Collective Classification of Spam Campaigners on Twitter: a Hierarchical Meta-Path Based Approach

Total Page:16

File Type:pdf, Size:1020Kb

Collective Classification of Spam Campaigners on Twitter: a Hierarchical Meta-Path Based Approach Collective Classification of Spam Campaigners on Twitter: A Hierarchical Meta-Path Based Approach Srishti Gupta Abhinav Khattar Arpit Gogia IIIT-Delhi IIIT-Delhi DTU [email protected] [email protected] [email protected] Ponnurangam Kumaraguru Tanmoy Chakraborty IIIT-Delhi IIIT-Delhi [email protected] [email protected] ABSTRACT KEYWORDS Cybercriminals have leveraged the popularity of a large user base Spam Campaign, phone number, heterogeneous network, meta- available on Online Social Networks (OSNs) to spread spam cam- path, Twitter, Online Social Networks paigns by propagating phishing URLs, attaching malicious contents, ACM Reference Format: etc. However, another kind of spam attacks using phone numbers Srishti Gupta, Abhinav Khattar, Arpit Gogia, Ponnurangam Kumaraguru, has recently become prevalent on OSNs, where spammers adver- and Tanmoy Chakraborty. 2018. Collective Classification of Spam Campaign- tise phone numbers to attract users’ attention and convince them ers on Twitter: A Hierarchical Meta-Path Based Approach. In WWW 2018: to make a call to these phone numbers. The dynamics of phone The 2018 Web Conference, April 23–27, 2018, Lyon, France. ACM, New York, number based spam is different from URL-based spam due toan NY, USA, 10 pages. https://doi.org/https://doi.org/10.1145/3178876.3186119 inherent trust associated with a phone number. While previous work has proposed strategies to mitigate URL-based spam attacks, 1 INTRODUCTION phone number based spam attacks have received less attention. Online Social Networks (OSNs) are becoming more and more popu- In this paper, we aim to detect spammers that use phone num- lar in the recent years, used by millions of users. As a result, OSNs bers to promote campaigns on Twitter. To this end, we collected are being abused by spam campaigners to carry out phishing and information (tweets, user meta-data, etc.) about 3; 370 campaigns spam attacks [18]. While attacks carried using URLs [8, 16, 18, 42, spread by 670; 251 users. We model the Twitter dataset as a hetero- 47] has been extensively explored in the literature, attacks via a new geneous network by leveraging various interconnections between action token, i.e., a phone number is mostly unexplored. Tradition- different types of nodes present in the dataset. In particular, we ally, spammers have been exploiting telephony system in carrying make the following contributions – (i) We propose a simple yet out social engineering attacks either by calling victims or sending effective metric, called Hierarchical Meta-Path Score (HMPS) to mea- SMS [45]. Recently, spammers have started abusing OSNs where sure the proximity of an unknown user to the other known pool of they float phone numbers controlled by them. Besides exploiting spammers. (ii) We design a feedback-based active learning strategy trust associated with a phone number, spammers save efforts in and show that it significantly outperforms three state-of-the-art reaching out their victims themselves. baselines for the task of spam detection. Our method achieves 6.9% Present Work: Problem definition. In this paper, we aim to and 67.3% higher F1-score and AUC, respectively compared to the detect spam campaigners (aka, spammers) spreading spam cam- best baseline method. (iii) To overcome the problem of less train- paigns using phone numbers on Twitter. We here define spammers ing instances for supervised learning, we show that our proposed as user accounts that use phone numbers to aggressively promote feedback strategy achieves 25.6% and 46% higher F1-score and AUC products, disseminate pornography, entice victims for lotteries and respectively than other oversampling strategies. Finally, we per- discounts, or simply mislead victims by making false promises. form a case study to show how our method is capable of detecting Discovering the correspondence between the spammer accounts arXiv:1802.04168v1 [cs.SI] 12 Feb 2018 those users as spammers who have not been suspended by Twitter and the resources (such as URL or phone number) used for spam (and other baselines) yet. activities is a crucial task. As the phone numbers are being prop- agated by spammers, and their monetization revenue starts once CCS CONCEPTS people call them, it is fair to assume that these phone numbers • Information systems; • Security and privacy; • Applied com- would be under their control. As an added advantage of this, if puting; we can identify the spammer accounts in Twitter and bring them down, the entire campaign would get disintegrated. To identify spammers, we model the Twitter dataset as a heterogeneous graph This paper is published under the Creative Commons Attribution 4.0 International where there are different connections between heterogeneous type (CC BY 4.0) license. Authors reserve their rights to disseminate the work on their personal and corporate Web sites with the appropriate attribution. of entities: