Privacy Trade-Offs: How Further Regulation Could Diminish Consumer Choice, Raise Prices, Quash Digital Innovation & Curtail

Total Page:16

File Type:pdf, Size:1020Kb

Privacy Trade-Offs: How Further Regulation Could Diminish Consumer Choice, Raise Prices, Quash Digital Innovation & Curtail Privacy Trade-Offs: How Further Regulation Could Diminish Consumer Choice, Raise Prices, Quash Digital Innovation & Curtail Free Speech Comments of Berin Szoka, Senior Fellow, The Progress & Freedom Foundation, to the FTC Privacy Roundtables (Dec. 7, 2009), Comment, Project No. P095416 In general, we at PFF have argued that any discussion about regulating the collection, sharing, and use of consumer information online must begin by recognizing the following: Privacy is “the subjective condition that people experience when they have power to control information about themselves and when they exercise that power consistent with their interests and values.”1 As such, privacy is not a monolith but varies from user to user, from application to application and situation to situation. There is no free lunch: We cannot escape the trade-off between locking down information and the many benefits for consumers of the free flow of information. In particular, tailored advertising offers significant benefits to users, including potentially enormous increases in funding for the publishers of ad-supported content and services, improved information about products in general, and lower prices and increased innovation throughout the economy. Tailored advertising increases the effectiveness of speech of all kinds, whether the advertiser is “selling” products, services, ideas, political candidates or communities. With these considerations in mind, policymakers must ask four critical questions: 1. What exactly is the “harm” or market failure that requires government intervention? 2. Are there “less restrictive” alternatives to regulation? 3. Will regulation’s costs outweigh its supposed benefits? 4. What is the appropriate legal standard for deciding whether further government intervention is required? We have addressed these questions in the PFF publications attached below, which I respectfully submit for the Commission’s consideration. This executive summary highlights their findings. Berin Szoka is a Senior Fellow with PFF and the Director of PFF’s Center for Internet Freedom. The views expressed here are his own, and are not necessarily the views of the PFF board, other fellows or staff. 1. “Properly defined, privacy is the subjective condition people experience when they have power to control information about themselves.” Jim Harper, Cato Institute, Understanding Privacy – and the Real Threats to It, Cato Institute Policy Analysis No. 520, Aug. 4, 2004, http://www.cato.org/pub_display.php?pub_id=1652. 1444 EYE STREET, NW SUITE 500 WASHINGTON, D.C. 20005 202-289-8928 [email protected] www.pff.org Page 2 Szoka Comments on FTC Privacy Roundtable, Dec. 7, 2009 Online Advertising & User Privacy: Principles to Guide the Debate, Berin Szoka & Adam Thierer, Progress Snapshot 4.19, Sept. 2008. Targeted Online Advertising: What’s the Harm & Where Are We Heading?, Berin Szoka & Adam Thierer, Progress on Point 16.2, Apr. 2009. Privacy Polls v. Real-World Trade-Offs, Berin Szoka, Progress Snapshot 5.10, Oct. 2009. The Benefits of Online Advertising & Costs of Privacy Regulation, Berin Szoka & Mark Adams, PFF Working Paper, Nov. 8, 2009. 2 Regulating Online Advertising: What Will it Mean for Consumers, Culture & Journalism?, Berin Szoka, Mark Adams, Howard Beales, Thomas Lenard, Jules Polonetsky, Progress on Point 16.22, Oct. 2009. I. A Principled Pro-Consumer Alternative to Further Regulation The “Privacy Wars” that have waged over how government should regulate online collection and use of data might better be referred to as the “Privacy Proxy Wars” because the most clearly demonstrated “harm” at issue seems to be from government itself, not the private sector. The Fourth Amendment guarantees that “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated…” Americans have a legitimate expectation that this “security” extends to their digital “papers and effects,” yet that expectation is not given effect by current restraints on government access to consumer data in American law. Thus, we have proposed the following layered approach to concerns about online privacy, focusing on restraining government access to data, rather than crippling the private sector uses of data that directly benefit consumers: 1. Erect a higher “Wall of Separation between Web and State” by increasing Americans’ protection from government access to their personal data—thus bringing the Fourth Amendment into the Digital Age. 2. Educate users about privacy risks and data management in general as well as specific practices and policies for safer computing. 3. Empower users to implement their privacy preferences in specific contexts as easily as possible. 4. Enhance self-regulation by industry sectors and companies to integrate with user education and empowerment. 