Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Tourism Northern Territory turns to social media

Stories from NT will be shared with an international audience via Pinterest, Twitter, Instagram and Google+

In a bid to attract more international tourists to the Northern Territory (NT) the territory’s department of Tourism is turning to social media channels.

NT Minister for Tourism and Major Events, Matt Conlan, said that it will be making an “aggressive push” over the next 12 months via Twitter, Pinterest, Instagram and Google+ by communicating with visitors in their own language and culture.

NT bus interchanges get free Wi-Fi

Australian War Memorial targets social media

Changing the world 140 characters at a time: Twitter co-creator

“Tourism NT representatives from 12 countries including Japan, China, Singapore, Hong Kong, Germany, Italy, France and America are here in the Territory for intensive training this week,” he said in a statement.

According to Conlan, the international team will travel by coach from Darwin to Alice Springs and collect stories about some of the Territory’s residents and attractions including Uluru (Ayers Rock).

“These experiences will help map out the best way to engage more [tourism] operators in the future, and demonstrate how the NT brand should be communicated in different countries using different social media channels,” he said.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Google, Rock
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Pinterest, Instagram, Tourism NT, twitter, Google+, northern territory, social media
Latest Blog Posts
Whitepapers
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Swiss Nuclear Power Plant Improves Business Continuity
    Learn how Kernkraftwerk Leibstadt (KKL), a Swiss nuclear power plant, achieved 95% virtualization with 50% fewer servers in just two months by implementing a Vblock System. The solution ensures that KKL can reliably deliver the continuous electricity supply safely and cost effectively.
    Learn more »
  • The Three Essential Steps to Successful Cloud Migration
    Businesses and enterprises have quickly realised the power and efficiency of cloud computing, but migrating to the cloud can be a challenging process. This guide leads you through the three key steps you should take to assess your workload, select the most appropriate cloud model and ensure your cloud provider’s migration methodology stacks up.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO