AURI JAYA Ð CEO JPNN.Com 2 MEDIA FLOWCHART

Total Page:16

File Type:pdf, Size:1020Kb

AURI JAYA Ð CEO JPNN.Com 2 MEDIA FLOWCHART 1 WEBINAR Regulasi Negara Dalam Menjaga Keberlangsungan Media Mainstream Di Era Disrupsi Medsos Kamis, 04 Februari 2021 AURI JAYA – CEO JPNN.com 2 MEDIA FLOWCHART Alur operasional bisnis media SHARE & CONTENT DISTRIBUTION Penyebaran dan distribusi konten ke Media memproduksi konten berbagai platform yang banyak artikel, audio atau video digunakan pembaca AUDIENCE TRAFFIC SOURCE MONETIZE Media mendapatkan pengunjung/pembaca Memperoleh pendapatan dari hasil yang berasal dari berbagai sumber penjualan konten atau iklan 3 TRAFFIC SOURCE Kategori sumber pengunjung yang mendistribusikan konten Search Pengunjung yang berasal dari search engine Social Pengunjung yang berasal dari media sosial Refferal Pengunjung yang berasal dari referensi website lain / agregator Direct Pengunjung yang langsung membuka halaman website TRAFFIC SOURCE LIST 4 Daftar sumber pengunjung berdarkan jenis platformnya Search Social Referral Pengunjung yang berasal dari search Pengunjung yang berasal dari media Pengunjung yang berasal dari engine sosial referensi website lain / agregator Ø Google Ø Facebook Ø Google News Ø Microsoft Bing Ø Twitter Ø BaBe Ø Yahoo Ø Instagram Ø Line Today Ø Baidu Ø Youtube Ø UC News Ø Yandex Ø WhatsApp Ø Flipboard Ø DuckDuckGo Ø Telegram Ø MSN Ø Ask.com Ø TikTok Ø Zend Yandex Ø Aol.com Ø Pinterest Ø Opera Ø … Dll Ø … Dll Ø … Dll 5 MONETIZE Sumber penghasilan media saat ini TRADISIONAL PROGRAMMATIC ADS VS ADS 6 TRADITIONAL VS PROGRAMMATIC Proses negosiasi pemasangan iklan model tradisional cukup Programmatic ad menjalankan suatu algoritma untuk memakan waktu dan biaya. Advertiser dan publisher harus mengumpulkan dan mengevaluasi data sehingga dapat bertemu untuk bernegosiasi harga iklan yang akan dipasang menentukan siapa dan dimana iklan akan ditampilkan Penetapan harga didapatkan dari hasil dinegosiasikan langsung Programmatic menggunakan proses yang dinamakan real-time antara advertiser dan publisher. Proses ini dapat berisiko bidding (RTB), sehingga dapat mengurangi risiko kesalahan terjadinya kesalahan, sehingga iklan bisa menjadi terlalu murah dalam penetapan harga atau terlalu mahal dari harga pasar Laporan penayangan iklan pada model tradisional dibuat oleh Programmatic memungkinkan pengiklan untuk melihat sendiri penerbit atau agen. Hasil laporan biasanya didapatkan setelah dan mengevaluasi kinerja secara real-time sehingga lebih masa kontrak berakhir transparan Optimasi dan perubahan strategi hanya dapat dilakukan setelah Perubahan strategi dapat dilakukan kapan saja jika dibutuhkan masa waktu iklan habis dan mendapatkan laporan dari penerbit untuk mengoptimasi performa iklan, seperti targeting, atau agensi iklan budgeting, dll Model tradisional dinilai kurang efisien saat ini, karena Programmatic membuat proses jual beli iklan antara pengiklan memakan waktu dalam prosesnya, membutuhkan dana dan penerbit. Proses menjadi lebih cepat, tepat dan bisa lebih yang lebih besar dan adanya celah kesalahan yang dibuat menguntungkan dengan meningkatkan Return On Investment (ROI) 7 TRADITIONAL VS PROGRAMMATIC Proses negosiasi pemasangan iklan model tradisional cukup Programmatic ad menjalankan suatu algoritma untuk memakan waktu dan biaya. Advertiser dan publisher harus mengumpulkan dan mengevaluasi data sehingga dapat bertemu untuk bernegosiasi harga iklan yang akan dipasang menentukan siapa dan dimana iklan akan ditampilkan 8 TRADITIONAL VS PROGRAMMATIC Penetapan harga didapatkan dari hasil dinegosiasikan langsung Programmatic menggunakan proses yang dinamakan real- antara advertiser dan publisher. Proses ini dapat berisiko time bidding (RTB), sehingga dapat mengurangi risiko terjadinya kesalahan, sehingga iklan bisa menjadi terlalu murah kesalahan dalam