Tuesday, December 10, 2013

Best Practices in Social Media for 2013


Thanks to our UK colleagues in the Chartered Institute of Public Relations (CIPR) for their 2013 social media best practices guide. This free 30-page document is chock full of wisdom on the following topics:
  • definition of social media
  • dos and don'ts of social media
  • planning social media
  • legal considerations
  • security considerations
  • advice for employers
  • social media measurement 
Here is a snippet from their section on social media "dos":
  • Listen
  • Understand
  • Plan
  • Engage in conversation
  • Disclose relationships when endorsing a product, client, organization
  • Be honest about how manages social media channels
  • Determine the content approval process from the beginning
  • Be transparent
  • Be respectful
The CIPR report is a must read for anyone who studies or practices social media management.

And no, I'm not "endorsing" the CIPR. I'm just a fan of their latest best practices guide and would like to recommend it to others.

You can download a copy from CIPR's Slideshare account.






Wednesday, May 22, 2013

Content Marketing and PR Thinking Will Dominate

The Paris, France, bureau of PRNewswire published on Tuesday (May 21) an article by Publicis Groupe that contained very interesting data from a survey about social media and digital marketing.

The survey of 2,000 European marketing students conducted by the MediaSchool Group was titled “Next Generation of Marcoms.” Maurice Lévy, the chairman and CEO of Publicis Groupe, described the data as “fascinating” and added that the survey results should serve as a warning to avoid becoming complacent about social media and digital communication.

Here are some of the key findings from the survey:

  • More than 80% of students surveyed thought agencies that focus entirely on social media and digital marketing will disappear within 10 years – believing social media will turn into a communication channel for all marketers. 
  • 70% believed that content marketing and public relations thinking will soon dominate the marketing field. 
  • Corporate social responsibility will become increasingly important. 86% of students surveyed want to work for organizations that place as much value on doing work that contributes to social good as creating a profitable brand image. 
  • The most important social media channel, according to the students? Facebook. 
  • The most admired communication campaign of the last year? Red Bull Stratos. 
Read the PRNewswire story at http://ow.ly/li4jy
Obtain a .pdf copy of the survey’s full report at http://www.mediaschool.eu/NextGeneration.pdf

Publicis Groupe [Euronext Paris FR0000130577, CAC 40] is one of the world's leading communications groups. We offer the full range of services and skills: digital (DigitasLBi, Razorfish, Rosetta, VivaKi), creative services (BBH, Leo Burnett, Publicis Worldwide, Saatchi & Saatchi), public affairs, corporate communications and events (MSLGROUP), media strategy, planning and buying (Starcom MediaVest Group and ZenithOptimedia) and healthcare communications, with Publicis Healthcare Communications Group (PHCG). Present in 108 countries, the Groupe employs 58,000 professionals.

The MediaSchool Group (MSG) is one of Europe's foremost business schools specializing in the marketing communications. For more than 30 years it has taught advertising, marketing, design, PR, journalism and more recently digital communications in faculties in France, Belgium, the UK and Spain. Graduates from the MSG work in management positions in marketing agencies and in-house positions around the world.

Friday, May 10, 2013

Dealing With Primary and Secondary Sources and Self-Plagiarism in APA Style


Students often ask me how to distinguish between primary and secondary sources, and how to cite each, when writing an academic paper in American Psychological Association (APA) style. The concepts of primary and secondary sources are often misunderstood or confused by students.

This can lead to a deduction of points for non-compliance APA style, since the Publication Manual of the American Psychological Association (2010) encourages use of primary (original) sources of information and discourages use of secondary sources and citations. According to the manual, "Use secondary sources sparingly, for instance, if the original work is out of print, unavailable through usual sources, or not available in English" (p. 178)

Students also ask how to cite their own work (e.g., a paper completed in a previous course). This is a very important question. Students who are not aware of the need to cite their previous work may be be susceptible to allegations of self-plagiarism, which the APA publication manual (2010) has described as "the practice of presenting one's own previously published work as though it were new" (p. 170). Read these tips to avoid the pitfall of self-plagiarism.

I am using this blog post to provide my response to common questions about primary and secondary sources and self-plagiarism, along with supporting material from the APA publication manual. Feel free to pass along this guidance.