5. Enforce existing laws against unfair and deceptive trade practices as well as state privacy tort laws. Such a layered approach would not only be a “less restrictive” alternative to increased government regulation, but also potentially more effective in key respects than government data use/collection mandates. In an ideal world, adults would be fully empowered to tailor privacy decisions, like speech decisions, to their own values and preferences (“household standards”). Specifically, in an ideal world, adults (and parents) would have (1) the information necessary to make informed decisions and (2) the tools and methods necessary to act upon that information. Importantly, those tools and methods would give them the ability to 2. Currently in draft form, pending further research quantifying the benefits of personalized advertising. Szoka Comments on FTC Privacy Roundtable, Dec. 7, 2009 Page 3 block the things they don’t like—annoying ads or the collection of data about them, as well as objectionable content. A wide variety of self-help tools and “technologies of evasion” are readily available to all users and can easily thwart traditional cookie-based tracking, as well as more sophisticated tracking technologies such as packet inspection. While cookie management tools that allow users to delete their cookies have been standard in browsers for some time, the latest generation of browsers incorporates far more advanced control over what kind of cookies browsers will accept from websites in the first place. Furthermore, the extensible nature of modern browsers allows any freelance software developer who sees a way to improve a browser to do so by writing an add-on that “plugs in” to the browser using standard programming interfaces designed by each browser developer. Many such add-ons are wildly popular, but even those users who never install a single one benefit from the acceleration of browser evolution made possible by add-ons. We have documented examples of these tools in an ongoing series of blog posts about “Privacy Solutions,” available at www.pff.org/privacy-solutions/. But a “layered approach” that relies on user empowerment and education need not be perfect to be “good enough,” because “privacy” is not an absolute good that trumps all other consumer interests, nor can “community standards” accommodate a diverse citizenry. If we “make the best the enemy of the good” by insisting on perfection, consumers will be made worse off. Advertising is indispensable to the future of online media, but it is also currently inadequate to sustain “Free” culture. The advocates of regulation pay lip-service to the importance of advertising in funding online content and services but don’t seem to understand that this quid pro quo is a fragile one: Tipping the balance, even slightly, could have major consequences for continued online creativity and innovation. Something must give because there is no free lunch.3 II. Benefits to Users of Smarter Online Advertising The attached working paper I co-authored with PFF Visiting Fellow Mark Adams identifies five broad categories of benefits to users from targeted advertising: 1. More relevant, and potentially less annoying/interruptive advertising for consumers; 2. Higher-quality content and services supported by advertising; 3. Better correlation between the production of content and services, and consumer preferences; 4. A more vibrant media and improved political discourse and communities; and 5. Lower prices for consumers and greater innovation throughout the economy. 3. Berin Szoka & Adam Thierer, The Progress & Freedom Foundation, Targeted Online Advertising: What’s the Harm & Where Are We Heading?, Berin Szoka & Adam Thierer, Progress on Point 16.2, April 2009, www.pff.org/issues-pubs/pops/2009/pop16.2targetonlinead.pdf. Page 4 Szoka Comments on FTC Privacy Roundtable, Dec. 7, 2009 The paper explains how better targeting of advertising delivers these benefits by: Increasing the informational value of advertising to consumers; Increasing advertising funding for content and services that might not be sustainable on an ad-supported basis with untargeted or less targeted advertising; and Reducing the costs of buying and selling (“transaction costs”). In particular, we note that, with behavioral targeting, the value of a site’s viewers depends less on the content associated with that site (keywords) and more on the viewers themselves. In this sense, behavioral advertising levels the playing field by allowing websites to sell access to viewers directly, rather than through the keywords associated with the website. Better targeting democratizes the ad-supported economy by empowering consumers to
Recommended publications
  • Canvas Developer Guide
    Canvas Developer Guide Version 53.0, Winter ’22 @salesforcedocs Last updated: August 5, 2021 © Copyright 2000–2021 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other names and marks. Other marks appearing herein may be trademarks of their respective owners. CONTENTS GETTING STARTED . 1 Chapter 1: Introducing Canvas . 1 Canvas Scenarios . 3 Where Canvas Apps Appear . 3 Supported Browsers . 4 Supported Salesforce Editions . 4 User Permissions Required . 5 User Interface Considerations . 5 Canvas App Process . 6 Canvas Personal Apps . 8 Canvas Personal App Process . 8 Enabling Canvas Personal Apps within an Organization . 9 Making an App a Canvas Personal App . 10 Uninstalling a Canvas Personal App . 10 Chapter 2: Quick Start . 12 Prerequisites . 13 Create the App . 13 Set the App Location . 14 Chapter 3: Quick Start—Advanced . 16 Prerequisites . 17 Clone the Project from GitHub . 17 Run the Web App Locally . 18 Create the Canvas App . 19 Configure Who Can Access the Canvas App . 21 Deploy the Web App to Heroku . 22 Update the Canvas App . 23 Package the Canvas App . 24 Upload the Canvas App Package . 25 Install the Canvas App . 25 Configure Who Can Access the Installed Canvas App . 26 USING CANVAS . 27 Chapter 4: Canvas SDK . 27 Referencing the Canvas SDK . 28 Authentication . 28 Signed Request Authentication . 28 Contents OAuth Authorization . 36 SAML Single Sign-On for Canvas Apps . 40 Getting Context in Your Canvas App . 40 Cross-Domain XHR . 41 Getting a List of Chatter Users . 41 Posting to a Chatter Feed . 42 Alternatives to Cookies for User Tracking .
