T.R. Robinson's Blog, page 11
January 10, 2020
Poll – Usefulness of Competition Notifications
[image error]
Over recent months occasional notifications of writing and book competitions have been published in this website blog. However, in the absence of any feedback, it has not been possible to judge whether readers and followers have found these useful or if publishing such notifications is a good use of resource. Consequently, it would be appreciated if regular readers and followers spared a few seconds to complete the following poll.
If anyone wishes to expand upon their response, please do so by adding a comment below.
January 7, 2020
Online Insecurities
[image error]
Ideas on how users may protect themselves while sharing on social media have been previously shared in How to Stay Safe on Social Media however, the issue extends far beyond social media.
It is suggested, most digital users, whether active on computer, tablet, e-reader, smartphone, etc., suffer some degree of insecurity in their online activity. In all honesty they would have to be rather naive not to have some concern, especially as cyber crime appears to be ever more prevalent.
Some of the insecurities are fairly obvious and commonplace whereas others often depend upon an individual’s personality and character.
Commonplace Concerns
Hacking; Viruses; and Spam, tend to be the primary areas of worry.
Hacking
In these days when a majority of people use their digital gadgets for most things: personal correspondence; finances; purchases; social media; live chats; writing; etc., there are naturally some concerns about the information, especially the more personal elements, becoming vulnerable to external exposure. As with most such matters, common sense regarding what is shared should be the guiding factor. Some may find the Infograph – Staying Safe Online helpful in this regard.
Viruses
No, not the medical type, though the results can feel the same. A computer virus is normally malicious with the intent of highjacking the digital device (computer, tablet, e-reader, smartphone, etc.). The cyber criminal behind such an attack usually holds one of two aims: financial blackmail (demands payment to release the device) or control of the device for nefarious purposes (criminal activity that will be associated to the highjacked device rather than themselves). This has become such a major issue that a number of articles, relating to varied types of computer viruses, have been previously published in this website blog. Further details, including how to deal with them, may be found in Computer Viruses – Summary.
Spam
Thankfully it is not the questionable meat product that is being referred to here. Spam (Stupid Pathetic Annoying Messages – as some define it) refers to the sending of unsolicited messages. These may be distributed by a number of means including, email, message services, adverts, etc.
Note: The term ‘spam’ originates from a British comedy (Monty Python’s Flying Circus) that is set in a cafe where every menu item contains the canned luncheon meat known as spam.
Why people insist on spamming their fellows is often beyond comprehension. In most instances the intent is obviously to try and force their services or products onto people but surely, if they had any sense, they would realise this method tends to be counterproductive: It is probably one of the best ways to alienate potential clients, customers, purchasers, etc.
Of course, with spam there must always be concern the communication is hiding some sort of malicious software. Users should therefore be circumspect about opening anything that looks questionable. Thankfully, though it is regrettable they have had to go to the trouble of doing so, most genuine software providers have inbuilt systems to identify anything questionable and to put it to one side for the user to consider. Deletion and, where available, blocking the initiating email address or user, is advised.
Personal Concerns
Undoubtedly these will vary from person to person, though some tend to be fundamental to humanity. Most boil down to some type of fear: Being disliked; Considered unintelligent; Thought naive; People laughing; etc.
Disliked
It is understood most psychologists consider it a basic human condition to want to be liked. Even those who have a tendency to be openly hostile and cruel appear to have the need. Users are therefore reluctant to publish anything negative or critical, even if it is appropriate and would help others.
Unintelligent
The majority of people, especially in the so called civilised western world, otherwise frequently referred to as the industrialised world, pride themselves upon being educated and of equal intelligence to all others. To be thought less so often, usually, results in the person being looked down upon and considered of little value to society. No one likes that.
Naive
People like to be thought of as savvy, especially when it comes to social interaction. But attitudes can frequently mitigate this. For example: wanting to believe the best of people is considered by many to be naive and consequently a failing that results in such a person being despised or at best sidelined. Contrarily, it is suggested, in this often cynical world, rather than being despised such an attribute should be valued and enjoyed.
Laughable
As is true with all the other ‘fears’ mentioned above people like to be thought of as being a valuable part of society with something to contribute. To be laughed at is undermining and can have a crushing effect. Many go to great lengths to avoid this.
Of course this is not an exhaustive list, much depends upon the individual character. Each will be able to identify their own concerns and insecurities.
What are the results of these insecurities?