penetapan harga atau terlalu mahal dari harga pasar 9 TRADITIONAL VS PROGRAMMATIC Laporan penayangan iklan pada model tradisional dibuat Programmatic memungkinkan pengiklan untuk melihat oleh penerbit atau agen. Hasil laporan biasanya didapatkan sendiri dan mengevaluasi kinerja secara real-time sehingga setelah masa kontrak berakhir lebih transparan 10 TRADITIONAL VS PROGRAMMATIC Optimasi dan perubahan strategi hanya dapat dilakukan Perubahan strategi dapat dilakukan kapan saja jika setelah masa waktu iklan habis dan mendapatkan laporan dibutuhkan untuk mengoptimasi performa iklan, seperti dari penerbit atau agensi iklan targeting, budgeting, dll 11 TRADITIONAL VS PROGRAMMATIC Model tradisional dinilai kurang efisien saat ini, karena Programmatic membuat proses jual beli iklan antara memakan waktu dalam prosesnya, membutuhkan dana pengiklan dan penerbit. Proses menjadi lebih cepat, tepat yang lebih besar dan adanya celah kesalahan yang dibuat dan bisa lebih menguntungkan dengan meningkatkan Return On Investment (ROI) 12 TOP SEARCH ENGINE Mesin pencarian teratas di dunia tahun 2020 1. GOOGLE 4. BAIDU Market share: 88,14% Market share: 0,59% 2. BING 5. YANDEX Market share: 6,18% Market share: 0,26% Source: www.statista.com 3. YAHOO Data : Jan 2020 – Oct 2020 Market share: 2,51% Google bukanlah satu-satunya mesin pencarian yang tersedia saat ini. Selain Google dan Bing, ada mesin pencarian lain yang mungkin tidak begitu terkenal tetapi masih melayani jutaan permintaan pencariaan per hari. Namun faktanya, mesin pencarian lain belum sanggup menyaingi bahkan tidak menjadi ancaman bagi Google. 13 GOOGLE ECOSYSTEM CONSUMER BUSINESS DEVELOPER Google memiliki lebih dari 100 produk dan layanan yang dapat digunakan oleh berbagai jenis user, sehingga saat ini banyak orang mengatakan, apapun yang kalian butuhkan semua ada di Google 14 TOP SOCIAL MEDIA (satuan dalam jutaan) Perusahaan Facebook milik Mark Zuckerberg mendominasi sosial media dengan berbagai macam produknya, antara lain : Facebook, WhatsApp, Facebook Messenger & Instagram. Statista mencatat, Indonesia menempati peringkat ketiga pengguna Facebook Source: www.statista.com terbanyak di dunia dengan angka mencapai Data : Oct 2020 140.000.000 akun 15 FACEBOOK ECOSYSTEM 1.Facebook (Facebook.com). 21.WhatsApp 41.Facebook Audience Insights 2.Facebook Lite 22.WhatsApp Payments 42.Facebook Audience Network 3.Instagram (iOS, Android, Windows Mobile) 23.Moments 43.Facebook Blueprint 4.Instagram Reels 24.Internet.org 44.Facebook IQ 5.Instagram Shopping 25.Facebook Ads 45.Instant Articles 6.Boomerang (iOS, Android) 26.Facebook Analytics 46.Facebook Paid Online Events 7.Facebook Collab 27.Instagram Business 47.Facebook Viewpoints 8.Facebook Marketplace 28.Facebook Creator Studio 48.Facebook Poke 9.Facebook Media 29.Facebook Business Suite 49.Facebook Slingshot 10.Facebook Messenger (Messenger.com) 30.Facebook Gaming 50.FriendFeed 11.Facebook Messenger Kids 31.Facebook Gaming Creators 51.Friend.ly 12.Facebook Messenger Rooms 32.Facebook Hacker Plus 52.Facebook Payments 13.Facebook Instant Articles 33.Facebook Pages 53.Lifestage 14.Facebook News 34.Facebook Campus 54.Atlas 15.Facebook Live 35.Facebook Portal 55.CrowdTangle 16.Facebook Libra (now known as Diem) 36.Facebook Local 56.Masquerade 17.Facebook Shops 37.Facebook For Creators 57.Moves 18.Facebook Watch 38.Facebook For Developers 58.Oculus 19.Facebook Workplace 39.Facebook Business 59.Onavo 20.Facebook Youth Portal 40.Facebook Business Manager 60.Origami 61.Spark AR Studio 16 POSITIONING Share & Audience Monetize Distribution Traffic Source Dari pemaparan di atas dapat dilihat bahwa perusahaan raksasa di dunia internet seperti Google dan Facebook memposisikan bisnis mereka di tiga kategori penting dalam flowchart bisnis media, yaitu : Share & Distribution, Audience Traffic Source dan Monetize. Keduanya