SlideShare une entreprise Scribd logo
1  sur  30
When Bureaucrats Met Twitter:From “Need to Know” to “Need to Share” Kevin Kim, CIPP/C, MFC
Quick analysis Public / Private Corporate Twitter Account Personal Account
Twitter vs. government ,[object Object]
 Ethereal
 Sharing
 Fast
 Gossipy
 Unpredictable
 Experimental
 Young
 Conversational
 Closed
 Heavy
 Secretive
 Slow
 Nervous
 Cautious
 Reluctant
 Old
 Often one-way,[object Object]
What is social media?
4Es of Social Media
[object Object]
 ~ 300,000 new users per day
 55m tweets per day
 100,000 apps
 600m search queries per day,[object Object]

Contenu connexe

Tendances

Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology Jeanloismorante
 
The language of social media
The language of social mediaThe language of social media
The language of social mediaDiana Maynard
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT TechnologiesMaria Eloisa Blanza
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governmentsCraig Thomler
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologiesDeped
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengedmcmenemy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies RicciGozon
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneTim Rich
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment TechnologiesMichelle Faina
 
Using language to save the world: interactions between society, behaviour and...
Using language to save the world: interactions between society, behaviour and...Using language to save the world: interactions between society, behaviour and...
Using language to save the world: interactions between society, behaviour and...Diana Maynard
 
How to keep women safe, online?
How to keep women safe, online?How to keep women safe, online?
How to keep women safe, online?Ankit Mehta
 
Benefits of Internet
Benefits of Internet Benefits of Internet
Benefits of Internet yogini sharma
 

Tendances (18)

CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Project in Empowerment Technology
Project in Empowerment Technology Project in Empowerment Technology
Project in Empowerment Technology
 
The language of social media
The language of social mediaThe language of social media
The language of social media
 
The Current State of ICT Technologies
The Current State of ICT TechnologiesThe Current State of ICT Technologies
The Current State of ICT Technologies
 
Ethics and Data
Ethics and DataEthics and Data
Ethics and Data
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
Empowerment Technologies
Empowerment TechnologiesEmpowerment Technologies
Empowerment Technologies
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Using language to save the world: interactions between society, behaviour and...
Using language to save the world: interactions between society, behaviour and...Using language to save the world: interactions between society, behaviour and...
Using language to save the world: interactions between society, behaviour and...
 
How to keep women safe, online?
How to keep women safe, online?How to keep women safe, online?
How to keep women safe, online?
 
Benefits of Internet
Benefits of Internet Benefits of Internet
Benefits of Internet
 

Similaire à When bureaucrats met twitter

Surveying The Landscape
Surveying The LandscapeSurveying The Landscape
Surveying The LandscapeLisa Pollack
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPKathy Swanson
 
Using Social Media to Do More With Less
Using Social Media to Do More With LessUsing Social Media to Do More With Less
Using Social Media to Do More With LessBeth Kanter
 
Society for Nonprofit Organizations
Society for Nonprofit OrganizationsSociety for Nonprofit Organizations
Society for Nonprofit OrganizationsBeth Kanter
 
"Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ...
"Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ..."Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ...
"Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ...Joshua Tree Internet Media, LLC
 
Social Media Primer
Social Media PrimerSocial Media Primer
Social Media PrimerRickey Gold
 
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...eldercomlaw
 
Adape Social Marketing Overview
Adape   Social Marketing OverviewAdape   Social Marketing Overview
Adape Social Marketing OverviewClive Lam
 
Going Social
Going SocialGoing Social
Going SocialAerin Guy
 
Social Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingSocial Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingEarthbound Media Group
 
Basic Guide on Growing Your Brands on Twitter-Ryan Spoon
Basic Guide on Growing Your Brands on Twitter-Ryan SpoonBasic Guide on Growing Your Brands on Twitter-Ryan Spoon
Basic Guide on Growing Your Brands on Twitter-Ryan SpoonWisdomTap, Inc
 
Social media to advance palliative care sep 2010
Social media to advance palliative care sep 2010Social media to advance palliative care sep 2010
Social media to advance palliative care sep 2010Christian Sinclair
 
Leveraging Twitter In The Workplace
Leveraging Twitter In The WorkplaceLeveraging Twitter In The Workplace
Leveraging Twitter In The WorkplaceTamera Kremer
 
