four or 
five years ago I wouldn't 
have gotten that quality 
of information." 
Photo: Max Whittaker, Getty Images
Osama bin laden 
Raid – May 2, 2011
Henryville, Indiana 
March 2, 2012
Asiana Airliner Crash, July 6, 2013
First Tweet
SFO Got It Right!
On the Other Hand… 
• Asiana – No social media presence for 6 hours!
LAX RESPONSE
LAX RESPONSE
LAX RESPONSE
LAX RESPONSE
SM Fail 
“Ryan found two more 4 bottle packs 
of Dogfish Head’s Midas Touch 
beer… when we drink we do it right 
#gettngslizzerd”
Red Cross Response
So, How Do You “Get 
Fast”?
You Need To 
Understand… 
• Traditional news reporting has changed 
• People now get breaking news from the 
crowd 
• You won’t be faster than the crowd 
• You can use the crowd to get valuable 
information 
• If you don’t engage, you’ll lose valuable 
opportunities
“Old School” Crisis 
Comms 
• Chain of Command 
• Message approval process 
• Reliance on media releases/briefings 
• Arrogance (“It’s MY incident”) 
• Underestimating public interest
Before 
Event Occurs Response Information to Media Media to the Crowd
New Crisis Communication 
Strategies
What is 
happening? 
(facts) 
What are we doing 
about it? 
(messages) 
“Here’s what’s 
happening” 
What is 
happening? 
(facts) 
Delegate to lowest 
who can assure 
accuracy 
Leader(s) 
PIO-Spokespersons 
Here’s what we are 
feeling, committing 
to, planning, etc.” 
Event activity 
Approvals Today
Today’s Instant News 
Dilemmas 
• Immediate demand for information 
• Time inertia in mobilizing the team 
• Initial “facts” may be wrong 
• Raising alarm vs. minimizing situation
What It Takes 
• An Open Mind 
• An Investment 
• Practice 
• People 
• Pre-existing 
presence 
• Fast Action
Today’s Crisis 
Comms 
• Use Social Media platforms to: 
• Size Up/Situational Awareness 
• Instruct and Inform 
• Identify those needing Help 
• Correct Rumors 
• Reputation/Credibility Preservation 
• Assess message effectiveness
Some Practical Tips 
• Get help! 
• Post early and often 
• Be smart with hashtags 
• Respect “The Big Two” 
• Play with 3rd party platforms 
• Request your archive 
• Don’t speak for someone else
Tools
Can we be faster than disaster   bill boyd

More Related Content

What's hot

How networked nonprofits use twitter
How networked nonprofits use twitterHow networked nonprofits use twitter
How networked nonprofits use twitter
Beth Kanter
 
SMIM - Class 1
SMIM - Class 1SMIM - Class 1
SMIM - Class 1
Joe Samra
 

What's hot (19)

How networked nonprofits use twitter
How networked nonprofits use twitterHow networked nonprofits use twitter
How networked nonprofits use twitter
 
Social Media Presentation at Key4Women networking event
Social Media Presentation at Key4Women networking eventSocial Media Presentation at Key4Women networking event
Social Media Presentation at Key4Women networking event
 
Obama.Com E Você, por Joe Crump
Obama.Com E Você, por Joe CrumpObama.Com E Você, por Joe Crump
Obama.Com E Você, por Joe Crump
 
Deep loc.us slides
Deep loc.us slidesDeep loc.us slides
Deep loc.us slides
 
SMIM - Class 1
SMIM - Class 1SMIM - Class 1
SMIM - Class 1
 
The Which What And Why Of Social Media for Business
The Which What And Why Of Social Media for BusinessThe Which What And Why Of Social Media for Business
The Which What And Why Of Social Media for Business
 
Fake News and the Trouble with Facebook
Fake News and the Trouble with FacebookFake News and the Trouble with Facebook
Fake News and the Trouble with Facebook
 
Week 9 - Drowning in Data
Week 9 - Drowning in DataWeek 9 - Drowning in Data
Week 9 - Drowning in Data
 
10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans
 
Advanced Organizing institute - Influence & Social Media
Advanced Organizing institute - Influence & Social MediaAdvanced Organizing institute - Influence & Social Media
Advanced Organizing institute - Influence & Social Media
 
SXSW 2014: Startups, Bow to Your Marketer Overlords
SXSW 2014: Startups, Bow to Your Marketer Overlords SXSW 2014: Startups, Bow to Your Marketer Overlords
SXSW 2014: Startups, Bow to Your Marketer Overlords
 
Extended Village
Extended VillageExtended Village
Extended Village
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
amalv google
amalv googleamalv google
amalv google
 
How Twitter is forcing institutions to meet organisational & cultural challen...
How Twitter is forcing institutions to meet organisational & cultural challen...How Twitter is forcing institutions to meet organisational & cultural challen...
How Twitter is forcing institutions to meet organisational & cultural challen...
 