Less Openness – Some will choose to be less open in their online activity and thereby deprive themselves and their contacts of a meaningful relationship. Such an approach may well, probably will, create a problem for people like authors whose fans often like to know about them as a person as well as about their books.
Lying – It has become known in recent times that many online users, especially in social media, blatantly lie about themselves, their families, what they are doing, etc. In fairness, with the inherent needs previously mentioned i.e. to be liked and approved of, such an approach may be understandable though by no means applauded. Beside anything else to lie in such communications will mean any ‘relationship’ will be formed upon a false (quicksand) foundation and is bound to ultimately collapse.
Reluctance – To counteract any possible critical exposure there are those who show a reluctance to participate in any discussion or conversation. This approach again deprives everyone from meaningful and enjoyable interactions.
Hesitation – A number of factors come into play here. When noticing a comment or something similar where the writer has omitted a fact or has included something erroneous, many will hold back from pointing it out. The desire to be liked may be one reason but there are also the issues of not wanting to make anyone feel silly or not wishing to enter into, or create, an argument. However, this deprives others of the truth and knowledge.
The more obvious reactions have been mentioned above but of course, there will undoubtedly be others.
Intermission
The original intent was to provide a complete comprehensive article about online insecurities and how to deal with them. However, to include everything will make this far too long for most website/blog readers who have limited time. The decision has therefore been made to share the information across two articles. The second part ‘How to Deal with Online Insecurities’ will be published shortly.
January 3, 2020
Bitches Series – Latest
December 31, 2019
New Year 2020
Look forward to sharing more together.
December 27, 2019
Bitches #6
Further details and information, including buy links, available here.
December 24, 2019
Christmas 2019
of this website and blog:
A Happy and Peaceful Christmas
Thank you for being here and for sharing.
December 20, 2019
Naked Truths About Getting Book Reviews 2018 by Gisela Hausmann.
[image error]The title of this book really says it all. This is a realistic and practical guide upon the subject of authors getting reviews for their books. Some may even consider it brutal. But it is a fact that truth is often merciless nevertheless, if an author honestly wants to get the best they can for their book(s) they need to face up to the realities.
Gisela Hausmann does not ‘beat about the bush’. In this book she tackles the subject of reviews head on, drawing upon her own extensive experience as a top Amazon reviewer. She covers all aspects of the topic: types of review; validity of all types; what an author should expect; how to request a review; etcetera.
Gisela also provides practical advice about building a fan base and how an author should share information about their book(s). This really is an all encompassing publication. It really needs to be read for authors to appreciate the breadth and validity of the information and insights.
Naturally, this book will prove helpful for those new to authoring but it may also be of assistance to those who are already on the path, if for no other reason than to be reminded of the realities facing independent, as well as traditionally published, authors.
Five stars (5*).
The book is available in both paperback and e-book formats.
December 17, 2019
Twitter Algorithm
[image error]
Social Media users will have heard a lot about Facebook’s algorithm in recent times but how many know Twitter also utilises similar processes?
Twitter’s adoption of an algorithm has been a fairly recent enhancement and one some did not take kindly to however, with the speed at which the site operates and the number of tweets (estimated at 500,000,000 per day), it must be seen as an inevitable and sensible development. Without such a filter a users timeline can be flooded, within seconds, with tweets from all the accounts they follow. In the past users had to wade through to find those they have a greater interest in. Twitter wanted to make the process a more positive experience and have therefore adopted the algorithm style. Thankfully their algorithm is less draconian and limiting than Facebook’s, which severely reduces the number of people to whom posts are displayed. In addition, as will be discussed later in this article, use of the Twitter’s algorithm is not mandatory.
How the Algorithm Operates
Twitter uses a scoring system to determine which tweets, from the accounts the user follows, are most likely to be relevant or of interest. The system looks at three characteristics: The tweet; The tweet’s author; and The user.
The Tweet
It’s recency (how recently was it posted).
Whether an image or video are attached.
Total engagement (retweets, likes and comments).
The Tweet’s Author
Type of past interactions the user had with them.
Strength of the connection.
Origin of the relationship.
The User
Types of tweets user has engaged with in past.
How often they visit the site.
How much they use the site.
The Algorithmic Timeline
When opening twitter the user’s timeline will be organised into three main sections: Top Ranked Tweets; In Case You Missed It; and Reverse Chronological Order.
Top Ranked Tweets
Tweets which, utilising the scoring system referred to above, the Twitter algorithm determines a user is most likely to be interested in. These are displayed in time order.
In Case You Missed It
Tweets from accounts the user frequently engages with. However, whether these are displayed or not depends upon the number of ‘highly relevant’ tweets, since the last time the user opened their account, the algorithm detects.
