1. Internet Use in
4‐H Activities
2010 Western Regional 4-H Leader's Forum
Fahzy Abdul-Rahman
Family Resource Management
Extension Specialist
March 11-14, 2010
1
2. Outline
• Motivation: Why the Internet
– Risks – Safety
– Why work … we have good program
• Internet as tools:
1. Marketing and Communication
2. Training
2
4. Types of Social Media Marketing
(SMM)
a. Content-based c. Interest-based
b. Personality- d. Fantasy-based
based
4
5. a. Content-based SMM
Content sites
• Focuses on the content to
be posted and passed
around: blogs, videos,
photos, news stories,
podcasts
• Or bookmarks to the Bookmarking sites
content
• Feeds viral marketing
6. b. Personality-based SMM
• Consumer
companies create
character profiles,
but may not be the
best marketing for IT
companies
• IT consultants create
professional profiles
7. c. Interest-based SMM
• Communities form IT marketers must get into
around topics of these conversations
interest, such as
message boards and Maybe social
specialty search bookmarking sites fit into
engines this category, too
7
8. d. Fantasy-based SMM
• Virtual worlds, inhabited
by avatars, allow fantasy
lives that marketers wish
to be part of—Apple,
IBM, and other
companies already play
• Kids have their worlds,
too, but IT marketers can
safely ignore them
9. Note: marketers can safely ignore kids
• MARKETING: As
kids get
savvy, retailers aim
to hook 'em early
9
12. How and Why?
1. You e-
inform your
network
2. Your
network e-
inform
theirs
3. … and so on
… in minutes • Quick
• Reliable messengers
People + Message + Internet
= social media marketing • Feedbacks creates 12
buzz
14. Local Twitter Success Story
• By Davonna Lowry, Bernalillo county 4-H
Leader:
– Set up a twitter account for our family business
– Created relationships with various people.
– Attended social media workshops and meeting
these people face to face.
– Krispy Kreme: Back to Albuquerque
– Each 4-H member would be teamed up with a
media personality and a non-profit charity.
14
15. Local Twitter Success Story
• Thanks 4-H students - they did a great job
decorating KKD-themed cakes! Come by the
new factory on Ellison and take a look!
11:18 AM Dec 8th, 2009
• County 4-H program really stepped up with
some great cake decorations! We will have
them on display all day!
6:20 AM Dec 8th, 2009
15
16. Goals
• Driving traffic to our site – expertise?
• Create social media presence
• Provide tools for 4-H members
– Building your network
• Connect your state/local networks with
national [international] network
16
18. Where and what
do you see your
role here?
Social
Media
Marketing
Funnel
18
19. Social media marketing can be planned
• Choose interesting
topics for your stories—
just like good old public
relations
• Use good titles and
descriptions — just like <title>
search marketing
• Make it easy to
bookmark, unless you
think that’s cheesy
19
21. Training
• Telstra: 40,000+ Employee Company Trains its
Employees on Social Media
– Intro & 3R
• University of the People (UoPeople)
– a tuition-free, non-profit online academic institution
• The Wikibooks project
– began in 2003,
– To create open source, CC-licensed textbooks
– Over 38,000 pages of free textbooks
21
22. NMSU-supported
• Centra
• Second Life
• YouTube
• Second Life
22
23. Training: Centra
• Virtual or "live" classroom events
• Live limited interactive
– Internet speed!
• May be recorded
• Together with documents, e.g. Powerpoint
• http://eplace.nmsu.edu
3/18/09 CES_4H Curriculum Meeting Mindy Turner 00:54:41 Playback
12/11/08 CES_4-H Curriculum Update Amy Zemler 00:51:30 Playback
5/21/07 CES_4H Diplomat Meeting Amy Zemler 00:00:13 Playback
12/6/07 CES_4H Hall of Fame Induction Sonja Serna 00:31:27 Playback
23
25. Training: iTunes
• Recorded
• Less Interactive
• High-quality video
• Demonstration
If you need assistance with iTunes please contact the NMSU
Help Desk at 646-1840 or help@nmsu.edu.
25
29. Risks and Safety
• Invasion of Privacy
– Repackaging of user data – hot commodity for
commercial purposes
– A typical agreement
– Where we live, interests, activities, age, based on your
friends if not yours, … .