    [Show full text]
  • Annual Report 2012
    NEWS CORP. ANNU AL REPO RT 2012 NEWSANNUAL REPORT 2012 1211 Avenue of the Americas New York, NY 10036 www.newscorp.com C O RP. 425667.COVER.CX.CS5.indd 1 8/29/12 5:21 PM OUR AIM IS TO UNLOCK MORE VALUE FOR OUR STOCKHOLDERS 425667.COVER.CS5.indd 2 8/31/12 9:58 AM WE HAVE NO INTENTION OF RESTING ON OUR LAURELS WE ARE ALWAYS INVESTING IN THE NEXT GENERATION 425667.TEXT.CS5.indd 2 8/28/12 5:10 PM 425667.TEXT.CS5.indd 3 8/27/12 8:44 PM The World’s LEADER IN QUALITY JOURNALISM 425667.TEXT.CS5.indd 4 8/28/12 5:11 PM A LETTER FROM Rupert Murdoch It takes no special genius to post good earnings in a booming economy. It’s the special company that delivers in a bad economic environment. At a time when the U.S. has been weighed down by its slowest recovery since the Great Depression, when Europe’s currency threatens its union and, I might add when our critics flood the field with stories that refuse to move beyond the misdeeds at two of our papers in Britain, I am delighted to report something about News Corporation you Rupert Murdoch, Chairman and Chief Executive Officer might not know from the headlines: News Corporation In 2012, for the second year in a row, we have brought our stockholders double-digit growth in total segment operating income. FOR THE SECOND We accomplished this because we do not consider ourselves a conventional YEAR IN A ROW, company.
    [Show full text]
  • Rishi.Narang (At) Thirdbrigade.Com +91 988.6982.678
    END USER PRIVACY BREACHES Rishi Narang Vulnerability Research Analyst Third Brigade Security Labs rishi.narang (at) thirdbrigade.com +91 988.6982.678 OWASP 06th September, 2007 Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org HAWK‟S EYE Web Application Security - 10 Steps to Secure - IE vs. Firefox Competition Common User Behaviors - Warnings & Error Messages - SURVEY: What End Users Say About Warnings Security Products vs. Attacks - Current Security Architecture - Security Myths Ideal World vs. Real World - Security Awareness (Geographically) - Plans & Actions + Prime Focus Privacy Approach - Data Gathering - Privacy Policies & Drives OWASP 2 WEB APPLICATION SECURITY … lot many web apps, but are they secured ?? Can they live together ?? OWASP 3 10 STEPS TO SECURE WEB 2.0 brings Threat 2.0 STEP 01. Policy: Fair policy @ every Gateway STEP 02. Tuning the Policy: Tuning as per custom applications STEP 03. Dealing with Malwares: HOST level protection against Malwares STEP 04. Block Undesirable URLs: Block Black-Listed and undesirables STEP 05. File Format Scans: Protection against malicious file downloads STEP 06. Upload Scans: Upload scan log for malicious activities STEP 07. IM traffic scans: IM traffic scan for file sharing and scripts STEP 08. Web Activity Monitoring: Passive monitoring for Anomalies STEP 09. Policy Enforcements: User Education and simplified process STEP 10. Emerging Web Activities: Keep an Eye on it ! OWASP 4 BROWSER VULNERABILITIES Source: Internet Security Threat Report Volume XI, Symantec Corporation IE & FIREFOX reported high number of vulnerabilities as compared to other browsers.
