XXX, A Network Initiative

XXX, A Network Initiative

A Brief Review of Technological Opportunities for Agency Resource Management Marcia deChadenedes Outreach and Partnerships Coordinator California Coastal National Monument Bureau of Land Management November 2010 Gateway flier Connecting Communities Through Technology

Connecting Communities Through Technology Connecting Communities Through Technology Network Goal / Vision Network Objectives Write Network Initiative Goal List objectives Your Title

Managing by Network Network Goal / Vision Network Objectives Write Network Initiative Goal List objectives Your Title Managing by Network Network Goal / Vision

Network Objectives Write Network Initiative Goal List objectives Your Title Managing by Network Network Goal / Vision Network Objectives

Write Network Initiative Goal List objectives Stage of Network Development With the Monterey Bay Sustainable Tourism Group as the focused study: Visioning Conceptual Research and Development Implementation Planning The group has progressed through these stages of their development and are poised to commence engaging the public in a National Heritage Area nomination process, the

first of several initiatives they intend to accomplish. Active anticipated in 1 month time with meetings with county supervisors, city councils, and representative congressionals How does the California Coastal National Monument intend to proceed? Take less leadership, more participant role, share the podium, sometimes stay neutral in decision-making. Continue to act as a catalyst and support. Network Geography Communities of Place, Identify and Interest The pilot study network operates: Geographically the California Monterey Bay Region Santa Cruz, San Benito, and Monterey Counties Virtually online in Google Groups, and through email

Participants self identify and actively engage other organizational representatives based on their common interests. The group is a regular item on community interest calendars and agendas. Benefits of the Network The mission of the network is to facilitate a mechanism for representatives of Monterey Bay communities, governmental agencies, and other interested organizations to collaboratively manage the promotion and preservation of our natural and cultural heritage. Without this network initiative no organization would

exist to accomplish what might only be possible today. Local and international communities of advocacy for natural and cultural heritage benefit. Evaluation Criteria 1 Comments Evaluating Network Potential and Performance Addresses the CCNM RMP, agency interest in stewardship Advance strategic priorities of

the agency and engaging youth 2 Leverages funding Funding becomes more available, with egalitarian use, like a potluck meal 3 Demonstrates big-picture

thinking Systems and knowledge can be adapted to unique programs, the objectives for the goals of the group 4 Demonstrates entrepreneurship Engages gov groups in opportunities ordinarily not available, faster, more sleek processes through nonfederal efforts

5 Management of formal agreements and contracts Opportunities exist with new partners to create MOUs and AA but not necessary at this point. 6 Demonstrates effective external and internal communication

An expectation of the challenge to fostering gateway relationships. 7 Demonstrates accountability On-line publishing evidences commitment 8 Potential as a network management model

Transferability potential, also could serve as a chapter for a network, a greater whole. Lessons Learned When Networking with Technology Technology, including social media, can optimize organizational mechanisms and enhance public access. TRAINING and CONSISTENCY in QUALITY PERFORMANCE are necessary, up front and in self-guided opportunities.

There are security risks that should be considered, define participation responsibilities. Use of the media can impact employee or participant productivity define parameters. The organizations reputation has new expectations & vulnerabilities - anticipate communication needs.

Identify objectives and establish strategies at the management level, inform the implementation interface. Define measurements and accomplishments, but be adaptable. Create matrix for tracking in action. Dedicate the appropriate resources with the right timing. Build in review and adaptation. Decide who the gatekeepers are and why. Establish protocol.

Decide who can participate and why. Encourage feedback. Set parameters to the media use significance to strategies and building coalition. Take care of proprietary interests, especially with publications, avoid conflicts of interest by gaining permissions from the right management level. Other Useful Trend Data

for Technology Choices More half of phone users Morethan than half ofall allcell

cell phone users between the ages of 50 and 64 use cell between the

ages of 50 and 64 use cell phones to send and receive text phones

to send and receive text messages. messages. 66of the age

65 of10 10over over thethose ageof of 65have havecell cell phones, half of use

them to phones, half of those use them totake take photos. photos.

95% 95%between betweenthe theages agesof of19 19and and29 29text. text.

InIn2007 of used 200711% 11% ofAmericans Americans usedtheir their phones to access

the Internet. phones to access the Internet. InIn2009 200938% 38% Marketplace Research Google Alerts Google Alerts

(http://www.google.com/alerts) (http://www.google.com/alerts) Google Blog Search ( Google Blog Search ( http://www.blogsearch.google.com/) http://www.blogsearch.google.com/) Twitter Search Twitter Search (http://www.search.twitter.com) (http://www.search.twitter.com) SiteVolume (http://www.sitevolume.com) SiteVolume (http://www.sitevolume.com) SocialMention SocialMention

(http://www.socialmention.com) (http://www.socialmention.com) Socialcast (http://www.socialcast.com) Socialcast (http://www.socialcast.com) Mashable(http://www.mashable.com) Mashable(http://www.mashable.com)

Recently Viewed Presentations

  • Parte II  Tipos de Ataques Julho/2004 Joo Bosco
  • Children's Protective Services, Mandated Reporter Training ...

    Children's Protective Services, Mandated Reporter Training ...

    Online reporting system should not be used for child death or immediate needs such as law enforcement on scene. Phone hotline will remain staffed 24/7 and able to take calls. If using the online reporting system, a DHS 3200 is...
  • Performance indices

    Performance indices

    * بهینه سازی اجرای پرس و جو SELECT name FROM books, keeper WHERE keeper.ID = books.keeping AND Title = "Handbook of applied cryptography" πname Books.keeper = Keeper.id σTitle = "Cryptography" D KeeperS D BooksS فقط عملگر‌هایی که در زیر عملگر...
  • IEEE OU AnalyticsStudents Dashboard

    IEEE OU AnalyticsStudents Dashboard

    IEEE OU Analytics . Student Count by Grade (table) - Displays attending students (any member grade) by region, council and section.. Sections may also view other sections of attending students (any member grade) who are enrolled in a school in...
  • Uwf Writing Lab Rules of Thumb for Pronoun Case

    Uwf Writing Lab Rules of Thumb for Pronoun Case

    Alcohol and tobacco are harmful to (whoever, whomever) consumes them. WHOEVER If I should decide to buy a hunting license, (who, whom) should I see? WHOM Dr. Evans asked Suzanne and (I, me) to explain the recent studies in literary...
  • Welcome to Mexico!

    Welcome to Mexico!

    • What are the arguments both for and against the current policies of the U.S. government at the Mexico/United States border? • What are the major problems and controversies associated with the Mexico/United States border? • What are some possible...
  • Presentation Title - National Library of Australia

    Presentation Title - National Library of Australia

    This may increase in the near future as social media tools such as Twitter and Facebook drive this form of interaction deeper into the public's toolkit. Purple = 3 sites only over 1000 contributors per month. Australian Newspapers, Distributed Proofreaders,...
  • Chapter 1

    Chapter 1

    Prove that regular languages are closed under union, concatenation, star-closure, complementation, and intersection. Prove that regular languages are closed under reversal. Describe a membership algorithm for regular languages. Describe an algorithm to determine if a regular language is empty, finite,...