If your company is business-to-business (B2B), your digital marketing efforts are likely to be centered around online lead generation, with the end goal being for someone to speak to a salesperson. For that reason, the role of your marketing strategy is to attract and convert the highest quality leads for your salespeople via your website and supporting digital channels.

In general, social networks are self-organizing, emergent, and complex, such that a globally coherent pattern appears from the local interaction of the elements that make up the system.[32][33] These patterns become more apparent as network size increases. However, a global network analysis[34] of, for example, all interpersonal relationships in the world is not feasible and is likely to contain so much information as to be uninformative. Practical limitations of computing power, ethics and participant recruitment and payment also limit the scope of a social network analysis.[35][36] The nuances of a local system may be lost in a large network analysis, hence the quality of information may be more important than its scale for understanding network properties. Thus, social networks are analyzed at the scale relevant to the researcher's theoretical question. Although levels of analysis are not necessarily mutually exclusive, there are three general levels into which networks may fall: micro-level, meso-level, and macro-level.
IFTTT stands for If This Then That. It's a tool that actually lets you build your very own automated actions, called "recipes," so that you don't have to do them yourself. For example, if you want all of your Instagram photos automatically saved to a public folder of your Dropbox account, you can do that by building a recipe with IFTTT so you never have do it manually.
My daughter went on Omegle after seeing it used on a YouTube video - the video showed the chat was safe- a tween talking to two young kids. My daughter's experience was much worse. Despite the numerous warnings on the initial page -she went right in and started to find people to chat with. She smartly had her camera off -but found no one would chat with her. So she turned it on - showing only below her neck. Sure enough - someone started chatting to her. He (using typing only) asked her to stand up and turn around - she did that - and he promptly threatened her -" I have taken a photo of your butt (she was fully clothed) and your face (not sure if that was possible) and I will put them onto social media and will embarrass you if you don't do what I say..." she promptly shut it down and came down in tears. We alerted the local police and reported the incident -which they fully supported. This is NOT a site for anyone but ADULTS. Despite many warnings and much education about this type of site - my daughter ignored everything for the chance of chatting and feeling that 'she belonged and was popular'. Such a hard thing to parent around. 

In general, social networks are self-organizing, emergent, and complex, such that a globally coherent pattern appears from the local interaction of the elements that make up the system.[32][33] These patterns become more apparent as network size increases. However, a global network analysis[34] of, for example, all interpersonal relationships in the world is not feasible and is likely to contain so much information as to be uninformative. Practical limitations of computing power, ethics and participant recruitment and payment also limit the scope of a social network analysis.[35][36] The nuances of a local system may be lost in a large network analysis, hence the quality of information may be more important than its scale for understanding network properties. Thus, social networks are analyzed at the scale relevant to the researcher's theoretical question. Although levels of analysis are not necessarily mutually exclusive, there are three general levels into which networks may fall: micro-level, meso-level, and macro-level.
This journal has partnered with Heliyon, an open access journal from Elsevier publishing quality peer reviewed research across all disciplines. Heliyon’s team of experts provides editorial excellence, fast publication, and high visibility for your paper. Authors can quickly and easily transfer their research from a Partner Journal to Heliyon without the need to edit, reformat or resubmit.
In the study of literary systems, network analysis has been applied by Anheier, Gerhards and Romo,[55] De Nooy,[56] and Senekal,[57] to study various aspects of how literature functions. The basic premise is that polysystem theory, which has been around since the writings of Even-Zohar, can be integrated with network theory and the relationships between different actors in the literary network, e.g. writers, critics, publishers, literary histories, etc., can be mapped using visualization from SNA.
In the 1990s, the term Digital Marketing was first coined,.[10] With the debut of server/client architecture and the popularity of personal computers, the Customer Relationship Management (CRM) applications became a significant part of marketing technology.[citation needed] Fierce competition forced vendors to include more service into their software, for example, marketing, sales and service applications. Marketers were also able to own huge online customer data by eCRM software after the Internet was born. Companies could update the data of customer needs and obtain the priorities of their experience. This led to the first clickable banner ad being going live in 1994, which was the "You Will" campaign by AT&T and over the first four months of it going live, 44% of all people who saw it clicked on the ad.[11]
If you don't want to pay for Tweetbot but don't like the official Twitter app either, then another good alternative is Twitterrific. You'll get chronological timelines with no ads, support for lists, mute filters for keywords and phrases, and plenty of customization options, like theming. Twitterrific also has multi-image support, and it's available on both your iPhone and iPad. Plus, it's free, with a tip jar if you choose to support the developers.
This course builds on the theory and foundations of marketing analytics and focuses on practical application by demystifying the use of data in marketing and helping you realize the power of visualizing data with artful use of numbers found in the digital space. This course is part of the iMBA offered by the University of Illinois, a flexible, fully-accredited online MBA at an incredibly competitive price. For more information, please see the Resource page in this course and onlinemba.illinois.edu.
In the study of literary systems, network analysis has been applied by Anheier, Gerhards and Romo,[55] De Nooy,[56] and Senekal,[57] to study various aspects of how literature functions. The basic premise is that polysystem theory, which has been around since the writings of Even-Zohar, can be integrated with network theory and the relationships between different actors in the literary network, e.g. writers, critics, publishers, literary histories, etc., can be mapped using visualization from SNA.
Kids might make poor decisions to gain popularity. Because it's live video, kids can do or say anything and can respond to requests from viewers -- in real time. Though there seems to be moderation around iffy content (kids complain about having accounts suspended "for nothing"), there's plenty of swearing and occasional sharing of personal information with anonymous viewers.
Collaborative Environment: A collaborative environment can be set up between the organization, the technology service provider, and the digital agencies to optimize effort, resource sharing, reusability and communications.[36] Additionally, organizations are inviting their customers to help them better understand how to service them. This source of data is called User Generated Content. Much of this is acquired via company websites where the organization invites people to share ideas that are then evaluated by other users of the site. The most popular ideas are evaluated and implemented in some form. Using this method of acquiring data and developing new products can foster the organizations relationship with their customer as well as spawn ideas that would otherwise be overlooked. UGC is low-cost advertising as it is directly from the consumers and can save advertising costs for the organisation.
Who would have thought this was the history of Facebook? well - I'm sure it's heavily dramatized. The director did an amazing job here as did the main cast. The music by Trent Reznor and Atticus Ross set the tone so well (and is great music to work out to, incidentally). As I'm sure facebook will be around for a long time, so too will the legacy of this movie.
My name is Jamie Spencer and I have spent the past 5 years building money making blogs. After growing tired of the 9-5, commuting and never seeing my family I decided that I wanted to make some changes and launched my first blog. Since then I have launched lots of successful niche blogs and after selling my survivalist blog I decided to teach other people how to do the same.
Owned by the tech giant Alphabet (Google), this interest-based social networking platform enables you to stay in touch with people by sharing messages, photos, videos, useful links to sites and so on. It also extends support for video conferencing through Hangouts and allows businesses to promote their brands and products through Google+ business pages.
Digital media is so pervasive that consumers have access to information any time and any place they want it. Gone are the days when the messages people got about your products or services came from you and consisted of only what you wanted them to know. Digital media is an ever-growing source of entertainment, news, shopping and social interaction, and consumers are now exposed not just to what your company says about your brand, but what the media, friends, relatives, peers, etc., are saying as well. And they are more likely to believe them than you. People want brands they can trust, companies that know them, communications that are personalized and relevant, and offers tailored to their needs and preferences.
The field of sociology focuses almost entirely on networks of outcomes of social interactions. More narrowly, economic sociology considers behavioral interactions of individuals and groups through social capital and social "markets". Sociologists, such as Mark Granovetter, have developed core principles about the interactions of social structure, information, ability to punish or reward, and trust that frequently recur in their analyses of political, economic and other institutions. Granovetter examines how social structures and social networks can affect economic outcomes like hiring, price, productivity and innovation and describes sociologists' contributions to analyzing the impact of social structure and networks on the economy.[51]
To create an effective DMP, a business first needs to review the marketplace and set 'SMART' (Specific, Measurable, Actionable, Relevant and Time-Bound) objectives.[60] They can set SMART objectives by reviewing the current benchmarks and key performance indicators (KPIs) of the company and competitors. It is pertinent that the analytics used for the KPIs be customised to the type, objectives, mission and vision of the company.[61][62]
Also, sooo much of social media is being used for political propagandizing & pushing political interests – especially on fb – that it’s turned me off, temporarily. Is there a vehicle on these platforms that allows one to only get notifications on specific topics, say if I was to use it for biz marketing, only seeing those posts but have the ability to pull up ALL other posts, if want to? Lastly, can the comment section come first before having to scroll down on all 90 odd comments -i. e. is there a way to ‘fast forward’ thru them when one wishes to just make a comment?
While working at a Fortune 100 company for nine years before moving to lead my current team, I became fascinated by customer behavior. What kinds of digital offerings most deeply engage customers in their digital lives? I started by looking at some case studies of the products, services, communications and experiences that had been embraced and adopted by customers during the first two decades of the internet. Over a period of seven years working on inbound marketing campaigns, what I found was a recurring pattern of three behaviors that drove the adoption of new digital experiences, which I call the three core behaviors of a network:
It would be great to also supplement this list with some kind of statistics regarding the audience, who is using each of these social networks. This statistics could be valuable for different kind of marketers, bloggers or business owners because with such statistics it would be possible to plan a strategy for business in different niches, like e-commerce, paper help online, any kind of services, or use it for the purpose of self-promotions for bloggers/website owners.
Randomly distributed networks: Exponential random graph models of social networks became state-of-the-art methods of social network analysis in the 1980s. This framework has the capacity to represent social-structural effects commonly observed in many human social networks, including general degree-based structural effects commonly observed in many human social networks as well as reciprocity and transitivity, and at the node-level, homophily and attribute-based activity and popularity effects, as derived from explicit hypotheses about dependencies among network ties. Parameters are given in terms of the prevalence of small subgraph configurations in the network and can be interpreted as describing the combinations of local social processes from which a given network emerges. These probability models for networks on a given set of actors allow generalization beyond the restrictive dyadic independence assumption of micro-networks, allowing models to be built from theoretical structural foundations of social behavior.[42]
In many organizations, members tend to focus their activities inside their own groups, which stifles creativity and restricts opportunities. A player whose network bridges structural holes has an advantage in detecting and developing rewarding opportunities.[48] Such a player can mobilize social capital by acting as a "broker" of information between two clusters that otherwise would not have been in contact, thus providing access to new ideas, opinions and opportunities. British philosopher and political economist John Stuart Mill, writes, "it is hardly possible to overrate the value ... of placing human beings in contact with persons dissimilar to themselves.... Such communication [is] one of the primary sources of progress."[64] Thus, a player with a network rich in structural holes can add value to an organization through new ideas and opportunities. This in turn, helps an individual's career development and advancement.

Digital marketing is defined by the use of numerous digital tactics and channels to connect with customers where they spend much of their time: online. From the website itself to a business's online branding assets -- digital advertising, email marketing, online brochures, and beyond -- there's a spectrum of tactics that fall under the umbrella of "digital marketing."


While working at a Fortune 100 company for nine years before moving to lead my current team, I became fascinated by customer behavior. What kinds of digital offerings most deeply engage customers in their digital lives? I started by looking at some case studies of the products, services, communications and experiences that had been embraced and adopted by customers during the first two decades of the internet. Over a period of seven years working on inbound marketing campaigns, what I found was a recurring pattern of three behaviors that drove the adoption of new digital experiences, which I call the three core behaviors of a network:
Prioritizing clicks refers to display click ads, although advantageous by being ‘simple, fast and inexpensive’ rates for display ads in 2016 is only 0.10 percent in the United States. This means one in a thousand click ads are relevant therefore having little effect. This displays that marketing companies should not just use click ads to evaluate the effectiveness of display advertisements (Whiteside, 2016).[42]
A disadvantage of digital advertising is the large amount of competing goods and services that are also using the same digital marketing strategies. For example, when someone searches for a specific product from a specific company online, if a similar company uses targeted advertising online then they can appear on the customer's home page, allowing the customer to look at alternative options for a cheaper price or better quality of the same product or a quicker way of finding what they want online.
That new app Down to Lunch is a new bad one its for sex trafficking it texts you and tell you your friends have invited you when they actually have no idea what the app even is. When you download it and signup it asks you for your address, and all your personal info. I know I got a text coming out of Atlanta Georgia that told me to sign up. So they already have our numbers! So all you parents warn your kids about this app!! 