    [Show full text]
  • 20190920 Joealexander V DMA-ADWEEK-COFFEE.Pdf
    Case 3:19-cv-00688 Document 1 Filed 09/19/19 Page 1 of 55 PagelD# 1 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Richmond Division JOE ALEXANDER ) ) Plaintiff, ) ) 3: 19-cv-688 V. ) Case No. ) ) TRIAL BY JURY DIET MADISON A VENUE ) IS DEMANDED OMA DOE DEFENDANTS 1-17 ) ADWEEK, LLC ) ) -and- ) ) PA TRICK COFFEE ) ) Defendants. ) COMPLAINT Plaintiff, Joe Alexander, by counsel, files the following Complaint against Defendants, Diet Madison Avenue ("OMA"), OMA Doe Defendants 1-17, Adweek, LLC ("Adweek") and Patrick Coffee ("Coffee"), jointly and severally. Plaintiff seeks (a) compensatory damages and punitive damages in the sum of $25,350,000.00, (b) plus prejudgment interest on the principal sum awarded by the Jury from November 21, 2017 to the date of Judgment, and ( c) court costs and expenses - arising out of the Defendants' tortious interference with contract, tortious interference with prospective economic advantage, common law conspiracy, defamation and intentional inflictionof emotional distress. 1 Case 3:19-cv-00688 Document 1 Filed 09/19/19 Page 2 of 55 PagelD# 2 I. INTRODUCTION [https://www.ispot.tv/ad/Ag03/geico-the-wisconsin ("Fifteen minutes could save you 15% or more on car insurance"). The GEICO Gecko has become a force to be reckoned with in the advertising world and was voted America's favorite advertising icon in 2005. GEICO's small green friend has traveled the country spreading the good news about GEICO and has captivated audiences of all ages. The idea for the Gecko grew from a creative session at GEICO's ad agency, The Martin Agency in Richmond, Virginia.
    [Show full text]
  • Branded Content Creation & Distribution Guide
    Branded Content Creation & Distribution Guide Steps for Success. Developing and distributing branded content has become more complicated than ever with a wide array of package options and pricing that can vary significantly depending on the content creator, buy types, content types, publisher sites, and more. This guide is designed to help brand marketers and their agencies identify the various branded content creation and distribution options available today and, importantly, understand the key factors that should be considered upfront to make sure that all branded content/native advertising buy meets strategic objectives/KPIs. iab.com/branded-content April 2018 © 2018 Interactive Advertising Bureau Branded Content Creation & Distribution Guide Table of Contents Mission and Contributors ................................................................................................................... 3 Introduction ........................................................................................................................................ 5 Setting the Stage – The IAB Branded Content Creation & Distribution Definitions Framework ......... 6 Where to Start – Key Steps ............................................................................................................... 8 First step: What’s your strategy and KPIs? ..................................................................................... 8 Next Step: Content: Do you have content? Do you need content? ............................................. 9 Next step:
    [Show full text]
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • Internet Explorer 9 Features
    m National Institute of Information Technologies NIIT White Paper On “What is New in Internet Explorer 9” Submitted by: Md. Yusuf Hasan Student ID: S093022200027 Year: 1st Quarter: 2nd Program: M.M.S Date - 08 June 2010 Dhaka - Bangladesh Internet Explorer History Abstract: In the early 90s—the dawn of history as far as the World Wide Web is concerned—relatively few users were communicating across this Internet Explorer 9 (abbreviated as IE9) is the upcoming global network. They used an assortment of shareware and other version of the Internet Explorer web browser from software for Microsoft Windows operating system. In 1995, Microsoft Microsoft. It is currently in development, but developer hosted an Internet Strategy Day and announced its commitment to adding Internet capabilities to all its products. In fulfillment of that previews have been released. announcement, Microsoft Internet Explorer arrived as both a graphical Web browser and the name for a set of technologies. IE9 will have complete or nearly complete support for all 1995: Internet Explorer 1.0: In July 1995, Microsoft released the CSS 3 selectors, border-radius CSS 3 property, faster Windows 95 operating system, which included built-in support for JavaScript and embedded ICC v2 or v4 color profiles dial-up networking and TCP/IP (Transmission Control support via Windows Color System. IE9 will feature Protocol/Internet Protocol), key technologies for connecting to the hardware accelerated graphics rendering using Direct2D, Internet. In response to the growing public interest in the Internet, Microsoft created an add-on to the operating system called Internet hardware accelerated text rendering using Direct Write, Explorer 1.0.