The Digital Academic
The Digital AcademicThe Digital Academic
The Digital AcademicMark Reed
 

Similaire à When bureaucrats met twitter (20)

Surveying The Landscape
Surveying The LandscapeSurveying The Landscape
Surveying The Landscape
 
Social Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOPSocial Media Presentation to Commercial Real Estate Group NAIOP
Social Media Presentation to Commercial Real Estate Group NAIOP
 
Using Social Media to Do More With Less
Using Social Media to Do More With LessUsing Social Media to Do More With Less
Using Social Media to Do More With Less
 
Society for Nonprofit Organizations
Society for Nonprofit OrganizationsSociety for Nonprofit Organizations
Society for Nonprofit Organizations
 
"Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ...
"Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ..."Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ...
"Crisis Communications and Social Media" - Jim Rettew (The Red Cross) - 2009 ...
 
Social Media Primer
Social Media PrimerSocial Media Primer
Social Media Primer
 
Businessfocus09
Businessfocus09Businessfocus09
Businessfocus09
 
Managing Social Media Risks
Managing Social Media RisksManaging Social Media Risks
Managing Social Media Risks
 
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
Abusive Content & Privacy/Security Breaches: Best Practices for Response ...
 
Twitter4 Bwin
Twitter4 BwinTwitter4 Bwin
Twitter4 Bwin
 
Adape Social Marketing Overview
Adape   Social Marketing OverviewAdape   Social Marketing Overview
Adape Social Marketing Overview
 
Twitter
TwitterTwitter
Twitter
 
Going Social
Going SocialGoing Social
Going Social
 
Social Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingSocial Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & Adapting
 
Basic Guide on Growing Your Brands on Twitter-Ryan Spoon
Basic Guide on Growing Your Brands on Twitter-Ryan SpoonBasic Guide on Growing Your Brands on Twitter-Ryan Spoon
Basic Guide on Growing Your Brands on Twitter-Ryan Spoon
 
Social media to advance palliative care sep 2010
Social media to advance palliative care sep 2010Social media to advance palliative care sep 2010
Social media to advance palliative care sep 2010
 
Leveraging Twitter In The Workplace
Leveraging Twitter In The WorkplaceLeveraging Twitter In The Workplace
Leveraging Twitter In The Workplace
 
The Digital Academic
The Digital AcademicThe Digital Academic
The Digital Academic
 
You.comm
You.commYou.comm
You.comm
 
Ethics In A Digital Age
Ethics In A Digital AgeEthics In A Digital Age
Ethics In A Digital Age
 

Dernier

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Dernier (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