The criteria and metrics can be classified according to its type and time span. Regarding the type, we can either evaluate these campaigns "Quantitatively" or "Qualitatively". Quantitative metrics may include "Sales Volume" and "Revenue Increase/Decrease". While qualitative metrics may include the enhanced "Brand awareness, image and health" as well as the "relationship with the customers".


It is increasingly advantageous for companies to use social media platforms to connect with their customers and create these dialogues and discussions. The potential reach of social media is indicated by the fact that in 2015, each month the Facebook app had more than 126 million average unique users and YouTube had over 97 million average unique users.[27]
Digital marketing is the use of the internet, mobile devices, social media, search engines, display advertising and other channels to reach consumers. As a subset of traditional marketing, digital marketing goes beyond the internet to include Short Message Service (SMS), Simple Notification Service (SNS), search engine optimization (SEO), electronic or interactive billboards and other online ads (such as banner ads) to promote products and services. Some marketing experts consider digital marketing to be an entirely new endeavor that requires a new way of approaching customers and new ways of understanding how customers behave compared to traditional marketing.
Why Facebook decided to remove access to your messages from the official app is a mystery that we're all still trying to solve. But still, if you chat with your Facebook friend often, then Messenger is a must-have. The app lets you send messages to your friends or create group chats, and it's also a way to reach out to businesses directly. Messenger also includes access to stickers, GIFs, voice and video calls, and you can even pay people directly through Messenger.
In the 2000s, with more and more Internet users and the birth of iPhone, customers started searching products and making decisions about their needs online first, instead of consulting a salesperson, which created a new problem for the marketing department of a company. In addition, a survey in 2000 in the United Kingdom found that most retailers had not registered their own domain address.[12] These problems made marketers find the digital ways for market development.
There has been research that both substantiates and refutes the benefits of information brokerage. A study of high tech Chinese firms by Zhixing Xiao found that the control benefits of structural holes are "dissonant to the dominant firm-wide spirit of cooperation and the information benefits cannot materialize due to the communal sharing values" of such organizations.[66] However, this study only analyzed Chinese firms, which tend to have strong communal sharing values. Information and control benefits of structural holes are still valuable in firms that are not quite as inclusive and cooperative on the firm-wide level. In 2004, Ronald Burt studied 673 managers who ran the supply chain for one of America's largest electronics companies. He found that managers who often discussed issues with other groups were better paid, received more positive job evaluations and were more likely to be promoted.[48] Thus, bridging structural holes can be beneficial to an organization, and in turn, to an individual's career.
Testimonials. If case studies aren't a good fit for your business, having short testimonials around your website is a good alternative. For B2C brands, think of testimonials a little more loosely. If you're a clothing brand, these might take the form of photos of how other people styled a shirt or dress, pulled from a branded hashtag where people can contribute.
Complex networks: Most larger social networks display features of social complexity, which involves substantial non-trivial features of network topology, with patterns of complex connections between elements that are neither purely regular nor purely random (see, complexity science, dynamical system and chaos theory), as do biological, and technological networks. Such complex network features include a heavy tail in the degree distribution, a high clustering coefficient, assortativity or disassortativity among vertices, community structure (see stochastic block model), and hierarchical structure. In the case of agency-directed networks these features also include reciprocity, triad significance profile (TSP, see network motif), and other features. In contrast, many of the mathematical models of networks that have been studied in the past, such as lattices and random graphs, do not show these features.[45] 

YouTube is the world’s largest video-sharing social networking site that enables users to upload and share videos, view them, comment on them and like them. This social network is accessible across the globe and even enables users to create a YouTube channel where they can upload all their personally recorded videos to showcase to their friends and followers.
In order to engage customers, retailers must shift from a linear marketing approach of one-way communication to a value exchange model of mutual dialogue and benefit-sharing between provider and consumer.[21] Exchanges are more non-linear, free flowing, and both one-to-many or one-on-one.[5] The spread of information and awareness can occur across numerous channels, such as the blogosphere, YouTube, Facebook, Instagram, Snapchat, Pinterest, and a variety of other platforms. Online communities and social networks allow individuals to easily create content and publicly publish their opinions, experiences, and thoughts and feelings about many topics and products, hyper-accelerating the diffusion of information.[22]
Now imagine you had that brochure on your website instead. You can measure exactly how many people viewed the page where it's hosted, and you can collect the contact details of those who download it by using forms. Not only can you measure how many people are engaging with your content, but you're also generating qualified leads when people download it.

It would be great to also supplement this list with some kind of statistics regarding the audience, who is using each of these social networks. This statistics could be valuable for different kind of marketers, bloggers or business owners because with such statistics it would be possible to plan a strategy for business in different niches, like e-commerce, paper help online, any kind of services, or use it for the purpose of self-promotions for bloggers/website owners.
Now imagine you had that brochure on your website instead. You can measure exactly how many people viewed the page where it's hosted, and you can collect the contact details of those who download it by using forms. Not only can you measure how many people are engaging with your content, but you're also generating qualified leads when people download it.
My daughter went on Omegle after seeing it used on a YouTube video - the video showed the chat was safe- a tween talking to two young kids. My daughter's experience was much worse. Despite the numerous warnings on the initial page -she went right in and started to find people to chat with. She smartly had her camera off -but found no one would chat with her. So she turned it on - showing only below her neck. Sure enough - someone started chatting to her. He (using typing only) asked her to stand up and turn around - she did that - and he promptly threatened her -" I have taken a photo of your butt (she was fully clothed) and your face (not sure if that was possible) and I will put them onto social media and will embarrass you if you don't do what I say..." she promptly shut it down and came down in tears. We alerted the local police and reported the incident -which they fully supported. This is NOT a site for anyone but ADULTS. Despite many warnings and much education about this type of site - my daughter ignored everything for the chance of chatting and feeling that 'she belonged and was popular'. Such a hard thing to parent around.
My eldest would chat to her friends every minute of every evening in parallel to life at home if allowed. They use What's App. Do you know how well managed this app is? Her other favourite site is Pinterest. I spoke to her and explained why I don't want her to use Tumblr or Facebook but one of the reasons I gave for not having a Facebook account was that she sees her friends at school every day, it's best for family overseas or people you don't see very often. She accepted that but the same could apply to a What's App. I don't think I would stop her using What's App cos she frequently shares the exchanges she has with friends with me and it's useful for communicating when they're doing homework, but sometimes I feel she is living her life in several alternate realities and sharing every minute of her friends' angst, fangirl hysteria and with some friends their loneliness. At the weekend I often take her iPod Touch off her and she participates fully in family life - still, only just a teenager!
The University of Illinois at Urbana-Champaign is a world leader in research, teaching and public engagement, distinguished by the breadth of its programs, broad academic excellence, and internationally renowned faculty and alumni. Illinois serves the world by creating knowledge, preparing students for lives of impact, and finding solutions to critical societal needs.
Complex networks: Most larger social networks display features of social complexity, which involves substantial non-trivial features of network topology, with patterns of complex connections between elements that are neither purely regular nor purely random (see, complexity science, dynamical system and chaos theory), as do biological, and technological networks. Such complex network features include a heavy tail in the degree distribution, a high clustering coefficient, assortativity or disassortativity among vertices, community structure (see stochastic block model), and hierarchical structure. In the case of agency-directed networks these features also include reciprocity, triad significance profile (TSP, see network motif), and other features. In contrast, many of the mathematical models of networks that have been studied in the past, such as lattices and random graphs, do not show these features.[45]
Honestly, there's good and bad in anything the world throws at us. And Social Media is no exception. First of all, most social media (including Facebook) users have to be at least 13 to even sign up so there's no reason for "tweens" to be on them at all. That being said I've noticed that tweens that ignore the rules aren't very familiar with what's not acceptable. Most social media platforms are supposed to be only available for 13+ because the Internet is in fact a scary place and most children don't know how to use the Internet responsibly until their 13 or 14. On another note, I think it's important that parents are aware of what goes on on social media, however, unless you're child is under the age of 14 it's not acceptable to monitor everything and creep on their page and check their phone because even though you do have the right to know what's going on, your child is now a teenager, their probably in high school and they need "privacy". Always checking what their doing will more than likely result in you losing their trust because Parents, you don't need to know every single thing. If you're child is old enough to have a their own phone and almost finished with school, their old enough to have a private life. And I will be blunt when I say this, if you monitor your teenagers social media they will do at least one of the following: block you, make their account private, or make a new account that you won't find. And they won't do it because they're hiding something, they'll do it because they need space. Social Media is only dangerous when people don't know how to use it and regardless of how hard parents try to " protect" their children, it's ultimately up to the child to protect themselves. Their is a block button and privacy settings for a reason. Only the user can control it. And a tip for parents: not letting your child use social media when they ask to will only make them ignorant to it. This generation... My generation and the generation after me, we're growing up in the digital age and if you don't let your kid learn now it's going to take a while for them to get caught up later. Social Media is always changing and it's just part of our culture now. It's not dangerous unless you let it be.
Social networking apps are going to grow even bigger as people adopt them into their everyday lives. Here we have listed the mobile-first social media platforms. But the Facebook mobile app would dominate this list with 1.37 billion monthly active users. As smartphones’ adoption continues, the share of the desktop use of social media platforms will fall .

Word of mouth communications and peer-to-peer dialogue often have a greater effect on customers, since they are not sent directly from the company and are therefore not planned. Customers are more likely to trust other customers’ experiences.[22] Examples can be that social media users share food products and meal experiences highlighting certain brands and franchises. This was noted in a study on Instagram, where researchers observed that adolescent Instagram users' posted images of food-related experiences within their social networks, providing free advertising for the products.[26]
Unlike most offline marketing efforts, digital marketing allows marketers to see accurate results in real time. If you've ever put an advert in a newspaper, you'll know how difficult it is to estimate how many people actually flipped to that page and paid attention to your ad. There's no surefire way to know if that ad was responsible for any sales at all.
Organizations: Formal organizations are social groups that distribute tasks for a collective goal.[40] Network research on organizations may focus on either intra-organizational or inter-organizational ties in terms of formal or informal relationships. Intra-organizational networks themselves often contain multiple levels of analysis, especially in larger organizations with multiple branches, franchises or semi-autonomous departments. In these cases, research is often conducted at a workgroup level and organization level, focusing on the interplay between the two structures.[40] Experiments with networked groups online have documented ways to optimize group-level coordination through diverse interventions, including the addition of autonomous agents to the groups.[41] 

