Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material INDEX A Audits. See Social media policy audits “About Me” section, 250, 255 –256, 328 –329 Authenticity, 314 Acceptable use policies (AUPs): best practices for Automatic archiving system, 34 blog, 87; description of, 2; e-discovery of, 37; helping to manage vicarious liability, 13–14, 24, 25; media policy audit questionnaire on, B 153 –154; mobile device use, 108 –109, 118; Backup system: defi nition of, 315; ESI stored prohibiting anonymous blogging and posting, using, 33; “virtual shredding” of tape, 33 –34 223; reputation management through use of, Banning sites: German workplace practice of, 221–222; social media policy audit of your, 80; growing challenge of, 169–170. See also 139–162; testing your know-how about, 4; tips Blocking sites for blogging, 87, 95 –99. See also Best practices; Best practices: automatic archiving of ESI, 34; Sample policies; Social media policies blog policies, 87, 95 –99, 102–105; company Accident-related liability, 23, 25, 114 –118 privacy and security, 66, 80 – 81; compliance Acknowledgment form requirement, 208 –209 management, 8; compliance with international Action plan. See Social media action plan privacy laws, 14, 76, 113; a comprehensive Age Discrimination in Employment Act, 20 legal review of policy as, 231–232; content Amended Federal Rules of Civil Procedure management rules, 198 –199; effective records (FRCP), 313–314. See also Federal Rules of management team and record retention policy, Civil Procedure (FRCP) 45 – 47; effective social media policies, 87, American Management Association, 7, 19, 23, 68, 166, 180 –181; employee privacy protection, 73, 114, 118, 172, 211 68; fi nancial services industry regulatory American MedicalCOPYRIGHTED Response (AMR), 71–72 compliance, MATERIAL 59; know the state rules affecting American Recovery and Reinvestment Act your company, 39; knowing international (ARRA), 324 privacy/monitoring laws, 76; legal compliance, Americans with Disabilities Act, 20 23 –25; management of third-party comments, Anonymous blogging, 101 95 –99; management of vicarious liability risk, Anti-Defamation League, 188 13 –14; mobile devices use, 25, 110 –114, Archive: categories of, 316; defi nition of, 314 119–120; policy is essential to compliance ArcMail Technology, 44 management, 8; policy training, 212–213, Armstrong, Heather B., 320 222; private social networks, 60 – 61, 327, 331, Associated Press, 69 336; records management and e-discovery Attachment, 314 compliance, 47– 49, 327; Regulation FD 347 bbindex.inddindex.indd 334747 331/12/111/12/11 99:45:45 AAMM 348 Index compliance, 55; regulatory compliance, management by using, 227; reputation 63 – 64; reputation management, 221–229; management through monitoring of, 222–223; reviewing your ESI legal compliance, 43; self-assessing your know-how about, 84 – 87; seven-step action plan, 130 –131; social media social media policy audit on use of, 136; social and networking policies, 70 –71, 72–73, 87, media presence through, 138, 224; Technorati’s 166, 180 –181; social media policy audit, 2010 State of the Blogosphere report on, 88; 161–162; SOX compliance, 55; technological thinking before you post, 188 –191; vlog tools supporting regulatory rules, 113 –114. (video) type of, 335; web diary type of, 336; See also Acceptable use policies (AUPs); Social workplace risks of mobile, 88 –93. See also media policies Third party blog comments Blawg, 315 Blogstorms (cybersmear), 92–93, 315 –316, 318 Blocking sites: employee gripe, 223; German BP reputation attacks, 219–220 workplace practice of, 80; growing challenge Brand bloggers, 226 –227, 316 of, 169–170. See also Banning sites Breach notifi cation laws, 316 Blog policies: best practices for, 87, 95 –99, 102–105; Burson-Marsteller’s The Global Social