    [Show full text]
  • Digital Content Creation Annual Report for FY12 Submitted by Betsy Kruger, Head DCC
    Digital Content Creation Annual Report for FY12 Submitted by Betsy Kruger, Head DCC I. Unit Narrative A. Overview of major activities and accomplishments in FY12 and major challenges faced i) Digital Content Creation’s (DCC) major activities and accomplishments in FY12 focused on the digitization of significant special collections, primarily in the RBML, the University Archives, the IHLL, the Sousa Archives, and the Map Library, which are detailed in various sections below. We also digitized a substantial amount of University of Illinois related publications, including dissertations, for deposit into IDEALS. We worked closely with CAM metadata personnel and the Visual Resources Coordinator at FAA on access issues related to our digitized content. We provided cost recovery digitization services for several campus units, and handled numerous patron requests for digital images. In addition to the digital projects outlined in the chart below, other major activities of the year included: (1) Developing and issuing a successful RFP for Digital Imaging Services, along with HPNL and the Preservation Department; (2) Oversight of and training for the Library’s participation in the IMLS grant funded Copyright Review Management System – World project, a collaborative project with the University of Michigan and 14 other institutions to make reliable copyright status determinations for foreign-published titles, which constitute a significant portion of the scholarly works being digitized by projects such as HathiTrust. (3) Began work on a Library funded initiative to assess the needs of non-Library, non-FAA units on campus for digitization and image management services. Our partners include representatives from FAA, CITES, and LAS/IT.
    [Show full text]
  • Modifying Interactive Computer Service Provider Immunity Under Section 230 of the Communications Decency Act in the Wake of “Me Too”
    APPS TOO: MODIFYING INTERACTIVE COMPUTER SERVICE PROVIDER IMMUNITY UNDER SECTION 230 OF THE COMMUNICATIONS DECENCY ACT IN THE WAKE OF “ME TOO” ALEXANDRA LOTTY* TABLE OF CONTENTS INTRODUCTION ..................................................................................... 886 I. BACKGROUND ................................................................................... 889 A. HISTORY OF THE COMMUNICATIONS DECENCY ACT ....................... 889 B. SECTION 230 OF THE COMMUNICATIONS DECENCY ACT ................. 890 C. CURRENT CLIMATE: THE “ME TOO” MOVEMENT AGAINST SEXUAL HARASSMENT AND ASSAULT ............................................................ 892 II. OVERBROAD INTERPRETATIONS OF SECTION 230 HAVE STIFLED OPPORTUNITIES FOR LEGAL RECOURSE ................... 893 A. INTERNET CONTENT PROVIDER ANALYSIS: THE “NEUTRAL” OR “PASSIVE” ASSISTANCE TEST ........................................................... 893 B. COURT INTERPRETATIONS OF THE TERM “PUBLISHER” IN THE CONTEXT OF SECTION 230 ................................................................ 895 1. The Narrow “Disseminator or Propagator” Interpretation ............ 896 2. The “Traditional Editorial Functions” Inquiry .............................. 897 3. The Broad “Overall Design and Operation” Interpretation .......... 898 a. Modern Case Study: Herrick v. Grindr .................................... 899 C. CONCERNS AND CONSIDERATIONS PRESENT IN SECTION 230 ANALYSIS .......................................................................................... 900 1. Free
    [Show full text]
  • Using Facebook to Engage Stakeholders: Developing A
    Coastal Carolina University CCU Digital Commons Library Faculty Publications Kimbel Library and Bryan Information Commons 2013 Using Facebook to Engage Stakeholders: Developing a Content Strategy to Meet Dynamic Social Media Challenges Scott aB con Coastal Carolina University, [email protected] Amanda Foster Follow this and additional works at: https://digitalcommons.coastal.edu/lib-fac-pub Part of the Library and Information Science Commons Recommended Citation Bacon, Scott nda Foster, Amanda, "Using Facebook to Engage Stakeholders: Developing a Content Strategy to Meet Dynamic Social Media Challenges" (2013). Library Faculty Publications. 2. https://digitalcommons.coastal.edu/lib-fac-pub/2 This Article is brought to you for free and open access by the Kimbel Library and Bryan Information Commons at CCU Digital Commons. It has been accepted for inclusion in Library Faculty Publications by an authorized administrator of CCU Digital Commons. For more information, please contact [email protected]. 2013 ASCUE Proceedings Using Facebook to Engage Stakeholders: Developing a Content Strategy to Meet Dynamic Social Media Challenges Amanda Foster Information Literacy Librarian [email protected] Scott Bacon Web Services and Emerging Technologies Librarian [email protected] Kimbel Library Coastal Carolina University Conway, SC 29528 843-349-2400 Abstract Facebook is often used by higher education institutions to increase engagement with the campus popu- lation and larger community. Facebook page administrators must successfully navigate Facebook’s News Feed algorithm to have content reach the largest possible audience. This algorithm uses different measures of audience interaction when determining how “engaging” a post is, rewarding the more en- gaging posts by increasing the likelihood that they will show up in a fan's News Feed.
