Reveal Chat Holdco V. Facebook

Total Page:16

File Type:pdf, Size:1020Kb

Reveal Chat Holdco V. Facebook Case 4:20-cv-00363-KAW Document 1 Filed 01/16/20 Page 1 of 110 1 PIERCE BAINBRIDGE BECK PRICE & HECHT LLP 2 YAVAR BATHAEE (CA 282388) 3 [email protected] MICHAEL POMERANTZ (NY 2920932) (pro hac vice forthcoming) 4 [email protected] 5 DAVID L. HECHT (NY 4695961) (pro hac vice forthcoming) [email protected] 6 ADAM C. LUDEMANN (NY 5352323) (pro hac vice forthcoming) [email protected] 7 277 Park Ave. 45th Floor 8 New York, NY 10172 (212) 484-9866 9 BRIAN J. DUNNE (CA 275689) 10 [email protected] 355 S. Grand Ave. 44th Floor 11 Los Angeles, CA 90071 12 (213) 262-9333 13 Attorneys for Plaintiffs 14 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA 15 16 REVEAL CHAT HOLDCO LLC, a Case No. 3:20-cv-363 Delaware limited liability company, USA 17 TECHNOLOGY AND MANAGEMENT SERVICES, INC. (d/b/a Lenddo USA), a 18 Delaware corporation, CIR.CL, INC., a dissolved Delaware corporation, and CLASS ACTION COMPLAINT 19 BEEHIVE BIOMETRIC, INC., a dissolved Delaware corporation, 20 21 Plaintiffs, 22 v. 23 FACEBOOK, INC., a Delaware Jury Trial Demanded corporation, 24 Defendant. 25 26 27 28 Class Action Complaint Case 4:20-cv-00363-KAW Document 1 Filed 01/16/20 Page 2 of 110 1 TABLE OF CONTENTS 2 INTRODUCTION ......................................................................................................................... 1 3 PARTIES ....................................................................................................................................... 5 4 I. PLAINTIFFS ..................................................................................................................... 5 5 II. DEFENDANT .................................................................................................................... 7 6 JURISDICTION AND VENUE .................................................................................................... 8 7 FACTS ........................................................................................................................................... 9 8 I. FACEBOOK EMERGES AS THE DOMINANT SOCIAL NETWORK ........................ 9 9 A. The Last Social Network Standing ........................................................................ 9 10 B. A New Market of Its Own Creation ..................................................................... 11 11 C. The Social Data Barrier to Entry ......................................................................... 14 12 13 D. Google’s Failed Entry into the Social Data Market ............................................. 16 14 II. A THREAT TO FACEBOOK’S MONOPOLY: THE RISE OF SMART PHONES AND MOBILE APPS ............................................... 19 15 A. The Mobile App Revolution ................................................................................ 19 16 B. Facebook Recognizes the Looming Threat Presented by 17 Mobile Applications.............................................................................................. 23 18 C. The Facebook Platform ........................................................................................ 25 19 D. The Profitable Open Graph Platform and Mobile Install Business ..................... 27 20 III. FACEBOOK WEAPONIZES ITS PLATFORM TO 21 DESTROY COMPETITION ........................................................................................... 30 22 A. Facebook Makes Plans to Remove Vital Friends and News Feed APIs and Refuses to Sell Social Data to Competing Application Developers .................... 30 23 B. Facebook’s Social-Data Heist .............................................................................. 32 24 25 C. Facebook Targets Its Competitors for Reciprocity or Denial of API Access ...... 37 26 D. The Decision to Remove Developer Access to the Friends, News Feed and Other Crucial APIs Lacked Any Legitimate Justification .................... 41 27 28 -i- Class Action Complaint Case 4:20-cv-00363-KAW Document 1 Filed 01/16/20 Page 3 of 110 TABLE OF CONTENTS 1 (continued) 2 E. Facebook Prepares to Announce Removal of the APIs ....................................... 46 3 F. The Announcement at F8 ..................................................................................... 50 4 IV. THE WHITELIST AND DATA SHARING AGREEMENTS ....................................... 51 5 V. THE SURVEILLANCE AND ACQUISITION OF 6 COMPETITIVE THREATS ............................................................................................. 