Media creating community guidelines for, 15, 96, Check-Up, 218 171–172, 173 –174, 179–180; litigation hold, Business blogs: ensuring legal compliance, 15 –17, 325 –326; making sure that you have up-to- 24; legal liabilities triggered by, 14 date, 87; samples of different, 249–280; tips Business blogs best practices: deactivate your for managing third-party comments, 95 –99; blog’s comment function, 16 –17; establish writing rules for business bloggers, 99–102 community blogging guidelines for third Blogger written rules: adhering to FTC blogging parties, 15; requiring visitors to register before rules, 62– 63, 77, 78, 89, 101, 184, 196, commenting on your blog, 15; review third-party 223, 225 –226, 322; on banning anonymous comments prepublication, 16 blogging, 101; fi nancial, 100; on handling Business-critical email, 316 media inquiries, 100; requiring a legal Business record, 316 disclaimer, 102; reviewing posts prior to publication, 102 Bloggerati, 315 C Bloggers: “About Me” information or C-level executive blogs, 225 profi le of, 250, 255 –256, 328 –329; citizen CareerBuilder survey, 7 journalists, 317; defi nition of, 315; engaging Categories, 316 brand, 226 –227, 316; form relationships with Cell phones. See Mobile devices; Smartphones infl uential, 226 Chats, 316 –317 Blogging: banning anonymous, 223; on Chief executive offi cers (CEOs): blogs written Deepwater Horizon oil spill by “Leroy Stick,” by, 94; C-level executive blog by, 225; creating 219–220; mobile, 326 and responding to news through blogs, 95, Blogging risks: confi dentiality, 90 –91; electronic 224 –225; educating external online community discovery, 91; litigation, 88; productivity, 92; role of, 211; positioning as “thought leader,” 94; public relations disasters and blog mob attacks, written policy support by, 180 92–93; regulatory, 88 – 89; security, 89–90; Chief fi nancial offi cers (CFOs): C-level executive splog (fake blog), 89, 90; X-rated blogs, blog by, 225; positioning as “thought leader,” 94 187–188 Chief information offi cers (CIOs): C-level Blogosphere, 315 executive blog by, 225; educating external Blogroll, 315 online community role of, 211; policy on ISP Blogs: “About Me” profi le of, 250, 255 –256, connection authorization by, 303; positioning 328 –329; business, 14 –17, 24; C-level as “thought leader,” 94; as social media policy executive, 225; CEO’s ability to create and team member, 125 –126; social media risks respond to news through, 95, 224 –225; expressed by, 75–76; written policy support defi nition of, 315; dos and don’ts to manage by, 180 content, 191–198; e-discovery of, 30 – 43; Chief information security offi cers (CISOs): e-discovery risk of, 91; Federal Trade educating external online community role of, Commission (FTC) rules governing, 62– 63, 211; social media risks expressed by, 76 77, 78, 89, 101, 184, 196, 223, 225 –226, Children’s Online Privacy Protection 322; FINRA rules on, 56 –57, 89, 208, 322; Act (1998), 284 as heart of web 2.0, 83 – 84; how resentful Citizen journalists, 317 employees use, 9–10, 203 –204; how they Civil e-discovery procedures: Federal Rules can benefi t your business, 93 –95; litigation of Civil Procedure (FRCP) on, 5, 32–35; hold on, 325 –326; mobile devices used for, individual state rules on, 39– 42, 333 87–93; permalink (“permanent”) links on, Clearswift’s Web 2.0 in the Workplace Today report 327; photoblog type of, 328; reputation (2010), 2, 6, 80 bbindex.inddindex.indd 334848 331/12/111/12/11 99:45:45 AAMM Index 349 CNN, 69 Defamation: company liability for, 18; defi nition ComedyCentral.com, 170 of, 18, 319, 325; “false light,” 218; libel versus Comment spam, 89–90, 317 slander forms of, 325, 331 Comments: defi nition of, 317; risks of third party Deleted fi le, 319 blog, 30 – 43, 89–90, 95 –99, 217; threads of, Deletion