LEADER 05321nam 2200649 450 001 9910797286203321 005 20200520144314.0 010 $a0-7303-2226-2 035 $a(CKB)3710000000401965 035 $a(EBL)2031449 035 $a(OCoLC)908075313 035 $a(SSID)ssj0001515671 035 $a(PQKBManifestationID)12590975 035 $a(PQKBTitleCode)TC0001515671 035 $a(PQKBWorkID)11481500 035 $a(PQKB)11754397 035 $a(Au-PeEL)EBL2031449 035 $a(CaPaEBR)ebr11047016 035 $a(CaONFJC)MIL776653 035 $a(OCoLC)903632222 035 $a(CaSebORM)9780730322252 035 $a(MiAaPQ)EBC2031449 035 $a(EXLCZ)993710000000401965 100 $a20150511h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSocial media rules of engagement $ewhy your online narrative is the best weapon during a crisis /$fNicole Matejic 205 $a1st edition 210 1$aMilton, Queensland :$cWiley,$d2015. 210 4$dİ2015 215 $a1 online resource (235 p.) 300 $aIncludes index. 311 $a0-7303-2227-0 311 $a0-7303-2225-4 327 $a""Social Media Rules of Engagement""; ""Contents""; ""About the author""; ""Author note""; ""Preface""; ""PART I Rules of engagement""; ""1 Social media crisis communications: a seismic shift in the risk profile""; ""Communications born again, but the fundamentals still apply""; ""Ita???s all about narrative""; ""Optimus Prime: are you conditioning your audience for sales or LOLs?""; ""2 Ready, aim a??? misfire: why you must be social media data savvy""; ""The social media iceberg""; ""From marketeers to info ops: this will blow your pixels off"" 327 $a""The narrative in your numbers: what story is your social data telling you?""""Why social numbers dona???t always add up to Klout, influence, votes, dollars, sales and raving fans""; ""3 The hurt locker: getting inside is easy; escaping an art""; ""The information vacuum: why going AWOL on social media isna???t an option""; ""From battlefield to boardroom a??? the threat posed by information vacuums""; ""Say something! Just not anything a???""; ""Overexposed: why trashing your brand has never been easier""; ""Hashtag horror! Why things go terribly wrong"" 327 $a""4 Mission recon: why knowing your audience is critical to success""""Mission: getting to know your target audience""; ""Recon: pin it, IG it, tumble it a???""; ""Mission: audience segmentation""; ""Psychosocial considerations""; ""Mission: audience sentiment analysis""; ""5 Classified: is your enemy an adversary or an opportunity?""; ""Social warfare: why ita???s not just the militarya???s problem""; ""Brand you: social media jihad collateral damage""; ""Is your organisation at risk?""; ""Where to source information and support for crisis communications planning"" 327 $a""How to communicate during a critical incident or terrorist attack""""Full-spectrum dominance a??? oh and social media""; ""6 Socially transmitted disasters (STDs): The Clap (#PRFail) is now more contagious than ever""; ""Sex Ed 101: the birds, the bees a??? and Snapchat""; ""The Clap: are you at risk?""; ""Organisational and individual apathy""; ""Data blindness""; ""Risk-taking behaviour""; ""Coitus interruptus: not an effective method of Clap control""; ""Practise safe social media a??? ita???s all about using protection""; ""People""; ""Technology""; ""Corporate governance"" 327 $a""Click-jacking a??? not as pleasurable as it sounds""""7 Target acquired: social engineering and what it means for you and your organisation""; ""Stalkerbook a??? I mean Facebook""; ""Socialveillance: who is watching you online and why you should care""; ""Sneaking in that Trojan Horse""; ""The Trojan Horse: epic fail""; ""White collar blue: espionage and hacking is a corporate problem too""; ""8 Social media information operations: much more than military propaganda""; ""Why influence is key to mission success from battlefield to boardroom""; ""The influence equation"" 327 $a""Propaganda in your pocket a??? influence in everyday life"" 330 $aAvoid becoming a #PRFail with a solid social media strategy Social Media Rules of Engagement guides you in the development of a bullet-proof social media strategy. You can manage any crisis effectively by having a plan before you actually need one-and by understanding and influencing your audience with military precision. This original, engaging, and informative text with case studies from the coalface offers you the tools you need to avoid scandal and media crises, and to learn how to leverage social media, big data, and influence in your communications strategies. Social media has establi 606 $aInternet in public relations 606 $aCrisis management$vCase studies 615 0$aInternet in public relations. 