55 7 A. Facebook Relies on Onavo’s Surveillance of Facebook’s Competitors, and 8 Acquires and Uses Onavo’s Assets ...................................................................... 56 9 B. Facebook Identifies Instagram as a Threat and Acquires the Company ......................................................................................... 60 10 C. Facebook Acquires WhatsApp ............................................................................ 66 11 VI. FACEBOOK’S INTEGRATION OF INSTAGRAM AND WHATSAPP 12 WITH ITS FACEBOOK PRODUCT .............................................................................. 71 13 VII. THE RELEVANT MARKETS......................................................................................... 77 14 A. The Social Data Market ....................................................................................... 77 15 B. The Social Advertising Market ............................................................................ 83 16 C. Barriers to Entry ................................................................................................... 85 17 D. Relevant Geographic Markets ............................................................................... 87 18 VIII. HARM TO COMPETITION AND ANTITRUST INJURY ............................................ 88 19 CONCEALMENT AND TOLLING ............................................................................................ 94 20 21 CLASS ACTION ALLEGATIONS ............................................................................................. 94 22 CLAIMS FOR RELIEF ................................................................................................................ 99 23 PRAYER FOR RELIEF ............................................................................................................. 106 24 JURY DEMAND ........................................................................................................................ 107 25 26 27 28 -ii- Class Action Complaint Case 4:20-cv-00363-KAW Document 1 Filed 01/16/20 Page 4 of 110 1 1. Plaintiffs allege the following on behalf of themselves and others similarly situated 2 on information and belief based on the review of only public documents and information. All 3 references to internal Facebook documents are exclusively to those published by news 4 organizations and other public sources, particularly NBC News.1 Neither Plaintiffs nor the 5 undersigned counsel viewed or received, or even had access to, any confidential information about 6 Facebook at the time this complaint was filed. 7 INTRODUCTION 8 2. This action seeks to halt the most brazen, willful anticompetitive scheme in a 9 generation—a scheme that verges on final, irreparable completion as of the date of this Complaint. 10 3. Facebook stands today as a paragon of unbridled market power. A company with 11 unprecedented reach, Facebook collects and monetizes the activity of more than two billion active 12 users around the world. Facebook’s advertising juggernaut produces almost $55 billion in revenue 13 in a year, and its founder and CEO, Mark Zuckerberg, enjoys incontestable control over the 14 company and its board. Facebook owns some of the most valuable social networks other than 15 Facebook itself, including Instagram and WhatsApp. As 2020 begins in earnest, Facebook has no 16 serious rival in its key markets—nor any prospect of one. 17 4. It was not always so. In 2010, when Facebook defeated rivals MySpace and 18 Friendster and emerged as the winner of the social network wars, the company was caught 19 flatfooted by a new technology that threatened its dominance—smartphones. 20 5. Facebook’s dominance had been fortified by powerful network effects—the more 21 data it collected on users, the more attractive its social network became to users. As a result, a 22 social data barrier to entry (“SDBE”) emerged, protecting Facebook’s business. This SDBE 23 24 1 As of the date of this complaint, NBC’s documents were available at 25 https://dataviz.nbcnews.com/projects/20191104-facebook-leaked-documents/as https://dataviz.nbcnews.com/projects/20191104-facebook-leaked-documents/assets/facebook- 26 exhibits.pdfsets/facebook-sealed-exhibits.pdf; and https://dataviz.nbcnews.com/projects/20191104-facebook-leaked-documents/assets/facebook- 27 exhibits.pdf. 28 -1- Class Action Complaint Case 4:20-cv-00363-KAW Document 1 Filed 01/16/20 Page 5 of 110 1 allowed Facebook to fend off a frontal assault by Google’s polished social network, Google+. 2 Google, with its massive resources and user base, failed to penetrate the SDBE, and Google 3 abandoned the project after it was clear that users were not engaging on its platform. 4 6. Smartphones, however, were different. Significant advances in mobile technology 5 allowed users to access the internet from any location, on user interfaces controlled by touch, 6 providing a distinct experience from desktop or laptop computers. Special-purpose apps designed 7 specifically for smart phones could not