Digital marketing became more sophisticated in the 2000s and the 2010s, when[13][14] the proliferation of devices' capable of accessing digital media led to sudden growth.[15] Statistics produced in 2012 and 2013 showed that digital marketing was still growing.[16][17] With the development of social media in the 2000s, such as LinkedIn, Facebook, YouTube and Twitter, consumers became highly dependent on digital electronics in daily lives. Therefore, they expected a seamless user experience across different channels for searching product's information. The change of customer behavior improved the diversification of marketing technology.[18]
This is the behemoth of social networks, and pretty much everyone and their mother (literally) uses it. With the official Facebook app, you'll gain access to your News Feed, where you can view the updates of friends and family, as well as any Pages and Groups you follow. Links open up in the built-in browser, and you can make any edits to your profile and pages on-the-go from here. It's the quintessential app, though it may drain your battery throughout the day (you've been warned).
Thanks for this list, but I think you need to update your review of Kik Messenger. You mention just one app within Kik Oink? Kik Messenger has over 400 "cards" or apps available to connect to your Kik app. You get to these apps through the Kik app from the slide out window in the app, or from under the message window. None of these apps are verified by either Google Play or iTunes, and many are plain and simply hook up apps. Also you will find that most kids make up names for Kik, It's not correct to say that they have a real name policy they don't. You can also use Kik without verifying your email address, so it's easy for people to make up an email address to hide your identity. The privacy settings in Kik don't block contact from strangers, or effectively hide new messages from strangers. Messages from new contacts or strangers are placed in the main message window at the bottom, by turning on the 2 privacy settings, "Message Preview" and "Notify for New People" all that does, is place a message from a stranger or new contact, in the main message window, but blurrs the profile picture and any photo they may send. If you then click on the message to find out if it's a friend...as so many kids make up user names it could be, it reveals the picture and clicking accept reveals the profile picture. There are many reports of strangers and Porn Bots sending kids porn pictures as way of first introduction. And increasing reports of predators using Kik Messenger to extort nude photos from kids. There are many websites set up, that have collected user names and profiles on Kik and advertise them by category, girl or boy, ages etc... Kik Messenger is also rated 17+ on the app stores. Please update the review of Kik. This is one very dangerous app.
The digital revolution has led to a titanic shift in the landscape of the marketing communication, while also creating new opportunities for businesses to reach and engage consumers through smart, social, and mobile media technologies. In this course, you will learn about the impacts of digital technologies on marketing communication strategies and practices. By understanding the underlying processes of marketing communication and the core features of new media technologies, you can strategically select the appropriate channels to deliver the right marketing message to the right audience at the right moment.
The best social media apps offer a range of solutions that can help you easily organize multiple accounts and share information across several social networks without ever needing to post anything separately to your accounts directly from the web. Although many of the features, layouts, and intuitiveness differ across each app, they all get the job done when you choose the right one that matches your current social presence and marketing strategy.
Just to give you an opinion from a teens point of view: I am 14 and I use most of these. And most of them can only be dangerous if your child is looking for danger. On Snapchat, you could be harmlessly sending pictures to your friends. In settings it gives you the option to only recieve pictures from people that you add on snapchat. Out of all of these I think instagram is the least dangerous. Like I said before you are only going to find danger if you're looking for it. You can make your page private so people must request to follow you. And you will only see other people's photos whom you follow. Out of all of these I use Twitter and Tumblr the most. On tumblr, you only see content from the blogs you follow so your child should not be following any blogs that are posting Pornographic images anyway and same with twitter. Oovoo is not bery dangerous either because you can only video chat and message people if they add you and you also add them so just make sure your kid isn't adding anyone they don't know. Omegle is really just a TERRIBLE website. Even on the safe chat people are still naked and I don't use that website at all. I LOVE VINE. Many of the 6 second videos are hilarious. I guess I would say the only problem is language. But if someone swears a lot in their vines or does something you don't like then your teen should not follow them. And of course, ***YOU CAN ALWAYS MONITOR THEIR SOCIAL MEDIAS*** Just follow them on twitter, instagram, tumblr, add them on facebook etc. You will be able to see anything they post. Unless they block you. But if they do block you, you could just take all their social media away!! CONGRAYS IF YOU READ THIS UNTIL THE END BC THIS IS SO LONG!
In general, social networks are self-organizing, emergent, and complex, such that a globally coherent pattern appears from the local interaction of the elements that make up the system.[32][33] These patterns become more apparent as network size increases. However, a global network analysis[34] of, for example, all interpersonal relationships in the world is not feasible and is likely to contain so much information as to be uninformative. Practical limitations of computing power, ethics and participant recruitment and payment also limit the scope of a social network analysis.[35][36] The nuances of a local system may be lost in a large network analysis, hence the quality of information may be more important than its scale for understanding network properties. Thus, social networks are analyzed at the scale relevant to the researcher's theoretical question. Although levels of analysis are not necessarily mutually exclusive, there are three general levels into which networks may fall: micro-level, meso-level, and macro-level.

The development of digital marketing is inseparable from technology development. One of the key points in the start of was in 1971, where Ray Tomlinson sent the very first email and his technology set the platform to allow people to send and receive files through different machines.[8] However, the more recognisable period as being the start of Digital Marketing is 1990 as this was where the Archie search engine was created as an index for FTP sites. In the 1980s, the storage capacity of computer was already big enough to store huge volumes of customer information. Companies started choosing online techniques, such as database marketing, rather than limited list broker.[9] This kind of databases allowed companies to track customers' information more effectively, thus transforming the relationship between buyer and seller. However, the manual process was not so efficient.
Skype, owned by Microsoft, is one of the most popular communication-based social networking platforms. It allows you to connect with people through voice calls, video calls (using a webcam) and text messaging. You can even conduct group conference calls. And, the best part is that Skype-to-Skype calls are free and can be used to communicate with anyone, located in any part of the world, over the internet.
Complex networks: Most larger social networks display features of social complexity, which involves substantial non-trivial features of network topology, with patterns of complex connections between elements that are neither purely regular nor purely random (see, complexity science, dynamical system and chaos theory), as do biological, and technological networks. Such complex network features include a heavy tail in the degree distribution, a high clustering coefficient, assortativity or disassortativity among vertices, community structure (see stochastic block model), and hierarchical structure. In the case of agency-directed networks these features also include reciprocity, triad significance profile (TSP, see network motif), and other features. In contrast, many of the mathematical models of networks that have been studied in the past, such as lattices and random graphs, do not show these features.[45]

Maybe you know the top 3 or even the top 5 social networking sites, but do you know what’s happening behind them? We maintain the list of top 15 most popular social networking worldwide. New social media sites are coming and going, but these have stood the test of time. We update this list of social media sites with new data as it becomes available. The data in this list combines global and US social media visitors. The actual numbers of monthly visitors are gathered from different sites. We bring you the latest data out there.
IFTTT stands for If This Then That. It's a tool that actually lets you build your very own automated actions, called "recipes," so that you don't have to do them yourself. For example, if you want all of your Instagram photos automatically saved to a public folder of your Dropbox account, you can do that by building a recipe with IFTTT so you never have do it manually.

Just to give you an opinion from a teens point of view: I am 14 and I use most of these. And most of them can only be dangerous if your child is looking for danger. On Snapchat, you could be harmlessly sending pictures to your friends. In settings it gives you the option to only recieve pictures from people that you add on snapchat. Out of all of these I think instagram is the least dangerous. Like I said before you are only going to find danger if you're looking for it. You can make your page private so people must request to follow you. And you will only see other people's photos whom you follow. Out of all of these I use Twitter and Tumblr the most. On tumblr, you only see content from the blogs you follow so your child should not be following any blogs that are posting Pornographic images anyway and same with twitter. Oovoo is not bery dangerous either because you can only video chat and message people if they add you and you also add them so just make sure your kid isn't adding anyone they don't know. Omegle is really just a TERRIBLE website. Even on the safe chat people are still naked and I don't use that website at all. I LOVE VINE. Many of the 6 second videos are hilarious. I guess I would say the only problem is language. But if someone swears a lot in their vines or does something you don't like then your teen should not follow them. And of course, ***YOU CAN ALWAYS MONITOR THEIR SOCIAL MEDIAS*** Just follow them on twitter, instagram, tumblr, add them on facebook etc. You will be able to see anything they post. Unless they block you. But if they do block you, you could just take all their social media away!! CONGRAYS IF YOU READ THIS UNTIL THE END BC THIS IS SO LONG!

Using an omni-channel strategy is becoming increasingly important for enterprises who must adapt to the changing expectations of consumers who want ever-more sophisticated offerings throughout the purchasing journey. Retailers are increasingly focusing on their online presence, including online shops that operate alongside existing store-based outlets. The "endless aisle" within the retail space can lead consumers to purchase products online that fit their needs while retailers do not have to carry the inventory within the physical location of the store. Solely Internet-based retailers are also entering the market; some are establishing corresponding store-based outlets to provide personal services, professional help, and tangible experiences with their products.[24]
On a fall night in 2003, Harvard undergrad and computer programming genius Mark Zuckerberg sits down at his computer and heatedly begins working on a new idea. In a fury of blogging and programming, what begins in his dorm room soon becomes a global social network and a revolution in communication. A mere six years and 500 million friends later, Mark Zuckerberg is the youngest billionaire in history... but for this entrepreneur, success leads to both personal and legal complications. Written by Columbia Pictures
While working at a Fortune 100 company for nine years before moving to lead my current team, I became fascinated by customer behavior. What kinds of digital offerings most deeply engage customers in their digital lives? I started by looking at some case studies of the products, services, communications and experiences that had been embraced and adopted by customers during the first two decades of the internet. Over a period of seven years working on inbound marketing campaigns, what I found was a recurring pattern of three behaviors that drove the adoption of new digital experiences, which I call the three core behaviors of a network:
Scale-free networks: A scale-free network is a network whose degree distribution follows a power law, at least asymptotically. In network theory a scale-free ideal network is a random network with a degree distribution that unravels the size distribution of social groups.[43] Specific characteristics of scale-free networks vary with the theories and analytical tools used to create them, however, in general, scale-free networks have some common characteristics. One notable characteristic in a scale-free network is the relative commonness of vertices with a degree that greatly exceeds the average. The highest-degree nodes are often called "hubs", and may serve specific purposes in their networks, although this depends greatly on the social context. Another general characteristic of scale-free networks is the clustering coefficient distribution, which decreases as the node degree increases. This distribution also follows a power law.[44] The Barabási model of network evolution shown above is an example of a scale-free network.

By the 1970s, a growing number of scholars worked to combine the different tracks and traditions. One group consisted of sociologist Harrison White and his students at the Harvard University Department of Social Relations. Also independently active in the Harvard Social Relations department at the time were Charles Tilly, who focused on networks in political and community sociology and social movements, and Stanley Milgram, who developed the "six degrees of separation" thesis.[25] Mark Granovetter[26] and Barry Wellman[27] are among the former students of White who elaborated and championed the analysis of social networks.[26][28][29][30]


That new app Down to Lunch is a new bad one its for sex trafficking it texts you and tell you your friends have invited you when they actually have no idea what the app even is. When you download it and signup it asks you for your address, and all your personal info. I know I got a text coming out of Atlanta Georgia that told me to sign up. So they already have our numbers! So all you parents warn your kids about this app!!
Scale-free networks: A scale-free network is a network whose degree distribution follows a power law, at least asymptotically. In network theory a scale-free ideal network is a random network with a degree distribution that unravels the size distribution of social groups.[43] Specific characteristics of scale-free networks vary with the theories and analytical tools used to create them, however, in general, scale-free networks have some common characteristics. One notable characteristic in a scale-free network is the relative commonness of vertices with a degree that greatly exceeds the average. The highest-degree nodes are often called "hubs", and may serve specific purposes in their networks, although this depends greatly on the social context. Another general characteristic of scale-free networks is the clustering coefficient distribution, which decreases as the node degree increases. This distribution also follows a power law.[44] The Barabási model of network evolution shown above is an example of a scale-free network. 

A content marketer, for example, can create a series of blog posts that serve to generate leads from a new ebook the business recently created. The company's social media marketer might then help promote these blog posts through paid and organic posts on the business's social media accounts. Perhaps the email marketer creates an email campaign to send those who download the ebook more information on the company. We'll talk more about these specific digital marketers in a minute.

Digital marketing is the use of the internet, mobile devices, social media, search engines, display advertising and other channels to reach consumers. As a subset of traditional marketing, digital marketing goes beyond the internet to include Short Message Service (SMS), Simple Notification Service (SNS), search engine optimization (SEO), electronic or interactive billboards and other online ads (such as banner ads) to promote products and services. Some marketing experts consider digital marketing to be an entirely new endeavor that requires a new way of approaching customers and new ways of understanding how customers behave compared to traditional marketing.

This instant messaging network is similar to WhatsApp and is available across platforms in more than eight languages. However, Telegram has always focused more on the privacy and security of the messages you send over the internet by using its platform. So, it empowers you to send messages that are encrypted and self-destructive. This encryption feature has only just been made available for WhatsApp, whereas Telegram has always provided it.