Vicariously Giving Through the Internet
Vicariously Giving Through the InternetVicariously Giving Through the Internet
Vicariously Giving Through the Internet
 
WTF is happening 5 consumer trends for 2020
WTF is happening 5 consumer trends for 2020WTF is happening 5 consumer trends for 2020
WTF is happening 5 consumer trends for 2020
 
Datenjournalismus - Entdecken - Erklären - Erkennen
Datenjournalismus - Entdecken - Erklären - ErkennenDatenjournalismus - Entdecken - Erklären - Erkennen
Datenjournalismus - Entdecken - Erklären - Erkennen
 
The Engaging Data Manifesto
The Engaging Data ManifestoThe Engaging Data Manifesto
The Engaging Data Manifesto
 

Viewers also liked

TAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleTAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap Style
Meg Weber
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
Meg Weber
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
TAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateTAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax Update
Meg Weber
 
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
Meg Weber
 
TAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationTAG Luncheon: Center for Innovation
TAG Luncheon: Center for Innovation
Meg Weber
 

Viewers also liked (18)

TAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleTAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap Style
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case study
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Future of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill PresentsFuture of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill Presents
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
TAG Luncheon: A+ Washington
TAG Luncheon: A+ WashingtonTAG Luncheon: A+ Washington
TAG Luncheon: A+ Washington
 
Deber de ingles
Deber de inglesDeber de ingles
Deber de ingles
 
TAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateTAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax Update
 
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecards
 
Technology Development Center Introduction
Technology Development Center IntroductionTechnology Development Center Introduction
Technology Development Center Introduction
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
TAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationTAG Luncheon: Center for Innovation
TAG Luncheon: Center for Innovation
 
TAG Luncheon: State of Technology
TAG Luncheon: State of TechnologyTAG Luncheon: State of Technology
TAG Luncheon: State of Technology
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 

Similar to Can we be faster than disaster bill boyd

Social media & crisis management handout
Social media & crisis management handoutSocial media & crisis management handout
Social media & crisis management handout
Social Media Rockstar
 
Where They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social mediaWhere They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social media
James Garrow
 

Similar to Can we be faster than disaster bill boyd (20)

Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital Age
 
Situational Awareness Through Social Media
 Situational Awareness Through Social Media  Situational Awareness Through Social Media
Situational Awareness Through Social Media
 
Crisis Communications in a Social Media Age
Crisis Communications in a Social Media AgeCrisis Communications in a Social Media Age
Crisis Communications in a Social Media Age
 
Government communications (george mason university)
Government communications (george mason university)Government communications (george mason university)
Government communications (george mason university)
 
Social media & crisis management handout
Social media & crisis management handoutSocial media & crisis management handout
Social media & crisis management handout
 
Facts, Fake news and Facebook
Facts, Fake news and FacebookFacts, Fake news and Facebook
Facts, Fake news and Facebook
 
Ali toronto november 2012 so me govt
Ali toronto november 2012 so me govtAli toronto november 2012 so me govt
Ali toronto november 2012 so me govt
 
Charlotte & The Convention
Charlotte & The ConventionCharlotte & The Convention
Charlotte & The Convention
 
OC Sheriff 10 Commandments of Crisis
OC Sheriff 10 Commandments of CrisisOC Sheriff 10 Commandments of Crisis
OC Sheriff 10 Commandments of Crisis
 
Where They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social mediaWhere They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social media
 
Crisis Management Through Social Media Monitoriing
Crisis Management Through Social Media MonitoriingCrisis Management Through Social Media Monitoriing
Crisis Management Through Social Media Monitoriing
 
Social media for emergency management (Suzanne Bernier)
Social media for emergency management (Suzanne Bernier)Social media for emergency management (Suzanne Bernier)
Social media for emergency management (Suzanne Bernier)
 