schedule, 319 333 –334 Delicious, 331 Communication: how blogs facilitate two-way, Destructive retention policy, 44 – 45, 319 94; social media form of, 332; Web 2.0 form Deutscher Aktien 30 Index, 318 –319 of, 335 Digg: allowing damaging content to last forever, Communications Decency Act (1996), 217, 217; as social bookmarking site, 331; social 219, 317 media policy audit on use of, 136 Community blogging guidelines, 15, 96, Digital Millennium Copyright Act (DMCA), 171–172, 173 –174, 179–180 17–18, 25, 97–98, 319 Compliance management. See Social media Digital Sky Technologies, 57 compliance management Discrimination: job applicant screening trigging Confi dentiality: blogging risk to, 90 –91; HIPAA claims of, 19–20, 74; “protected classes” and, rule on, 60 – 62, 89, 91, 113, 184, 321, 324 –325. 19–20, 74, 329 See also Privacy; Privacy laws Domino’s employees’ YouTube, 220 Connections (LinkedIn), 317, 326 Dooced, 320 Consumer Reports 2010 “State of the Net” Doximity, 60, 320 survey, 66 “Drivers’ ed” training, 117–118 Content: defi nition of, 317–318; hidden readers Driving: Facebook posting while, 115; high cost of, 325; intended readers of, 325; rules of distracted, 115; pending legislation on cell governing, 184 –199, 206; unintended readers phone bans while, 117; vicarious liability of of, 334 accidents while, 23, 25, 114 –118 Content risks: Anthony Weiner scandal, 185; bloggers who break boundaries, 187–188; dos and don’ts to manage, 191–198; sexual E harassment, 186 –187; Tweets triggering e-Discovery: Amended Federal Rules of Civil terminations, 187; YouTube video, 188 Procedure (FRCP) application to, 314; Content rules: best practices for management blogging risk to, 91; complexity and time- of, 198 –199; compliance management role consuming task of, 35 –38; defi nition of, 30, of, 184 –185; dos and don’ts, 191–198; think 320 –321; Federal Rules of Civil Procedure before you post or publish, 188 –191; training (FRCP) for, 5, 32–35; media policy audit on, 206; understanding consequences
Recommended publications
  • Library and Information Science Digest, 7, 2014 Pp
    ISSN: 2006-1463 LIBRARY AND INFORMATION SCIENCE DIGEST Journal of the Nigerian Library Association Anambra State Chapter Volume 7, June 2014. Article SOCIAL MEDIA AND LIBRARY SERVICES: POINTS OF CONVERGENCE Peter Nnamdi Ibe* & Obiora Kingsley Udem** *Nnewi Divisional Library, Nnewi **Dept. of Library and Information Science, Nnamdi Azikiwe University, Awka Abstract The Internet has brought in its wake unlimited opportunities for information sourcing, retrieval and dissemination, as well as plethora of platforms for exchange of information. Among such platforms are web 2.0 technologies like Twitter, Blog, Facebook, My space, Linkedin, Wiki, Flicker and a host of others known and referred to as the social media. The social media is home to millions of subscribers who make use of these sites daily for one information need or the other, to socialize or to interact. One of the core mandates of libraries is to provide needed information for their diverse users. Because of the popularity enjoyed by these social media outfits as a result of ability to disseminate information, it has been latched on by many professions, including libraries whose duty is to provide needed information. This paper discusses the major social media technologies and benefits to libraries. It also explained the need for these social media technologies in the libraries, as well as how libraries can integrate them. The paper concluded by stating that there is need for management of libraries to ensure internet connectivity in their libraries, which is a prerequisite for the use of these applications. 82 © 2014 The Authors, Nigerian Library Association, Anambra State Chapter. Library and Information Science Digest, 7, 2014 pp.