– Add more data ~ survey! – boss, future employer,
parents
• Exposure to Inappropriate Material
• Being Harassed
• Financial: Credit card
29
30. pleaserobme.com
“The danger is publicly telling people where you
are. This is because it leaves one place you're
definitely not... home.”
30
31. Risks and Safety
• For content that is covered by intellectual property rights, like
photos and videos ("IP content"), you specifically give us the
following permission, subject to your privacy and application
settings: you grant us a non-exclusive, transferable, sub-licensable,
royalty-free, worldwide license to use any IP content that you post
on or in connection with Facebook ("IP License").
• We allow advertisers to select characteristics of users they want to
show their advertisements to and we use the information we have
collected to serve those advertisements.
• We may use information about you that we collect from other
Facebook users to supplement your profile (such as when you are
tagged in a photo or mentioned in a status update).
31
32. Risks and Safety: What To Do
1. Obtain Safe Surfing Programs
2. It's Okay to Keep Secrets
3. Have an Internet Contract
4. Obtain a Free Email Account
5. Report Sexual Exploitation
6. Use Family Filters on the Search Engines
32
33. Internet Use in
4‐H Activities
2010 Western Regional 4-H Leader's Forum
Fahzy Abdul-Rahman
Family Resource Management
Extension Specialist
http://aces.nmsu.edu/ces/mymoney |
tweet | blog
33
Notas del editor
Friday, March 12; 3:30 – 5:00 pm
The best way to reach a large segment of the youth population is via internet given that children are probably the most tech‐savvy population in New Mexico and other states/provinces. This workshop will demonstrate to participants ways to use the internet as marketing, communication, and training tools for 4‐H programs
http://www.usatoday.com/tech/webguide/internetlife/2009-01-28-online-generations_N.htm From business to fun: What different generations do online
Youth are special groups. They are not like us when we were younger. In general, they are more tech-savvy and quick to make decisions (short attention span).Use facebook, utilizes i-phone, you-tubing, like to feel in-control, and like interactive sessions. Idea: Utilize the youths interest in Fantasy Football or Poker for fantasy investment … updated in facebook or myspace. Unique ads: Table outside movie shows, viral marketing, product placement (ask athletes to wear clothes with our website), Teens as “consumer in training”Sow the seed to children Brand loyalty often develops in adolescenceTeens exert a big influence on the purchase decisions of their parents. Many become the shoppers for the home because of working parents.
http://www.youtube.com/v/6ILQrUrEWe8Social Media Revolution http://www.youtube.com/watch?v=sIFYPQjYhv8Social Media in Plain English http://www.youtube.com/watch?v=MpIOClX1jPETwitter in Plain English http://www.youtube.com/watch?v=ddO9idmax0oSocial Media ROI: Socialnomics http://www.youtube.com/watch?v=ypmfs3z8esIReturn on Investment (ROI): Social Media http://www.youtube.com/watch?v=zrhrmcGhXlsLinkedIn30 million users, strongly business-oriented, $1 Billion+ valuationFacebookAustralia recently allowed service of court documents via FB #5 top global website per Alexa132 million unique visitors/monthTwitterFastest growing social networkRecently turned down $.5 Billion buyout offer from FacebookYouTubeNow the second leading search engineBigger than YahooAccounts for 25% of all Google searches
http://www.youtube.com/v/6ILQrUrEWe8Social Media Revolution http://www.youtube.com/watch?v=sIFYPQjYhv8Social Media in Plain English http://www.youtube.com/watch?v=MpIOClX1jPETwitter in Plain English http://www.youtube.com/watch?v=ddO9idmax0oSocial Media ROI: Socialnomics http://www.youtube.com/watch?v=ypmfs3z8esIReturn on Investment (ROI): Social Media http://www.youtube.com/watch?v=zrhrmcGhXls
By Davonna Lowry, Bernalillo county 4-H Leader:In the end Bern Cty 4-H received a $500 donation for the baking projects and the members had the opportunity to showcase their talent ½Promote 4-H to the publicKKD donated $500 to the charity of the winning cakeAs the world is moving into the 21st century, I decided that is was time to get on board. I created a twitter account for our family business and began tweeting. Well, not knowing what I was doing, I did a lot of promotions to grow our business. I learned not too long after opening the account, that I was doing this all wrong. What I needed to do was create relationships through this social media avenue. I began creating relationships with various people in Albuq. I also began attending social media workshops and meeting these people face to face. Being a homeschool mom, I try to introduce my kids to all aspects of life. Danielle, who is a senior 4-H member, went with me to a workshop one evening and we met a public relations manager. After meeting the PR manager, he told me that he would put me in a different list on his twitter account and watch what I have to say since he has now met me. That night the members at the workshop encouraged Danielle to set up a twitter account promoting her cake business. She also met the PR manager, so when she set up her account, he immediately started following her. The PR manager contacted us about a month later with an opportunity for Danielle and other 4-H members that like to do cake decorating. He told us that KrispyKreme doughnuts was coming back to Albuq. and would like to hold a cake decorating contest for their grand opening. Each 4-H member would be teamed up with a media personality and a non-profit charity. The winning cake would receive $500 for their charity and 4-H would receive $500 for the baking projects. We agreed to contact several 4-H members and get cakes started. The grand opening took place on Dec.9th, 2009 and the 4-H members were there to represent and promote their cakes. I have to say that if I had not try to promote my business by way of twitter, I don’t think that the 4-H members would have had that opportunity or the donation to promote the baking projects. Social media works.
