Case 3:16-Cv-00764-N Document 86 Filed 04/06/17 Page 1 of 10 Pageid 1859
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
2014 INTIX Instagram, Pinterest, Vine and Tumblr, Oh
Instagram, Pinterest, Vine and Tumblr, Oh My! • Kyle Kelly, Assistant Director of Athletic Communications, Central Michigan University • Russell Sauve, E-Commerce and Social Media Manager, Fox Theatre • Craig Ricks, Vice President of Marketing, Paciolan • Dave Brooks, Managing Editor, Venues Today Magazine • Doug Meffley, Director of Athletics Digital & Social Communications, Northwestern University • Michael Nabasny, Head of Enterprise Sales, Wildfire at Google SOCIAL MEDIA PLATFORMS BY THE NUMBERS 80 % of online adults who use the social media sites by year 71 70 67 60 50 40 2012 2013 30 20 22 21 20 16 18 17 15 13 10 0 Facebook LinkedIn Pinterest Twitter Instagram *Pew Research SOCIAL MEDIA PLATFORMS BY THE NUMBERS 64 Facebook 22 14 58 Instagram 20 22 Frequency of 47 Social Media Site Use Twitter 21 32 24 Daily Pinterest 31 Weekly 45 Less Often 14 LinkedIn 34 52 0 10 20 30 40 50 60 70 *Pew Research MILESTONE CAMPAIGNS TICKETPOP – DATA ACQUISITION GREAT SOCIAL ENGAGEMENT EXAMPLES COCA COLA BOTTLE RUMOR GOOGLE STREET VIEW GOOGLE SPOTIFY ENGAGEMENT PINTEREST ENGAGEMENT PIN IT TO WIN IT SPORTS STREAM FRONT PAGE ASK AND YOU SHALL RECEIVE “GAMEDAY FAN VOTE” CMU Football Day after Thanksgiving - Value customer’s opinion - Drive attendance - Voting entered fans in a contest to win sideline passes/upgraded seats - Allowed to build data base of fans for email marketing - Fans could vote on - Jerseys - Kickoff time - Kickoff song MOBILE AND SOCIAL STATS 61% of adults 874 million 65% of time During the and 78% of users check spent on holidays 17% -
G:\Chambers\MPT\OPINIONS\18-62 VAC-MPT Twitter Motion to Stay.Wpd
IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE ) In re TWITTER, INC. SHAREHOLDER ) DERIVATIVE LITIGATION ) ) ) ) C.A. No. 18-62-VAC-MPT This Document Relates To: ) ) ALL ACTIONS. ) ) REPORT AND RECOMMENDATION I. INTRODUCTION This matter arises from plaintiffs Jim Porter, Ernesto Espinoza, and Francis Flemings’ (collectively, “Plaintiffs”) Verified Consolidated Shareholder Derivative Complaint1 against nominal defendant Twitter, Inc.. (“Twitter”) and defendants Richard Costolo, Anthony Noto, Jack Dorsey, Peter Fenton, David Rosenblatt, Marjorie Scardino, Evan Williams, Peter Chernin, and Peter Currie (collectively, “Defendants”), filed on April 19, 2017. The initial complaint was filed on October 24, 2016, followed by two other actions, with the three matters eventually consolidated and present operative complaint filed in the Northern District of California.2 The case was transferred to the 1 D.I. 33. 2 See D.I. 1, 21 and 33. In the interim between the filing of the initial complaint and the present operative amended complaint, the court entered an amended order which consolidated the three actions filed in the Northern District of California, appointed the lead plaintiff and lead counsel, and established a schedule to file a consolidated complaint. D.I. 11. As a result, 16-6136 (filed October 24, 2016), 16-6457 (filed November 4, 2016) and 16-6492 (filed November 8, 2016) were consolidated into 16-6136 (the “Derivative Action”). District of Delaware on January 8, 2018.3 The complaint alleges the issuance of false and misleading proxy statements in violation of Section 14(a) of the Securities Exchange Act of 1934 (the “Exchange Act”), breaches of fiduciary duties, unjust enrichment, corporate waste, and insider selling.4 On March 14, 2018, Defendants filed a motion to stay the Verified Consolidated Shareholder Derivative Complaint pending resolution of a related securities action in the Northern District of California.5 Presently before the court is Defendants’ motion to stay. -
Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the -
Cachet: a Decentralized Architecture for Privacy Preserving Social Networking with Caching
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid Prateek Mittal Indiana University University of Illinois at University of California, Bloomington Urbana-Champaign Berkeley [email protected] [email protected] [email protected] Nikita Borisov Apu Kapadia University of Illinois at Indiana University Urbana-Champaign Bloomington [email protected] [email protected] ABSTRACT and (b) use of social contacts for object caching results in Online social networks (OSNs) such as Facebook and significant performance improvements. Google+ have transformed the way our society communi- cates. However, this success has come at the cost of user Categories and Subject Descriptors privacy; in today's OSNs, users are not in control of their C.2.4 [Computer-Communication