Educational CyberPlayGround ®☰ Menu

K12 Social Networking:
Defining Cultural Literacy
and Technological Literacy

SOCIAL NETWORKS EXPLAINED
#21st century Literacy Skills

Social media is destroying human relationships by turning our fundamental emotional connections into commodities by Facebook drones who click “like” boxes without ever thinking about how corporations are controlling every aspect of their lives. When a corporation decides to have a focus where you make money off human relationships, that’s incredibly dangerous. It crosses the line. Facebook has a business model of “you are learning about me and taking me and my relationships apart to monetize that.” It’s a trojan horse for something sinister. http://ow.ly/NUVaV

HACKERS TRICK FACIAL-RECOGNITION LOGINS WITH PHOTOS FROM FACEBOOK (WHAT ELSE?) Now researchers have demonstrated a particularly disturbing new method of stealing a face: one that’s based on 3-D rendering and some light Internet stalking.

 

HOW BUZZWORDS, BULLIES, AND CELEBRITY RULE OVER ALL "SOCIAL" MEDIA THE SOCIAL ASPECTS OF THE NETWORK INCLUDE GOSSIP AND CELEBRITY BECAUSE IS IT THE ORIGIN OF SOCIAL ORDER.

Know the purpose of:

1) Internet Rules of Social Media - Civility Counts!
"George Washington's Rules for Social Media."

2) Buzzwords Incomprehensible jargon is the hallmark of a profession.

3) Bullies Just remember . . . "If I Were King Of the Forrest" please report abuse!

4) Celebrity Over the course of human evolution, assessing social dominance and subordinance has been a ubiquitous feature of our interactions; it’s deep-set in our brains. Faces with either stereotypically high- or low-status expressions. People could correctly identify the status even when viewing pictures for 40 milliseconds. That’s 40-thousandths of a second.

Technological efficiency or sharing doesn't help relationships which are fragile, and require effort to preserve. Shortcuts like texting or tweets aren't going to take the place of a phone call or hand written thank you note. Essential facts don't make relationships. Personal communication isn't about using shortcuts. People need real connections not the technology that interrupts what is already tenuous and fragile.
"Efficient" isn't about personal relationships. Manners and old fashioned Etiquette have their place at the party - the dinner table - the car ride - the vacation. It isn't "all about you and what you deserve" as the advertisers say over and over - you can't dictate the terms of a real relationship with effecient technology. It's about other people's feelings and how you negototiate them.

 

How to REPORT A PROBLEM
and get an underage kid off facebook.

Facebook Is Using You --
and so is every other FREE internet service,
including Twitter and WeChat!

WeChat flaw that the average user will enable putting the other side at risk - Do NOT back up your iPhone chat history and media to the iCloud. Congratulations to @jankoum, @brianacton, @moxie and the rest of the team on shipping E2E in WhatsApp. Tech paper

The NSA uses FISA orders as part of the PRISM program.
Microsoft and Google have previously released data on government requests for user information, but they were barred from including Foreign Intelligence Surveillance Act (FISA) court orders. This is the first time that Facebook has released any statistics on government requests.

NSA SPYS using FACEBOOK

For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) – was between 9,000 and 10,000. These requests run the gamut – from things like a local sheriff trying to find a missing child, to a federal marshal tracking a fugitive, to a police department investigating an assault, to a national security official investigating a terrorist threat. The total number of Facebook user accounts for which data was requested pursuant to the entirety of those 9-10 thousand requests was between 18,000 and 19,000 user accounts.

Facebook’s inventory consists of yours and my personal data. Facebook makes money by selling ad space to companies that want to reach us. Advertisers choose key words or details — like relationship status, location, activities, favorite books and employment — and then Facebook runs the ads for the targeted subset of its 845 million users. In Europe, laws give people the right to know what data companies have about them, but that is not the case in the United States. Why are privacy laws non existent in the U.S.?