    [Show full text]
  • Canada Archives Canada Published Heritage Direction Du Branch Patrimoine De I'edition
    A QUALITATIVE STUDY OF FIVE AUTHORS OF FIVE BLOGS ON TRAINING AND DEVELOPMENT by Kristina Schneider A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in Educational Technology Concordia University August 2008 © 2008, Kristina Schneider Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-45326-1 Our file Notre reference ISBN: 978-0-494-45326-1 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]
  • Handbook for Bloggers and Cyber-Dissidents
    HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS REPORTERS WITHOUT BORDERS MARCH 2008 Файл загружен с http://www.ifap.ru HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS CONTENTS © 2008 Reporters Without Borders 04 BLOGGERS, A NEW SOURCE OF NEWS Clothilde Le Coz 07 WHAT’S A BLOG ? LeMondedublog.com 08 THE LANGUAGE OF BLOGGING LeMondedublog.com 10 CHOOSING THE BEST TOOL Cyril Fiévet, Marc-Olivier Peyer and LeMondedublog.com 16 HOW TO SET UP AND RUN A BLOG The Wordpress system 22 WHAT ETHICS SHOULD BLOGUEURS HAVE ? Dan Gillmor 26 GETTING YOUR BLOG PICKED UP BY SEARCH-ENGINES Olivier Andrieu 32 WHAT REALLY MAKES A BLOG SHINE ? Mark Glaser 36 P ERSONAL ACCOUNTS • SWITZERLAND: “” Picidae 40 • EGYPT: “When the line between journalist and activist disappears” Wael Abbas 43 • THAILAND : “The Web was not designed for bloggers” Jotman 46 HOW TO BLOG ANONYMOUSLY WITH WORDPRESS AND TOR Ethan Zuckerman 54 TECHNICAL WAYS TO GET ROUND CENSORSHIP Nart Villeneuve 71 ENS URING YOUR E-MAIL IS TRULY PRIVATE Ludovic Pierrat 75 TH E 2008 GOLDEN SCISSORS OF CYBER-CENSORSHIP Clothilde Le Coz 3 I REPORTERS WITHOUT BORDERS INTRODUCTION BLOGGERS, A NEW SOURCE OF NEWS By Clothilde Le Coz B loggers cause anxiety. Governments are wary of these men and women, who are posting news, without being professional journalists. Worse, bloggers sometimes raise sensitive issues which the media, now known as "tradition- al", do not dare cover. Blogs have in some countries become a source of news in their own right. Nearly 120,000 blogs are created every day. Certainly the blogosphere is not just adorned by gems of courage and truth.
    [Show full text]
  • Lexical Innovation on the Internet - Neologisms in Blogs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.
    [Show full text]
  • Blogging Glossary
    Blogging Glossary Glossary: General Terms Atom: A popular feed format developed as an alternative to RSS. Autocasting: Automated form of podcasting that allows bloggers and blog readers to generate audio versions of text blogs from RSS feeds. Audioblog: A blog where the posts consist mainly of voice recordings sent by mobile phone, sometimes with some short text message added for metadata purposes. (cf. podcasting) Blawg: A law blog. Bleg: An entry in a blog requesting information or contributions. Blog Carnival: A blog article that contains links to other articles covering a specific topic. Most blog carnivals are hosted by a rotating list of frequent contributors to the carnival, and serve to both generate new posts by contributors and highlight new bloggers posting matter in that subject area. Blog client: (weblog client) is software to manage (post, edit) blogs from operating system with no need to launch a web browser. A typical blog client has an editor, a spell-checker and a few more options that simplify content creation and editing. Blog publishing service: A software which is used to create the blog. Some of the most popular are WordPress, Blogger, TypePad, Movable Type and Joomla. Blogger: Person who runs a blog. Also blogger.com, a popular blog hosting web site. Rarely: weblogger. Blogirl: A female blogger Bloggernacle: Blogs written by and for Mormons (a portmanteau of "blog" and "Tabernacle"). Generally refers to faithful Mormon bloggers and sometimes refers to a specific grouping of faithful Mormon bloggers. Bloggies: One of the most popular blog awards. Blogroll: A list of other blogs that a blogger might recommend by providing links to them (usually in a sidebar list).