NOTES:
1. Keep in mind, the American Psychological Association and its publications are the only primary (original) sources of information about APA style. I support the guidance I provide in this blog post with quotes, attributions, and citations taken from my direct observations of APA sources. Hence, for me, all material in this blog represents my original work or work that I have drawn from primary sources.
2. Also keep in mind, you as a reader of this blog are one-step removed from the original source of a direct quote, attribution, or citation that I have published in this blog; and you are reading my interpretation or reproduction of the original source. Therefore, if you base your work or interpretation of APA style on any direct quotes or citations of another author's work in my blog post you are using secondary sources, since you are not reading the original source. I encourage you to use my citations to locate an original source of material and base your interpretations and scholarly work on your direct observation of the primary source.
Question 1: In our course textbook, the author used an interesting quote from another author. Can I use that quote in my paper?

There is no black and white answer to this question. The APA publication manual recommends that you use a primary (original) source of information when you cite material in your work and the manual discourages you from using a secondary source (e.g., work by one author that is cited by another author). However, you may "use secondary sources sparingly, for instance, if the original work is out of print, unavailable through usual sources, or not available in English" (APA, p. 178). Here is how to distinguish between primary and secondary sources.
Primary source. If you or one of your paper's coauthors directly observed (read) the original source of the work that you quote, paraphrase, cite, or reference then you citing a primary source. The key here is that you directly observe the source that you are citing (e.g., work by the author of a textbook). You may include this primary source (textbook) material in your work with proper attribution or citation.
Secondary source. A secondary source is one step removed from the original source. For instance, the original work of your textbook's author is a primary source since you are observing the original source of that material (e.g., the textbook). However, the quote from another source published in that textbook is, for you the reader of the textbook, a secondary source. Since you are not reading directly the original source of that quote, attribution, reference, or citation you are depending on the textbook's author to reproduce and interpret the quoted material accurately. To ensure the accuracy of the citation and understand the context of the quote or attribution you should use the textbook author's reference list to find the original source of that material and read it directly.
Examples: In the APA publication manual's (2010) Introduction section, the editors wrote,
The Publication Manual of the American Psychological Association was first published in 1929 as a seven-page "standard of procedure, to which exceptions would doubtless be necessary, but to which reference might be made in cases of doubt. (Bentley at al., 1929, p. 57)
In-Text citation of a primary source. Let's say you want to use and cite the editors' statement of fact about the publication date of the original APA manual. Since you were able to make a direct observation of this material, it becomes a primary source for your paper: "The Publication Manual of the American Psychological Association was first published in 1929" (APA, 2010, p. 3). Use the standard APA format for a reference list citation (see the example following Question 2, below.)
Now let's say that you want to use in your paper the current APA manual editors' quote from Bentley et al. (1929). The quote is a secondary source for you, since you are one-step removed from the original Bentley et al. source. You have not read the original Bentley et al. source; therefore, you are depending on the APA editors as intermediaries to reproduce and interpret the original source for you.
In-text citation of a secondary source. The APA publication manual discourages you from using or citing this secondary source. Try to find the original source, the Bentley et al. manual, read it directly, and then quote and cite it as a primary source. If you can't find the original source, you would then cite the secondary source of the Bentley quote in the APA publication manual as follows:
The original APA style manual was described by Bentley (1929) as a "standard of procedure, to which exceptions would doubtless be necessary, but to which reference might be made in cases of doubt" (as cited in American Psychological Association, 2010, p. 3).
However, since you did not read the Bentley source directly, you cite it only in text. In the reference list, you cite the source that you did read, the APA manual, but not the secondary source, Bentley, which you did not read directly. 
Question 2. Can I use material in this assignment that comes from a paper I have previously written in another course; and if so do I cite my previous paper as a primary or secondary source?

As author or co-author of your own paper, you may cite your paper as an original, primary source -- as long as you refer directly to your own material.

If you are a Marist College student, you are required to follow academic integrity policy before submitting work submitted in one course for credit in another course: "An arrangement by which work is to be submitted for credit in two or more courses must have the prior approval of the instructors involved" (see http://www.marist.edu/academics/advise/acad.html).