Sourcing and Verifying Social Content
Sourcing and Verifying Social ContentSourcing and Verifying Social Content
Sourcing and Verifying Social Content
 
Unplug Yourself
Unplug YourselfUnplug Yourself
Unplug Yourself
 
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
 
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
 
Public Health Preparedness Conference
Public Health Preparedness ConferencePublic Health Preparedness Conference
Public Health Preparedness Conference
 
Movement proposal (2012)
Movement proposal (2012) Movement proposal (2012)
Movement proposal (2012)
 
Debunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media ExecutivesDebunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media Executives
 
Social Media Marketing for your Department
Social Media Marketing for your DepartmentSocial Media Marketing for your Department
Social Media Marketing for your Department
 

More from Meg Weber

Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
Meg Weber
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
Meg Weber
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks
Meg Weber
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile iron
Meg Weber
 

More from Meg Weber (15)

Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk Summit
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs Overview
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation tech
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case study
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile iron
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
Jimmy johns infractions
Jimmy johns infractionsJimmy johns infractions
Jimmy johns infractions
 
2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Can we be faster than disaster bill boyd

  • 1. Can We Be Faster Than Disaster? It’s a New Era Bill Boyd, Corporate Health and Safety Coordinator Coastal Industrial Services @chiefb2
  • 2.
  • 3. Goals • Review: • History of the Technology • Impact of Change • New Expectations for Business/Agencies • Recent Examples • Action Steps
  • 4. About Me @chiefb2 http://chiefb2.com
  • 6. The New Reality 129 million smartphone users
  • 7. The New Realities • Facebook has 1.1 BILLION active users worldwide as of May, 2013 • 250 million pictures uploaded daily to Facebook • 100 hours of video are uploaded to YouTube EVERY MINUTE • Twitter has 500 million active users worldwide
  • 8. Impact • Explosive Growth • Changing work habits • Expectation of constant connection • Ability to instantly record and disseminate to the world • People walk into things
  • 9. When something bad happens… • People turn to trusted sources to; • Share what they are experiencing • Validate their observations/feelings • Gather information • Seek help • And, they DO IT FAST!
  • 10. Are you faster than these folks?
  • 11. San Bruno Explosion September 9, 2010 Photo: Paul Sakuma AP
  • 12. Craig Fugate, FEMA Director @craigatFEMA "I got better situational awareness [from Twitter] before we got official word," he said. "Four or five years ago I wouldn't have gotten that quality of information." Photo: Max Whittaker, Getty Images
  • 13. Osama bin laden Raid – May 2, 2011
  • 15. Asiana Airliner Crash, July 6, 2013
  • 17. SFO Got It Right!
  • 18. On the Other Hand… • Asiana – No social media presence for 6 hours!
  • 19.
  • 24.
  • 25. SM Fail “Ryan found two more 4 bottle packs of Dogfish Head’s Midas Touch beer… when we drink we do it right #gettngslizzerd”
  • 27. So, How Do You “Get Fast”?
  • 28. You Need To Understand… • Traditional news reporting has changed • People now get breaking news from the crowd • You won’t be faster than the crowd • You can use the crowd to get valuable information • If you don’t engage, you’ll lose valuable opportunities
  • 29. “Old School” Crisis Comms • Chain of Command • Message approval process • Reliance on media releases/briefings • Arrogance (“It’s MY incident”) • Underestimating public interest
  • 30. Before Event Occurs Response Information to Media Media to the Crowd
  • 32.
  • 33. What is happening? (facts) What are we doing about it? (messages) “Here’s what’s happening” What is happening? (facts) Delegate to lowest who can assure accuracy Leader(s) PIO-Spokespersons Here’s what we are feeling, committing to, planning, etc.” Event activity Approvals Today
  • 34. Today’s Instant News Dilemmas • Immediate demand for information • Time inertia in mobilizing the team • Initial “facts” may be wrong • Raising alarm vs. minimizing situation
  • 35. What It Takes • An Open Mind • An Investment • Practice • People • Pre-existing presence • Fast Action
  • 36. Today’s Crisis Comms • Use Social Media platforms to: • Size Up/Situational Awareness • Instruct and Inform • Identify those needing Help • Correct Rumors • Reputation/Credibility Preservation • Assess message effectiveness
  • 37. Some Practical Tips • Get help! • Post early and often • Be smart with hashtags • Respect “The Big Two” • Play with 3rd party platforms • Request your archive • Don’t speak for someone else
  • 38. Tools