Digital marketing planning is a term used in marketing management. It describes the first stage of forming a digital marketing strategy for the wider digital marketing system. The difference between digital and traditional marketing planning is that it uses digitally based communication tools and technology such as Social, Web, Mobile, Scannable Surface.[57][58] Nevertheless, both are aligned with the vision, the mission of the company and the overarching business strategy.[59]
Thanks for the great list and info Kelly! My 14 year old desperately wants to be using some of these apps. We have resisted so far, but realize that she really is an anomaly at this point so are now considering letting her at least use Instagram (as long as we come up with agreements about privacy settings etc). I've read that teens shouldn't use their real name/photo on their profile as it's publically searchable (despite the privacy settings). I see almost all her peers using their real name and photo, and they say it's so they are searchable to friends. Makes sense, but seems unsafe - any tips on this?
Honestly, there's good and bad in anything the world throws at us. And Social Media is no exception. First of all, most social media (including Facebook) users have to be at least 13 to even sign up so there's no reason for "tweens" to be on them at all. That being said I've noticed that tweens that ignore the rules aren't very familiar with what's not acceptable. Most social media platforms are supposed to be only available for 13+ because the Internet is in fact a scary place and most children don't know how to use the Internet responsibly until their 13 or 14. On another note, I think it's important that parents are aware of what goes on on social media, however, unless you're child is under the age of 14 it's not acceptable to monitor everything and creep on their page and check their phone because even though you do have the right to know what's going on, your child is now a teenager, their probably in high school and they need "privacy". Always checking what their doing will more than likely result in you losing their trust because Parents, you don't need to know every single thing. If you're child is old enough to have a their own phone and almost finished with school, their old enough to have a private life. And I will be blunt when I say this, if you monitor your teenagers social media they will do at least one of the following: block you, make their account private, or make a new account that you won't find. And they won't do it because they're hiding something, they'll do it because they need space. Social Media is only dangerous when people don't know how to use it and regardless of how hard parents try to " protect" their children, it's ultimately up to the child to protect themselves. Their is a block button and privacy settings for a reason. Only the user can control it. And a tip for parents: not letting your child use social media when they ask to will only make them ignorant to it. This generation... My generation and the generation after me, we're growing up in the digital age and if you don't let your kid learn now it's going to take a while for them to get caught up later. Social Media is always changing and it's just part of our culture now. It's not dangerous unless you let it be.
Thank you for your post, and I am very sorry for what happened to your child. You correctly point out that no amount of monitoring, including using software, can cover all the bases. There are just too many things out there and too many creeps willing to take advantage. I'm a "computer guy" with all kinds of filters, etc. on, but my daughter was given a thumb drive with executable VPN software to beat OPENDNS and my firewall settings. I only caught it by happenstance. So ignore any "bad parent" comments; those people just don't know.
In the parlance of digital marketing, advertisers are commonly referred to as sources, while members of the targeted ads are commonly called receivers. Sources frequently target highly specific, well-defined receivers. For example, after extending the late-night hours of many of its locations, McDonald's needed to get the word out. It targeted shift workers and travelers with digital ads, because the company knew that these people made up a large segment of its late night business. McDonald's encouraged them to download a new Restaurant Finder app, targeting them with ads placed at ATMs and gas stations, as well as on websites that it new its customers frequented at night.
On the other hand, marketers who employ digital inbound tactics use online content to attract their target customers onto their websites by providing assets that are helpful to them. One of the simplest yet most powerful inbound digital marketing assets is a blog, which allows your website to capitalize on the terms which your ideal customers are searching for.
My daughter went on Omegle after seeing it used on a YouTube video - the video showed the chat was safe- a tween talking to two young kids. My daughter's experience was much worse. Despite the numerous warnings on the initial page -she went right in and started to find people to chat with. She smartly had her camera off -but found no one would chat with her. So she turned it on - showing only below her neck. Sure enough - someone started chatting to her. He (using typing only) asked her to stand up and turn around - she did that - and he promptly threatened her -" I have taken a photo of your butt (she was fully clothed) and your face (not sure if that was possible) and I will put them onto social media and will embarrass you if you don't do what I say..." she promptly shut it down and came down in tears. We alerted the local police and reported the incident -which they fully supported. This is NOT a site for anyone but ADULTS. Despite many warnings and much education about this type of site - my daughter ignored everything for the chance of chatting and feeling that 'she belonged and was popular'. Such a hard thing to parent around.
My child was lured by a complete stranger on Instagram. I am NOT a lax parent, in fact, very far from it, but you CAN NOT compete with a predator. They are professionals. They can be anyone they want on a profile, and kids generally believe this stuff. Kids want more "likes" and followers. These predators can know where your kids go to school, anything they want just by keeping up with your kids posts! Please BE NOSEY! Don't make the mistake I made, and then have to deal with what we are dealing with. This is literally every parents nightmare. It's a hard toss-up because you want your kids to be able to contact you, but at what cost? Their lives? I know mine is LITERALLY lucky to be alive. Predators manipulate, lie, groom, tell your kids what they want to hear. If you live in a small area like we do, it wouldn't be hard just from following posts to find out where you live, where your kids go to school. You think this could never happen to you, BUT IT CAN HAPPEN, and does happen WAY MORE THAN YOU THINK! I think I read it's a 100% chance kids will be contacted by a predator online these days no matter how strict you are (I was very strict and always wanted to be in the know about what our kid was doing, with whom, and where) but it still wasn't enough. Now my child is a victim, we get to go through a lengthy court battle b/c I had this person arrested, and I also have to carry the guilt of providing them with a cell phone. It's not just the kids that have no supervision, trust me, PLEASE, if a predator wants to get at your kid, they will. This is why they are called predators because they PREY on kids. I hope that someone reads this and at least considers what I am telling you, because if one kid doesn't have to go through what we are going through, it was worth making this comment!
It is important for a firm to reach out to consumers and create a two-way communication model, as digital marketing allows consumers to give back feed back to the firm on a community based site or straight directly to the firm via email.[24] Firms should seek this long term communication relationship by using multiple forms of channels and using promotional strategies related to their target consumer as well as word-of mouth marketing.[24]
Using an omni-channel strategy is becoming increasingly important for enterprises who must adapt to the changing expectations of consumers who want ever-more sophisticated offerings throughout the purchasing journey. Retailers are increasingly focusing on their online presence, including online shops that operate alongside existing store-based outlets. The "endless aisle" within the retail space can lead consumers to purchase products online that fit their needs while retailers do not have to carry the inventory within the physical location of the store. Solely Internet-based retailers are also entering the market; some are establishing corresponding store-based outlets to provide personal services, professional help, and tangible experiences with their products.[24]
My eldest would chat to her friends every minute of every evening in parallel to life at home if allowed. They use What's App. Do you know how well managed this app is? Her other favourite site is Pinterest. I spoke to her and explained why I don't want her to use Tumblr or Facebook but one of the reasons I gave for not having a Facebook account was that she sees her friends at school every day, it's best for family overseas or people you don't see very often. She accepted that but the same could apply to a What's App. I don't think I would stop her using What's App cos she frequently shares the exchanges she has with friends with me and it's useful for communicating when they're doing homework, but sometimes I feel she is living her life in several alternate realities and sharing every minute of her friends' angst, fangirl hysteria and with some friends their loneliness. At the weekend I often take her iPod Touch off her and she participates fully in family life - still, only just a teenager!
My name is Jamie Spencer and I have spent the past 5 years building money making blogs. After growing tired of the 9-5, commuting and never seeing my family I decided that I wanted to make some changes and launched my first blog. Since then I have launched lots of successful niche blogs and after selling my survivalist blog I decided to teach other people how to do the same.

In the context of networks, social capital exists where people have an advantage because of their location in a network. Contacts in a network provide information, opportunities and perspectives that can be beneficial to the central player in the network. Most social structures tend to be characterized by dense clusters of strong connections.[48] Information within these clusters tends to be rather homogeneous and redundant. Non-redundant information is most often obtained through contacts in different clusters.[49] When two separate clusters possess non-redundant information, there is said to be a structural hole between them.[49] Thus, a network that bridges structural holes will provide network benefits that are in some degree additive, rather than overlapping. An ideal network structure has a vine and cluster structure, providing access to many different clusters and structural holes.[49]
Digital marketing activity is still growing across the world according to the headline global marketing index. A study published in September 2018, found that global outlays on digital marketing tactics are approaching $100 billion.[40] Digital media continues to rapidly grow; while the marketing budgets are expanding, traditional media is declining (World Economics, 2015).[41] Digital media helps brands reach consumers to engage with their product or service in a personalised way. Five areas, which are outlined as current industry practices that are often ineffective are prioritizing clicks, balancing search and display, understanding mobiles, targeting, viewability, brand safety and invalid traffic, and cross-platform measurement (Whiteside, 2016).[42] Why these practices are ineffective and some ways around making these aspects effective are discussed surrounding the following points.
I highly recommend iPhones for the ability to block apps, internet, etc. The restrictions have a different 4 number passcode so only you can have access to those features. You can block their ability to add or delete apps. We also have a rule that all devices are turned in at bedtime and charge on my nightstand until morning. If I bought the phone and pay the bill, you follow my rules, it belongs to me and I let you borrow it.
We always talk about where kids go after...what about where kids can go before, and still retain their privacy? There is a app called GeckoLife which allows one to create spaces to communicate privately. Has all the features others have like messaging, pics, video...but it's done with a little more purpose. My kids use it with their friends...and family. 

It would be great to also supplement this list with some kind of statistics regarding the audience, who is using each of these social networks. This statistics could be valuable for different kind of marketers, bloggers or business owners because with such statistics it would be possible to plan a strategy for business in different niches, like e-commerce, paper help online, any kind of services, or use it for the purpose of self-promotions for bloggers/website owners.
The kind of content you create depends on your audience's needs at different stages in the buyer's journey. You should start by creating buyer personas (use these free templates, or try makemypersona.com) to identify what your audience's goals and challenges are in relation to your business. On a basic level, your online content should aim to help them meet these goals, and overcome their challenges.
A social capital broker also reaps control benefits of being the facilitator of information flow between contacts. In the case of consulting firm Eden McCallum, the founders were able to advance their careers by bridging their connections with former big three consulting firm consultants and mid-size industry firms.[65] By bridging structural holes and mobilizing social capital, players can advance their careers by executing new opportunities between contacts.
Digital marketing became more sophisticated in the 2000s and the 2010s, when[13][14] the proliferation of devices' capable of accessing digital media led to sudden growth.[15] Statistics produced in 2012 and 2013 showed that digital marketing was still growing.[16][17] With the development of social media in the 2000s, such as LinkedIn, Facebook, YouTube and Twitter, consumers became highly dependent on digital electronics in daily lives. Therefore, they expected a seamless user experience across different channels for searching product's information. The change of customer behavior improved the diversification of marketing technology.[18]

Maybe you know the top 3 or even the top 5 social networking sites, but do you know what’s happening behind them? We maintain the list of top 15 most popular social networking worldwide. New social media sites are coming and going, but these have stood the test of time. We update this list of social media sites with new data as it becomes available. The data in this list combines global and US social media visitors. The actual numbers of monthly visitors are gathered from different sites. We bring you the latest data out there.


Now imagine you had that brochure on your website instead. You can measure exactly how many people viewed the page where it's hosted, and you can collect the contact details of those who download it by using forms. Not only can you measure how many people are engaging with your content, but you're also generating qualified leads when people download it.
Instagram Stories have quickly outpaced the original Snapchat story. 11 out of 12 influencers now post more stories to Instagram than to Snapchat. It’s easy to see why: people watch 70% of Instagram stories with the volume on. Since the stories update average user time spent on Instagram has increased from 15 minutes to 28 minutes per day (Mediakix).

Scale-free networks: A scale-free network is a network whose degree distribution follows a power law, at least asymptotically. In network theory a scale-free ideal network is a random network with a degree distribution that unravels the size distribution of social groups.[43] Specific characteristics of scale-free networks vary with the theories and analytical tools used to create them, however, in general, scale-free networks have some common characteristics. One notable characteristic in a scale-free network is the relative commonness of vertices with a degree that greatly exceeds the average. The highest-degree nodes are often called "hubs", and may serve specific purposes in their networks, although this depends greatly on the social context. Another general characteristic of scale-free networks is the clustering coefficient distribution, which decreases as the node degree increases. This distribution also follows a power law.[44] The Barabási model of network evolution shown above is an example of a scale-free network.


