article thumbnail

10 Twitter Best Practices for Nonprofits

Nonprofit Tech for Good

Use hashtags strategically to mention important causes, campaigns, and events, but hashtag spamming to try to increase your reach doesn’t work and has a negative effect on engagement. Don’t be a photo tag spammer either! 3) Tweet content that inspires engagement. 8) Get to know your Twitter Analytics Dashboard.

Twitter 356
article thumbnail

10 Popular #Hashtags for Nonprofits

Nonprofit Tech for Good

There is such a thing as hashtag spamming. Nonprofit : Occasionally, you can replace the word “nonprofit&# with “#nonprofit&# in a Tweet, or tag it on to the end of Tweet that mentions a nonprofit or nonprofit trend. fundraising : This hashtag is best used when tagged on to a Tweet that discusses fundraising trends.

Nonprofit 199
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Networked Nonprofit Update

Beth's Blog: How Nonprofits Can Use Social Media

If You Want An Answer, Ask Everyone by Jane Wales, Huffington Post, provides an overview of crowdsourcing in philanthropy and quotes from the chapter in our book on crowdsourcing. He raises a good point and even makes up a new word: spamanthropism (spam + philanthropism). Tags: Promotions. And that’s just October!

Network 94
article thumbnail

NpTech Tag Summary: Putting the U in YouTube, Some Cool Events, and Electronic Sheep Dreams

Beth's Blog: How Nonprofits Can Use Social Media

Yikes, the first ever tag spam I've seen in the NpTech Tag Stream! " (At first, I thought the title might refer to Electric Sheep Company , a big player in virtual worlds, and that it would lead to some more reflections on the MacArthur Foundation's recent Philanthropy Event in Second Life. NpTech Talk.

Nptech 50
article thumbnail

Top 10 Threats to Higher Ed Computer Systems

Robert Weiner

In his article in the Chronicle of Philanthropy titled “ Top 10 Threats to Computer Systems Include Professors and Students ,&# Jeffrey Young says. He then lists the following threats: #10: Spammers (&# attackers use college networks to help them send more spam&# ). #9: Tags: IT Management Security. No surprise there).

System 100