    [Show full text]
  • Google Advertising Tools
    Download at WoweBook.Com Google Advertising Tools Download at WoweBook.Com Download at WoweBook.Com SECOND EDITION Google Advertising Tools Harold Davis with David Iwanow Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Download at WoweBook.Com Google Advertising Tools, Second Edition by Harold Davis with David Iwanow Copyright © 2010 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Editor: Julie Steele Cover Designer: Karen Montgomery Production Editor: Sarah Schneider Interior Designer: David Futato Production Services: Appingo, Inc. Illustrator: Robert Romano Printing History: November 2009: Second Edition. January 2006: First Edition. O’Reilly and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Google Advertising Tools, Second Edition, the image of a capuchin monkey, and related trade dress are trademarks of O’Re- illy Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein.
    [Show full text]
  • Blog Rules: a Business Guide to Managing Policy, Public Relations, and Legal Issues Has You Covered
    Other Books by Nancy Flynn Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication, Nancy Flynn, (AMACOM) E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication, Nancy Flynn and Randolph Kahn, Esq., (AMACOM) The ePolicy Handbook: Designing and Implementing Effective E-Mail, Internet, and Software Policies, Nancy Flynn (AMACOM) Writing Effective E-Mail: Improving Your Electronic Communication, Nancy Flynn and Tom Flynn (Crisp) E-Mail Management, Nancy Flynn (Thomson Learning) ................. 15888$ $$FM 05-19-06 09:29:45 PS PAGE i This page intentionally left blank Blog Rules A Business Guide to Managing Policy, Public Relations, and Legal Issues Nancy Flynn American Management Association New York • Atlanta • Brussels • Chicago • Mexico City • San Francisco Shanghai • Tokyo • Toronto • Washington, D. C. ................. 15888$ $$FM 05-19-06 09:29:45 PS PAGE iii Special discounts on bulk quantities of AMACOM books are available to corporations, professional associations, and other organizations. For details, contact Special Sales Department, AMACOM, a division of American Management Association, 1601 Broadway, New York, NY 10019. Tel.: 212-903-8316. Fax: 212-903-8083. Web site: www.amacombooks.org This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. Although this book is designed to provide accurate and authoritative information in regard to the subject matter covered, it is sold with the understanding that the publisher and author are not engaged in rendering legal, regulatory, technology, or other professional service.
    [Show full text]
  • Your Complete Guide to Adobe Bridge
    Your Complete Guide to Adobe Bridge by Brian Auer http://blog.epicedits.com INTRODUCTIONS ............................................. 1 WORKSPACE .................................................... 4 IMPORTING ................................................... 11 FILE PREPARATION ....................................... 14 FILE PROCESSING ......................................... 17 ORGANIZING ................................................. 21 TIPS AND TRICKS .......................................... 24 You may distribute this publication freely as long as it is left completely intact, unaltered, and delivered via this PDF file. You may also republish excerpts as long as they are accompanied by an attribution link back to http://blog.epicedits.com/ This publication is licensed under a Creative Commons Attribution-Noncommercial- No Derivative Works 3.0 United States License. Based on a work at blog.epicedits.com (See this chapter online) As photographers, we can all agree that the camera is one of our most important tools of the trade. But photography is much more than taking pictures — that’s the easy part. Photos need to be managed, organized, and processed. Thus, an equally important tool for the digital photographer is the photo management software we use. Having tried several methods of file management, I’ve settled on Adobe Bridge as my choice software. In this chapter, my goal is only to introduce the concept of using Adobe Bridge as a file management tool. I won’t get into any of the specific features or operations — we’ll save that for the next several chapters. WHAT IS ADOBE BRIDGE? Adobe Bridge is a piece of software that can prove to be crucial for digital photographers. I think Adobe makes a clear statement as to what Bridge is all about: Adobe® Bridge CS3 is a powerful, easy-to-use media manager for visual people, letting you easily organize, browse, locate, and view creative assets.