Skype, owned by Microsoft, is one of the most popular communication-based social networking platforms. It allows you to connect with people through voice calls, video calls (using a webcam) and text messaging. You can even conduct group conference calls. And, the best part is that Skype-to-Skype calls are free and can be used to communicate with anyone, located in any part of the world, over the internet.
This instant messaging network is similar to WhatsApp and is available across platforms in more than eight languages. However, Telegram has always focused more on the privacy and security of the messages you send over the internet by using its platform. So, it empowers you to send messages that are encrypted and self-destructive. This encryption feature has only just been made available for WhatsApp, whereas Telegram has always provided it.
I completely agree with you, Cyber Safety Lady. I think the Common Sense Media review of Kik needs to be updated. The sub-apps of Kik (available via a side swipe) offer their own versions of YouTube, Internet Browser, Image searching and more. There are parents out there that may think that turning off Safari will prohibit their child from accessing YouTube or other inappropriate content; however, Kik is a backdoor for your children to access these very sites. The problem with the CSM review of Kik is that it falls into the trap of categorizing the app as a "texting" app, but it is much, much more! Please re-evaluate the product and see if you agree that your review needs to be updated. Thank you Cyber Safety Lady! (I think I originally learned of the holes in Kik from you!)
Collaborative Environment: A collaborative environment can be set up between the organization, the technology service provider, and the digital agencies to optimize effort, resource sharing, reusability and communications.[36] Additionally, organizations are inviting their customers to help them better understand how to service them. This source of data is called User Generated Content. Much of this is acquired via company websites where the organization invites people to share ideas that are then evaluated by other users of the site. The most popular ideas are evaluated and implemented in some form. Using this method of acquiring data and developing new products can foster the organizations relationship with their customer as well as spawn ideas that would otherwise be overlooked. UGC is low-cost advertising as it is directly from the consumers and can save advertising costs for the organisation.
It is so hard to keep up with these apps so thank you for the list! I've found that the terms of service for the apps and reviews give parents the best guidance or can clue them in. When my 11 year old requested Kik, I checked online and saw that it was rated 17+! After carefully testing it, I found that because we have parental controls enabled on the old iPhone he is using, it did not allow for the web and image searching within the app so that was a relief and he can only communicate with the kids he knows. There is a very strict filter on the websites he can access since we have already gone down the road of accessing extremely inappropriate content. YouTube is another one that we block after finding him watching narrated Grand Theft Auto videos that were extremely violent and sexually degrading (which he came upon after watching a YouTuber gamer who originally discussed Minecraft). Now that there is a YouTube kids app, we have allowed YouTube again. It would be great to have all these apps on a list with the TOS, and any alerts that parents should be aware of because I am finding that most parents have no idea what kids add access when they are handed fully enabled smart phones with no restrictions or conversation. All of these things need to start being discussed around 9 or 10 it seems these days and don't assume that even the basic parental controls work well or that your child will not be exposed to it on some other child's unrestricted smart phone.
The new digital era has enabled brands to selectively target their customers that may potentially be interested in their brand or based on previous browsing interests. Businesses can now use social media to select the age range, location, gender and interests of whom they would like their targeted post to be seen by. Furthermore, based on a customer's recent search history they can be ‘followed’ on the internet so they see advertisements from similar brands, products and services,[38] This allows businesses to target the specific customers that they know and feel will most benefit from their product or service, something that had limited capabilities up until the digital era.
I'm sure there is plenty of self-loathing and porn on Tumblr. However, my daughter has been using it for years, primarily to participate in the fan communities of various TV shows, movies, podcasts, and video games that interest her. Kids in these communities demonstrate a lot of creativity as they role play, share artwork, and mash-up different stories. When drama arises in those communities, she is smart enough to stay away. She has also learned a lot about politics and gender roles, social justice issues and respect for diversity. I suppose we are fortunate that she has a good head on her shoulders and wants to share her world with us rather than hide it.
First of all, thanks for sharing this list. It’s really useful, but it would be great to supplement it with some kind of statistics regarding the audience who is using each of these social networks. This statistics could be valuable for different kind of marketers, bloggers or business owners because with such statistics it would be possible to plan a strategy for business in different niches, like e-commerce, paper help online, any kind of services, or use it for the purpose of self-promotions for bloggers/website owners.
The marketing automation coordinator helps choose and manage the software that allows the whole marketing team to understand their customers' behavior and measure the growth of their business. Because many of the marketing operations described above might be executed separately from one another, it's important for there to be someone who can group these digital activities into individual campaigns and track each campaign's performance.
There are lots of social apps now, and sweetalk is a new discovery. For a long time, I have searched and tried different apps and most of the time, left disappointed and frustrated, until one day by accident, the sweetalk comes into my world. And here I would like to share with you all my feelings and experiences about this mobile app. It is probably the best free transnational social tool with the function of instant translation, supporting online translation in 30 different languages and can make me learn the foreign language easily during the chat. My English is ok, so I would like to choose to send messages to the people whom I am interested in instead of my mother tongue for the purpose of improving my English better while talking. And there are a lot of lads and gals there from all walks of life around the globe(later the screenshot will be pasted). You don’t need to pay money for the VPN service, which is really fantastic for those who are eager to make friends from abroad and learn foreign language as well without the extra trouble. Of course, you can talk with the friends from your own country and if you cannot speak English well or those you want to send messages to fail to speak English, then here comes another feature of sweetalk, that is the instant translation of sweetalk. And it is foolproof to use. All right, all of these are written during the work, a little busy now and I would end this introduction of sweetalk with some screenshots, if you like it, maybe you can give it try.
Thanks for this list, but I think you need to update your review of Kik Messenger. You mention just one app within Kik Oink? Kik Messenger has over 400 "cards" or apps available to connect to your Kik app. You get to these apps through the Kik app from the slide out window in the app, or from under the message window. None of these apps are verified by either Google Play or iTunes, and many are plain and simply hook up apps. Also you will find that most kids make up names for Kik, It's not correct to say that they have a real name policy they don't. You can also use Kik without verifying your email address, so it's easy for people to make up an email address to hide your identity. The privacy settings in Kik don't block contact from strangers, or effectively hide new messages from strangers. Messages from new contacts or strangers are placed in the main message window at the bottom, by turning on the 2 privacy settings, "Message Preview" and "Notify for New People" all that does, is place a message from a stranger or new contact, in the main message window, but blurrs the profile picture and any photo they may send. If you then click on the message to find out if it's a friend...as so many kids make up user names it could be, it reveals the picture and clicking accept reveals the profile picture. There are many reports of strangers and Porn Bots sending kids porn pictures as way of first introduction. And increasing reports of predators using Kik Messenger to extort nude photos from kids. There are many websites set up, that have collected user names and profiles on Kik and advertise them by category, girl or boy, ages etc... Kik Messenger is also rated 17+ on the app stores. Please update the review of Kik. This is one very dangerous app.
Hi there -- Thank you so much for your comments! Our review doesn't say you have to use real names, only that you can (which is not recommended by us). Regarding Oink, it's one of many mini apps created by Kik Messenger; we chose to call it out but weren't implying that it is the only one -- and you're right, lots of Kik's mini apps aren't regulated as they're created by independent developers. It's a challenging app to safely navigate, so your concern is right on target.
A content marketer, for example, can create a series of blog posts that serve to generate leads from a new ebook the business recently created. The company's social media marketer might then help promote these blog posts through paid and organic posts on the business's social media accounts. Perhaps the email marketer creates an email campaign to send those who download the ebook more information on the company. We'll talk more about these specific digital marketers in a minute.
Balancing search and display for digital display ads are important; marketers tend to look at the last search and attribute all of the effectiveness to this. This then disregards other marketing efforts, which establish brand value within the consumers mind. ComScore determined through drawing on data online, produced by over one hundred multichannel retailers that digital display marketing poses strengths when compared with or positioned alongside, paid search (Whiteside, 2016).[42] This is why it is advised that when someone clicks on a display ad the company opens a landing page, not its home page. A landing page typically has something to draw the customer in to search beyond this page. Things such as free offers that the consumer can obtain through giving the company contact information so that they can use retargeting communication strategies (Square2Marketing, 2012).[43] Commonly marketers see increased sales among people exposed to a search ad. But the fact of how many people you can reach with a display campaign compared to a search campaign should be considered. Multichannel retailers have an increased reach if the display is considered in synergy with search campaigns. Overall both search and display aspects are valued as display campaigns build awareness for the brand so that more people are likely to click on these digital ads when running a search campaign (Whiteside, 2016).[42]

Using Dr Dave Chaffey's approach, the digital marketing planning (DMP) has three main stages: Opportunity, Strategy and Action. He suggests that any business looking to implement a successful digital marketing strategy must structure their plan by looking at opportunity, strategy and action. This generic strategic approach often has phases of situation review, goal setting, strategy formulation, resource allocation and monitoring.[59]


Targeting, viewability, brand safety and invalid traffic: Targeting, viewability, brand safety and invalid traffic all are aspects used by marketers to help advocate digital advertising. Cookies are a form of digital advertising, which are tracking tools within desktop devices; causing difficulty, with shortcomings including deletion by web browsers, the inability to sort between multiple users of a device, inaccurate estimates for unique visitors, overstating reach, understanding frequency, problems with ad servers, which cannot distinguish between when cookies have been deleted and when consumers have not previously been exposed to an ad. Due to the inaccuracies influenced by cookies, demographics in the target market are low and vary (Whiteside, 2016).[42] Another element, which is affected within digital marketing, is ‘viewabilty’ or whether the ad was actually seen by the consumer. Many ads are not seen by a consumer and may never reach the right demographic segment. Brand safety is another issue of whether or not the ad was produced in the context of being unethical or having offensive content. Recognizing fraud when an ad is exposed is another challenge marketers face. This relates to invalid traffic as premium sites are more effective at detecting fraudulent traffic, although non-premium sites are more so the problem (Whiteside, 2016).[42] 