If you receive permission to use your previously published material, your citation would look something like this in your new paper:

Examples:
In-Text Citation from From Your Previous Work as a Primary Source:
According to Bason, Berman, Logue, Thompson, and Williams (2013), "Marist is a leader in the field of communication" (p. 2). 
Reference List Citation from Your Previous Work as a Primary Source:
Bason, M., Berman, S., Logue, M., Thompson, M., &   Williams, M. (2013). My Marist portal: Bringing a community together. Unpublished manuscript, Department of Communication, Marist College, Poughkeepsie, NY.
NOTES:
1. See the APA publication manual, Article 7.09, p. 221-212, for the reference list style of an unpublished paper from an academic institution.
2. If you wish to cite another source of course material that is not widely available (an e-mail or message to a limited distribution, a post in a discussion forum, a handout given only to students in the course, a telephone call, lecture notes, etc.) you should use the citation format for personal communication. See the APA publication manual, Article 6.19, p. 179, and the example, below:
Examples:
In-Text Citation for Personal Communication:
According to Van Dyke (personal communication, May 10, 2013), "If you wish to cite another source of course material that is not widely available ... you should use the citation format for personal communication.
or
When citing information that is not widely available, "you should use the citation format for personal communication." (M. A. Van Dyke, personal communication, May 9, 2013)
P.S. Also note the single space between the initials M. and A. The APA manual calls for one space after a period or other punctuation marks (except for a few rare exceptions). This includes an author's initials in text or reference list citations (e.g., M. A. Van Dyke, not M.A. Van Dyke), in page number citations (e.g., p. 3, not p.3), etc.
Reference List Citation for Personal Communication: According to the APA Style Manual, "Because they do not provide recoverable data, personal communications are not included in the reference list. Cite personal communications in text only" (p. 179). In other words, add to your reference list only sources of information that other readers or authors could find in a library, an online source, etc. In the case of a course paper that is not widely available or recoverable, you could use a personal communication citation when referencing its contents. Whether or not the paper is widely circulated or recoverable is a judgment call on the part of the author. However, if you are writing a new paper and wish to cite material from another source that you cited in your research paper (e.g., a direct quote), your research paper becomes a secondary source of that material -- since it is one step removed from the original source.
Since you directly observed that information when you cited it in your research paper, simply go back to the original source and quote it directly as a primary source. If you cannot find the original source and want to use your research report as the source of material, you would use a secondary citation style:

Examples:
In-Text Citation from Your Previous Work as a Secondary Source:
Rust (2005) stated that at the university level, faculty members who are in the middle of their careers can either be “allies or stubborn opponents as their institutions adjust to competitive pressures, revise programs to meet the needs of increasingly diverse students, and integrate new educational technologies" (as cited in M. Bason et al., 2013, p. 5).
NOTE: Only use the abbreviation et al. after your first citation, in which you list all authors.

Monday, May 6, 2013

How a Crisis Can Change Organizational Culture and Communication Strategy


How does a crisis change the management culture of an organization and lead it to adopt a strategy of integrated communication led by a senior leader? Use this link to listen to an audio podcast of a special online Marist College School of Communication & the Arts M.A. speaker event presented on May 1, 2013.

In this one-hour podcast, Ms. Kathy Geiger, deputy assistant director for community, education, government, and public affairs at Brookhaven National Laboratory (BNL), Long Island, N.Y., speaks about managing organizational culture and integrating communications during a crisis.

In 1989, the U.S. Environmental Protection Agency placed BNL on its National Priorities List because of problems associated with historical chemical and waste-management practices and onsite soil and groundwater contamination. In 1996 and 1997, plumes of volatile compounds and groundwater contaminated with tritium were discovered off the BNL site.

These events led to immediate and intense public outrage, which developed into sustained, active involvement by members of the surrounding communities, activist groups, elected officials, and government agencies. This series of crises, along with a sharp erosion of publics’ trust in BNL, also led Lab leaders to plan a dramatic change in the Lab’s management and communication culture.

This change has resulted in:

- a commitment from senior leaders to a two-way, integrated communication strategy that seeks to maintain public trust.