 

 

Software that tracks people on social media created by defence firm 2013
Raytheon's Riot program mines social network data like a 'Google for spies', drawing ire from civil rights groups. A multinational security firm has secretly developed software capable of tracking people's movements and predicting future behaviour by mining data from social networking websites. A video obtained by the Guardian reveals how an "extreme-scale analytics" system created by Raytheon, the world's fifth largest defence contractor, can gather vast amounts of information about people from websites including Facebook, Twitter and Foursquare. Raytheon says it has not sold the software – named Riot, or Rapid Information Overlay Technology – to any clients. But the Massachusetts-based company has acknowledged the technology was shared with US government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analysing "trillions of entities" from cyberspace. The power of Riot to harness popular websites for surveillance offers a rare insight into controversial techniques that have attracted interest from intelligence and national security agencies, at the same time prompting civil liberties and online privacy concerns.


Digital Natives are K-12 kids born after 2000 who have been encouraged to extend a part of their IRL (In Real Life) aka meat space identity into the digital space aka cyberspace. The online world provides amazing platforms when it comes exploring alter egos (Second Life) and other identity-forming activities. It also provides the tools to explore each other.
Second Life, MySpace, Flickr and all the other web 2.0 aren't places to go, but things to do, and a way to collaborate and express yourself. If you can get millions of users generating content, millions of users organizing that content, tens of thousands of users distributing that across the Internet, and thousands of people not on the payroll actually building it you've got a web 2.0 biz you can sell for millions of dollars.

Key Take Away: In fact, for most Digital Natives, there is no difference between their meat space, physical identity and their online cyberspace life, they are the same, it is their natural habitat. Digital Natives understand that to compete in the workplace, participate online, have a voice in government, influence the world, a digital identity can't be treated as an add-on to life. It's essential to everything, period.

Participatory cultures
involve being a part of online communities, producing digital media, problem-solving collaboratively, and shaping the public discussion (via blogs, podcasts, etc.). And access to these is becoming key to young people's ability to succeed. They will not be stifled, filtered, censored and we (adults) don't get that.

Hate Facebook want privacy?
anti-oversharing start-ups include GroupMe, Frenzy, Rally Up, Shizzlr, Huddl and Bubbla

 

So, What are your children doing on the net?
What are they putting up there?

Do K-12 Students Understand that Facebook is Public?

 

Teachers and Facebook

 

Application Platforms

Application Platforms like Twitter are like sharecropping. You are the sharecropper. You get to work on the farm, but you don't get to own the farm. The owners of the social networking platforms, get to call the shots, and at any point you can lose your farm which is the same thing as losing your domain name, access to your accrued data, and any kind of community you may have created. We are treated like sharecroppers on social networks. We would be better off if we constructed a network ourselves, because networks don't really matter. At some point the technology won't make me sign up for every single one of these networks, and we don't want to duplicate our social network or duplicate all of this work multiple times.

There Is Something wrong with Facebook and any other technology when the terms of the bargain is to allow websites to swap your personal information for convenient access to their sites - with the companies that operate the networks - collecting ever more information about their users. That information can and will be sold to marketers. When you give up that data, you're giving it up forever. The value they give us is negligible in the scale of what they are doing, and what we are giving up is all of our privacy.

Department Of Defense going after social network sites.

New Scientist Magazine has discovered that Pentagon's National Security Agency, which specialises in eavesdropping and code-breaking, is funding research into the mass harvesting of the information that people post about themselves on social networks. And it could harness advances in internet technology - specifically the forthcoming "semantic web" championed by the web standards organisation W3C - to combine data from social networking websites with details such as banking, retail and property records, allowing the NSA to build extensive, all-embracing personal profiles of individuals. See Security and Privacy

Facebook is a centralized social network used for spying.
Ilya Zhitomirskiy, Dan Grippi, Max Salzberg, and Raphael Sofaer decided to build a social network that wouldn't force people to surrender their privacy to a big business. They have called their project Diaspora* and intend to distribute the software free, and to make the code openly available so that other programmers can build on it. Share what you want, with whom you want. To manage your privacy on Facebook, you will need to navigate through 50 settings with more than 170 options. Facebook says it wants to offer precise controls for sharing on the Internet. http://www.nytimes.com/interactive/2010/05/12/business/facebook-privacy.html

There is something wrong.