Recommended publications
  • Joining Forces Accomplishments Overview
    JOINING FORCES ACCOMPLISHMENTS OVERVIEW COMMUNITIES ACROSS THE COUNTRY JOINING FORCES TO SERVE AND HONOR MILITARY FAMILIES On April 12, 2011, First Lady Michelle Obama and Dr. Jill Biden launched Joining Forces to bring Americans together to recognize, honor and serve our nation’s veterans and military families. The initiative focuses on improving employment, education, and wellness of America’s troops, veterans and military families as well as raising awareness about the service, sacrifice, and needs of all who serve our country, both abroad and here at home. In just one year, Americans from communities across America – our businesses, schools, faith groups, non- profit organizations, and neighborhoods – have stepped up with an overwhelming amount of support for these heroes, not just with words, but with real, concrete actions to make a difference in their lives. Working with Joining Forces, these groups have helped thousands of veterans and military spouses find jobs, improved educational opportunities for military children, supported our nation’s wounded warriors and their caregivers, and honored our nation’s fallen and their families whose strength continues to inspire us all. KEY JOINING FORCES ACCOMPLISHMENTS: Through Joining Forces, American businesses have hired more than 50,000 veterans and military spouses, with a pledge to hire at least 160,000 more in the years ahead. More than 1,600 companies have been involved in this effort, including Microsoft, Comcast, Honeywell, Safeway and Sears. Associations of doctors, nurses, psychologists, social workers and medical schools have committed to educating their memberships on diagnosing and caring for military families affected by post-traumatic stress and traumatic brain injuries – the invisible wounds of our wars in Iraq and Afghanistan.
    [Show full text]
  • Facebook Adds Anonymous Login, in Move to Build Trust (Update) 30 April 2014, by Glenn Chapman
    Facebook adds anonymous login, in move to build trust (Update) 30 April 2014, by Glenn Chapman time use them more," Zuckerberg told an audience of about 1,700 conference attendees. "That is positive for everyone." In a statement Facebook explained its new "Anonymous Login" as an easy way for people to try an app without sharing personal information from Facebook.. "People tell us they're sometimes worried about sharing information with apps and want more choice and control over what personal information apps receive," the company said. "Today's announcements put power and control squarely in people's hands." Facebook CEO Mark Zuckerberg delivers the opening People are scared keynote at the Facebook f8 conference on April 30, 2014 in San Francisco, California In coming weeks, Facebook will also roll out a redesigned dashboard to give users a simple way Facebook moved Wednesday to bolster the trust of to manage or remove third-party applications linked its more than one billion users by providing new to their profiles at the social network. controls on how much information is shared on the world's leading social network. "This is really big from a user standpoint," JibJab chief executive Gregg Spiridellis said of what he In a major shift away from the notion long heard during the keynote presentation that opened preached by Facebook co-founder and chief Mark the one-day Facebook conference. Zuckerberg of having a single known identity online, people will be able to use applications "I think they are seeing people are scared. They anonymously at Facebook. realize that long-term, they need to be trusted." The social network also provided a streamlined A JibJab application that can synch with Facebook way for people to control which data applications lets people personalize digital greeting cards with can access and began letting people rein in what images of themselves or friends.