Networks]: Dis- own data, and depend on OSN operators to enforce access tributed Systems|Distributed Applications; K.6.m control policies. A multitude of privacy breaches has spurred [Management of Computing and Information research into privacy-preserving alternatives for social net- Systems]: Miscellaneous|Security working, exploring a number of techniques for storing, dis- seminating, and controlling access to data in a decentral- ized fashion. In this paper, we argue that a combination General Terms of techniques is necessary to efficiently support the complex Algorithms, Security functionality requirements of OSNs. We propose Cachet, an architecture that provides strong Keywords security and privacy guarantees while preserving the main functionality of online social networks. In particular, Cachet privacy, peer-to-peer systems, social networking, caching protects the confidentiality, integrity and availability of user content, as well as the privacy of user relationships. -
Archival Circulation on the Web: the Vine-Tweets Dataset
Archival Circulation on the Web: The Vine-Tweets Dataset Ed Summers and Amy Wickner 06.04.19 Peer-Reviewed By: Anon. Clusters: Data Article DOI: 10.22148/16.040 Journal ISSN: 2371-4549 Cite: Ed Summers and Amy Wickner, “Archival Circulation on the Web: The Vine- Tweets Dataset,”Journal of Cultural Analytics. May 4, 2019. At Ethics and Archiving the Web, a conference convened in March 2018 at the New Museum in New York City, a group of artists, archivists, activists and re- searchers met to critically examine the ethical implications of our ability to col- lect and archive content from the web. In a session focused on the ethics of digital folklore, Frances Corry asked the audience to consider, ”What’s the right way to shut down a social networking site?” (Figure 1). Corry specifically discussed the closure of Vine, a social media service designed for sharing six-second video clips. She highlighted how, despite Vine’s best in- tentions to sunset their service “the right way,” mistakes were made regarding missing content and leaked personal information in users’ archives.2 Despite these difficulties, Vine’s effort remains noteworthy because of how it mobilizes the concept of an archive in dismantling its online service. Vine’s commitment to preserving content with user consent stands in stark contrast to the way many web platforms have shuttered their windows, barricaded their doors, and pulled vast amounts of content offline in the process. 1Christine A George, “Frances Corry provides a ‘burning yellow’ background for a burning ethical question,” Twitter, March 23, 2017. -
“Over-The-Top” Television: Circuits of Media Distribution Since the Internet
BEYOND “OVER-THE-TOP” TELEVISION: CIRCUITS OF MEDIA DISTRIBUTION SINCE THE INTERNET Ian Murphy A dissertation submitted to the faculty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Communication. Chapel Hill 2018 Approved by: Richard Cante Michael Palm Victoria Ekstrand Jennifer Holt Daniel Kreiss Alice Marwick Neal Thomas © 2018 Ian Murphy ALL RIGHTS RESERVED ii ABSTRACT Ian Murphy: Beyond “Over-the-Top” Television: Circuits of Media Distribution Since the Internet (Under the direction of Richard Cante and Michael Palm) My dissertation analyzes the evolution of contemporary, cross-platform and international circuits of media distribution. A circuit of media distribution refers to both the circulation of media content as well as the underlying ecosystem that facilitates that circulation. In particular, I focus on the development of services for streaming television over the internet. I examine the circulation paths that either opened up or were foreclosed by companies that have been pivotal in shaping streaming economies: Aereo, Netflix, Twitter, Google, and Amazon. I identify the power brokers of contemporary media distribution, ranging from sectors of legacy television— for instance, broadcast networks, cable companies, and production studios—to a variety of new media and technology industries, including social media, e-commerce, internet search, and artificial intelligence. In addition, I analyze the ways in which these power brokers are reconfiguring content access. I highlight a series of technological, financial, geographic, and regulatory factors that authorize or facilitate access, in order to better understand how contemporary circuits of media distribution are constituted. -
Diaspora Knowledge Flows in the Global Economy