When bureaucrats met twitter

Notes de l'éditeur

  1. 1. Good morning! Does this picture look familiar to you? If so, you would also familiar with Twitter. When bureaucrats met Twitter, when I made this title, I thought a lot about making some analogies to the movie When Harry met Sally, but it didn’t work eventually. I’m still working on it.By the way, my name is Kevin Kim, and I’m an Information Privacy Officer, a.k.a., “the Privacy Guy,” at my ministry, Alberta Education. However, I’d like to make a full disclosure here. Any opinions or views on this presentation I am going to provide are solely mine, not my employer’s.
  2. Quick & unscientific analysisBefore going further, I’d like to do a quick analysis. Could you please raise your hand if you’re working in the public sector? Thank you.How about Twitter? Please raise your hand if you know that your business area is using Twitter?What about personal account? One more time, could you raise your hand if you have your own personal Twitter account? Thank you. From what I saw, I can guess that more than half of you must be quite familiar with Twitter, and the social media in general.
  3. What would happen when bureaucrats meet Twitter? Let’s see how different they are. Well, maybe I’m a bit exaggerating, but still it makes sense, doesn’t it?
  4. Then what would be the answer to what would happen when bureaucrats meet Twitter? A fail whale? That is what I want to explore – what would happen, and how to make things happen in a better and more productive way. If you’re using Twitter, this image can’t be too strange. With this image, Twitter tells you that “Twitter is over capacity. Too many tweets! Please wait a moment and try again.”
  5. Source: http://radar.oreilly.com/2010/04/twitter-by-the-numbers.html
  6.  Social Media Venn Diagram by pescatello
  7. Conducted in February 2010, the Edison Research study polled 1,753 Americans ages 12 and up and presented three years of tracking data regarding Twitter awareness and usage.1. Awareness of Twitter has exploded over the past twelve months: from 5% in 2008 to 87% in 2010.2. 2. Despite near-ubiquitous awareness, Twitter is currently used by 7% of the population, or approximately 17 million Americans.3. Almost 50% of Americans 12+ maintain a profile on at least one social networking site, with the vast majority using Facebook. Twitter has yet to articulate its value and usage benefits to the vast majority of Americans.4. One strategy to encourage Twitter adoption may be to emphasize the parallels between status updates via Twitter and SMS messaging.5. The majority of Twitter users are “lurkers,” passively following and reading the updates of others without contributing updates of their own.6. Marketing and Business use cases for Twitter far exceed similar usage for social networking Web sites in general.7. Twitter is a natural “companion medium” to other media channels - in particular, as an accompaniment to live TV.8. A significantly higher proportion of Twitter users update their social networking profiles - and access Twitter - using mobile phones than the average user of other social networking sites and services.
  8. From Corporate to Personal: The Four Types of Twitter ProfilesPure Corporate Brand These accounts, which are often sporting the proper brand name of a company are used often to provide corporate news, deals, and support. Pros: This account can be managed by a team, and less risk of an individual being co-branded with the brand, as they may leave later.Cons: This may be perceived as a just an extension of corporate PR or the corporate website with little human interaction.Corporate With PersonaAbout 80% corporate brand + 20% personal brand.Pros: This account maintains the face of the corporate side, yet shows a human element, building trust with the community.Cons: The account may be limiting itself as the community may come to expect and rely on the individual person to participate.Employee With Corporate Association20% corporate + 80% personal information. Perhaps the most common accounts are the hundreds of thousands of accounts that may not explicitly represent a brand –but they represent their individualism and often indicate they’re an employee of a company.Pros: These personal accounts are often organic and are a great way to build connections with a community.Cons: Even if a disclaimer states that “these opinions only represent me, not my employer” they still are representatives of the brand.Pure Personal AccountPros: This account has no tie or risk to a brand.Cons: Although the risks are reduced, so are the opportunities. The chance to evangelize the brand with their community are lost.Which type is right for your social media endeavors? It depends on the culture and goals of the organization. Expect many brandsto have several of these accounts (For example, Cisco has types 1, 2, and 3) within their social arsenal). Type 1 may be useful for sharing facts, Type 2 may be helpful for support, Type 3 may have advantages in evangelism and type 4 may be helpful for employees that have little connection to the product or customers.Having multiple types of profiles for your brand strategy is useful, play to the strengths of each, however it’s important to note that having internal coordination with process and policy will also help to provide a common, high-quality experience to customers.
  9. Who owns the content that you post in social media. It depends on the tool. You need to know who owns the content and who can copy the content.
  10. In-house, outsourced, or third-party sites?All GoA info on third-party sites must also reside on GoA-owned site/server.Metadata, tagging, primary steward.Ensuring records management: scheduling for retention and disposition.No other’s content, and “transitory” records.Information in computing cloud: outside of Canada.
  11. Law and Harm: We may disclose your information if we believe that it is reasonably necessary to comply with a law, regulation or legal request; to protect the safety of any person; to address fraud, security or technical issues; or to protect Twitter's rights or property.How to respond to FOIP requests quickly? Just direct the requester to the Twitter accounts? Or to deny on the basis that the information is readily available to the public?