There are Dead People on Facebook
The world's biggest social network, knows a lot about its roughly 500 million members. Its software is quick to offer helpful nudges about things like imminent birthdays and friends you have not contacted in a while. But the company has had trouble automating the task of figuring out when one of its users has died. That can lead to some disturbing or just plain weird moments for Facebook users as the site keeps on shuffling a dead friend through its social algorithms. Facebook says it has been grappling with how to handle the ghosts in its machine but acknowledges that it has not found a good solution. Now, people over 65 are adopting Facebook at a faster pace than any other age group, with 6.5 million signing up in May alone, three times as many as in May 2009, according to the research firm comScore. People over 65, of course, also have the country's highest mortality rate, so the problem is only going to get worse. 2010

China, Russia, South Africa - And The Facebook Connection 12 Jan 2011
By Matthew Buckland at Memeburn There is something going on in China, Russia and South Africa. Via various internet investments and creations, these three countries combined have built up major stakes in some of the world's biggest sites and social networks. Russian investment company, Digital Sky Technologies (DST), now owns about 7-10% of Facebook by various estimates, putting the company among Facebook's biggest owners. Via its sister company Mail.ru, another 2.4% of Facebook is held. Recently, according to the New York Times, DST ploughed a further $50-million into Facebook. DST also owns about five percent of the popular social gaming company Zynga and another five percent of the prominent shopping-coupon company Groupon. The company is now apparently eyeing a piece of Twitter, but then again who isn't? The Mail.ru Group, which has grown into the biggest Internet company in the Russian-speaking world, owns 100% of Russian social networking site Odnoklassniki, and has a significant stake in the country's other major networking site, Vkontakte. DST also owns the early-web era instant messaging service ICQ, an interesting investment because the service is somewhat of a fading star.
The Chinese and South African connection