Kik- it's rated 17+ for a reason. ooVoo I have never heard of before. WhatsApp- heard of it, but it's not popular in my social circle, so I unfortunately can't supply any useful information. Instagram- fairly safe to use. Most of my friends just use it to chat with one another. Just make sure your kid sets theirs to private, and they should be fine. Tumblr- can have inappropriate content(porn, "smut", profanity, graphic images of self-harm, drug use, etc.), but is generally fine since content that one will come across is determined by who one follows and which tags they search for. Radical politics are a theme throughout the website, too, but as long as you keep tabs on your kid's blog, it should be fine. Twitter- can have profanity, but generally fairly safe to use. It's good as long as it's set to private. Vine- has plenty of inappropriate content. Not necessarily appropriate for every teen(let alone tweens), but most of it is just annoying stuff that kids at school will quote until they've sucked all the humor out of it. Burn Note- never heard of it, let alone used it before. Snapchat- pretty tame. Usually just videos of people acting like idiots and silly face selfies. Whisper- can have some pretty dark content. If I were a parent, I wouldn't let a kid use it. Yik-Yak- I'd watch them pretty closely if they're using this one. MeetMe- never heard of this. Omegle- keep them away from this. This is clearly for adults. Skout- don't know much about it, but I've heard of it. Tinder- this and Grindr are both hook-up apps that should probably not be used by teenagers, though they should be fine for adults. A few more to add: Google+- practically no one uses this, but it should be fine. Reddit- as long as they only subscribe to appropriate subs, it should be fine. They probably won't tell you they use Reddit if they do, though—it kinda defeats the purpose. Pinterest- absolutely fine for everyone. They might use Pinterest instead of doing their homework, though, so be warned... 4chan- if your teen is using this site, throw their computer out the window. 4chan isn't even appropriate for adults. MySpace- if your kid is using this, they may have blows to their self-esteem due to them not being ranked as their best friend's best friend. FaceBook- fewer teens are using this anymore. It's mostly just parents. I don't even know anyone under the age of 25 who uses this. Vimeo- kind of like YouTube, but fewer trolls in the comments section. YouTube- tons of profanity. Make sure they're only watching appropriate stuff. Voat- basically a European clone of Reddit. People who get banned from Reddit flock to there, though, so it's basically filled with the worst of Reddit. Digg- basically no one uses this. LinkedIn- teenagers will probably not be using this. It's usually accountants and businesspeople who are looking to get jobs. Flick- photosharing. Mostly photography. iFunny- funny pictures and internet memes. Lots of swearing, but the content itself is pretty tame. LiveJournal- don't know too much about this, but it's pretty much like its name. WattPad- monitor their use of this. It has lots of erotic fan-fiction. Text messaging- don't read these unless you have reason to believe they are in danger. It's kind of like reading their diary, if their diary was a chat log. Telephone- this is used less and less and texting more and more, but they'll be fine if they're using the phone to call people. Don't eavesdrop on their conversations, though. That's snooping, and those are private (to them, the person they called, and the NSA : ) FaceTime/Skype- they should be fine, but make sure they're safe if they're skyping or facetiming a boyfriend or girlfriend. Actually talking to people- if they're doing this, be glad. Don't eavesdrop. This is the most private mode of communication. : ) Basically, as a rule of thumb, if it's on the web for anyone to access, checking it out is fine and is never snooping, but if you're stealing their phone in order to read their text messages one they've fallen asleep, that's snooping, and it's probably going to make them trust you less. Also, teenagers might sign up for social media accounts without your permission or knowledge. This is pretty normal, and usually is fine, but sometimes can be dangerous. If they're over the age of 13, they can legally sign up for many social media accounts without parental permission, but it still is technically you responsibility as a parent to do your best to keep them safe online. Be aware of their online activity, but don't be nagging or nosy or disrespect their privacy. Hopefully this has been helpful : )
My name is Jamie Spencer and I have spent the past 5 years building money making blogs. After growing tired of the 9-5, commuting and never seeing my family I decided that I wanted to make some changes and launched my first blog. Since then I have launched lots of successful niche blogs and after selling my survivalist blog I decided to teach other people how to do the same.
"The Social Network" explores the moment at which Facebook, the most revolutionary social phenomena of the new century, was invented -- through the warring perspectives of the super-smart young men who each claimed to be there at its inception. The result is a drama rife with both creation and destruction; one that audaciously avoids a singular POV, but instead, by tracking dueling narratives, mirrors the clashing truths and constantly morphing social relationships that define our time. Drawn from multiple sources, the film captures the visceral thrill of the heady early days of a culture-changing phenomenon in the making -- and the way it both pulled a group of young revolutionaries together and then split them apart.

Digital marketing poses special challenges for its purveyors. Digital channels are proliferating rapidly, and digital marketers have to keep up with how these channels work, how they're used by receivers and how to use these channels to effectively market things. In addition, it's becoming more difficult to capture receivers' attention, because receivers are increasingly inundated with competing ads. Digital marketers also find it challenging to analyze the vast troves of data they capture and then exploit this information in new marketing efforts.
Social networks and the analysis of them is an inherently interdisciplinary academic field which emerged from social psychology, sociology, statistics, and graph theory. Georg Simmel authored early structural theories in sociology emphasizing the dynamics of triads and "web of group affiliations".[2] Jacob Moreno is credited with developing the first sociograms in the 1930s to study interpersonal relationships. These approaches were mathematically formalized in the 1950s and theories and methods of social networks became pervasive in the social and behavioral sciences by the 1980s.[1][3] Social network analysis is now one of the major paradigms in contemporary sociology, and is also employed in a number of other social and formal sciences. Together with other complex networks, it forms part of the nascent field of network science.[4][5]
Hi there -- Thank you so much for your comments! Our review doesn't say you have to use real names, only that you can (which is not recommended by us). Regarding Oink, it's one of many mini apps created by Kik Messenger; we chose to call it out but weren't implying that it is the only one -- and you're right, lots of Kik's mini apps aren't regulated as they're created by independent developers. It's a challenging app to safely navigate, so your concern is right on target.
The picture here is a bit different if we look at the brand names. WhatsApp and Messenger are in a close race for the top spot. But both of these most popular social media apps are owned by Facebook so the competition may not be as fierce as between completely separate companies. Then there’s a lot of Asian apps and then on the sixth spot is Instagram, again owned by Facebook.
In the context of networks, social capital exists where people have an advantage because of their location in a network. Contacts in a network provide information, opportunities and perspectives that can be beneficial to the central player in the network. Most social structures tend to be characterized by dense clusters of strong connections.[48] Information within these clusters tends to be rather homogeneous and redundant. Non-redundant information is most often obtained through contacts in different clusters.[49] When two separate clusters possess non-redundant information, there is said to be a structural hole between them.[49] Thus, a network that bridges structural holes will provide network benefits that are in some degree additive, rather than overlapping. An ideal network structure has a vine and cluster structure, providing access to many different clusters and structural holes.[49]
By using Internet platforms, businesses can create competitive advantage through various means. To reach the maximum potential of digital marketing, firms use social media as its main tool to create a channel of information. Through this a business can create a system in which they are able to pinpoint behavioral patterns of clients and feedback on their needs.[30] This means of content has shown to have a larger impingement on those who have a long-standing relationship with the firm and with consumers who are relatively active social media users. Relative to this, creating a social media page will further increase relation quality between new consumers and existing consumers as well as consistent brand reinforcement therefore improving brand awareness resulting in a possible rise for consumers up the Brand Awareness Pyramid.[31] Although there may be inconstancy with product images;[32] maintaining a successful social media presence requires a business to be consistent in interactions through creating a two way feed of information; firms consider their content based on the feedback received through this channel, this is a result of the environment being dynamic due to the global nature of the internet.[29] Effective use of digital marketing can result in relatively lowered costs in relation to traditional means of marketing; Lowered external service costs, advertising costs, promotion costs, processing costs, interface design costs and control costs.[32]

Could be. Kids think of their devices as their private property -- as personal as a diary -- so uninstalling his apps may backfire. Depending on his phone, you might be able to restrict app downloads so he can't download new apps. Keep talking about your expectations for responsible use and after he demonstrates that he can follow your rules, he could earn back privileges.
Two other practical limitations can be seen in the case of digital marketing. One,digital marketing is useful for specific categories of products,meaning only consumer goods can be propagated through digital channels.Industrial goods and pharmaceutical products can not be marketed through digital channels. Secondly, digital marketing disseminates only the information to the prospects most of whom do not have the purchasing authority/power. And hence the reflection of digital marketing into real sales volume is skeptical.[citation needed]
I highly recommend iPhones for the ability to block apps, internet, etc. The restrictions have a different 4 number passcode so only you can have access to those features. You can block their ability to add or delete apps. We also have a rule that all devices are turned in at bedtime and charge on my nightstand until morning. If I bought the phone and pay the bill, you follow my rules, it belongs to me and I let you borrow it.
Instagram Stories have quickly outpaced the original Snapchat story. 11 out of 12 influencers now post more stories to Instagram than to Snapchat. It’s easy to see why: people watch 70% of Instagram stories with the volume on. Since the stories update average user time spent on Instagram has increased from 15 minutes to 28 minutes per day (Mediakix).
By using Internet platforms, businesses can create competitive advantage through various means. To reach the maximum potential of digital marketing, firms use social media as its main tool to create a channel of information. Through this a business can create a system in which they are able to pinpoint behavioral patterns of clients and feedback on their needs.[30] This means of content has shown to have a larger impingement on those who have a long-standing relationship with the firm and with consumers who are relatively active social media users. Relative to this, creating a social media page will further increase relation quality between new consumers and existing consumers as well as consistent brand reinforcement therefore improving brand awareness resulting in a possible rise for consumers up the Brand Awareness Pyramid.[31] Although there may be inconstancy with product images;[32] maintaining a successful social media presence requires a business to be consistent in interactions through creating a two way feed of information; firms consider their content based on the feedback received through this channel, this is a result of the environment being dynamic due to the global nature of the internet.[29] Effective use of digital marketing can result in relatively lowered costs in relation to traditional means of marketing; Lowered external service costs, advertising costs, promotion costs, processing costs, interface design costs and control costs.[32]

Digital marketing methods such as search engine optimization (SEO), search engine marketing (SEM), content marketing, influencer marketing, content automation, campaign marketing, data-driven marketing,[6] e-commerce marketing, social media marketing, social media optimization, e-mail direct marketing, display advertising, e–books, and optical disks and games are becoming more common in our advancing technology. In fact, digital marketing now extends to non-Internet channels that provide digital media, such as mobile phones (SMS and MMS), callback, and on-hold mobile ring tones.[7] In essence, this extension to non-Internet channels helps to differentiate digital marketing from online marketing, another catch-all term for the marketing methods mentioned above, which strictly occur online. 

Studies of language and linguistics, particularly evolutionary linguistics, focus on the development of linguistic forms and transfer of changes, sounds or words, from one language system to another through networks of social interaction. Social networks are also important in language shift, as groups of people add and/or abandon languages to their repertoire.
This course examines how digital tools, such as the Internet, smartphones, and 3D printing, are revolutionizing the world of marketing by shifting the balance of power from firms to consumers. Marketing in a Digital World is one of the most popular courses on Coursera with over 150,000 Learners and is rated by Class Central as one of the Top 50 MOOCs of All Time (https://www.class-central.com/report/top-moocs/). This course is part of the iMBA offered by the University of Illinois, a flexible, fully-accredited online MBA at an incredibly competitive price. For more information, please see the Resource page in this course and onlinemba.illinois.edu.
The thing about Tumblr is that things are separated by "tags". Unless you follow a person who posts content with tags like "nsfw" which is usually used for porn or you look up a tag yourself, you will not come across this content. You can also block tags, or "blacklist" them so that you won't come across them. There are some great resources like writing activities and tips, craft instructions that are available on Tumblr (and you don't have to have a blog to go directly to it). The password protected blog is your second blog, but you don't have to put anything on the first and just post from the second. Those are all tips that I find useful about that website because of its rise in popularity. And about websites giving information to the police: there was an incident that happened in my city where a girl was posting a Gossip-girl like Tumblr blog and it spread. There were students who tried to contact Tumblr support to remove the blog as it had some raunchy pictures, but they could not do anything about it since they were not the ones actually in the pictures. I know that the blog was taken down after someone called the police -- it was actually child pornography due to the nature of some of the pictures. They were able to track the student down and she ended up getting expelled.

This is a local search- and discovery-based social media platform that enables you to find the ideal places (based on your location) to go to with friends and loved ones. It also gives appropriate search results for the best food outlets, night entertainment places and more in your area. The social networking feature is now available in a separate app named Swarm.


My child was lured by a complete stranger on Instagram. I am NOT a lax parent, in fact, very far from it, but you CAN NOT compete with a predator. They are professionals. They can be anyone they want on a profile, and kids generally believe this stuff. Kids want more "likes" and followers. These predators can know where your kids go to school, anything they want just by keeping up with your kids posts! Please BE NOSEY! Don't make the mistake I made, and then have to deal with what we are dealing with. This is literally every parents nightmare. It's a hard toss-up because you want your kids to be able to contact you, but at what cost? Their lives? I know mine is LITERALLY lucky to be alive. Predators manipulate, lie, groom, tell your kids what they want to hear. If you live in a small area like we do, it wouldn't be hard just from following posts to find out where you live, where your kids go to school. You think this could never happen to you, BUT IT CAN HAPPEN, and does happen WAY MORE THAN YOU THINK! I think I read it's a 100% chance kids will be contacted by a predator online these days no matter how strict you are (I was very strict and always wanted to be in the know about what our kid was doing, with whom, and where) but it still wasn't enough. Now my child is a victim, we get to go through a lengthy court battle b/c I had this person arrested, and I also have to carry the guilt of providing them with a cell phone. It's not just the kids that have no supervision, trust me, PLEASE, if a predator wants to get at your kid, they will. This is why they are called predators because they PREY on kids. I hope that someone reads this and at least considers what I am telling you, because if one kid doesn't have to go through what we are going through, it was worth making this comment!
Once consumers can access this content, they want to engage with something that fits their needs and is sensory and interactive — from the early popularity of web portals to the spread of online video, to the next generation virtual realities. Their digital desires are marked by a thirst for content. The old media adage that “content is king" is correct. There is no question that the desire to engage with content is a key driver of customer behavior.
Offered by Baidu of China, a search engine company, Baidu Tieba (known as Postbar internationally) is a social forum network based on the keyword searches in the Baidu search engine. This discussion forum works on the unique concept of allowing you to create a social network group for a specific topic, using the search, or even to join an existing online social group.

