Remove Activities Remove Examples Remove Policies Remove Web 2.0
article thumbnail

Social Media Insecurity: What to do When Online Activity Affects.

Techipedia: Tamar Weinberg

Social media is about helping one another and building real strong friendships, usually around a certain interest or activity. If my actively engaged social media colleague James posts a photo of his young son Harold on his Facebook page, James might expect comments by me and other peers who may not know the mother of that child.

article thumbnail

e4innovation.com " Blog Archive " Nice work

Buzz Marketing for Technology

e4innovation.com E-learning innovation: research, evaluation, practice and policy. Policy and strategy (4). Activity theory. social justice education 2.0. beyond simply the formal, paid work context, citing parenting, caring for the elderly, and voluntary work activities as examples. Blog Search. April 2008.

Wiki 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

5 Keys to Effective Knowledge Transfer for Nonprofits

Buzz Marketing for Technology

s needs, knowledge, and the sorts of practices they face on a daily basis is critical in an effective knowledge transfer and exchange activity.". Consider how you might use the interactive possibilities of the Internet and Web 2.0 But youve really hit the nail on the head here with the real-world examples. Rebecca Muller.

Web 2.0 100
article thumbnail

Intranet Blog :: E-mail fatigue

Buzz Marketing for Technology

Intranet 2.0. Nearly half those respondents (44%) spend more than 30% of their work activity on e-mail related activity. Also helping overcome e-mail fatigue at leading organizations are effective policies on e-mail use and the use of social media such as wikis and blogs. Internal Communications. Knowledge Management.

article thumbnail

3 Golden Business Rules for Social Media Engagement

Techipedia: Tamar Weinberg

On a particular forum I am active on (yes, I still use them!), They don’t follow guidelines on contact form policies on what will be covered and what won’t be. If this rockstar knew better, he’d have used my contact form and read my coverage policy (short answer: I won’t cover anything you send to me).

article thumbnail

7 Deadly Blog Writing Sins

Techipedia: Tamar Weinberg

Schedule those important activities in your weekly calendar. What’s a good example of this? There are a few bloggers who are smart and great writers … like you for example, Tamar. Lately, I’ve been creating graphics with screenshots to point out specific examples. Bit you are the exception!

Blogger 250
article thumbnail

An Interview with Blogger Bob From TSA's Evolution of Security.

Social Media Strategery

From what I’ve heard and read, one of the largest hurdles to clear is getting leadership to buy off on Web 2.0, Legal also played a major part in crafting our comment policy. This gives the public confidence that they are interacting with the government and not a “phishing&# (fake) government Web site.

Blogger 81