There is also a Chinese, and even a South African connection to the Russian group. South African emerging markets media giant Naspers, an $18-billion company, also owns a stake (reported at 28.7%) in DST, and therefore indirectly holds a stake in Facebook. Naspers also owns a chunk in TenCent's QQ, China's largest instant messenger and social network. In December 2010, QQ.com ranked 9th overall in Alexa's internet rankings, ahead of Twitter which ranked 10th. According to Business Day, TenCent had about 637-million registered users in December 2010. Ironically Naspers hails from a newspaper background, but started to make serious money via pay-TV operations in South Africa and throughout Africa. Naspers operates from a home market with a comparatively small internet user base of anywhere between 7-12 million South African users, so this may explain why the company has been aggressively fishing beyond its borders for internet properties. Naspers is headed by a tough, shrewd and ambitious Cape Town-based CEO in Koos Bekker. At home, the company owns the largest internet media player in News24, which attracts a modest -- by world standards -- five million monthly users. It also owns a piece of the South African MXit, a mobile-app-based IM now claiming around 25-30-million world-wide users. In 2001 Naspers bought the 46,5% piece of Tencent for $32m, making it the largest shareholder in the then three-year-old company. Then QQ had just 18-million accounts. As Tencent grew and turned into the world's third-largest dot-com by market value, the value of Naspers' stake jumped more than 400-fold to exceed R14bn. With these impressive figures, it appears that Tencent's QQ platform may be challenging Facebook as the world's largest social networking platform. They are not exactly comparable platforms because QQ is an IM first and a social network second. For Facebook it is the other way round. But a broad definition of "social network" -- a somewhat abused term these days -- could put the companies in the same category.
In September 2010, Naspers snapped up yet another social network, but this time in the US. The company bought a "controlling interest" in social networking site Multiply. Multiply, headquartered in Boca Raton, Florida, reportedly has more than 11-million registered users. Naspers also owns Indian social networking play Ibibo, as well as various ecommerce platforms in Eastern Europe, South America and other parts of Asia. The company holds 25% of Singapore-based BuzzCity, a mobile media company that runs a global advertising network on the mobile internet. Memeburn has it on good authority that Naspers sometime back had an opportunity to buy a piece of business networking site LinkedIn, but turned it down at the time -- a decision which has caused some regret at the company.
The Russians are not coming, they have in fact arrived.
On the other side of the world, the other figure leading this new emerging markets internet charge is the low-profile Internet tycoon Yury Milner. Milner is also the chairman of Mail.ru. The shaven-headed businessman trained as a physicist in Moscow before starting out as a manager at the World Bank. He began investing in the Russian Internet in the late 1990s and founded Mail.ru in 2001. A report in The New York Times noted that if DST had invested 50 million dollars (37.5 million euros) more in Facebook, its combined stake with Mail.ru would be worth about 500 million dollars. Mail.ru made its debut on the London stock exchange in November and was valued at 5.71 billion dollars on flotation. In a rare interview with business daily Vedomosti late in December 2010, Milner said that Mail.ru had "chosen a strategy to have a global expertise in a very narrow sector". He said that in every Internet sector, there was a tendency for one single firm to become dominant, and that the company had picked Facebook as the leader in English-language social networking. "On the Internet there is a tendency for 'winner takes all' and a leader emerges in every niche with surprising consistency," he said. "This is the main issue that we look at. When we made our first investment in Facebook, it was not obvious that it was a winner." Milner said he planned to invest the proceeds of the IPO in Internet projects, which he called "one of the most promising areas for the next 10 years". The Mail.ru Group and DST are part owned by Alisher Usmanov, a Russian billionaire of Uzbek origin who first invested in DST in 2008 and is also a major shareholder in Arsenal football club.


Internet: Learn About Twitter social network Tools

The Social Network - Defining Cultural Literacy and Technological Literacy

Define
Cultural Literacy and Technological Literacy

140 Character Conf

Social network sites are the Internet generation's equivalent of the town hall, the school cafeteria, or the workplace water cooler - the place where people come together to exchange both ideas and idle gossip.
There is no
absolute definition of literacy

Educational theorist E.D. Hirsch, Jr. said literate people in every society and every culture share a body of knowledge that enables them to communicate with each other and make sense of the world around them. The kinds of things a literate person knows will vary from society to society and from era to era; so there is no absolute definition of literacy. In the early twenty-first century, however, cultural literacy must have a large technological component.
Technological literacy is a much richer concept than computer literacy. Technological literacy can be thought of a comprising three interrelated dimensions that help describe the characteristics of a technologically literate person who has knowledge of technology and is capable of using it effectively to accomplish various tasks. He or she can think critically about technological issues and acts accordingly.


What every administrator, Policy Maker and Parent should know:

NSBA Social Network Report.pdf
MIT professor and clinical psychologist Sherry Turkle thinks "the impact of social networking on individual users and society in further accentuating "the tethered self" a person who understands himself and his feelings more in relation to others." It seems to be part of a larger trend in media culture for people not to know what they think until they get a sense of what everyone else think." "Tethered adolescents are given a cellphone by their parents. In return, they are expected to answer their parents' calls. On the one hand, this arrangement gives the adolescent new freedoms. On the other, the adolescent doe not have the experience of being alone, of having only him or herself to count on: there is always a parent on speed dial. This provides comfort in a dangerous world, yet there is a price to pay in the development of autonomy. There used to be a moment in the life of an urban child, usually between the ages of 12 and 14, when there was a first time to navigate the city alone. It was a rite of passage that communicated, 'You are on your own and responsible.' Tethering via a cellphone buffers this moment; tethered children think differently about themselves. They are not quite alone." And time alone to digest, reflect, and form our own views - not just in relation to how our friends or fellow IM-ers or social networkers think is a good thing.