Editor's Notes

  1. Who has a Personal Facebook Account? Who manages a Facebook Fan Page? Who has a Twitter Account? Anyone Blog? Who does NONE of the above? For those of you who do none of the above, have you ever watched a YouTube video? Who does Facebook, Blogging or Twitter for their Company?
  2. It’s Not My Emergency http://chiefb2.com
  3. 0g 1947 1g 1978 2g 1990-2000 3g 2001 4g 2009 Biggest leaps have come with 3 and 4 g as it relates to smartphone use and apps
  4. The convergence of mobile technology, wireless infrastructure and applications has rapidly changed our culture and expectations, especially with the new generation.
  5. Along with the explosion of technology, software and applications have exploded as well. Social media sites like Facebook, YouTube, Twitter and blogs fundamentally have changed how we communicate.
  6. “Smartphonatic” Someone who changes their shopping, banking and payment behaviors after switching to a smartphone 20% of US smartphone users are smartphoantics. 43% of mobile users use smartphones Blurring of the lines between work and personal life due to the connection (email forwarding for example)
  7. So, it should be no surprise when cell networks become overloaded during high visibility events. Skagit I-5 bridge collapse brought local cell carriers to their knees. Twitter is the fastest of them all.
  8. No way, as crisis managers and communicators we will never be as fast as a witness with a smartphone.
  9. Time stamp on tweet was 30 seconds after the crash! Now that’s fast!
  10. 6% dip in stock in 1 day Their PR response roundly criticized and used as an example of what not to do, both here and abroad. A spokesperson stated “It’s not the proper time to manage the company’s image.”
  11. Nov 1, Lone gunman Targeted TSA agents 1 agent killed – several (7) wounded Airport shut down for several hours – affecting worldwide air travel
  12. Airport response on Twitter Note; very cryptic, fluid situation “fog of war”
  13. They also used Facebook, but very sparingly. Almost all information and hyperlinks were posted on Twitter. Much more nimble and faster.
  14. Bill February 15th 2011, an employee of the Red Cross tweeted from the @RedCross account:
  15. Bill
  16. First, understand the following: Accept the fact that social media is how many people are getting their news, especially breaking news on Twitter Take a hard look at your internal media statement approval process (more on that in a minute Address the legal/institutional barriers Educate key staff Engage before the event – Use the platforms! (if you don’t use it regularly, you won’t use it during crisis)
  17. Conflicting mixed messaging – especially in high profile/”policitical” type incidents (Unified Command) Deep Water Horizon example (ask Gerald to comment) Thad Allen had a tough time! Can a JIS/JIC help this? YES! If key agencies are committed to working together.
  18. Transition to how integration of social media can – and should – support the emergency response coordination and credibility.
  19. Bill - Mention Reuters and other Cable news channels who passed along false information about subject being captured during Boston Marathon bombing - Reddit used to identify WRONG people as suspects, etc…
  20. So, what does it take as a person in charge of incident response/agency response to effectively communicate during an incident? The next question is; Where should social media monitoring reside within the incident command system?
  21. When it comes to using Twitter during emergencies, ICs and PIOs should consider the following: Post early and post often. Even if the situation is unclear and rapidly evolving, simply saying crews are on scene working on the problem can buy you time in the initial stages. This message will be rapidly shared, and likely will generate comments that can lead to early engagement. Insert a geographical and/or agency hashtag with every post. Your town or location name (or abbreviation if the name is really long) can help others follow your tweets, and may end up being the default hashtag for the incident if your posts are retweeted enough. Prolific hashtags used during an incident often combine location and incident type (for example, #joplintornado, #sanbrunoexplosion, #chirstchurcheq, #I5bridgecollapse). However, the proliferation of a specific hashtag during an emergency incident is a crowd-sourced organic process. Make sure you have the “big two”: reliable Internet access and power. Phone chargers, spare batteries and robust Internet connectivity are critical to sustaining a strong SM presence during long-duration incidents. Try out some of the third-party Twitter platforms. TweetDeck, Hootsuite, GeoFeedia and Twitterfall, just to name a few, make it extremely easy to monitor multiple SM platforms, hashtags and posts from specific locations.