Tweet Naked


Book Description

Presenting a fresh perspective on a common challenge, author Scott Levy delivers a new answer to every business owner’s social media question — how can I make social media work for me? Levy’s solution takes a cue from another explosive media phenomenon: reality TV. Levy invites readers to create the same magnetism that pulls reality TV viewers in by using the same tools: transparency, authenticity, and a human element. Readers learn how to use social platforms to tactfully share, or bare, their brand, inciting consumer action. Readers also learn how to strip their social media strategy down to what works for their brand, exhibit transparency that engages followers on all popular social channels, and create brand consistency across all social platforms. Other topics cover engineering positive brand impacts and avoid devastating damage, using crowdsourcing and retweets, and lifting a brand from relative obscurity to significant popularity. Real-life examples relate well-known business brands such as Sharpie and Jet Blue, and personal brands such as NFL Runningback DeAngelo Williams. Social media marketers learn exactly what it takes to seduce the masses and turn them from passive followers to brand champions and loyal brand buyers.




The Discourse of Customer Service Tweets


Book Description

The Discourse of Customer Service Tweets studies the discursive and pragmatic features of customer service interactions, making use of a corpus of over 1.5 million tweets from more than thirty different companies. With Twitter being used as a professional service channel by many transport operators, this book features an empirical analysis of British and Irish train companies and airlines that provide updates and travel assistance on the platform, often on a 24/7 basis. From managing crises in the midst of strike action to ensuring passengers feel comfortable on board, Twitter allows transport operators to communicate with their customers in real time. Analysing patterns of language use as well as platform specific features for their communicative functions, Ursula Lutzky enhances our understanding of customers' linguistic expectations on Twitter and of what makes for successful or unsuccessful interaction. Of interest to anyone researching discourse analysis, business communication and social media, this book's findings pave the way for practical applications in customer service.




Tweeting to Power


Book Description

Using theory and data, Gainous and Wagner illustrate how online social media is bypassing traditional media and creating new forums for the exchange of political information and campaigning.




The Diary of Amos Lee (I'm Twelve, I'm Tough, I Tweet!)


Book Description

It’s my last year in primary school and I’m taking part in my school’s first Tween Idol contest! I got myself a Twitter Account to gain supporters. I’m furious that my arch enemy, Michael, is doing the same. Oh man, he’s everywhere—Facebook, IM, YouTube, you name it. But what he doesn’t realise is how popular I am. My secret weapon? My sister WPI (Whiny, Pesky and Irritating) and her two-girl band. She’s so popular these days it’s good to be her big brother. I’m kind of sad that my best friend, Alvin, is also running against me in the contest, but hey, may the best man win. Psst…I’ve got a few tricks up my sleeve.




The She Boss


Book Description




Computer Networks and Inventive Communication Technologies


Book Description

This book is a collection of peer-reviewed best-selected research papers presented at 4th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2021). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference are a valuable resource, dealing with both the important core and the specialized issues in the areas of next-generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advanced work in the area.




Hybrid Intelligent Systems


Book Description

This book highlights the recent research on hybrid intelligent systems and their various practical applications. It presents 97 selected papers from the 22nd International Conference on Hybrid Intelligent Systems (HIS 2022) and 26 papers from the 18th International Conference on Information Assurance and Security, which was held online, from 13 to 15 December 2022. A premier conference in the field of artificial intelligence and machine learning applications, HIS–IAS 2022, brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from over 35 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.




Database Systems for Advanced Applications


Book Description

This two volume set LNCS 7238 and LNCS 7239 constitutes the refereed proceedings of the 17th International Conference on Database Systems for Advanced Applications, DASFAA 2012, held in Busan, South Korea, in April 2012. The 44 revised full papers and 8 short papers presented together with 2 invited keynote papers, 8 industrial papers, 8 demo presentations, 4 tutorials and 1 panel paper were carefully reviewed and selected from a total of 159 submissions. The topics covered are query processing and optimization, data semantics, XML and semi-structured data, data mining and knowledge discovery, privacy and anonymity, data management in the Web, graphs and data mining applications, temporal and spatial data, top-k and skyline query processing, information retrieval and recommendation, indexing and search systems, cloud computing and scalability, memory-based query processing, semantic and decision support systems, social data, data mining.







Month by Month Books ..


Book Description