Parents, teachers, and administrators who are concerned about what their kids are doing out of the house should also know what their kids are doing online. The 21st century is an online world and everyone needs 21st century skills.

Students think they are anonymous - wrong.   They don't realize how they can be traced online.  The Secret Service can identify the IP of your school from the message and if your kid even goes to that school. Then will go to the school and using the time stamp on the message and firewall logs, can identify the exact computer from which it came and the student who was logged in at the time.

K-12 Teacher Trainers - Twitter 24/7 Professional Development
Institutional Brand - digital footprint - Authentic Rich Learning Environments - It's about Networking. We now have education policy makers making policies about technology with a limited understanding of how it fits in education as a tool for learning, or even how it works, and viewing it as more of a hindrance than a help. It would be so much easier if Technology went away and we could get back to the “Three R's”, good ole' read'n, rite'n, and rithmetic.

It turns out that one child's educational tool is another child's distraction -- particularly when bored. Those distractions have led to a mini-war on laptops in the classroom. At the University of Colorado at Boulder, professor Diane Sieber also knew her students weren't all paying attention in class. She carried out a very unscientific study simply by comparing the grades of students who used laptops in class with those of the students who didn't. According to the Chronicle of Higher Education, Sieber privately informed the students after their first exam that they scored 11 percent lower than their counterparts without laptops. * But they don't take pencils or pens away when children are bored and they doodle with pencils.

 

Cyberbully TOOLS


LAW

 

WEB 2.0 TOOLS

 

 

LIST OF 5 DOZEN SOCIAL NETWORKING SITES

Financial Literacy - NetworthIQ, allows people to record their net worths and display the ups and downs for anyone to view. Most people who share their data do so anonymously, but Kincer posts a link to his personal Web site, where he uses his real name. Kincer especially liked that the site allowed him to compare himself with others. It appealed to the Mega Man player in him. “NetworthIQ is kind of a game,” he said. “Can I get ahead of everyone? Can I be up there with the big shots?” Net worth is the number you get when you subtract what you owe from what you own. You start with things like cash on hand, retirement savings and home equity and subtract your mortgage, as well as credit-card, student-loan and other debts. Net worth paints a bigger picture than income; it rewards the saver and reveals the drain that big borrowers put on their finances. And it vividly reminds people who think only in terms of monthly payments that their debts may be with them for a good long while.

We need to teach entrepreneurial skills not business manager skills. We need e-school -- not b-school. Skills in demand when it comes to the job. Need Money to Start - How to and Where to get the first investors

U.S. Students Need 21st Century Skills to Compete in a Global Economy Oct. 10, 2007
A new, nationwide poll of registered voters reveals that Americans are deeply concerned that the United States is not preparing young people with the skills they need to compete in the global economy. An overwhelming 80 percent of voters say that the kind of skills students need to learn to be prepared for the jobs of the 21st century is different from what they needed 20 years ago. Yet a majority of Americans say that schools need to do a better job of keeping up with changing educational needs. The national poll was conducted by Public Opinion Strategies and Peter D. Hart Research Associates on behalf of the Partnership for 21stCentury Skills.

 

Social Media's Power

 

 

From 21 Century skills learned and practiced from K-16
these are the skills in demand when it comes to the job.

Definition of 21st Century Literacy:
3 videos on managing info overload: Infotention http://bit.ly/5k9wMS - http://bit.ly/89uI0R - http://bit.ly/bw8yyI

The term "social media" first began to coalesce around 2003 to describe the impact of personal media and opinion through the emergence of low-cost publishing platforms. It was a term we adopted. We are rapidly moving to a post-social media world, where all media is social, and brands and businesses recognize its power to influence the entire enterprise.