Twitter: Top Twitter Tools Exposed & Explained at Lightning Speed!http://www.youtube.com/watch?v=UvVg8PtaGWsTwitter: iowa4h , Florida4H , Following & follower
The obvious primary goal of the FsA social marketing effort is to drive traffic back to eXtension.org. There are numerous social media outlets, and we will begin building our presence, and expand to new outlets: Twitter, Facebook, etc.Then we will connect to existing 3rd party partner sites, such as your university pages, or other resources for consumers. The next step is to engage the CoP.As demonstrated by a survey conducted for the 2009 AFCPE Pre-Conference the members of our CoP are building their presence and networks. The FsA CoP wants to connect with your pages. Then, We hope to enhance this trend by providing another source of leadership by directing CoP members to social media resources, inviting you to join our networks, create your own pages, and network with us.As CoP members and FsA enhance our online presence, our consumers will access our networked information, and more easily access our growing central resources of research based knowledge.
Driving traffic to our site – expertise?Create social media presenceProvide tools for 4-H membersBuilding your networkConnect your state/local networks with national [international] networkMarketers Have to Give Up ControlWe don’t control the messageThe message is changed, rebutted, parodied, and misconstrued by our audienceEven if our audience issmall, they are keyvoices to usWe must modify whatwe say in responseEvery day
http://www.thesocialworkplace.com/social-media-2/914/Social Monitoring ToolsEstablish which tools you want to use to capture the conversation, whether they are paid or free custom solutions. The tools you decide to use will impact the rest of the social media monitoring funnel, so choose carefully.Keyword TargetingImplement specific keywords that allow you to monitor your brand, target significant players in your organization, and keep tabs on your competition. This is also a point of entry in the funnel where you should be doing ongoing optimizations to refine your keyword data set.Noise EliminationEliminate spam sites that litter your feed and remove off topic mentions by building out negative key phrase lists. Blacklist specific sites that you do not want appearing in your feed.Refined MentionsUtilize your refined mention feed – watch the conversation. This is also an entry point of the funnel where most of the day-to-day monitoring takes place. Read, analyze and act.AnalysisApply sentiment analysis manually if your system is not doing it automatically – you need to measure the overall health of your brand if there is enough conversation going on. Group your mentions together in a holistic manner, facilitating portable data transfer within your organization.Take ActionTake action when needed – make sure the proper people inside your organization are acting and engaging the social web where your conversation is happening. If you are not applying manual analysis, then this part will be difficult. If you feel like your stream of mentions is not optimal enough, then go back through and tweak your keyword targeting at this point. Once you have constructed your plan, you will want to rinse and repeat. Read the refined mentions, analyze them and act accordingly.Source: The Social Media Monitoring Funnel | Ignite Social Media
Telstra: 40,000+ Employee Company Trains its Employees on Social MediaIntro & 3RUniversity of the People (UoPeople) a tuition-free, non-profit online academic institution with a mission to democratize higher education by providing universal access to college studiesThe Wikibooks project, which began in 2003, aims to create open source, CC-licensed textbooks written by volunteers. The site now contains over 38,000 pages of free textbooks, but unfortunately many of the books remain incomplete.