- the hiring of a senior communication manager who has a direct role in the Lab’s strategic decision making process and access to the Lab’s senior leaders.

- the allocation of resources and implementation of a communication assessment program to support excellence in communication.

Use this link to read more background about this topic.

In her current position, Ms. Geiger is responsible for developing, integrating, implementing, and assessing strategic internal and external communications along with engagement plans and programs to advance the Lab’s scientific mission. She also manages the Lab’s emergency public information program and oversees community relations, media and communications, and issues management programs. Ms. Geiger has served at Brookhaven National Laboratory for more than 20 years.

She previously worked as an editorial researcher for Newsday, a prominent daily newspaper on Long Island, N.Y.; and as a reference services librarian for the Lindenhurst Public Library in Lindenhurst, N.Y. She holds a B.A. in English from Dowling College.

Brookhaven National Laboratory is a U.S. Department of Energy laboratory founded in 1947. It is situated on 5,300 acres in the Pine Barrens of Suffolk County on Long Island, N.Y. The Laboratory’s mission is to create, operate, and make available major facilities to university, industrial, and government personnel for basic and applied research. This research extends to physics, chemistry, materials science, biology, medicine, and other scientific fields. The Laboratory has more 3,000 employees who support more than 4,000 scientists who visit Brookhaven’s large and unique facilities to conduct research each year.

This event was scheduled and organized by students and faculty in COMG 503 Media Relations, a course in Marist’s M.A. in Communication program. The event was also open to students in Marist’s M.A. in IMC program. This audio podcast is provided for anyone who was unable to attend the event.


View Larger Map Brookhaven National Laboratory

Thursday, March 28, 2013

Are You Close To Marist College?

Here is an interesting statistic about one of the graduate online classes I'm currently teaching at Marist. Students in this class are located from the U.S. East Coast to Hawaii, and from Hawaii to Nairobi, Kenya.

That means the student in Hawaii is 10,762 miles (17,320 Kilometers or 9,346 Nautical Miles) away from the student in Kenya; and it would take the student in Kenya approximately 22 hours to fly from Nairobi to have a meeting with the student in Hawaii. Obviously, such a meeting would not be very feasible.

So why does this matter? Well, given the current public debate about the value of online courses versus traditional courses, it demonstrates the value of Marist's online graduate programs in communication. Our program is accessible and affordable for students from around the world and requires no supplemental on-campus residency. Our student in Kenya is already meeting with the student in Hawaii in our online classroom, without having to travel.

These statistics also demonstrate the power of our virtual community. It takes a lot of work to be in our online classrooms -- for both students and faculty. But it's a very rewarding experience to be part of such a dedicated, collaborative, and supportive network of teachers and life-time learners. As many of our graduates will attest, we form close and lasting relationships with each other during the time spent together in our online classrooms, despite geographic separation.

Check out this map. Are you close to a Marist student or faculty member?

Saturday, March 9, 2013

Marist to Present Social Media Webinar, March 12

Chris Dessie (left) and Tim Massie
The Marist College School of Communication & the Arts will host a social media Webinar, Tuesday, March 12, 8-9 p.m. (Eastern), for students in the M.A. in IMC program. Attendance at the online-only event will be by invitation.

If you are a current M.A. in IMC student, when you receive your invitation, please RSVP as soon as possible, so any available space in the Webinar may be offered to students in Marist's M.A. in Communication program, or to prospective students interested in these programs.

If you are not in the M.A. in IMC program and would like to receive an invitation to the Webinar on a space-available basis, please go to the post about this event on Marist's M.A. in IMC Facebook Page and follow directions. You can also visit the event board for the Webinar on the M.A. in IMC Facebook Page and post a comment expressing interest.

The Webinar will feature an informal Q & A discussion with social media experts Chris Dessi and Tim Massie.

Chris is a best-selling author, thought leader, TV commentator, conference organizer, and CEO of Silverback Social. He recently appeared on Fox TV to discuss changes to Facebook's timeline.

Tim, director of giving at a global pharmaceutical company. is the former chief public affairs officer at Marist College. He helped Marist earn a national reputation for its work with social media. He, too, is a frequent contributor to major news media outlets on the topic of social media and public relations. Tim has more than 3,000 followers on Twitter (https://twitter.com/tcmassie/).