memiliki produk dan layanan yang sangat kuat dan paling laris digunakan oleh seluruh pengguna internet saat ini. 17 GOOGLE FOR US Banyak sekali produk dan layanan yang sampai saat ini masih menjadi bagian penting bagi semua orang, termasuk perusahaan media Google Search Google Analytic Google Ads Google Play GMail Google Classroom Google Drive Google Docs Google News Google Sheet Youtube Google Slide Android OS Google Translate Google Chrome Google My Business Dan produk google yang lainnya… PLUS & MINUS 18 Dampak positif dan negatif Google bagi perusahaan media, antara lain: LIKE UNLIKE Mempermudah proses Ketergantungan pencarian informasi menggunakan layanan google Membantu penyebaran Dapat menyimpan seluruh konten kepada pembaca riwayat data pengguna Memiliki tools yang dapat Beberapa isu belum ada membantu saat menganalisa regulasi yang ketat. Contoh, konten terkait penyebaran konten hoaks, verifikasi media online, dll. Membantu marketing perusahaan pada saat Berpotensi memonopoli melakukan branding, bisnis periklanan advertising dan selling Tidak ada sharing revenue atas Meningkatkan traffic dan konten yang ditampilkan, revenue perusahaan kecuali jika menggunakan Google Adsense 19 Google vs United States Jaksa Agung dari puluhan negara bagian AS melayangkan gugatan terhadap Google. Mereka menuding Google telah melakukan monopoli yang merugikan konsumen dan pengiklan. Google juga telah menggunakan dominasinya untuk mengalahkan pesaingnya secara ilegal, memantau hampir setiap aspek kehidupan digital para penggunaannya, dan mendapatkan keuntungan hingga miliaran dollar. Google vs France Otoritas Perancis menjatuhkan denda sebesar €50 juta kepada Google. Mereka menilai Google melanggar peraturan pelindungan data dalam memproses data pribadi pengguna layanannya, terutama untuk tujuan personalisasi iklan. Badan perlindungan data Prancis, CNIL juga telah menghukum Google karena menghapus cookie pelacak tanpa persetujuan. Google dikenakan denda US$120 juta. 20 Konflik Google Terkait Keamanan
Recommended publications
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Apps and Smart Devices Listening In; How to Block Them; Protect Your Privacy 11/5/19, 109 Pm
    Apps and smart devices listening in; how to block them; protect your privacy 11/5/19, 109 pm Log in No account? Sign up National World Lifestyle Travel Entertainment Technology Finance Sport The gap between This is not Australia. what you earn Change the government, and the cost of living, change the rules. just gets wider and wider and wider. Authorised by Sally McManus, Australian Council of Trade Unions 365 Queen Street, Melbourne. Tiffany home entertainment These apps and devices could be listening to your private chats It’s not only Siri and Alexa listening. These apps and devices are also eavesdropping on you. And they don’t have to tell you they’re doing it. Adrianna Zappavigna MAY 10, 2019 7:31PM Video Image Home AI assistants: can we trust them? Hey Siri, who else is listening? While tech companies like Apple say Siri only starts listening after hearing so-called “wake up” words, earlier this month Amazon admitted to listening to your private conversations through its digital assistant Alexa. https://www.news.com.au/technology/home-entertainment/these-app…your-private-chats/news-story/7258fedcbe6103ca41aaf66bb4b28239 Page 1 of 8 Apps and smart devices listening in; how to block them; protect your privacy 11/5/19, 109 pm But it’s not just Siri, Alexa and potentially thousands of Amazon employees who are eavesdropping. According to futurist and business technologist Steve Sammartino, “Any speaker device, phone or app which can be used by speaking to it, is always listening.” Scary stuff. Amazon recently came under fire after it admitted to having a team of thousands listening to snippets of Alexa conversations.