http://www.youtube.com/watch?v=qOFU9oUF2HA
http://parentingteens.about.com/cs/sitesforteens/a/internetusage.htmhttp://www.youtube.com/watch?v=X7gWEgHeXcAInvasion of PrivacyChildren have the right not to give out private information to anyone, including reputable companies, for any reason without the expressed permission of their parents. This information includes, but is not limited to name, email, address, age, and school they attend. Exposure to Inappropriate MaterialThe Internet is a vast information resource... of all types of information. Sites that contain explicit sexual, violent, and hateful information can be found with little and sometimes no effort. There are also sites on how to build bombs, make designer drugs, etc. Being HarassedChat rooms and message boards are chuck full of people who are just plain nasty. This can hurt a teenagers self esteem. Also, there are those on the net that will harass in email. FinancialA teenager with a credit card can do major damage to their credit, or yours. You should not allow any purchases for anything on the Internet without your permission. Then it should only be done on a secure server and NEVER through email. Know What To Do:Obtain Safe Surfing ProgramsThe Family Internet Guide at About.com has reviewed them in her Guide To Filtering Software. It's Okay to Keep SecretsLet your teen know it is ok not to tell things to people on the Net. Teach them to protect their privacy, that things aren't always what they seem. Have an Internet ContractMake a behavior contract with your teenager. This will enable them to know what you expect of their behavior while online. One can be found here. Obtain a Free Email AccountDo not allow your teen to use your ISP email account for message boards, chat, or anything really. Obtain a free email account for them. These types of accounts keep the SPAM level down and do not point out where your teen lives, like a local ISP can. Report Sexual ExploitationIf someone sends you messages or images that are obscene, lewd, filthy, or indecent with the intent to harass, abuse, annoy, or threaten you, report it to your Internet service provider and the CyberTipline online or by calling 1-800-843-5678.Use Family Filters on the Search EnginesMany companies on the internet, especially the search engines, are getting into the swing of online safety for our kids. Check out your favorite search engines filtering capabilities before your teen uses it.
The site uses streams of data from Foursquare, an increasingly popular location-based social network that is based on a game-like premise. Players use smart phones or laptops to "check in" to a location, recording their position on a map for friends using the service to see.
For content that is covered by intellectual property rights, like photos and videos ("IP content"), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook ("IP License"). We allow advertisers to select characteristics of users they want to show their advertisements to and we use the information we have collected to serve those advertisements.We may use information about you that we collect from other Facebook users to supplement your profile (such as when you are tagged in a photo or mentioned in a status update).
http://parentingteens.about.com/cs/sitesforteens/a/internetusage.htmInvasion of Privacy Children have the right not to give out private information to anyone, including reputable companies, for any reason without the expressed permission of their parents. This information includes, but is not limited to name, email, address, age, and school they attend. Exposure to Inappropriate MaterialThe Internet is a vast information resource... of all types of information. Sites that contain explicit sexual, violent, and hateful information can be found with little and sometimes no effort. There are also sites on how to build bombs, make designer drugs, etc. Being HarassedChat rooms and message boards are chuck full of people who are just plain nasty. This can hurt a teenagers self esteem. Also, there are those on the net that will harass in email. FinancialA teenager with a credit card can do major damage to their credit, or yours. You should not allow any purchases for anything on the Internet without your permission. Then it should only be done on a secure server and NEVER through email. Know What To Do:Obtain Safe Surfing ProgramsThe Family Internet Guide at About.com has reviewed them in her Guide To Filtering Software. It's Okay to Keep SecretsLet your teen know it is ok not to tell things to people on the Net. Teach them to protect their privacy, that things aren't always what they seem. Have an Internet ContractMake a behavior contract with your teenager. This will enable them to know what you expect of their behavior while online. One can be found here. Obtain a Free Email AccountDo not allow your teen to use your ISP email account for message boards, chat, or anything really. Obtain a free email account for them. These types of accounts keep the SPAM level down and do not point out where your teen lives, like a local ISP can. Report Sexual ExploitationIf someone sends you messages or images that are obscene, lewd, filthy, or indecent with the intent to harass, abuse, annoy, or threaten you, report it to your Internet service provider and the CyberTipline online or by calling 1-800-843-5678.Use Family Filters on the Search EnginesMany companies on the internet, especially the search engines, are getting into the swing of online safety for our kids. Check out your favorite search engines filtering capabilities before your teen uses it.