The Webinar will be recorded for later viewing by interested followers who were unable to attend. Stay tuned for more information.

Sunday, March 3, 2013

The Court of Consumer-Generated Content: Which Images Can We Use?


I engaged recently in an interesting discussion about the legal and ethical responsibilities of bloggers and authors of other kinds of social media content. This discussion, which focused on the appropriate use of images found on the World Wide Web, began with questions from graduate students in my COM610 Social Media Strategies and Tactics course, part of the M.A. in Integrated Marketing Communication in the School of Communication and the Arts at Marist College.

First, I tip my hat to the professionalism of our Marist graduate students. Without prompting from the faculty member, students in this course showed excellent insights and a strong sense of ethical and legal responsibility by raising this issue.

Second, this discussion is important and relevant to millions of people who blog, tweet pictures, post images on Facebook, design PowerPoint presentations, or otherwise present or represent copies of images and other intellectual knowledge that others have created.

I received this question from some of my graduate students, who have been assigned to blog this semester as part of a social media management assignment:
“When we are posting to our blog, many of us are using photos and even though they are being cited we technically do not have permission to use these photos. Some of us are afraid of breaking copyright laws but we also do not want to get penalized in class for not using photos. Can you shed some light on this for us?” (Personal Communication, February 27, 2013).
This is a great question. In fact, many of us violate copyright laws – knowingly or unknowingly – when we copy an image from the World Wide Web and share it. With a few simple mouse clicks we can “Copy image URL” (universal resource locator) or “Save image as” and post the link or image to our blog or other social media platform. Even though this simple process is easy, in most cases this practice is not legal. Consider the following facts related to U.S. Copyright Law and other federal regulations.

The TEACH Act (Technology, Education, and Artistic Harmonization) of 2002 allows teachers and students some latitude for displaying and discussing intellectual knowledge inside a classroom (e.g., showing a work of art like a painting, movie, or piece of literature). However, artistic works like photographs or images usually enjoy special protection under U.S. Copyright Law outside the classroom.

Yes, in an online course, the distinction between inside and outside a classroom can get fuzzy. However, inside a virtual classroom usually refers to access that is limited to students, faculty, and technicians that are enrolled in a course or involved with administration of the course.

But there are limits to what teachers and students can use; and don’t try to play the “Fair Use” trump card to share too much copyrighted material in a classroom. There is no rule to guide how much material you can use before you violate the law. According to the U.S. Copyright Office:
“Under the fair use doctrine of the U.S. copyright statute, it is permissible to use limited portions of a work including quotes, for purposes such as commentary, criticism, news reporting, and scholarly reports. There are no legal rules permitting the use of a specific number of words, a certain number of musical notes, or percentage of a work. Whether a particular use qualifies as fair use depends on all the circumstances. See FL 102, Fair Use, and Circular 21, Reproductions of Copyrighted Works by Educators and Librarians.” (U.S. Copyright Office, para. 4)
We often think nothing of sharing, retweeting, tagging, or repinning, images and information that we receive from friends on social media sites. However, consider what the U.S. Copyright Office has to say about using files obtained from peer-to-peer networks:
“Since the files distributed over peer-to-peer networks are primarily copyrighted works, there is a risk of liability for downloading material from these networks. To avoid these risks, there are currently many "authorized" services on the Internet that allow consumers to purchase copyrighted works online, whether music, ebooks, or motion pictures. By purchasing works through authorized services, consumers can avoid the risks of infringement liability and can limit their exposure to other potential risks, e.g., viruses, unexpected material, or spyware.” (U.S. Copyright Office, para. 12) 
Now, we might normally think of music or movies when we consider files from peer-to-peer networks. However, think of a “pin” from Pinterest that we receive from a friend or repin from a Pinterest board of someone we follow. It’s a file. The file is from a network of images shared by peers; and it is probably protected. 