    [Show full text]
  • Welcome to the Scbwi Summer Spectacular!
    WELCOME TO THE SCBWI SUMMER SPECTACULAR! We’re happy to have you join us for our first all-digital Summer Spectacular. Detailed information on all aspects of the Summer Spectacular can be found on the event’s website page (https://www.scbwi.org/events/scbwi-summer-spectacular-2020/) We are bringing you 10 craft-centered keynote conversations featuring award-winning and world-renowned authors and illustrators, plus the timely and relevant editors’ panel and agents’ panel, and manuscript, portfolio, social media and career consultations. The program is a truly historic gathering featuring many of the best and strongest voices in our field. All sessions will be recorded and posted on scbwi.org for the entire month of August, for you to enjoy and re-watch at your leisure. It’s our pleasure to welcome this year for the first time, the Vermont College of Fine Arts (VCFA) as our exclusive education sponsor. VCFA has one of the most prestigious writing programs in the US, and they are generously offering to waive the application fee through October 15 for active SCBWI members who apply to the Writing for Children & Young Adults Program. See the one-sheet in your attendee materials for more information. Other parts of your experience at the Summer Spectacular are the faculty/member bookstore which will be live on our website from the first day of the event through August 31. Please visit, browse and buy. You are also invited to enjoy the Portfolio Showcase exhibiting beautiful art from over 400 of our gifted attendees. Take part in the socials and Twitter chats, and a fun meme contest to test your sense of humor and creativity.
    [Show full text]
  • How to Attract Customers with Facebook Contents
    HOW TO ATTRACT CUSTOMERS WITH FACEBOOK CONTENTS 3 PRIORITIZE YOUR BUSINESS OBJECTIVES 10 BUILD YOUR FACEBOOK AUDIENCE 21 DEVELOP & FOCUS ON YOUR OVERARCHING CONTENT & LEAD GEN STRATEGIES 30 CHAMPION VALUE CREATION: WHAT CONTENT TO CREATE & SHARE ON FACEBOOK 59 MAXIMIZE CUSTOMER ACQUISITION WITH ADVERTISING 72 WRAP UP & TAKEAWAYS PRIORITIZE YOUR BUSINESS 1OBJECTIVES Every brand on Facebook is on Facebook for one reason – to (eventually) get more business. Getting more business from Facebook means different things to different types of businesses, though, which means different brands… …will have different objectives, such as: • Driving in-store sales; • Increasing online sales; • Launching a new product; • Building awareness; or • Promoting a mobile app. This guide will primarily be helpful for businesses that want to generate leads or online sales. Even with these objectives in mind, there are a few stepping stones that precede turning fans into customers. If you want customers … … you have to first: Attract Visitors 1. Build an audience; Create an audience of engaged Facebook fans to drive to your website. 2. Drive inbound traffic to your website; Convert Leads Use forms on optimized landing pages to collect contact information from visitors. 3. Turn that traffic into qualified leads; and then Close Customers Use email and marketing automation to 4. Nurture those leads into nurture leads into (repeat) customers. customers. This guide will give you a playbook for doing just that. First we’ll talk about how to build an audience, and then we’ll dive into how you get that audience to head on over to your website where they can actually do business with you.
    [Show full text]