Social media's power is profound and can strongly impact a wide range of use cases within brands, including risk management, media, product life cycle management, customer care, HR, market research, and innovation. There is a clear disconnect between the common association of the term "social media" with what it can actually do. Social Media is adopted as core to corporate strategy and not just another marketing channel. Social media is driving greater collaboration and forcing organizations to reexamine their business processes so they can be agile enough to react to the real-time social intelligence being infused into the organization.
The primary value of social media doesn't come from the tactics or the technologies, many of which are transitory, but from infusing its value across the enterprise to drive real and sustainable business advantage. And the examples of its power are tangible. HP, for example, said that it saved $10 million in call center costs by infusing social listening into customer service. Procter & Gamble reported that nearly half of its innovation is coming from outside the company through forms of social engagement, like its InnoCentive initiative. IBM is infusing ongoing real-time social intelligence across the organization for myriad use cases. This is about business redesign. It is also about the application of the social sciences. In our view, social media is about the evolution of human communication.
Cultural anthropology, sociology, psychology, and linguistics matter in marketing again. Concepts like "social framing," whereby individuals often perceive issues through the prism of their friends, are starting to help us rethink the way we communicate and the ways people gather, act, and synthesize information. Rethinking social organization through social media is beginning to have a transformative impact on governments and businesses.

Online Credibility Assessment
Information-seeking process figures into the final evaluation of content people encounter. Using unique data about how a diverse group of young adults looks for and evaluates Web content, our paper makes contributions to existing literature by highlighting factors beyond site features in how users assess credibility. We find that the process by which users arrive at a site is an important component of how they judge the final destination. In particular, search context, branding and routines, and a reliance on those in one's networks play important roles in online information-seeking and evaluation. We also discuss that users differ considerably in their skills when it comes to judging online content credibility. Full Text: PDF
Keywords: Credibility, Internet, Users, Web, Branding, Trust, Search, Information-Seeking, Media Literacy
Known brands were essential signifiers of quality for respondents, and seem to serve as an important part of users' daily information-gathering routines. However, not all name brands were trusted equally. Web sites from educational organizations and government entities were often trusted more than the average commercial site. We find evidence of users' trust in search engines with respect to the credibility of information they find when using these services. To complete many of the assigned tasks, students often turned to a particular search engine as their first step. When using a search engine, many students clicked on the first search result. Over a quarter of respondents mentioned that they chose a Web site because the search engine had returned that site as the first result suggesting considerable trust in these services. In some cases, the respondent regarded the search engine as the relevant entity for which to evaluate trustworthiness, rather than the Web site that contained the information. Students often did not investigate those results with regard to who authored the information they found through searching and ended up using to complete the tasks at hand. Going to a specific search engine like Google or Yahoo! was regularly the first step in the information-seeking process and students made this clear in the way they referred to the action of using such a service.

Tags give you subject related Metadata

 

Tags add value to the giant piles of data that are already out there. What are tags? Thousands of members use tags to give some contextual meaning to more than 3.5 million pictures that might otherwise get lost in the shuffle. You can give your photos a "tag", which is like a keyword or category label. Tags help you find photos which have something in common. Let folks loose categorizing their own stuff on their own terms.

Tag Defintion - example of system:media:audio
http://del.icio.us/tag/system:media:audio
http://del.icio.us/rss/tag/your+tags
system:something:specific taxonomy

K12 |FINANCIAL LITERACY|Del.icio.us - is a social bookmarks manager using Tags are one-word descriptors that you can assign to any bookmark. Tags can't contain quotation marks or whitespace, but are otherwise unrestricted. You can assign as many tags to a bookmark as you like, and rename, delete, add or merge tags together. Joshua Schachter began del.icio.us, a way for people to store and share their favorite Web-browsing bookmarks online. Instead of organizing them himself, or even creating a standard taxonomy of categories, Schachter used something called user tagging people simply labeled the bookmarks by any name they wanted, and eventually the group as a whole effectively voted on them by either adopting those tags themselves or rejecting them.