E-Leader Budapest 2010 Diaspora Knowledge Flows in the Global Economy Dr. Martin Grossman Bridgewater State College Department of Management Bridgewater, MA, USA Abstract Globalization has fostered greater rates of mobility and an increasing reliance on transnational networks for commerce, social interaction, and the transfer of knowledge. This is particularly true among diaspora groups who have left their homelands in search of better economic and political environments. Unlike those of the past, today’s migrants stay connected via information and communications technology (ICT). Digital diaspora networks have the potential to reverse brain drain (the flight of human capital resulting from emigration) by facilitating knowledge sharing and technology transfer between the diaspora and the homeland. This paper explores the role that ICT-enabled diasporic networks are playing in reversing brain drain and stimulating brain gain and brain circulation. International development initiatives as well as empirical studies revolving around this concept are reviewed. The case of China is presented as an example of a country that has successfully leveraged its diaspora by implementing a number of strategies, including those based on ICT. A proposed research project, involving the Cape Verdean diaspora in Massachusetts, is also discussed. Introduction In today’s global economy intellectual capital has become the most important factor of production, underlying a nation’s ability to innovate and remain competitive (Stewart, 2007). Knowledge workers have become highly mobile, enabling them to seek out education and employment opportunities in other countries. While this might constitute a net gain for the country on the receiving end, it may also represent a serious loss of talent and ‘know-how’ from the home country. -
Teen-Social-Media-Addiction.Docx
1 Table of Contents: Introduction 3 Dominant Characteristics of Social Media Addiction in Teens 3 Statistics on Teen Social Media Addiction 3 Causes of Teenage Social Media Addiction 4 Is Social Media Addiction the Sign of a Disorder? 4 How Social Media Addiction Affects the Adolescent Brain 4 How Does Social Media Addiction Affect Teens 5 Treatment for Social Media Addiction in Teens 5 Additional Resources 6 2 Introduction Teenage social media addiction can be described as preoccupation and obsession. A teenager with a social media addiction has become so engrossed in the virtual world that it has impacted the real world, causing harmful effects. While many teens engage in social media through platforms such as Facebook, Twitter, YouTube, Vine, Snapchat, and others, teens who are addicted to social media see a negative impact on their real life relationships and responsibilities. Dominant Characteristics of Social Media Addiction in Teens Paradigm Malibu explains that social media addiction most often entails two distinct characteristics of addiction: the extensive amount of time spent on social media and the underlying reasons why they’re engaged online. A teen with a social media addiction has an overwhelming desire to participate in the virtual world. The teen will feel internal pressure to check their updates, add new statuses, post a photo, or engage in other online activity. A teen addicted to social media will prefer the virtual connections and relationships to those in real life. As the teenage years are a pivotal time for social growth in teens, this desire can be harmful as the teen may not develop healthy or appropriate social skills. -
Listen Well on Twitter
★★★★★★★ ★★★★★★★ round 4: listen well on twitteR • • Launched: March 2006 • • The company’s logo, a little blue • • As of December 2012, there were bird, is officially named Larry, after more than 100 million users in the Larry Bird, the former player for the United States, 500 million world- Boston Celtics. wide. • • JetBlue was one of the first com- • • The Twitter concept evolved out of panies to start using Twitter for a brainstorming session that took marketing research and customer place at the top of a slide on a San s e r v i c e . Francisco playground. • • Users post 750 tweets per second. talk about Twitter with almost the same affection as I talk about my children. i It’s had that much of an impact on my life since I started using it to reach out to customers in 2007. As an extrovert who can get to know a room full of people in just a few hours, I felt at home in Twitter’s 140 -word cocktail party environ ment. It was the platform that came most naturally to me, because it was per fectly suited for small bursts of quick-fire conversation and idea exchanges. If the only platform I’d had at my disposal in early 2006, when I first started trying to storytell about my family business, Wine Library, had demanded long-form 83 Jab Jab Jab right Hook writing, like a magazine column or a written blog, the business would not be what it is today. Twitter’s restrictions played directly to my strengths. -
How to Use Vine