Reverse Chronological Order
This is where a user will see their regular Twitter feed. In other words the newest tweets from accounts they follow. These are always shown in reverse order i.e. the newest is displayed first. This section is always ordered after the previous two.
Note: Unlike the Facebook algorithm, Twitter will always, unless specifically addressed to individual accounts or people, display ALL tweets to ALL users of the accounts they follow. It should also be noted Twitter management and development have stated the system will always remain ‘live and real-time’.
Miscellaneous Tweets
Occasionally tweets from accounts the user does not follow may show up in their timeline. These are ones Twitter considers will make the user’s timeline more relevant and interesting.
Sometimes sponsored (advertising) tweets are also included. The user may determine which of these are displayed by using the dropdown menu available from clicking on the ellipsis displayed to the right of the tweet.
Turning Off Algorithm
As mentioned earlier the use of Twitter’s algorithm is not mandatory. Some users prefer to stick with the traditional timeline flow in which, other than time of posting, there is no discrimination between tweets and all are shown in reverse chronological order. Twitter accepts this and has provided the option for users to turn the algorithm process off.
Twitter management and development have made clear there are likely to be constant changes to the system as they seek to improve user experience. This also appears to impact how users access various settings. As at the time of writing the option to turn off the algorithm may be actioned by:
clicking on the ✧ symbol displayed at the top of timelines; and
selecting ‘See Latest Tweets Instead’.
Note 1: As stated in the displayed panel, the system will switch back to utilising the algorithm after the user has been away for a while.
Note 2: Within the panel there is also an option to go to the content preferences settings. However, as at the time of writing, the option to deselect or select ‘Show me the best Tweets first’ appears to no longer exist.
Note 3: Within settings there is an option for adverts to be personalised to the user’s own interests.
Conclusion
It cannot be denied Twitter’s algorithm has been designed to improve relevance and user experience for which people should be grateful. However, in acknowledgement and consideration of individual preferences, the option to alter settings is provided.
Twitter have reassured the system will remain ‘live and real-time’ and all tweets will be displayed to all followers unless addressed to individual accounts by prefacing the tweet with @username. In the latter instance only the addressee and those who follow both accounts will see the tweet.
One point not mentioned above is, to get the best out of Twitter users should be regularly active.
Facebook’s algorithm has been mentioned consequently, some readers of this article may be interested in a previous article that discussed some far reaching, and still relevant, changes Facebook made to its algorithm in 2018. Click here to access the article.
December 13, 2019
BookLife Non-Fiction Writing Contest Deadline Approaching
This is a reminder that the deadline for entry to the BookLife Non-Fiction Writing Contest is:
Wednesday 1 January 2020
Details of the contest and how to enter may be found in the previous notification:
Writing/Review Opportunity – BookLife NonFiction Contest
All those who choose to enter are wished success.
Caveat: Writing contest information is provided ‘As Is’. No endorsement or guarantee of validity is implied.
Disclaimer: Neither T. R. Robinson Publications nor T. R. Robinson have any affiliation to the company or organisation referred to. Nor do either receive any remuneration for publishing the information or for referring to the company or organisation. These notifications are simply designed to offer assistance to authors.
December 10, 2019
Infograph – Staying Safe Online
Regrettably online security threats continue to grow in various ways. Back in 2016 scams on social media (Twitter; Facebook; LinkedIn; etc.) grew by an estimated 150%. How much more must it be these days when hackers and cyber criminals are even more prevalent? All online and internet users need to be aware of the increasing trend.
Of course, it is wise for users to be continually alert throughout the year however, the issue comes more into focus at holiday times when there is the temptation to share more instantaneously.
Unfortunately the individual user has little power, other than reporting the fact, when it comes to trying to counteract these nasty, unpleasant, inconsiderate, thoughtless, CRIMINALS (what else can they be called). Nevertheless, it would be wrong to allow them to deter people from the joy of sharing with their friends, relatives and colleagues. All it really needs is for users to be aware and circumspect in what they put on public display.
The following inforgraph has been designed as a high-level reminder that may be kept to hand for everyday use. Though the information is based upon a previous article How to Stay Safe on Social Media the principles are applicable to all aspects of online activity, not just social media.
[image error]
Conclusion
To stay safe online users simply need to be careful about how much personal information they share. It may be all right with family and friends, who probably already know the primary details, but it must always be born in mind, social media as well as websites and blogs are usually publicly accessible.