    [Show full text]
  • Onavo Protect for Mac
    Onavo Protect For Mac 1 / 5 Onavo Protect For Mac 2 / 5 3 / 5 As part of this procedure, Onavo gets and analyzes facts about your cellular knowledge and application use. 1. onavo protect 2. onavo protect for pc 3. onavo protect vpn for iphone It is the Facebook owned Onavo Protect iOS app that is linked to in the Facebook iOS app settings under the “Protect” label.. After a paragraph about the protection that Onavo provides and some bullet points on how the service works, the company states that it is essentially spyware, which is on both the iOS App Store and the web.. Pinnacle stellt video capture for mac Free pinnacle video capture for mac free download - Adobe Presenter Video Express, Pinnacle Video Spin, 4Media Video Frame Capture for Mac, and many more programs. onavo protect onavo protect, onavo protect vpn for iphone, onavo protect ios, onavo protect vpn security, onavo protect for pc, onavo protect vpn download, onavo protect android, onavo protect for iphone, onavo protect apk for iphone, onavo protect uptodown Gratis Notifikasi Tidak Muncul Di Android “> Onavo Protect – VPN Security aplication For PC Windows 10/8/7/Xp/Vista & MAC To be capable to check out Onavo Shield – VPN Security aplication on your hard push or netbook machine owning windows seven eight ten and Macbook system you ought to start working with things like the actual lesson How to download Onavo Protect – VPN Security for pc windows 10 7 8 Mac on blustack? • 1st point you should have bluestack on your laptop.. Alternatives to Onavo Protect for Windows, Mac, Linux, Android, iPhone and more.
    [Show full text]
  • REGUS Infographic Rev 1
    The changing world of work New technologies are making it easier than ever to create intercontinental workforces and put our businesses on the global map. Employees are looking to use this new connectivity to create a better work-life balance and to make their daily output more efficient. Our latest survey shows how this change has already started, and reveals many of the ideas and motivations behind the flexible working revolution. Remote working on the rise 54% 83% 54% of global respondents 83% of executives plan to already work remotely 2.5 increase their use of flexible days per week or more. employment in the coming years, meaning these numbers are set to rise. The global context Working mothers, ageing populations and young workers seeking flexibility are changing the nature of the global workforce. 6% Returning mothers 13% Older workers remaining beyond their pensionable age 19% Outsourced suppliers 22% Part-time workers 29% Freelance workers 30% Consultants 33% Other The role of technology New Cloud technology, better Wi-Fi and modern communication tools mean we’re on call 24/7. Messaging tools used in the previous month: Whatsapp Skype Facebook Messenger WeChat Viber Snapchat LINE QQ MessageMe Tango ChatOn Hike Kakaotalk Nibuzz 0% 10% 20% 30% 40% 50% 60% 70% Online flexible working tools used in the last month: Dropbox Google Drive Video conferencing Team Viewer WeTransfer Server cloud access Google Hangouts MS Remote Desktop Chrome remote desktop Virtual workgroups Apple remote desktop GoToMyPC LogMeIn Ignition Splashtop Wyse PocketCloud 0% 10% 20% 30% 40% 50% 60% 70% Relishing remote work As these tech advances help employees take their work with them, they’re increasingly seeing the advantages of flexible workspaces.