    [Show full text]
  • Safety Activity Checkpoints (SAC)
    1 GSUSA 2021 Edition Safety Activity Checkpoints Change Memo – Important Updates to 2021 Edition The 2021 Edition of GSUSA’s Safety Activity Checkpoints has been updated to reflect the following changes as outlined in this three-page memo. National guidelines are developed in collaboration with the Girl Scout Council Safety Activity Checkpoints Task Team which includes a balanced regional representation as well as in-depth expertise and experience in the areas of Girl Scout programs, safety, and risk management. Standard Safety Guidelines. GSUSA’s Standard Safety Guidelines (formerly titled “Girl Scout Activity Safety Standards & Guidelines”) are located on pages 4 - 22 and apply to all Girl Scout activities including: troop meetings, day trips, special events, camp, travel, and product program. Accordingly, a link under each activity chapter has been added to direct volunteers to the Standard Safety Guidelines section. Within the Standard Safety Guidelines (p. 4 - 22) are the following updates: Adult Supervision. Further emphasizes the long-standing Girl Scout rule of at least two registered and approved, unrelated Girl Scout volunteers, one of whom is female. Examples of unrelated are provided as: not a sibling, spouse, domestic partner, parent, child, or anyone who would be considered a family member, and who do not live in the same residence. This rule applies to all Girl Scout gatherings and is mandatory whenever girls meet, whether in person or virtually. It is recommended that councils advise troops and parents of this requirement so that the council can be alerted if the supervision is not meeting this requirement. Activities not Listed in Safety Activity Checkpoints.
    [Show full text]
  • Being an Advocate for Substance Abuse Treatment and Prevention
    Being an Advocate for Substance Abuse Treatment and Prevenon—Time for New Strategies Andrew Kessler Slingshot Solutions, LLC NCAD 2013 Anaheim, CA September 21, 2013 FOUNDED AND PRODUCED BY THE PUBLISHERS OF IN CONJUNCTION WITH IN ASSOCIATION WITH Introductions all around! • Andrew Kessler, J.D. • Slingshot Solu6ons, LLC • Incorporated in 2008 • Clients include IC&RC, CAADAC/ CFAAP, Strategic Applicaons Internaonal, Naonal Council on Problem Gambling Who am I? Why am I here? • To learn about the environment we are currently in • To learn about how substance abuse is viewed by policy makers • To take what we learn and apply it to effec6ve advocacy strategies • (All in 60 minutes!) What is an expert? • Webster’s: “having, involving, or displaying special skill or knowledge derived from training or experience.” • Court of law: “a person who is a specialist in a subject, oZen technical, who may present his/ her expert opinion” • Newsflash- I’m not the only expert in this room… We need you to be leaders • If the experts do not lead, who will? (That’s a rhetorical ques6on…) • This is a complex issue that will require guidance and paence. If you’re looking for overnight results, you can leave now. • I mean it. • Get ready to go outside your comfort zone • This is not about a step by step, easy to use formula. Developing that will take months if not years. We only have an hour. • This is about learning what is going on outside our world of treatment and preven6on, what is going on in the rest of the world of advocacy, and learning to operate in that world • This is about the landscape we are working in, and why our strategies need to change.