You don’t agree? Here’s what attorney Jonathan Pink had to say about this issue during an interview on National Public Radio:
“Pinterest is no different than any other user-generated site. Perhaps it's more image-oriented than most. But for the most part, it's not terribly different. And what the law says - the Copyright Act says, with respect to the using of images that belong to other people, is pretty basic. And that is that one may not reproduce or prepare a derivative work based on or distribute copies of photographs that one doesn't own, absent those works falling into certain exceptions, fair use being one of them, public domain being another. Or unless the - in this case, Pinterest pinner - has obtained permission from the copyright owner of those images.” (National Public Radio, 2012, para. 6)
It seems Pinterest agrees with Mr. Pink, too. Read the terms of agreement you signed for when establishing your Pinterest account. First, you have agreed to be “solely responsible for … the User Content you post to Pinterest” (Pinterest, 2. Your Content, para 1).

Second, “Pinterest has adopted and implemented the Pinterest Copyright Policy in accordance with the Digital Millennium Copyright Act. For more information, please read our Copyright Policy” (Pinterest, 3.  Copyright Policy, para 1).

Third, “TO THE MAXIMUM EXTENT PERMITTED BY LAW, PINTEREST SHALL NOT BE LIABLE FOR … (C) UNAUTHORIZED ACCESS, USE OR ALTERATION OF YOUR TRANSMISSIONS OR CONTENT). IN NO EVENT SHALL PINTEREST'S AGGREGATE LIABILITY EXCEED ONE HUNDRED U.S. DOLLARS (U.S. $100.00)” (Pinterest, 9.  Limitation of Liability, para 1).

It doesn’t take a lawyer to understand what Pinterest is saying here. You pin and repin images at your own risk. If someone sues you for copyright infringement, don’t expect to “pin” responsibility on Pinterest or have it pay the damages.

Now, we could go on and on with this discussion and extend these examples to Facebook, Twitter, Flickr, blogs, etc. But in the interest of time, let’s look at what we can do on a blog or Pinterest in terms of posting or sharing images.

First, know your copyright law … and trademark law. Just because a piece of material isn’t labeled with the once ubiquitous copyright symbol (©) or trademark symbol (TM) (R) doesn’t mean it is not copyrighted. The requirement to attach © to copyrighted material was dropped by the United States when it joined the Berne Convention in 1988. Now, anything we author is considered to enjoy copyright protection as soon as we create it – with our without the © symbol.

Second, don’t assume you are authorized to use a trademarked image, just because you are working on an academic assignment or you belong to an organization that created the image. Take for example Marist College’s beloved “Shooter the Fox” mascot. Just because students and faculty are part of the “Red Fox Nation” of sports fans doesn’t entitle us to use the Fox logo without permission. Here is the official policy of the Marist College Athletics Department:
“Logo marks … were designed exclusively for the Marist Athletics Department and for those entities that have been given permission to use them…. The Marist Athletics Department does not allow these marks to be altered in any way and all logo applications must be supplied to the Marist College Associate Athletics Director for authorization and approval…. All logo marks are the property of Marist College and may be used with written permission only.” (Marist College Athletics Department, Marist Athletics Style Guide, n.d., paras. 3-4).
The same laws apply to the trademarked images and logos of major companies, with or without the trademark symbol and whether or not you are a member of that organization. Do not use these logos or symbols in your work without written permission.

Third, don’t stop using images in your social media products. Learn how to request permission from copyright owners to use an image. Refer to the U.S. Copyright Office’s Web page for information about finding and contacting copyright holders.

Or, find sources of free images that you can use legally.  You can start with Microsoft’s extensive online gallery of free clip art, photographs, and animations. Design Shack (2010) also offered the following ideas:
“Check out Stock XCHNG, a free stock photography website with tons of content (good and bad). Also, did you know you can run a Flickr Search using only creative commons licensed content? These photos are free to use and many only require attribution, which can come in the form of a simple slide thrown in at the end of your presentation with a link to the photo sources.” (para. 11)
See the Creative Commons Web site for information about the creative commons licensing system, referred to in the preceding paragraph, which allows for a range of protections and authorized use of content. 

To bring this post to a close and leave this topic open to further discussion, let me end with an observation. The laws governing how we protect and share content on the World Wide Web are subject to much debate and legal wrangling. And the ease with which new technologies enable us to copy, paste, and share images and other information from the Web has blurred the lines between what is legal and illegal.