    [Show full text]
  • Wetenschappelijke Verhandeling
    UNIVERSITEIT GENT FACULTEIT POLITIEKE EN SOCIALE WETENSCHAPPEN PR enters the blog entries. Een verkennend onderzoek naar de receptiviteit van de Vlaamse blogosphere ten aanzien van Public Relations en naar opinion leadership van bloggers. Wetenschappelijke verhandeling aantal woorden: 24.925 Marie Lemaître MASTERPROEF COMMUNICATIEWETENSCHAPPEN afstudeerrichting COMMUNICATIEMANAGEMENT PROMOTOR : (PROF.) DR. Lieven De Marez COMMISSARIS : (PROF.) DR. Dimitri Schuurman COMMISSARIS : (PROF.) DR. Pieter Ugille ACADEMIEJAAR 2009 - 2010 1 Abstract Consumenten staan kritischer tegenover reclame en keren zich meer en meer af van traditionele media. Ze hechten meer belang aan de opinie van mensen zoals hen (hun peers). Nu we meer en meer ook online opinies zien verschijnen wordt het belang van sociale media, en daarbinnen blogs, groter. Er zou een kleine groep bloggers zijn die hierbinnen meer invloed uitoefent dan anderen, de opinion leaders. PR-firma’s en –departementen richten hun aandacht nu ook op hen, om op een alternatieve manier hun doelgroep te bereiken, maar doen dit veelal op de verkeerde manier. In deze exploratieve studie willen we via kwalitatieve en kwantitatieve onderzoeksmethodes een licht schijnen op wat een blogger credibel maakt en of er een impact is van diens meningen over merken op de merkattitudes van bloglezers. We onderzoeken ook de beste manier voor PR- personen om bloggers te bereiken. We vonden dat expertise en aantal links naar de blog de belangrijkste criteria waren voor geloofwaardigheid van bloggers. Eveneens ontdekten we dat PR-bureaus bloggers op een eerlijke, transparante manier moeten bereiken, met oog op een lange termijn relatie. 2 Inhoudstabel INLEIDING DEEL 1 LITERATUURSTUDIE 1 Opinion leadership theorie ....................................................................................... 1.1 Geschiedenis en concept ...........................................................................
    [Show full text]
  • F V Teampark Platform and Method
    innovation and inspiration and innovation Sogeti From crowd to community vision and inspiration innovation and inspiration Patrick Savalle, Wim Ho and and Arnd Brugman From crowd to community | From crowd to community | TeamPark Patrick Savalle, Wim Ho Wim Savalle, Patrick and and Arnd Brugman Arnd and and innovation and inspiration platform and method and platform TeamPark Sogeti innovation and inspiration 22525_SOG_Omslag_Teampark-Crowd_E.indd 1 29-04-2010 16:36:08 #REATIVEJUSTI½CATIONONCOVER ±4HEDETAILED3OGETIBRIE½NGFORTHEDOUBLECOVERPROVIDESTHEBASISFOR THEDESIGN &RONTANDBACKCOVEROFTHEBOOKHAVEACONSISTENTDESIGNINVOLVINGAN INTRIGUINGINTERPLAYOFLINES 4EAM0ARK 4HEMETHODISMETICULOUSLY SCHEMATICALLYDETAILEDINTHEBRIE½NG 7HEELSARESUBTLYINCORPORATED4HEIMAGEOF!RNTZICONOGRAPHYUSED HEREISAREPRESENTATIONOFDIVERGENTBUSINESSLINES² $ESIGNTEAM&RANCISKA&RANSENAND*OSVANDEN"ERG TeamPark TeamPark Platform and Method 2nd (revised) edition Patrick Savalle Wim Hofland Arnd Brugman 2010 Sogeti Attribution-Share Alike 3.0 The Netherlands http://creativecommons.org/licenses/by-sa/3.0/nl/ You are free: to Share – to copy, distribute and transmit the work to Remix – to adapt the work Under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same, similar or a compatible license. • For any reuse or distribution, you must make clear to others the license terms of this work. The best way to do this is with a link to this web page: http://creativecommons.org/ licenses/by-sa/3.0/nl/. • Any of these conditions can be waived if you get permission from the copyright holder. • Nothing in this License is intended to affect or limit the author’s moral rights.