    [Show full text]
  • 2020 Safety Activity Checkpoints 2021 Edition @ April 1, 2021
    - 2020 SAFETY ACTIVITY CHECKPOINTS 2021 EDITION @ APRIL 1, 2021 1 Table of Contents Introduction .................................................................................................................................................. 4 Standard Safety Guidelines .......................................................................................................................... 4 Coronavirus Safety in Girl Scouts ................................................................................................................. 7 Have an Emergency Action Plan (EAP)......................................................................................................... 8 Understanding Which Activities Are Not Permitted ....................................................................................... 12 Chartered Aircraft Trips and Aviation........................................................................................................... 14 Other Actions Girls and Volunteers Should Not Take ................................................................................... 14 First Aid ..................................................................................................................................................... 14 Overall Health, Well Being and Inclusivity.................................................................................................... 17 Transporting Girls .....................................................................................................................................
    [Show full text]
  • Voice Assistants and Smart Speakers in Everyday Life and in Education
    Informatics in Education, 2020, Vol. 19, No. 3, 473–490 473 © 2020 Vilnius University, ETH Zürich DOI: 10.15388/infedu.2020.21 Voice Assistants and Smart Speakers in Everyday Life and in Education George TERZOPOULOS, Maya SATRATZEMI Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece Email: [email protected], [email protected] Received: November 2019 Abstract. In recent years, Artificial Intelligence (AI) has shown significant progress and its -po tential is growing. An application area of AI is Natural Language Processing (NLP). Voice as- sistants incorporate AI by using cloud computing and can communicate with the users in natural language. Voice assistants are easy to use and thus there are millions of devices that incorporates them in households nowadays. Most common devices with voice assistants are smart speakers and they have just started to be used in schools and universities. The purpose of this paper is to study how voice assistants and smart speakers are used in everyday life and whether there is potential in order for them to be used for educational purposes. Keywords: artificial intelligence, smart speakers, voice assistants, education. 1. Introduction Emerging technologies like virtual reality, augmented reality and voice interaction are reshaping the way people engage with the world and transforming digital experiences. Voice control is the next evolution of human-machine interaction, thanks to advances in cloud computing, Artificial Intelligence (AI) and the Internet of Things (IoT). In the last years, the heavy use of smartphones led to the appearance of voice assistants such as Apple’s Siri, Google’s Assistant, Microsoft’s Cortana and Amazon’s Alexa.
    [Show full text]
  • Privacy As a Competitive Advantage 4 Case Studies on How Tech Is Building Consumer Trust
    Privacy as a Competitive Advantage 4 Case Studies on How Tech Is Building Consumer Trust Shifting consumer attitudes and new regulations have raised the stakes on personal protection. Today, privacy is more than a compliance concern—it’s a key opportunity for differentiation. This eMarketer Report gives a closer look at why this opportunity is especially true for emerging tech platforms and applications that rely on users’ trust to grow. presented by Dear eMarketer Reader, eMarketer is pleased to make this report, Privacy as a Competitive Advantage: 4 Case Studies on How Tech Is Building Consumer Trust, available to our readers. This report features eMarketer data, insights, and four case studies that illustrate how trust and privacy practices can fuel adoption, growth, and increase or retain market share. We invite you to learn more about eMarketer’s approach to research and why we are considered the industry standard by the world’s leading brands, media companies, and agencies. We thank you for your interest in our report and Adtaxi for making it possible to offer it to you today. Best Regards, Nancy Taffera-Santos Nancy Taffera-Santos SVP, Media Solutions & Strategy, eMarketer eMarketer, Inc. www.emarketer.com 11 Times Square, Floor 14 [email protected] New York, NY 10036 Privacy as a Competitive Advantage: 4 Case Studies on How Tech Is Building Consumer Trust Shifting consumer attitudes and new regulations have raised the stakes on personal data protection. Today, privacy is more than a compliance concern—it’s a key opportunity for differentiation. This is particularly true for emerging tech platforms and applications that rely on users’ trust to grow.