Still, we need to sharpen our focus on these lines. And we need to err on the conservative side of declaring a line. Just think of the many lawsuits that rained down on college students a decade ago over claims by the Recording Industry Association of America (RIAA) that downloading music from peer-to-peer file sharing sites like Napster was illegal. I recall many students saying, “We’re safe. They can’t sue all of us.”

Well, RIAA didn’t have to sue everyone. A small sample of students did the trick. According to Internetlaw.com, the RIAA filed civil suits against four students at Princeton University, Michigan Technological University, and Rensselaer Polytechnic Institute.
"RIAA alleged that students made between 27,000 and a million songs available through their universities’ networks. The music industry also contended that statistics indicated that nearly 50 percent of the available computer resources at some universities were being used for unauthorized copying and distribution of copyrighted material. These cases were settled; defendants paid damages reported to range from $12,500 to $17,000." (Internetlaw.com, para. 2)
But playing it safe and staying legal doesn’t mean we cannot continue to communicate on social media through words, images, and sounds that are not of our own making. You should continue to create and innovate. Just stop before you communicate, learn or review the rules, and play by them.

Note: All images in this blog post came from Microsoft Office's gallery of free clip art, photos, and animations.

Wednesday, February 27, 2013

To Tell, or Not To Tell? A Question of Cybersecurity


I am currently teaching two fully-online graduate courses in Marist College's master's program in integrated marketing communication. One of the courses is COMI 610 Social Media Strategies and Tactics. This week, COMI 610 students and I have been reading about and discussing a variety of topics related to privacy and security in social media and other forms of Internet or computer-mediated communication. 

We have been having a fascinating exchange of information and ideas about this topic on Facebook, Twitter, Pinterest, and our own course Web site. Here is the latest issue in this interesting series of news and feature stories: the question of whether or not organizations (especially publicly-traded companies) have a legal, or at least moral, obligation to report cyberattacks (e.g., hacking) against them.

According to The New York Times, "Apart from a few companies like Google, which revealed that Chinese hackers had tried to read its users’ e-mail messages, American companies have been disturbingly silent about cyberattacks on their computer systems" ("An Eerie Silence on Cybersecurity," Editorial, February 26, 2013).



Apparently, there is a silent majority of organizations in this country and elsewhere that remain mum about the constant cyberattacks (hacking) against them. The rationale seems to be "fear that this disclosure will unnerve customers and shareholders and invite lawsuits and unwanted scrutiny from the government" ("An Eerie Silence on Cybersecurity," para. 1).

Protecting information about cyberattacks might be sensible if you are investigating the crimes and want to avoid tipping your hand to the bad guys that you might be on their trail. On the other hand, witholding information from shareholders could be a crime itself. In the United States, state and federal agencies mandate the reporting of breaches in personal information security.

For instance, the U.S. Securities and Exchange Commission has reminded organizations registered with the SEC of their obligations to provide the public with information about cybersecurity risks and cyberattacks:
The federal securities laws, in part, are designed to elicit disclosure of timely, comprehensive, and accurate information about risks and events that a reasonable investor would consider important to an investment decision. (Division of Corporate Finance, U.S. SEC, CF Disclosure Guidance: Topic No. 2, Cybersecurity, Oct. 18, 2011, para. 7). 
Furthermore, U.S. private and public institutions have over our nation's history assumed a social responsibility to provide audiences with accurate and timely information on matters of public interest. Ivy Ledbetter Lee, often called "the father of public relations" in the United States, stated at the turn of the 20th century his concept of public relations: 
In brief, our plan is frankly, and openly, on behalf of business concerns and public institutions, to supply the press and public of the United States prompt and accurate information concerning subjects which it is of value and interest to the public to know about. (Ivy Lee, Declaration of Principles, 1906, para. 5)
The U.S. Department of Defense, like many other federal agencies, also advocates a free flow of information, constrained only by the need to protect operational security and the safety of DoD personnel and their families. According to DoD principles of information, like the principles of Ivy Lee, the defense department has an obligation to
Ensure a free flow of news and information to the news media, the general public, the
internal audiences of the Department of Defense, and the other applicable forums, limited only by the security restraints. (DoD Directive 5122.05, 2008, Responsibilities and Functions, para. d.)
In fact, the U.S. Department of Defense strictly prohibits the witholding of information solely for purposes of avoiding embarrassment or criticism. The DoD information principles state clearly, "Information will be withheld only when disclosure would adversely affect national security, threaten the safety or privacy of the men and women of the Armed Forces, or if otherwise authorized by statute or regulation. (DoD Directive 5122.05, 2008, Enclosure 2, para. d.)