Beginning in the late 1990s, social network analysis experienced work by sociologists, political scientists, and physicists such as Duncan J. Watts, Albert-László Barabási, Peter Bearman, Nicholas A. Christakis, James H. Fowler, and others, developing and applying new models and methods to emerging data available about online social networks, as well as "digital traces" regarding face-to-face networks.
Another disadvantage is that even an individual or small group of people can harm image of an established brand. For instance Dopplegnager is a term that is used to disapprove an image about a certain brand that is spread by anti-brand activists, bloggers, and opinion leaders. The word Doppelganger is a combination of two German words Doppel (double) and Ganger (walker), thus it means double walker or as in English it is said alter ego. Generally brand creates images for itself to emotionally appeal to their customers. However some would disagree with this image and make alterations to this image and present in funny or cynical way, hence distorting the brand image, hence creating a Doppelganger image, blog or content (Rindfleisch, 2016).
As a clinical psychologist and speaker on raising kids in the Instant Gratification Generation, I found this to be extremely helpful and to the point. I have shared it with many parents. New apps are developed all the time so sharing this information is the best way for parents to know what is out there. In our area the app causing an rash of cyberbullying and threats to schools is the "anonymous" app called Burnbook, which is based on the Burn Book from the movie Mean Girls.
Complex networks: Most larger social networks display features of social complexity, which involves substantial non-trivial features of network topology, with patterns of complex connections between elements that are neither purely regular nor purely random (see, complexity science, dynamical system and chaos theory), as do biological, and technological networks. Such complex network features include a heavy tail in the degree distribution, a high clustering coefficient, assortativity or disassortativity among vertices, community structure (see stochastic block model), and hierarchical structure. In the case of agency-directed networks these features also include reciprocity, triad significance profile (TSP, see network motif), and other features. In contrast, many of the mathematical models of networks that have been studied in the past, such as lattices and random graphs, do not show these features.[45]
In J.A. Barnes' day, a "community" referred to a specific geographic location and studies of community ties had to do with who talked, associated, traded, and attended church with whom. Today, however, there are extended "online" communities developed through telecommunications devices and social network services. Such devices and services require extensive and ongoing maintenance and analysis, often using network science methods. Community development studies, today, also make extensive use of such methods.
Customers are often researching online and then buying in stores and also browsing in stores and then searching for other options online. Online customer research into products is particularly popular for higher-priced items as well as consumable goods like groceries and makeup. Consumers are increasingly using the Internet to look up product information, compare prices, and search for deals and promotions.[21]
This course examines how digital tools, such as the Internet, smartphones, and 3D printing, are revolutionizing the world of marketing by shifting the balance of power from firms to consumers. Marketing in a Digital World is one of the most popular courses on Coursera with over 150,000 Learners and is rated by Class Central as one of the Top 50 MOOCs of All Time (https://www.class-central.com/report/top-moocs/). This course is part of the iMBA offered by the University of Illinois, a flexible, fully-accredited online MBA at an incredibly competitive price. For more information, please see the Resource page in this course and onlinemba.illinois.edu.

Contact with strangers is part of the experience. While it's great for kids to be able to feel a sense of belonging and kinship with others, the mix of kids and adults blended with all varieties of chat makes it risky. Also, unless a kid is in a closed group, everything they post is public, and other users can search for them. Make sure your kid's location is not included in their profile. 

If you don't want to pay for Tweetbot but don't like the official Twitter app either, then another good alternative is Twitterrific. You'll get chronological timelines with no ads, support for lists, mute filters for keywords and phrases, and plenty of customization options, like theming. Twitterrific also has multi-image support, and it's available on both your iPhone and iPad. Plus, it's free, with a tip jar if you choose to support the developers.
Now imagine you had that brochure on your website instead. You can measure exactly how many people viewed the page where it's hosted, and you can collect the contact details of those who download it by using forms. Not only can you measure how many people are engaging with your content, but you're also generating qualified leads when people download it.
My name is Jamie Spencer and I have spent the past 5 years building money making blogs. After growing tired of the 9-5, commuting and never seeing my family I decided that I wanted to make some changes and launched my first blog. Since then I have launched lots of successful niche blogs and after selling my survivalist blog I decided to teach other people how to do the same.
Tumblr is like a cross between a blog and Twitter: It's a streaming scrapbook of text, photos, and/or video and audio clips. Users create and follow short blogs, or "tumblogs," that can be seen by anyone online (if they're made public). Many teens have tumblogs for personal use: sharing photos, videos, musings, and things they find funny with their friends.

On the other hand, marketers who employ digital inbound tactics use online content to attract their target customers onto their websites by providing assets that are helpful to them. One of the simplest yet most powerful inbound digital marketing assets is a blog, which allows your website to capitalize on the terms which your ideal customers are searching for.
Collaborative Environment: A collaborative environment can be set up between the organization, the technology service provider, and the digital agencies to optimize effort, resource sharing, reusability and communications.[36] Additionally, organizations are inviting their customers to help them better understand how to service them. This source of data is called User Generated Content. Much of this is acquired via company websites where the organization invites people to share ideas that are then evaluated by other users of the site. The most popular ideas are evaluated and implemented in some form. Using this method of acquiring data and developing new products can foster the organizations relationship with their customer as well as spawn ideas that would otherwise be overlooked. UGC is low-cost advertising as it is directly from the consumers and can save advertising costs for the organisation. 

In demography, the study of social networks has led to new sampling methods for estimating and reaching populations that are hard to enumerate (for example, homeless people or intravenous drug users.) For example, respondent driven sampling is a network-based sampling technique that relies on respondents to a survey recommending further respondents.
The University of Illinois at Urbana-Champaign is a world leader in research, teaching and public engagement, distinguished by the breadth of its programs, broad academic excellence, and internationally renowned faculty and alumni. Illinois serves the world by creating knowledge, preparing students for lives of impact, and finding solutions to critical societal needs.
Major developments in the field can be seen in the 1930s by several groups in psychology, anthropology, and mathematics working independently.[6][10][11] In psychology, in the 1930s, Jacob L. Moreno began systematic recording and analysis of social interaction in small groups, especially classrooms and work groups (see sociometry). In anthropology, the foundation for social network theory is the theoretical and ethnographic work of Bronislaw Malinowski,[12] Alfred Radcliffe-Brown,[13][14] and Claude Lévi-Strauss.[15] A group of social anthropologists associated with Max Gluckman and the Manchester School, including John A. Barnes,[16] J. Clyde Mitchell and Elizabeth Bott Spillius,[17][18] often are credited with performing some of the first fieldwork from which network analyses were performed, investigating community networks in southern Africa, India and the United Kingdom.[6] Concomitantly, British anthropologist S. F. Nadel codified a theory of social structure that was influential in later network analysis.[19] In sociology, the early (1930s) work of Talcott Parsons set the stage for taking a relational approach to understanding social structure.[20][21] Later, drawing upon Parsons' theory, the work of sociologist Peter Blau provides a strong impetus for analyzing the relational ties of social units with his work on social exchange theory.[22][23][24] 

Just to give you an opinion from a teens point of view: I am 14 and I use most of these. And most of them can only be dangerous if your child is looking for danger. On Snapchat, you could be harmlessly sending pictures to your friends. In settings it gives you the option to only recieve pictures from people that you add on snapchat. Out of all of these I think instagram is the least dangerous. Like I said before you are only going to find danger if you're looking for it. You can make your page private so people must request to follow you. And you will only see other people's photos whom you follow. Out of all of these I use Twitter and Tumblr the most. On tumblr, you only see content from the blogs you follow so your child should not be following any blogs that are posting Pornographic images anyway and same with twitter. Oovoo is not bery dangerous either because you can only video chat and message people if they add you and you also add them so just make sure your kid isn't adding anyone they don't know. Omegle is really just a TERRIBLE website. Even on the safe chat people are still naked and I don't use that website at all. I LOVE VINE. Many of the 6 second videos are hilarious. I guess I would say the only problem is language. But if someone swears a lot in their vines or does something you don't like then your teen should not follow them. And of course, ***YOU CAN ALWAYS MONITOR THEIR SOCIAL MEDIAS*** Just follow them on twitter, instagram, tumblr, add them on facebook etc. You will be able to see anything they post. Unless they block you. But if they do block you, you could just take all their social media away!! CONGRAYS IF YOU READ THIS UNTIL THE END BC THIS IS SO LONG! 

Great works of art define more than just what is on display. They define a culture, a generation. What makes The Great Gatsby such a monumental piece of literature is not just the story or the interesting struggle between characters. It is the fact that The Great Gatsby defines an era in more than one way that makes it such a great novel. The Social Network is the Gatsby of our time. The themes that persist in this movie are so culturally significant and spot-on that it would be cheating yourself to not watch this movie. The Social Network is superbly directed and acted. The story is brilliant. The soundtrack is perfect. In addition to being incredibly well-made and culturally significant, this movie is also wildly engaging and entertaining. The Social Network is the best movie of 2011, if not also one of the greatest triumphs in cinema ever.
It would be great to also supplement this list with some kind of statistics regarding the audience, who is using each of these social networks. This statistics could be valuable for different kind of marketers, bloggers or business owners because with such statistics it would be possible to plan a strategy for business in different niches, like e-commerce, paper help online, any kind of services, or use it for the purpose of self-promotions for bloggers/website owners.
Contact with strangers is part of the experience. While it's great for kids to be able to feel a sense of belonging and kinship with others, the mix of kids and adults blended with all varieties of chat makes it risky. Also, unless a kid is in a closed group, everything they post is public, and other users can search for them. Make sure your kid's location is not included in their profile.
On a fall night in 2003, Harvard undergrad and computer programming genius Mark Zuckerberg sits down at his computer and heatedly begins working on a new idea. In a fury of blogging and programming, what begins in his dorm room soon becomes a global social network and a revolution in communication. A mere six years and 500 million friends later, Mark Zuckerberg is the youngest billionaire in history... but for this entrepreneur, success leads to both personal and legal complications. Written by Columbia Pictures 

An omni-channel approach not only benefits consumers but also benefits business bottom line: Research suggests that customers spend more than double when purchasing through an omni-channel retailer as opposed to a single-channel retailer, and are often more loyal. This could be due to the ease of purchase and the wider availability of products.[24]
With brands using the Internet space to reach their target customers; digital marketing has become a beneficial career option as well. At present, companies are more into hiring individuals familiar in implementing digital marketing strategies and this has led the stream to become a preferred choice amongst individuals inspiring institutes to come up and offer professional courses in Digital Marketing.
A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for analyzing the structure of whole social entities as well as a variety of theories explaining the patterns observed in these structures.[1] The study of these structures uses social network analysis to identify local and global patterns, locate influential entities, and examine network dynamics.
TweetDeck is totally free and perfect for those who need to manage multiple accounts, follow specific hashtags, reply to lots of other users and see exactly what's being tweeted in real time. You can organize everything you need in separate columns so you can see all of it on one screen. Keep in mind that TweetDeck is meant for the desktop web only.
Great works of art define more than just what is on display. They define a culture, a generation. What makes The Great Gatsby such a monumental piece of literature is not just the story or the interesting struggle between characters. It is the fact that The Great Gatsby defines an era in more than one way that makes it such a great novel. The Social Network is the Gatsby of our time. The themes that persist in this movie are so culturally significant and spot-on that it would be cheating yourself to not watch this movie. The Social Network is superbly directed and acted. The story is brilliant. The soundtrack is perfect. In addition to being incredibly well-made and culturally significant, this movie is also wildly engaging and entertaining. The Social Network is the best movie of 2011, if not also one of the greatest triumphs in cinema ever.