  12. Do you remember the GoA Communications policy I’ve shown you before? What do you think? Do we need another new “Twitter policy”? To be honest, it is more often than not necessary to create a brand new, but in fact mostly duplicate policy. It’s waste of time and energy as well as of keeping people even farther from actually reading it. Then perhaps what we need, and we need it quickly, would be a procedure or a guidelines. The shorter the better, the simpler and more flexible, the better. “The best practices that guide our use of social media are really no different than the behaviours we already practice in other work situations. Because of all of this really comes down to one of the core values that every public servant shares: trust and personal responsibility in all relationships. GoA Values: Integrity, “I suspect you already follow these guidelines in practice in you everyday work. Because the reality is, while social media may change how we communicate, it doesn’t change what we can and should say. It doesn’t change our fundamental behaviours.” IBMWhen you publish o a blog or Twitter, be sure to include a disclaimer that makes it clear that what you say is representative of your views and opinions and not necessarily the views and opinions of IBM.
  13. 1. Be transparent. Your honesty – or dishonesty – will be quickly noticed in the social media environment. If you are blogging about your work at the Ministry, use your real name, identify that you work for Alberta Education, and be clear about your role. If you have a vested interest in what you are discussing, be the first to say so.  2. Be judicious. Make sure your efforts to be transparent don’t violate Alberta Education’s privacy, confidentiality, and legal guidelines for external commercial speech. Ask permission to publish or report on conversations that are meant to be private or internal to the Ministry. Never represent yourself or Alberta Education in a false or misleading way. 3. Post meaningful, respectful comments. No spam and no remarks that are off-topic or offensive.  4. Write what you know. Make sure that you write and post about your areas of expertise and do feel free to provide unique, individual perspectives on non-confidential activities at Alberta Education. If you publish to a website outside the Ministry, please use a disclaimer something like this: “The postings on this site are my own and don’t necessarily represent my employer’s positions, strategies, or opinions.” Also, please respect brand, copyright, fair use, trade secrets, confidentiality, and financial disclosure laws.  5. Perception is reality. In online social networks, the lines between public and private, personal and professional are blurred. Just by identifying yourself as an Alberta Education employee, you are creating perceptions about your expertise and about Alberta Education by our stakeholders, customers, and the general public; and the perceptions about you by your colleagues and managers. Do us all proud. Be sure that all content associated with you is consistent with your work and with the Ministry’s values and professional standards. 6. It’s a conversation. Talk to your readers like you would talk to real people in professional situations. In other words, avoid overly pedantic or “composed” language. Consider content that’s open-ended and invites response. Encourage comments.  7. Are you adding value? There are millions of words out there. The best way to get yours read is to write things that people will value. It should be thought-provoking and build a sense of community. If it helps people improve knowledge or skills, build their businesses, do their jobs, solve problems, or understand our Ministry’s business better – then it’s adding value. 8. When disagreeing with others' opinions, keep it appropriate and polite. If you find yourself in a situation online that looks as if it’s becoming antagonistic, do not get overly defensive and do not disengage from the conversation abruptly: feel free to ask the Communications Branch personnel for advice and/or to disengage from the dialogue in a polite manner that reflects well on Alberta Education.  9. Your responsibility. What you write is ultimately your responsibility. Please know and follow the Code of Conduct and Ethics for the Public Service of Alberta. Contact XXX@gov.ab.ca for more information. Please also follow the terms and conditions for any third-party site.  10. If it gives you pause, please pause. If you’re about to publish something that makes you even slightest bit uncomfortable, don’t shrug it off and hit “send.” Be smart about protecting yourself, your privacy, and the Ministry’s confidential information. What you publish is widely accessible and will be around for a long time, so consider the content carefully. Google has a long memory.
  14. Avoid Personal Attacks At All Times.Respect the Opinions of Others.Do Not Tweet While Intoxicated.Keep the private private (DMs are there for a reason).Don’t post thoughts across multiple Tweets.Before post anything, consider this: Would you want your kid sister, mother, future girlfriend, boss or mother-in-law to read it? If you don’t have anything good to say, don’t say anything at all.The web is forever: what you put on the web remains there forever, searchable, traceable, source-able, ready to resurface years later.Rights of free speech – with some additional obligationsNo harm to reputation of GoANon disclosure of GoA information or content.Need to clearly identify contributions are made as an individual and not as a government representativeDisclaimerDo not comment on government policy unless it is appropriate to your roleBe discreet about what you say, do and post.A Twitter-Like Twitter Policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.”
  15. Some of the good companies have a clear strategy, while others are just dipping their toe in the water. The key with social media is to fail fast, fail forward and fail better. You aren’t going to get it right the first time, but you aren’t going to learn anything if you don’t take that first step. The beauty of social media is that your customers are very forgiving and at the same time, helpful at expressing exactly what they need from you as a company. It is the world’s largest focus group on Steroids.