I support The New York Times' position that withholding public (versus legitimately classified) information about cyberattacks undermines the public trust in our nation's institutions and weakens our security. By disclosing information about cyber attacks, organizations can keep publics informed while also sharing valuable information with other organizations who might be under attack. Such information sharing and collaboration might actually strengthen security and prevent against future attacks. 

And in a profession that acknowledges "perceptions are reality," public relations officials for organizations should remind their executives that protecting the public trust is every bit as important as protecting against cyberattacks. Even if a company succeeds in fending off a cyberattack and withholding this information from its publics, in the end the organization will lose valuable trust if it tries to avoid embarrassment or criticism by creating a false perception of security. 

True security comes in the form of trust -- or perceptions that are based on reality. Trust is based in part on our confidence that an organization will do what it says it will do when a) it safeguards our interests and b) tells us when our interests are threatened. 

It's time for organizations to heed Ivy Ledbetter Lee's century-old advice and provide their publics with prompt and accurate information on matters that are of "value and interest" to us. Draw a sharp line between matters that are truly security threats and other matters that are simply risks of embarrassment or criticism. 

ADM Leighton W. Smith, Jr.
As one of my former military commanders once told me, with regard to military public information obligations to journalists and publics, "Tell them, and tell them now, unless it poses a risk to our operational security or the safety of my men and women." (U.S. Navy Admiral Leighton W. Smith, Jr., personal communication, December 1995, preparing to deploy to Bosnia-Herzegovina with NATO forces in Operation Joint Endeavour).

Thursday, January 10, 2013

Speak to Your Apple Mac: Enable Dictation in OS X


I recently purchased an Apple iMac for my professional use at home. A dedicated PC user for my entire adult life, I finally tired of battling frequent viruses, blue screens, hardware and software glitches, and a once superb Dell Support program that is sadly in decline in terms of customer service. 

I am extremely pleased with my iMac so far, but as a novice Mac user I go through daily learning experiences trying to figure out the differences between my old PC and new Mac. It's been fun, though, discovering the seemingly endless array of tools, apps, widgets, and resources -- some that are hard to find.

Each Thursday is a special training day for me. My Thursday edition of The New York Times arrives with its weekly "Personal Tech" section. Reading today's "Gadget Wise" column, I learned about the Dictation tool that comes standard with Apple's OS X Mountain Lion operating system. Unfortunately, the factory-installed system comes with Dictation disabled. So, if you know that it even exists and where to find it you have to enable it. 

Follow these simple steps on your OS X Mac and you, too, can talk to your Mac: speak instead of type characters, numbers, words, sentences, paragraphs, and even entire pages of text into Word, Mail, Messages, search and text boxes on Web sites, etc. Your words magically appear, right where you want them!


1. Click the Apple icon  in the upper-right corner of the tool bar at the top of your screen.
2. Click System Preferences.
















3. On the System Preferences display, click Dictation and Speech, under System (fourth row of icons).














4. Toggle from the Off to the On radio button next to Dictation.

NOTE: You can also select Edit on the toolbar of any application you have running and click Start Dictation. See the image below.












Now that you have enabled dictation you are ready to talk to your Mac. Simply place your cursor in the desired text box or page location on your screen and double-click the Function button (fn) on your keyboard. The dictation icon will appear and start to record sound. Speak into your Mac's microphone and, when finished, click the Done button on the Dictation icon.

I hope this helps. Have fun conversing with your Mac! For more help with Dictation, go to Apple's Support site for Mac Basics: Dictation.

Mark

P.S. I used Dictation on my Mac to insert the last three paragraphs of this post. Neat stuff!