Remove Method Remove Practice Remove Survey Remove Teen
article thumbnail

Unlease Your Organizations Knowledge Sharing Processes

Beth's Blog: How Nonprofits Can Use Social Media

As Wyman’s Teen Outreach Program® began to be replicated across the nation, the need to capture learning in a more sophisticated way grew right along with the growth of replication. Be aware that “knowledge hoarding” is often a common practice. Administer a Survey Pilot. Conduct an Organizational Audit. Conduct the Audit.

Knowledge 100
article thumbnail

How Minnesota’s ‘Networked Nonprofits’ Raised over $10M in 1 Day!

Beth's Blog: How Nonprofits Can Use Social Media

From the looks of our post-event survey data and Google traffic reports, social media played a big part, particularly Facebook. Here are some highlights from our post-event nonprofit survey*: • 55.4 And, here are some highlights from our post-event donor survey*: • 61.2 Survey remains open. About Jeff.

Raise 108
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Creating Buy-In for a Data Culture at Your Nonprofit

Tech Soup

Don't create all new goals — explain how the change in methods will contribute towards the objectives you have always had. At every level , colleagues in various positions will need to participate in best practices, training, and tracking to make the shift successful. What Are Some Case Studies of Success?

Culture 36
article thumbnail

Trust Me, Know Me, Love Me: Trust in the Participatory Age

Museum 2.0

Last month, the IMLS published a report on a survey of 1,700 people, with similar findings about trustworthiness of museums and libraries, and some great added information about how use of the internet benefits both museums (with higher in-person visitation) and visitors (with more ways to find information of interest). It's very relational.

article thumbnail

Protecting Yourself from Malware with Better Password Security

Tech Soup

In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails , cybercriminals' preferred method of spreading malware. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Best Practices for Effective Password Protection.

Files 61
article thumbnail

What I Learned From @nancylublin About #dataonpurpose

Beth's Blog: How Nonprofits Can Use Social Media

It doesn’t mean that we’re going to do a survey once as a fancy report for a Foundation. Their primary communications method is text and that lends itself to templates. For example, they ran a campaign for teens to collect food for a Food Banks around the country. It is ongoing.”. A Culture of Iteration. Text Crisis Line.