How to Use Vine 1. Vine is a phone application. It works on iPhones and Android phones. You need to download the application before you can sign up. 2. When you open Vine for the first time, you will see two options: “Sign in with Twitter” and “Sign up with Email”. a. If you have a Twitter account already, then perfect! You’re almost done! Here’s how to Sign in with Twitter: i. Type in: 1. Username or email 2. Password b. If you don’t own a Twitter account, don’t fear! Signing up with Email is easy, too: i. Type in your full name (or a variation of your name, up to you) ii. Click on the hot air balloon icon to upload a profile picture. 1. Choose a photo that is already saved on your phone. It looks best if you upload a photo that is square-shaped. 2. Vine will ask for permission to access your photos. Click “OK.” 3. Once you have selected your photo, you can trim it so that the square aligns with the part of your photo that you want your icon to be. 4. Click “Choose.” 5. Your icon is all set! iii. Click “Next.” iv. Enter your: 1. Email 2. Password (make sure it’s strong) 3. Phone number (this is optional) v. Click “Done.” Congratulations! You’ve completed signing in! Now, let’s get started on building your profile. 1. Click the small house icon on the top left corner of your Vine timeline. A dropdown menu will appear. -
Enrollment Management Marketing and New Media in the Era of Big Data
Enrollment Management Marketing and New Media in the Era of Big Data AACRAO Webinar Jim Bouse University of Oregon March 31, 2015 What We Will Cover • Marketing and Communications • Viral and Personalized Video’s • Big Data • Social Media • CRM • Predictive Analytics • Mobile Call Me A Duck Videos helping expand brand awareness BYU New Spice Study Like a Scholar Perls of Knowledge Location, Location, Location Big Data “Linking data from disparate sources to answer questions you didn’t even know to ask.” Kent Kuo Oregon State, Dir. Ent. Computing Big Data “Sifting through the sea of information in search of trends and truths.” - Andrew Barbour, Campus Technology Big Data •The original V’s: Volume and Velocity •The 3 V’s •Volume •Velocity •Variety Graphic credit - Diya Soubra Big Data Graphic Credit: IBM Big Data • Many V’s • The most important V’s? • Volume • Veracity • Velocity • Visualization • Variety • Value • Variability • Veracity • Visualization • Value Photo credit: Slate.com Big Data: Analytics, Tracking, Prediction • Target pregnancy ads • RFID. Prism consortium. • Big Brother is here and he is us. Walmart infrared. Video tracking • Amazon to Facebook example “Free” internet. We are not the customer, we are the product. Social Media Perls of Knowledge The Insider (Check out Harvey’s eyes at the end) Listen and Monitor There are more channels than ever. • Facebook (1.23B +, 76% Mobile) • Google (24+ PB/day) • Twitter (500M+, 284M active) • College Confidential (Hobsons) • Instagram (200M) • YikYak • Google Maps, Apple iOS, review your campus Where are Teens on Social? Changes from January 2013 to February 2015 Teen Survey (sentiments) Gary Tan (founder of Posterous ), Jan. -
Doris Shenwick, Et Al. V. Twitter, Inc., Et Al. 16-CV-05314-Lead Plaintiff's
Case 3:16-cv-05314-JST Document 81 Filed 03/02/17 Page 1 of 86 1 BLEICHMAR FONTI & AULD LLP LESLEY E. WEAVER (191305) 2 1999 Harrison Street, Suite 670 Oakland, CA 94612 3 Telephone: (415) 445-4003 Facsimile: (415) 445-4020 4 Email: [email protected] 5 Liaison Counsel for Lead Plaintiff and the Class 6 MOTLEY RICE LLC 7 GREGG S. LEVIN (admitted pro hac vice) 28 Bridgeside Blvd. 8 Mt. Pleasant, SC 29464 Telephone: (843) 216-9000 9 Facsimile: (843) 216-9450 Email: [email protected] 10 Lead Counsel for Lead Plaintiff and the Class 11 [Additional counsel appear on signature page.] 12 13 UNITED STATES DISTRICT COURT 14 NORTHERN DISTRICT OF CALIFORNIA 15 SAN FRANCISCO DIVISION 16 DORIS SHENWICK, as Trustee for the ) Case No. 3:16-cv-05314-JST DORIS SHENWICK TRUST, Individually and ) 17 on Behalf of All Others Similarly Situated, ) (Consolidated) ) 18 Plaintiff, ) CLASS ACTION 19 ) vs. ) LEAD PLAINTIFF’S CONSOLIDATED 20 ) AMENDED COMPLAINT FOR TWITTER, INC., et al., ) VIOLATIONS OF THE FEDERAL 21 ) SECURITIES LAWS Defendants. ) 22 23 24 25 26 27 28 Case 3:16-cv-05314-JST Document 81 Filed 03/02/17 Page 2 of 86 1 TABLE OF CONTENTS 2 Page 3 I. INTRODUCTION ...............................................................................................................1 4 II. JURISDICTION AND VENUE ..........................................................................................5 III. THE PARTIES.....................................................................................................................5 5 IV. SUMMARY OF DEFENDANTS’