    [Show full text]
  • Academic Excellence Celebration April 27, 2017
    Academic Excellence Celebration April 27, 2017 Table of Contents Morning Schedule ................................................................................................................... 2 Afternoon Schedule ................................................................................................................ 4 Session Information ............................................................................................................... 6 Student Presenters ................................................................................................................ 21 Faculty/Staff Sponsors ........................................................................................................ 26 LUNCH and DINNER OPTIONS Ames Dining Hall Cafeteria style Hours: Lunch 11:00 a.m. – 1:30 p.m. Dinner 4:30 – 7:00 p.m. 1828 A la carte deli Hours: 7:30 a.m. – 3:00 p.m. Programs are available in Holman Library, Ames Dining Hall, and Piper Academic Center. Students exhibiting posters should register in Holman Library or Ames Dining Hall at 8 a.m. Students giving presentations should register at the Presenters Check-in Station in Piper Academic Center lounge at least 15 minutes prior to the start of their session. For information, please see a volunteer located in Piper Academic Center. Share your news and pictures: #McKAEC17 1 Morning Schedule CHECK-IN for posters in Holman Library or Ames 8:00 – 8:25 a.m. 8:00 CHECK-IN for presentations in PAC Lounge 9:00 a.m. – 12:00 p.m. Attendees may pick up programs in Holman Library,
    [Show full text]
  • Network and Device Forensic Analysis of Android Social-Messaging Applications
    DIGITAL FORENSIC RESEARCH CONFERENCE Network And Device Forensic Analysis Of Android Social-Messaging Applications By Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Frank Breitinger and Jason Moore Presented At The Digital Forensic Research Conference DFRWS 2015 USA Philadelphia, PA (Aug 9th - 13th) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive the direction of research and development. http:/dfrws.org Network'and'device'forensic'analysis'of'' Android'socialOmessaging'applica=ons' Daniel'Walnycky,'Ibrahim'Baggili,'Andrew'Marrington,' Jason'Moore,'Frank'Brei=nger' Graduate'Research'Assistant,'UNHcFREG'Member' Presen=ng'@'DFRWS,'Philadelphia,'PA,'2015' Agenda' • Introduc=on' • Related'work' • Methodology' • Experimental'results' • Discussion'and'conclusion' • Future'work' • Datapp' 2' Introduc=on' Tested'20'Android'messaging'apps'for'“low'hanging'fruit”'a.k.a'unencrypted'data:' • on'the'device,'in'network'traffic,'and'on'server'storage' Found'eviden=ary'traces:'passwords,'screen'shots,'text,'images,'videos,'audio,'GPS' loca=on,'sketches,'profile'pictures,'and'more…' 3' Related'work' • Forensic'value'of'smartphone'messages:' • Smartphones'may'contain'the'same'rich'variety'of'digital'evidence'which'might'be'found'on'a'computer'
    [Show full text]
  • How Apps on Android Share Data with Facebook (Even If You Don’T Have a Facebook Account)
    How Apps on Android Share Data with Facebook (even if you don’t have a Facebook account) December 2018 How Apps on Android Share Data with Facebook Privacy International is a UK-registered charity (1147471) that promotes the right to privacy at an international level. It is solely responsible for the research and investigation underpinning its reports. 2 How Apps on Android Share Data with Facebook Executive Summary Previous research has shown how 42.55 percent of free apps on the Google Play store could share data with Facebook, making Facebook the second most prevalent third-party tracker after Google’s parent company Alphabet.1 In this report, Privacy International illustrates what this data sharing looks like in practice, particularly for people who do not have a Facebook account. This question of whether Facebook gathers information about users who are not signed in or do not have an account was raised in the aftermath of the Cambridge Analytica scandal by lawmakers in hearings in the United States and in Europe.2 Discussions, as well as previous fines by Data Protection Authorities about the tracking of non-users, however, often focus on the tracking that happens on websites.3 Much less is known about the data that the company receives from apps. For these reasons, in this report we raise questions about transparency and use of app data that we consider timely and important. Facebook routinely tracks users, non-users and logged-out users outside its platform through Facebook Business Tools. App developers share data with Facebook through the Facebook Software Development Kit (SDK), a set of software development tools that help developers build apps for a specific operating system.