615 0$aCrisis management 676 $a659.202854678 700 $aMatejic$b Nicole$01572902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910797286203321 996 $aSocial media rules of engagement$93848268 997 $aUNINA LEADER 05410nam 22006615 450 001 9910416083103321 005 20251225185029.0 010 $a3-030-51051-4 024 7 $a10.1007/978-3-030-51051-0 035 $a(CKB)4100000011372969 035 $a(DE-He213)978-3-030-51051-0 035 $a(MiAaPQ)EBC6281986 035 $a(PPN)258304359 035 $a(EXLCZ)994100000011372969 100 $a20200805d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovations and Interdisciplinary Solutions for Underserved Areas $e4th EAI International Conference, InterSol 2020, Nairobi, Kenya, March 8-9, 2020, Proceedings /$fedited by Jessica P. R. Thorn, Assane Gueye, Adam P. Hejnowicz 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XV, 287 p. 119 illus., 99 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v321 311 08$a3-030-51050-6 320 $aIncludes bibliographical references and index. 327 $aA Matrix Model to Analyze Cascading Failure in Critical Infrastructures -- Clusters Construction Mechanism for Strictly Linear Wireless Sensor Networks -- On the Treewidth of Planar Minor Free Graphs -- BACP+: A more efficient Beacon Analysis-based Collision Prevention Protocol -- Indigenous and scientific knowledge of soil regulation services, and factors effecting decision-making in agricultural landscapes in the Terai Plains of Nepal -- Enriching geolocalized dataset with POIs descriptions at large scale -- Building Word Representations for Wolof Using Neural Networks -- Extraction of relevant data from social media based on termino-ontological resources: Application to meningitis surveillance via Twitter -- Stakeholder Relations and Ownership of a Community -- Wireless Network: The Case of iNethi Variation with Depth of Physico-Chemical, Mineralogical and Physical Properties of Overburden over Gneiss Basement Complex in Minna Metropolis Nigeria -- Hydroclimate analysis under 1.5 and 2?C global warming in the Faleme River Basin -- Integration of Indigenous knowledge, climate data, satellite imagery and machine learning to optimize cropping decisions by small-scale farmers. A case study of uMgungundlovu District Municipality -- Vulnerability analysis in mobile banking and payment applications on Android in African countries -- A multi-level smart monitoring system by combining an e-nose and image processing for early detection of FAW pest in Agriculture -- Mangroves under demographic pressure and salt production threats in the Municipality of Ouidah (Benin) -- Mitigating the Impacts of Environmental Pollution in Lejweleputswa District through Integration of Local and Scientific Knowledge -- Environmental Protection in Nigerian Democracy: The Ogoni Clean-up in Perspective -- Supervisory strategy of a PV system with storage for injection to the electrical network -- Assessing the e-Readiness of Marginalised Communities for E-Government Services: A Case of Oniipa, Namibia -- Consolidating the Right to Data Protection in the In-formation Age: A Comparative Appraisal of the Adoption of the OECD (Revised) Guidelines into the EU GDPR, the Ghanaian Data Protection Act 2012 and the Kenyan Data Protection Act 2019. 330 $aThis book constitutes the refereed post-conference proceedings of the 4th EAI International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2020, held in Nairobi, Kenya, in March 2020. Due to the COVID-19 pandemic the conference is postponed to a later date in 2020. The 20 papers presented were selected from 50 submissions and issue different problems in underserved and unserved areas. They face problems in almost all sectors such as energy, water, communication, climate, food, education, transportation, social development, and economic growth. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v321 606 $aComputer networks 606 $aDatabase management 606 $aData protection 606 $aArtificial intelligence 606 $aComputer Communication Networks 606 $aDatabase Management System 606 $aData and Information Security 606 $aArtificial Intelligence 615 0$aComputer networks. 615 0$aDatabase management. 615 0$aData protection. 615 0$aArtificial intelligence. 615 14$aComputer Communication Networks. 615 24$aDatabase Management System. 615 24$aData and Information Security. 615 24$aArtificial Intelligence. 676 $a303.4833091724 676 $a004 702 $aThorn$b Jessica P. R$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGueye$b Assane$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHejnowicz$b Adam P$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910416083103321 996 $aInnovations and Interdisciplinary Solutions for Underserved Areas$94030474 997 $aUNINA