    [Show full text]
  • Penguin Authors Guide to Online Marketing Penguin Group USA Spring/Summer 2008
    Penguin Authors Guide to Online Marketing Penguin Group USA Spring/Summer 2008 Getting Started, Getting Online, and Getting Noticed © 2008 Penguin Group (USA) Inc. All rights reserved. | Page 1 Copyright © 2008 Penguin Group (USA) Inc. Prepared by the Penguin Group USA Online Marketing Department PUBLISHER’S NOTES This guide is distributed with the understanding that the publisher is not engaged in rendering legal, technical or other professional services. If you require legal advice or other technical or expert assistance, you should seek the services of a competent professional. This guide may not be reproduced, distributed, displayed, or published in whole or in part with- out the prior written permission of Penguin Group (USA) Inc. However, Penguin authors may copy and print material from the guide for their personal, noncommercial use only. Links to Web sites other than those owned by Penguin Group (USA) are offered as a service to Penguin authors. Penguin is not responsible for their content. References to products and services and their approximate prices and other timely facts in this guide are current as of Spring 2008 and are likely to change in the future. us.penguingroup.com © 2008 Penguin Group (USA) Inc. All rights reserved. | Page 2 Contents Getting Started 1. What is Online Marketing? Why you need to be on the Web - How we can help - Basic decisions 2. Domain Names How to register a domain name - Choosing a domain name - What to do if your domain name is taken - You have your domain name. Now what? Getting Online 3. Web Sites Working with a designer - What should the site consist of? - Pointing your domain name to your Web site (“Hosting”) 4.
    [Show full text]
  • Blogs in Education Kevin Curran and David Marshall School of Computing and Intelligent Systems, Faculty of Engineering, University of Ulster
    3515 Kevin Curran et al./ Elixir Adv. Engg. Info. 36 (2011) 3515-3518 Available online at www.elixirjournal.org Advanced Engineering Informatics Elixir Adv. Engg. Info. 36 (2011) 3515 -3518 Blogs in education Kevin Curran and David Marshall School of Computing and Intelligent Systems, Faculty of Engineering, University of Ulster. ARTICLE INFO ABSTRACT Article history: Educational blogs are used to allow educators to interact with students from any location. Received: 18 May 2011; Teachers sharing ideas through blogs is a promising way to communicate teaching ideas and Received in revised form: allows multicultural teaching methods to be disseminated. The blogs that tell the educator 8 July 2011; how to use technology within the classroom are informative as many teachers would have no Accepted: 18 July 2011; idea about such teaching methods. Research based blogs allow users to see different educational topics discussed in more depth. This paper provides an overview of the impact Keywords blogs are having in an educational context. Educational blogs, © 2011 Elixir All rights reserved. Classroom, Teachers. Introduction Xanga, started in 1996, had only 100 diaries by 1997, and over A blog is a website that is maintained by an individual or 50,000,000 in December 2005. It was the launch of Open group with regular updates of information; this information Diaries in 1998 that helped blogging become more popular, as could include diary entries, descriptions of events or in this case this was the first blog community where readers could add educational material. In most blogs readers can supply comments to other writers' blog entries.
    [Show full text]