    [Show full text]
  • Facebook's Products, Services & Companies
    FACEBOOK'S PRODUCTS, SERVICES & COMPANIES Products and Services The following products and services are explicitly connected to, or part of, your Facebook account, and fall under Facebook’s "Data Policy". Profile Personal profile page on Facebook. News Feed Personal news page on Facebook where stories from friends, Pages, groups and events are updated. Messenger Facebook’s mobile messaging app. roups !ool for creating groups to share photos, files and events. "vents !ool for creating and inviting people to events. #ideo !ool for storing and sharing videos on Facebook. Photos !ool for storing and sharing photos on Facebook. Search Search engine for searching within Facebook. Pages Public profile pages for e.g. organisations, brands, celebrities. Free $asics %pp and web platform that gives access to a package of internet services for free, in places where internet access is limited. &see Internet.org(. Facebook )ite % version of Facebook that uses less data, for situations where there is lower bandwidth. Mobile %pp Facebook’s mobile app. *ompanies The following companies are owned by Facebook but many have individual privacy policies and terms. !owever, in many case information is shared with Facebook. Pa+ments !ool that can be used to transfer money to others via Facebook Messenger. %tlas Facebook’s marketing and advertising tool. Moments %pp that uses facial recognition to collect photos based on who is in them. 'nstagram %pp for taking, editing and sharing photos. ,navo %ndroid app to save, measure and protect mobile data Moves Mobile app for monitoring your movements over the da+. ,culus #irtual realit+ equipment . research. )ive/ail Monetisation platform for video publishers.
    [Show full text]
  • The Power of Interoperability: Why Objects Are Inevitable
    The Power of Interoperability: Why Objects Are Inevitable Jonathan Aldrich Carnegie Mellon University Pittsburgh, PA, USA [email protected] Abstract 1. Introduction Three years ago in this venue, Cook argued that in Object-oriented programming has been highly suc- their essence, objects are what Reynolds called proce- cessful in practice, and has arguably become the dom- dural data structures. His observation raises a natural inant programming paradigm for writing applications question: if procedural data structures are the essence software in industry. This success can be documented of objects, has this contributed to the empirical success in many ways. For example, of the top ten program- of objects, and if so, how? ming languages at the LangPop.com index, six are pri- This essay attempts to answer that question. After marily object-oriented, and an additional two (PHP reviewing Cook’s definition, I propose the term ser- and Perl) have object-oriented features.1 The equiva- vice abstractions to capture the essential nature of ob- lent numbers for the top ten languages in the TIOBE in- jects. This terminology emphasizes, following Kay, that dex are six and three.2 SourceForge’s most popular lan- objects are not primarily about representing and ma- guages are Java and C++;3 GitHub’s are JavaScript and nipulating data, but are more about providing ser- Ruby.4 Furthermore, objects’ influence is not limited vices in support of higher-level goals. Using examples to object-oriented languages; Cook [8] argues that Mi- taken from object-oriented frameworks, I illustrate the crosoft’s Component Object Model (COM), which has unique design leverage that service abstractions pro- a C language interface, is “one of the most pure object- vide: the ability to define abstractions that can be ex- oriented programming models yet defined.” Academ- tended, and whose extensions are interoperable in a ically, object-oriented programming is a primary focus first-class way.
    [Show full text]
  • Resolving Mobile Communique App Using Classification of Data Mining Technique
    ISSN:0975-9646 M.Mohamed Suhail et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2) , 2016, 583-587 Resolving Mobile Communique App Using Classification of Data Mining Technique M.Mohamed Suhail, Lecturer,Department of Computer Science, Jamal Mohamed College, Trichy, K.SyedKousarNiasi, Assistant Professor,Department of Computer Science, Jamal Mohamed College, Trichy, Abstract- A mobile app is a software application Data Mining refers to extracting or “mining” developed specifically for use on small, wireless computing knowledge from large amount of data.Many other terms devices, such as smartphones and tablets, rather than carry a similar or slightly different meaning to Data mining, desktop or laptop computers.On the Internet and mobile such as knowledge mining from data, knowledge app, chatting is talking to other people who are using the extraction, data/pattern analysis, Data archaeology, and Internet at the same time you are. Usually, this "talking" is Data dredging.Many people treat data mining as a synonym the exchange of typed-in messages requiring one site as the for another popularly used term, Knowledge Discovery repository for the messages (or "chat site") and a group of form Data, or KDD.Data mining has attracted a great deal users who take part from anywhere on the Internet.In this of attention in the information industry and in society as a work, we apply classification techniques of data mining whole in recent years, due to the wide availability of huge using a dataset of some mobile applications (eg. whatsapp, amounts of data and the imminent need for turning such Line…etc.,) to analyze the messengers.