    [Show full text]
  • Staying Connected During the Coronavirus Pandemic, the Holidays, and Beyond –Smart Speakers, Apps and More!
    Staying Connected during the Coronavirus Pandemic, the Holidays, and Beyond –Smart Speakers, Apps and More! Alisa Brownlee, ATP, CLIPP, CAPS, WSP Assistive Technology Specialist The ALS Association National Office and Greater Philadelphia Chapter [email protected] About me • Assistive Technology Professional – Specialty areas are communication, computer access, environmental controls, home modifications • Credentialed Assistive Technology Professional (ATP) through RESNA (Rehabilitation Engineering and Assistive Technology Society of North America) • Certified Living in Place Professional (CLIPP) through the Living in Place Institute • Certified Aging in Place (CAPS) through the National Association of Home Builders • Credentialed Wheelchair Service Provider (WSP) through the International Society of Wheelchair Professionals – Current RESNA Board Member – Current RESNA Faculty • 24 years with the ALS Association – Greater Philadelphia Chapter – National Office Welcome • I have no actual or potential conflict of interest in relation to this program/presentation • I have no financial interest regarding any product I am including in this presentation • I will share my slides – email me – [email protected] Emergency Preparedness and Coronavirus Pandemic Caregivers are not allowed to ride along in an ambulance Most hospitals will NOT allow a visitor/caregiver in the Emergency Room No Visitors in hospitals during an in- patient stay No visitors allowed in nursing homes Content suggestions Go Bag • Copy of your Medical
    [Show full text]
  • NHSX Facebook Portal Pilot
    Center Type Area End Content Area NHSX Facebook Portal Pilot 29TH MAY 2020 Copyright © 2020 Accenture. All rights reserved. 1 Center Type Area End Content Area AGENDA 01 EXECUTIVE SUMMARY 02 BACKGROUND 03 PILOT DELIVERY 04 USER INSIGHTS 05 OPERATIONAL LEARNINGS 06 COMPETITOR ANALYSIS 07 RECOMMENDATION 08 APPENDIX CopyrightCopyright © 2020 © 2020 Accenture. Accenture. All rightsAll rights reserved reserved.. 2 Center Type Area End Content Area Executive Summary Copyright © 2020 Accenture. All rights reserved. 3 Center Type Area End Content Area PILOT CONTEXT As part of the COVID-19 response, Facebook donated 2,050 Portal video communication devices to support the NHS. NHSX and Facebook, with support from Accenture, have piloted the Portals across various care settings and regions within England between 23/03 and 29/05. Portal features X3 Use Cases Tested 1. Connecting Patients with family and/or friends (97% of Portals) Connect via WIFI Multiple screen sizes + + + Patient Care Setting Portal Family Home 2. Connecting patients/residents with necessary clinical support (2% of Portals) Touchscreen Multiple users per device + + + Patient Care Setting Portal GP GP Practice Smart Camera & smart sound 3. Enabling clinical care providers to deliver remote consultations (1% of Portals) + + + Other daily uses GP GP Practice Portal Patient Care Setting Copyright © 2020 Accenture. All rights reserved. 4 Center Type Area End Content Area PORTALS “I’m really grateful, it “They (care home EFFECTIVELY really matters, in a big resident) are a lot way. Being told at a happier and they are a CONNECT PATIENTS time like this that you lot more reassured can’t speak with that they (relatives) are WITH THEIR FAMILY someone at the end of at the other end of the their life, it’s awful.”, portal.”, AND FRIENDS Family Member Care Home Staff “The sound is so much better, and the screen is bigger so they can focus more.
    [Show full text]
  • Facebook Fake News in the Post -Truth World
    9-717-473 REV: SEPTEMBER 14, 2 0 1 7 JOHN R. WELLS CAROLE A. WINKLER Facebook Fake News in the Post -Truth World Our mission is to make the world more open and connected. — Mark Zuckerberg1 Introduction In January 2017, Mark Zuckerberg, founder and CEO of Facebook was surrounded by controversy. The election of Donald Trump as the next President of the United States on November 8, 2016 had triggered a national storm of protests, and many put the blame at the door of fake news stories served up on Facebook’s Trending News Feed.2 Facebook had launched the service in January 2014 to deliver news stories that might be of interest to Facebook users, in addition to the automatic News Feed that told them what was going on in their social network. Individuals could select items that they were interested in, but an algorithm served up news items that might appeal based on past reading habits and those of their close friends.3 The argument against Facebook was that this process polarized public opinion, fueled prejudices and encouraged the bitter partisan character of the election campaign.4 Some claimed that fake news, propagated through News Feed, supported the rise of anti-establishment sentiments amongst groups that felt left behind by the establishment elite.5 Zuckerberg was unapologetic. On November 10, 2016 he had commented, “Personally I think the idea that fake news on Facebook, which is a very small amount of the content, influenced the election in any way — I think is a pretty crazy idea.”6 He argued that fake stories were posted on both sides of the political spectrum.
    [Show full text]
  • Tendances De Cybersécurité 2019
    CYBERSÉCURITÉ 2019 : à l’ère de la mondialisation, le respect de la vie privée et les intrusions au cœur de toutes les préoccupations INDEX Introduction 3 — 4 Cryptomineurs : le nouvel outil de prédilection des cybercriminels ? 1 5— 9 Machine learning : l’interdépendance des humains et des machines 2 10 — 14 RGPD : le premier pas vers une loi internationale sur le respect de la vie privée ? 3 15— 19 Respect de la vie privée : le nouveau moteur de réussite des entreprises ? 4 20 — 23 Assistants connectés : des appareils aux dangers toujours en veille 5 25 — 28 Conclusion 30 — 32 www.eset.com/fr 2 INTRODUCTION www.eset.com 3 Introduction Depuis plusieurs années déjà, notre rapport annuel regroupe les contributions d’experts ESET du monde entier. Offrant un aperçu des jalons atteints dans l’industrie de la cybersécurité, il s’intéresse également aux scénarios d’attaque susceptibles de se produire en 2019 et aux mesures à adopter pour se prémunir de ces menaces. Les scénarios de base en la matière varient peu : les don- clut une section sur les assistants connectés, sur les pré- nées des particuliers comme des entreprises sont encore cautions à prendre avec l’Internet des Objets (IoT) et sur et toujours au cœur de toutes les préoccupations. L’en- l’impact de ces appareils en termes de sécurité, aussi jeu reste d’assurer leur confidentialité, leur intégrité et bien au travail qu’à la maison. leur disponibilité et de les protéger contre les attaques répétées de hackers désireux d’y accéder, de les utiliser Nous abordons également un autre sujet connexe qui a et/ou de les dérober.
    [Show full text]
  • Summaries and Best Practices
    Dartmouth College FY 16 Club and Group Activities Report (CGAR) Summaries and Best Practices Alumni Relations – Communities [email protected] (603) 646-3497 1. Introduction This is the second year that the Communities Department has provided our club and group volunteers with access to the great ideas, successes, and best practices of over 80 Dartmouth alumni clubs and groups. This information on a range of topics is gleaned from the FY16 CGAR: How to involve more alumni in your organization. Successful initiatives of other clubs and groups. The most unusual or innovative events of other clubs and groups. Ideas for admitted student events, summer send offs, and more. How to have effective communications: email, website, newsletter, etc. Methods to encourage members to pay dues. And 18 other topics! 2. How to Use this Resource The CGAR contains numerous open ended questions that our volunteer leaders answer every year. For 24 of these questions, this resource provides both big picture and detailed information: Overview of 24 topics (page 3) Executive summaries of each question (pages 5 – 12) Detailed responses provided by volunteers for each question (pages 13 – 81) This resource is extensively hyper-linked to make it easy to quickly move from the executive summaries to over 1,600 detailed responses (and vice versa). Each detailed response identifies the club or group that provided the suggestion. To contact a leader from a particular club or group, first visit the AR website where contact information for all clubs and groups is listed. If you cannot find a contact, please contact our office.
    [Show full text]