Thanks for this list, but I think you need to update your review of Kik Messenger. You mention just one app within Kik Oink? Kik Messenger has over 400 "cards" or apps available to connect to your Kik app. You get to these apps through the Kik app from the slide out window in the app, or from under the message window. None of these apps are verified by either Google Play or iTunes, and many are plain and simply hook up apps. Also you will find that most kids make up names for Kik, It's not correct to say that they have a real name policy they don't. You can also use Kik without verifying your email address, so it's easy for people to make up an email address to hide your identity. The privacy settings in Kik don't block contact from strangers, or effectively hide new messages from strangers. Messages from new contacts or strangers are placed in the main message window at the bottom, by turning on the 2 privacy settings, "Message Preview" and "Notify for New People" all that does, is place a message from a stranger or new contact, in the main message window, but blurrs the profile picture and any photo they may send. If you then click on the message to find out if it's a friend...as so many kids make up user names it could be, it reveals the picture and clicking accept reveals the profile picture. There are many reports of strangers and Porn Bots sending kids porn pictures as way of first introduction. And increasing reports of predators using Kik Messenger to extort nude photos from kids. There are many websites set up, that have collected user names and profiles on Kik and advertise them by category, girl or boy, ages etc... Kik Messenger is also rated 17+ on the app stores. Please update the review of Kik. This is one very dangerous app.


As a clinical psychologist and speaker on raising kids in the Instant Gratification Generation, I found this to be extremely helpful and to the point. I have shared it with many parents. New apps are developed all the time so sharing this information is the best way for parents to know what is out there. In our area the app causing an rash of cyberbullying and threats to schools is the "anonymous" app called Burnbook, which is based on the Burn Book from the movie Mean Girls.
That new app Down to Lunch is a new bad one its for sex trafficking it texts you and tell you your friends have invited you when they actually have no idea what the app even is. When you download it and signup it asks you for your address, and all your personal info. I know I got a text coming out of Atlanta Georgia that told me to sign up. So they already have our numbers! So all you parents warn your kids about this app!!
My eldest would chat to her friends every minute of every evening in parallel to life at home if allowed. They use What's App. Do you know how well managed this app is? Her other favourite site is Pinterest. I spoke to her and explained why I don't want her to use Tumblr or Facebook but one of the reasons I gave for not having a Facebook account was that she sees her friends at school every day, it's best for family overseas or people you don't see very often. She accepted that but the same could apply to a What's App. I don't think I would stop her using What's App cos she frequently shares the exchanges she has with friends with me and it's useful for communicating when they're doing homework, but sometimes I feel she is living her life in several alternate realities and sharing every minute of her friends' angst, fangirl hysteria and with some friends their loneliness. At the weekend I often take her iPod Touch off her and she participates fully in family life - still, only just a teenager!
Although social networking itself is free, building and maintaining a company profile takes hours each week. Costs for those hours add up quickly. In addition, businesses need many followers before a social media marketing campaign starts generating a positive return on investment (ROI). For example, submitting a post to 15 followers does not have the same effect as submitting the post to 15,000 followers.
One of the most popular social networks with the younger crowd right now is Snapchat. With Snapchat, you can capture life's best moments as they happen. There are a ton of fun effects and even special promo lenses to use to spruce up your selfie or photo as well. And with a lot of brands on the network, there's unique content that you won't find elsewhere, and it's even a place to get your news, believe it or not. Everything you post on Snapchat stays for 24 hours before it's deleted, but remember that people can screenshot what you post, so be mindful!
I really don't like Tumblr. Its built on angry and misguided teens. Our kid is fun loving, cheerful, athletic, smart and kind to everyone. He's still a teen. But those kids on Tumblr are the dark side - blogging about their cutting issues, their gay experience with another kid last night, how heroin should be legalized, how the world should turn trans, how its "not just a phase". Good god please don't pollute my kids head. While porn might not be on every page, its on every other page, and when it isn't porn, there's still bad language, sexual remarks and inappropriate content
My son switched from txt msg to Kik about a month ago and it really threw me for a loop. I was used to randomly checking his texts, but took me a couple of weeks to realize his text inbox was empty because he had switched to a new app. He texts constantly, usually to girls, and his content is too provocative and sometimes completely crosses the line. As much as we redirect him and counsel him and consequence him on this, he seems to keep doing whatever he can get away with. Now, my husband and I are thinking of uninstalling all of his apps except ones for productivity, like calendar and checklists. we may still allow the camera, but that seems harmless as long as there's no app to post the actual pics. I'm wondering if this move will be so extreme that it starts a tug of war. Any thoughts?

Great list and please don’t get me wrong here, I am sick to death of Facebook. Is there another alternative TO Facebook? Put simply, NO!!! The other social media sites are devoid of the basic common denominator, Collaboration!! While they MIGHT get you a closed network or a specific audience, it doesn’t cater for interaction with all of the platform. What we really need is somewhere that has a home page with your posts that is broadcast to ALL other users or chosen crowds. We need a news feed to cast all of the posts for people to interact with. Twitter, Snapchat, Google+ and Instagram etc etc, just don’t cut the mustard as far as this goes. Some of the others mentioned are specific to specific audiences and are nothing like Facebook. That is why all other alternatives fail dismally!! I wish I had the money and development time to produce it, but alas I don’t.
Now imagine you had that brochure on your website instead. You can measure exactly how many people viewed the page where it's hosted, and you can collect the contact details of those who download it by using forms. Not only can you measure how many people are engaging with your content, but you're also generating qualified leads when people download it.
By the 1970s, a growing number of scholars worked to combine the different tracks and traditions. One group consisted of sociologist Harrison White and his students at the Harvard University Department of Social Relations. Also independently active in the Harvard Social Relations department at the time were Charles Tilly, who focused on networks in political and community sociology and social movements, and Stanley Milgram, who developed the "six degrees of separation" thesis.[25] Mark Granovetter[26] and Barry Wellman[27] are among the former students of White who elaborated and championed the analysis of social networks.[26][28][29][30]
The new digital era has enabled brands to selectively target their customers that may potentially be interested in their brand or based on previous browsing interests. Businesses can now use social media to select the age range, location, gender and interests of whom they would like their targeted post to be seen by. Furthermore, based on a customer's recent search history they can be ‘followed’ on the internet so they see advertisements from similar brands, products and services,[38] This allows businesses to target the specific customers that they know and feel will most benefit from their product or service, something that had limited capabilities up until the digital era.
The marketing automation coordinator helps choose and manage the software that allows the whole marketing team to understand their customers' behavior and measure the growth of their business. Because many of the marketing operations described above might be executed separately from one another, it's important for there to be someone who can group these digital activities into individual campaigns and track each campaign's performance.
Organizations: Formal organizations are social groups that distribute tasks for a collective goal.[40] Network research on organizations may focus on either intra-organizational or inter-organizational ties in terms of formal or informal relationships. Intra-organizational networks themselves often contain multiple levels of analysis, especially in larger organizations with multiple branches, franchises or semi-autonomous departments. In these cases, research is often conducted at a workgroup level and organization level, focusing on the interplay between the two structures.[40] Experiments with networked groups online have documented ways to optimize group-level coordination through diverse interventions, including the addition of autonomous agents to the groups.[41]
Master strategic marketing concepts and tools to address brand communication in a digital world. This Specialization explores several aspects of the new digital marketing environment, including topics such as digital marketing analytics, search engine optimization, social media marketing, and 3D Printing. When you complete the Digital Marketing Specialization you will have a richer understanding of the foundations of the new digital marketing landscape and acquire a new set of stories, concepts, and tools to help you digitally create, distribute, promote and price products and services. In 2016, this was one of the top 10 specializations in terms of enrollments. INC Magazine rated the first course, Marketing in a Digital World, as one of The 10 Hottest Online Classes for Professionals in 2015. In addition, this course was also ranked in the top five courses across multiple MOOC providers. Finally, the Digital Marketing Certificate was the top coveted certificate on Coursera in 2015. Get more updates on the specialization at http://digitalmarketingprofs.com/ This Specialization is part of the University of Illinois Masters of Business Administration degree program, the iMBA. Learn more about the admission into the program here.
Hello! I’m writing a blog post for the digital marketing agency I work for about social media, and I would like to use information from this post along with the Top 15 Most Popular Social Networking Sites graphic in the blog post. We would of course give credit and link back to this post. Feel free to check out our blog here: https://www.bluemagnetinteractive.com/blog/ and let me know!
A content marketer, for example, can create a series of blog posts that serve to generate leads from a new ebook the business recently created. The company's social media marketer might then help promote these blog posts through paid and organic posts on the business's social media accounts. Perhaps the email marketer creates an email campaign to send those who download the ebook more information on the company. We'll talk more about these specific digital marketers in a minute.
"The Social Network" explores the moment at which Facebook, the most revolutionary social phenomena of the new century, was invented -- through the warring perspectives of the super-smart young men who each claimed to be there at its inception. The result is a drama rife with both creation and destruction; one that audaciously avoids a singular POV, but instead, by tracking dueling narratives, mirrors the clashing truths and constantly morphing social relationships that define our time. Drawn from multiple sources, the film captures the visceral thrill of the heady early days of a culture-changing phenomenon in the making -- and the way it both pulled a group of young revolutionaries together and then split them apart.
Triadic level: Add one individual to a dyad, and you have a triad. Research at this level may concentrate on factors such as balance and transitivity, as well as social equality and tendencies toward reciprocity/mutuality.[35] In the balance theory of Fritz Heider the triad is the key to social dynamics. The discord in a rivalrous love triangle is an example of an unbalanced triad, likely to change to a balanced triad by a change in one of the relations. The dynamics of social friendships in society has been modeled by balancing triads. The study is carried forward with the theory of signed graphs.
To create an effective DMP, a business first needs to review the marketplace and set 'SMART' (Specific, Measurable, Actionable, Relevant and Time-Bound) objectives.[60] They can set SMART objectives by reviewing the current benchmarks and key performance indicators (KPIs) of the company and competitors. It is pertinent that the analytics used for the KPIs be customised to the type, objectives, mission and vision of the company.[61][62]
Computer networks combined with social networking software produces a new medium for social interaction[67]. A relationship over a computerized social networking service can be characterized by context, direction, and strength. The content of a relation refers to the resource that is exchanged. In a computer mediated communication context, social pairs exchange different kinds of information, including sending a data file or a computer program as well as providing emotional support or arranging a meeting. With the rise of electronic commerce, information exchanged may also correspond to exchanges of money, goods or services in the "real" world.[68] Social network analysis methods have become essential to examining these types of computer mediated communication.
Email marketing - Email marketing in comparison to other forms of digital marketing is considered cheap; it is also a way to rapidly communicate a message such as their value proposition to existing or potential customers. Yet this channel of communication may be perceived by recipients to be bothersome and irritating especially to new or potential customers, therefore the success of email marketing is reliant on the language and visual appeal applied. In terms of visual appeal, there are indications that using graphics/visuals that are relevant to the message which is attempting to be sent, yet less visual graphics to be applied with initial emails are more effective in-turn creating a relatively personal feel to the email. In terms of language, the style is the main factor in determining how captivating the email is. Using casual tone invokes a warmer and gentle and inviting feel to the email in comparison to a formal style. For combinations; it's suggested that to maximize effectiveness; using no graphics/visual alongside casual language. In contrast using no visual appeal and a formal language style is seen as the least effective method.[48] 

What a horrible thing to happen. It is so important that we don't rush to allow our kids to use social media too early. They need to be mature enough to be able to spot predators, and old enough to tell parents if it happens. It's also so important that parents educate themselves on what these apps, do. What the content is inside the apps ,does it have privacy settings that actually block and protect your child. Sadly so many parents don't seek out education around technology or cyber safety. Most parents think it won't happen to their child, they also believe they know enough. I teach I.T teachers about cyber safety. Cyber Safety education is a very specialised area, no matter how much experience you have with computers and the internet, parents need to learn HOW their kids are using these things. Don't think you know enough...find out for sure! If you have the opportunity to attend a technology or cyber safety talk please go, and take your friends. Knowledge is power.
×