    [Show full text]
  • Soziale Netzwerke Und Google Als Grundlage Für Personalentscheidungen
    Eingereicht von Paul Steger Angefertigt am Institut für SOZIALE NETZWERKE UND Datenverarbeitung in den Sozial- und GOOGLE ALS GRUNDLAGE Wirtschaftswissenschaften Beurteiler / Beurteilerin FÜR PERSONALENT- Univ.‐Prof. Mag. Dr. Manfred Pils SCHEIDUNGEN: EINE Juni 2016 WIEDERHOLUNGSSTUDIE IN NIEDERÖSTERREICH Diplomarbeit zur Erlangung des akademischen Grades Magister der Sozial- und Wirtschaftswissenschaften im Diplomstudium Wirtschaftswissenschaften JOHANNES KEPLER UNIVERSITÄT LINZ Altenberger Straße 69 4040 Linz, Österreich www.jku.at DVR 0093696 EIDESSTATTLICHE ERKLÄRUNG Ich erkläre an Eides statt, dass ich die vorliegende Diplomarbeit selbstständig und ohne fremde Hilfe verfasst, andere als die angegebenen Quellen und Hilfsmittel nicht benutzt bzw. die wörtlich oder sinngemäß entnommenen Stellen als solche kenntlich gemacht habe. Die vorliegende Diplomarbeit ist mit dem elektronisch übermittelten Textdokument identisch. Waidhofen an der Ybbs, Juni 2016 Paul Steger Kurzfassung In der vorliegenden Arbeit wird vordergründig der Einfluss des Onlineprofils, also in Suchmaschinen oder auch in sozialen und professionell orientierten Netzwerken auffindbarer Informationen, auf den Bewerbungsprozess niederösterreichischer Unternehmen untersucht. Dies geschieht einerseits auf Basis vieler international durchgeführter quantitativer Untersuchungen, andererseits stellt sie auch eine Wiederholungsstudie zweier nach qualitativen Methoden verfasster Diplomarbeiten aus der Steiermark und Oberösterreich dar. Die auf Basis dieser Vorarbeiten formulierten
    [Show full text]
  • NAR's E-PRO Certification: Day 2
    NARNAR’s e-PRO®’s Certification: e-PRO Day 2 ® Certification: Day 2 Porf Student Manual Bill Lublin, GRI, CRB, CRS, e-PRO® Ginger Wilcox, GRI, CRS, e-PRO® Amy Chorew, e-PRO® Hal Lublin V 11. 1 Introduction WELCOME Congratulations on successfully completing Day1 of NAR’s e-PRO certification program and welcome to Day 2. In Day 2, we will discuss how to develop a social media strategy that is sustainable. You will also review how to make yourself more mobile, more efficient, and more profitable by integrating technology into your current business. WHAT YOU WILL LEARN The modules in Day 2 are self-paced. The content of the course is organized in six modules with the following learning objectives. 1. e-Strategy – Develop a Hub for your business to capture and convert potential customers and clients. – Connect with consumers through non-real estate–related sites and turn those connections into clients. 2. Content and SEO Strategy – Identify strategies for developing content. – Optimize your Hub so that consumers can find it on the Web. – Use analytics tools to measure consumer traffic to your Hub. 3. e-Office – Become familiar with cloud computing. – Learn how to use portable and mobile devices to do business anywhere, anytime. 2 NAR’s e-PRO® Certification: Day 2 4. Twitter and Foursquare – Learn about location-based services and how they can help you engage with your chosen community and improve your business. 5. Rich Media – Choose equipment to create still photos, video, and audio files to enhance your communication. 6. Technology Toolbelt – Get up to speed on the latest hardware.
    [Show full text]