Remove Activities Remove Examples Remove Policies Remove Virtual World
article thumbnail

Metaverse dangers: How to protect brands from the dark side

Sprout Social

For example, extended reality (XR) headsets can record a user’s facial attributes, blinks, movement, surroundings and activities in the metaverse. For example, fingerprint scanning and facial recognition will likely become a default step to log into the metaverse. NFT giveaways, in-experience currencies, etc.).

Brands 117
article thumbnail

IBM Social Computing Guidelines

Buzz Marketing for Technology

Blogs, wikis, social networks, virtual worlds and social media. To contribute: IBM—as a business, as an innovator and as a corporate citizen—makes important contributions to the world, to the future of business and technology, and to public dialogue on a broad range of societal issues. Skip to main content.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberbullying and blogs – a case study Mumbrella

Laurel Papworth

Examples of cyberbullying behaviour are: teasing and being made fun of. Both sites point out that humour can be used and that a normal clash of personalities doesn’t count - the bullying has to be sustained over a number of activities. A recent example: The Freeview fiasco. What is Cyberbullying. defamation.

article thumbnail

The Ultimate Social Media Etiquette Handbook

Techipedia: Tamar Weinberg

Considering the above example, I pose a question on Facebook etiquette: Is it appropriate to let these requests sit in pending mode or to reject the friends outright?? I don’t get when people sign comments for example, since they comment itself already comes with the name and link above it. on Twitter.

Handbook 279