Taxonomy, FOLKSONOMY and TAGS

 

"FOLKSONOMY" Thomas Vander Wal, the information architect credited with coining the term.

Furl, MetaFilter and the blog index Technorati are generally considered folksonomy trailblazers. Other ways businesses can get value out of Twitter is competitive research, lead generation and media relations. You can research competitor accounts and their followers. You can sometimes identify which followers are their customers and prospects and try to engage with them yourself, when appropriate. Be careful not to push an advertisement on them too soon.Tweetdeck can be used to search on terms that are relevant for the business and identified potential leads which they pass to sales.
From a PR perspective, you can follow and try to engage members of the media, bloggers, and other subject matter experts who write about your industry. Compliment them on articles they write, pitch them new ideas to write about. If you can build a relationship, maybe they will write about you.

Bloom's Taxonomy and the Digital World - Open Education.net 2008
Bloom's Taxonomy, developed in the 1950's, expresses thinking and learning through a set of concepts that begin with lower order thinking skills (LOTS) and build to higher order thinking skills (HOTS). Bloom's Revised Taxonomy, constructed over the last 15 years, turns these words into different phrases. In the revised taxonomy, verbs are used rather than nouns to express the concept. The revised taxonomy begins with the word remembering before moving to understanding, applying, analyzing, evaluating and creating. Perhaps most importantly, there has been a general consensus of a change at level five and six, with evaluating being seen as a lower level to that of creating.

Normal ordinary humans = FOLK
SEE FOLKMUSIC
Scientific Classification = TAXONOMY
SEE Taxonomy Community of Practice (TaxoCOP)

FOLKSONOMY - According to various speakers at Online, folksonomies and tagging are becoming increasingly important. Web 2.0 presents exciting opportunities for networked information of the future - see The Hive Mind . "Many recently developed concepts and technologies are seen as contributing to Web 2.0, including weblogs, wikis, podcasts, rss feeds and other forms of many to many publishing; social software, web APIs, web standards, online web services, AJAX, and others.").

Social media releases are a Web 2.0 take on the traditional news release. They feature links, video and photos and are perfect for use on Facebook or other social media sites. Use PitchEngine, Marketwire and PRWeb they also have social media release builders for targeting online audiences.
Calling all bloggers can organizing a video meeting and inviting bloggers in addition to traditional media. Instead of pitching traditional media, you might also consider straight pitching to bloggers with whom you have or are trying to cultivate a relationship. Granting exclusivity on breaking news to bloggers whose sites receive lots of hits is a great way to cement relationships and make sure your news is seen by the masses.
Tweet It. If your company or client has a strong Twitter network. Bypass the media altogether and craft a 140-character news brief. If you have reporters who follow you on Twitter, I would also suggest tweeting the news @ them. If it's specific to their beat you just made their life that much easier, if it's not, you run the risk of annoying them a creating a reputation for yourself as a spammer, so beware.
Do It Yourself on YouTube. Don't wait for members of the media to contact you for a statement from your company on a recent announcement. Instead, consider shooting video of your CEO or a company spokesperson and upload it on YouTube. Then, promote the link on your website, social media pages and share a link with members of the media.
PODCASTING A podcast is a radio show that listeners subscribe to online.  Podcasts are a unique combination of subscription and publication.

VIDEOBLOG / VLOGS Video blogging Broadcasting Software

RSS THERE IS NOTHING SIMPLE ABOUT RSS IT IS DIFFICULT. RSS: podcasts are syndicated, meaning listeners just have to find them once, and receive them every time a broadcast is issued.

SMART MOBS A new form of social coordination made possible by the usage of modern technology, in particular the Internet and wireless devices.

WIKI "the simplest online database that could possibly work."

 

#social networks
#facebook privacy
#twitter
#flicker

 

© Educational CyberPlayGround ® All rights reserved world wide.