{"id":2684,"date":"2012-10-06T15:30:14","date_gmt":"2012-10-06T13:30:14","guid":{"rendered":"https:\/\/infopolicy.net\/?p=2684"},"modified":"2012-10-06T15:30:14","modified_gmt":"2012-10-06T13:30:14","slug":"","status":"publish","type":"post","link":"https:\/\/infopolicy.net\/en\/ispolzovanie-sotsialnyh-media-dlya-z\/","title":{"rendered":"","raw":""},"content":{"rendered":"","protected":false,"raw":""},"excerpt":{"rendered":"","protected":false,"raw":""},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ru_post_content":"<img src=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2012\/10\/w-ZeroDay-SocEng.jpg\" alt=\"\" title=\"w-ZeroDay-SocEng\" width=\"900\" height=\"625\" class=\"alignnone size-full wp-image-2685\" \/>\r\n\r\n\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a:\r\n<a href=\"http:\/\/www.washingtonpost.com\/investigations\/social-engineering-using-social-media-to-launch-a-cyberattack\/2012\/09\/26\/a282c6be-0837-11e2-a10c-fa5a255a9258_graphic.html\">\r\nhttp:\/\/www.washingtonpost.com\/investigations\/social-engineering-using-social-media-to-launch-a-cyberattack\/2012\/09\/26\/a282c6be-0837-11e2-a10c-fa5a255a9258_graphic.html<\/a>","_ru_post_name":"ispolzovanie-sotsialnyh-media-dlya-z","_ru_post_excerpt":"","_ru_post_title":"\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0435\u0434\u0438\u0430 \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438","_en_post_content":"","_en_post_name":"","_en_post_excerpt":"","_en_post_title":"","edit_language":"en","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-2684","post","type-post","status-publish","format-standard","","category-bez-rubriki"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pffTZ2-Hi","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1309,"url":"https:\/\/infopolicy.net\/en\/15-naibolee-populyarnyh-sotsialnyh-sete\/","url_meta":{"origin":2684,"position":0},"title":"15 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2010","author":"infopolicy","date":"28.09.2010","format":false,"excerpt":"1 | facebook 2 - eBizMBA Rank | 550,000,000 - Estimated Unique Monthly Visitors | 3 - Compete Rank | 2 - Quantcast Rank | 2 - Alexa Rank. Most Popular Social Networking Websitess\u00a0|\u00a0Updated 9\/15\/2010\u00a0|\u00a0eBizMBA 2 | MySpace 19 - eBizMBA Rank | 90,500,000 - Estimated Unique Monthly Visitors |\u2026","rel":"","context":"In &quot;\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430&quot;","block_context":{"text":"\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430","link":"https:\/\/infopolicy.net\/en\/category\/socialmedia\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.ebizmba.com\/images\/logos\/facebook.gif?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1114,"url":"https:\/\/infopolicy.net\/en\/100-sposobov-izmerit-sotsialnye-media\/","url_meta":{"origin":2684,"position":1},"title":"100 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0438\u0437\u043c\u0435\u0440\u0438\u0442\u044c \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430","author":"infopolicy","date":"18.11.2009","format":false,"excerpt":"\u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e :-) 1. Volume of consumer-created buzz for a brand based on number of posts 2. Amount of buzz based on number of impressions 3. Shift in buzz over time 4. Buzz by time of day \/ daypart 5. Seasonality of buzz 6. Competitive buzz 7. Buzz by category \/\u2026","rel":"","context":"In &quot;\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430&quot;","block_context":{"text":"\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0435\u0434\u0438\u0430","link":"https:\/\/infopolicy.net\/en\/category\/socialmedia\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6839,"url":"https:\/\/infopolicy.net\/en\/digital-social-mobile-worldwide-v-2015\/","url_meta":{"origin":2684,"position":2},"title":"Digital, Social &#038; Mobile Worldwide \u0432 2015","author":"infopolicy","date":"09.02.2015","format":false,"excerpt":"\u041a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u0430\u044f, \u0443\u0436\u0435 \u0435\u0436\u0435\u0433\u043e\u0434\u043d\u0430\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u044f: Digital, Social & Mobile in 2015 from We Are Social Singapore \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/wearesocial.net\/blog\/2015\/01\/digital-social-mobile-worldwide-2015\/","rel":"","context":"In &quot;Mobile&quot;","block_context":{"text":"Mobile","link":"https:\/\/infopolicy.net\/en\/category\/mobile\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7660,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-8-oshibok-v-sotsialnyh-m\/","url_meta":{"origin":2684,"position":3},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: 8 \u043e\u0448\u0438\u0431\u043e\u043a \u0432 \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0435\u0434\u0438\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0430\u0434\u043e \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c","author":"infopolicy","date":"18.07.2015","format":false,"excerpt":"\u041f\u043e\u043b\u0435\u0437\u043d\u043e: Having no social media strategy Creating accounts on too many platforms too soon Paying for fake followers Talking about nothing but the brand Using irrelevant and excessive hashtags Sharing too much in a short amount of time Forgetting to proofread Neglecting the \u201csocial\u201d aspect of social media \u0418\u043b\u043b\u044e\u0441\u0442\u0440\u0430\u0446\u0438\u044f: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a:\u2026","rel":"","context":"In &quot;\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430&quot;","block_context":{"text":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430","link":"https:\/\/infopolicy.net\/en\/category\/infographic\/"},"img":{"alt_text":"8-Social-Media-Marketing-Mistakes-to-Avoid","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2015\/07\/8-Social-Media-Marketing-Mistakes-to-Avoid.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2015\/07\/8-Social-Media-Marketing-Mistakes-to-Avoid.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2015\/07\/8-Social-Media-Marketing-Mistakes-to-Avoid.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2015\/07\/8-Social-Media-Marketing-Mistakes-to-Avoid.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":19884,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-kak-manipulirovat-s\/","url_meta":{"origin":2684,"position":4},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u041a\u0430\u043a \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u043c\u0435\u0434\u0438\u0430","author":"infopolicy","date":"14.08.2022","format":false,"excerpt":"\u0418\u043b\u043b\u044e\u0441\u0442\u0440\u0430\u0446\u0438\u044f \u043a \u043e\u0442\u0447\u0435\u0442\u0443 \"Social Media Manipulation 2021\/2022: Assessing the Ability of Social Media Companies to Combat Platform Manipulation\" \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/stratcomcoe.org\/publications\/social-media-manipulation-20212022-assessing-the-ability-of-social-media-companies-to-combat-platform-manipulation\/242","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/08\/SocialMediaManipulate.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/08\/SocialMediaManipulate.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/08\/SocialMediaManipulate.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1237,"url":"https:\/\/infopolicy.net\/en\/interesnoe-issledovanie\/","url_meta":{"origin":2684,"position":5},"title":"\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435","author":"infopolicy","date":"12.05.2010","format":false,"excerpt":"Social Marketing Analytics: A New Framework for Measuring Results in Social MediaView more documents from John Lovett. \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: http:\/\/www.webanalyticsdemystified.com\/downloads\/Web_Analytics_Demystified_Altimeter-Social-Media_Analytics.pdf","rel":"","context":"In &quot;\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f&quot;","block_context":{"text":"\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f","link":"https:\/\/infopolicy.net\/en\/category\/research\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/2684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/comments?post=2684"}],"version-history":[{"count":1,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/2684\/revisions"}],"predecessor-version":[{"id":2686,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/2684\/revisions\/2686"}],"wp:attachment":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/media?parent=2684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/categories?post=2684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/tags?post=2684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}