users, campaigns, and the action tokens (phone number WWW 2018, April 23–27, 2018, Lyon, France or URL) as shown in Figure 1. Heterogeneous networks have been © 2018 IW3C2 (International World Wide Web Conference Committee), published proposed for data representation in a variety of datasets like path under Creative Commons CC BY 4.0 License. ACM ISBN 978-1-4503-5639-8. similarity in scholar data [39], link prediction in social network https://doi.org/https://doi.org/10.1145/3178876.3186119 data [22], etc. Objects of different types and links carry different User We collected tweets and other meta-data information of users propagating propagated-by from April-October, 2016, and identified 3; 370 campaigns, contain- Phno shared-by ing 670; 251 users (Section 2). Each tweet carries a phone number. sharing using We consider user accounts suspended by Twitter as ground-truth used-by Camp spammers. However, due to the lack of enough training samples per using using campaign, we introduce a novel feedback-based active learning mech- used-by used-by anism that uses a SVM-based one-class classifier for each campaign. Phno User URL Over multiple iterations, it keeps accumulating evidences from dif- sharing ferent campaigns to enrich the training set for each campaign. This, shared-by in turn, enhances the prediction performance of individual classi- fiers. The process terminates when there is no chance of finding Figure 1: Twitter modeled as a heterogeneous network. the label of the unknown users across iterations. Summary of the evaluation. We compare our model with three state-of-the-art baselines used for spam detection (Section 5.3). semantics. For instance, a phone number being a more stable re- We design various experimental setup to perform a thorough eval- source would help in connecting user accounts over an extended uation of our proposed method. We observe that our model out- period. Physical identity verification is required to purchase phone performs the best baseline method by achieving 44.8%, 16.7%, 6.9%, numbers, while only e-mail verification is sufficient to purchase 67.3% higher performance in terms of accuracy, precision, F1-score domains. Studying similarity between a pair of nodes keeping the and AUC (Section 5.3). We further demonstrate how / why one-class heterogeneous nature of the network helps in distinguishing the classifier (Section 5.4), active learning (Section 5.5) and feedback- semantics of different types of paths connecting these two nodes. based learning (Section 5.6) are better than 2-class classifier, general To distinguish the semantics among paths connecting two nodes, learning and other oversampling method, respectively. Moreover, we introduce a meta-path based similarity framework for nodes we conduct a case study and present an intuitive justification why of the same type in the heterogeneous network. A meta-path is our method is superior to the other methods (Section 5.3). a sequence of relations between node types, which defines a new composite relation between its starting type and ending type. It provides a powerful mechanism to classify objects sharing similar semantics appropriately. 2 DATASET Present Work: Motivation of the work. The problem of iden- We collected tweets containing phone numbers from Twitter based tifying spammers on Twitter that use phone numbers is useful in on an exhaustive list of 400 keywords via Twitter streaming API. many aspects. Attacks using phone numbers and URLs are different We chose Twitter due to easy availability of data. The data was in some aspects: in URL based spam, the campaign propagates and collected from April - October, 2016. Since we intended to detect spreads on the same medium, i.e., OSNs, while in case of phone campaigns around phone numbers, the keywords we chose were number based spam, the attacking medium is a telephone and the specific to phone number such as ‘call’, ‘SMS’, ‘WA’, ‘ring’ etc.We propagating medium is OSNs. As a result, it is challenging for OSN accumulated ∼ 22 million tweets, each of which containing at service providers to track down the accounts spreading these spam least one phone number. The reason behind collecting only tweets campaigns. In addition, there is no meta-data available for phone containing phone numbers is that they are found to be a stable numbers, unlike URLs where landing page information, length of resource, i.e., spammers use them for a long period due to attached URLs, obfuscation, etc. can be checked. Perhaps due to the chal- cost. Moreover, the phone numbers are known to help in forming lenges associated with finding spam phone numbers, there have better user communities [9], which is the basis of the approach been several attacks and financial losses caused by the phone-based adopted in this work. attacks [31]. Using the collective classification approach proposed Campaign identification: We define a campaign as a group of in the paper, Twitter will be able to find potential spammers and sus- similar posts shared by a set of users propagating multiple phone pend the accounts, thereby restricting phone number based spam numbers.
Recommended publications
  • Investor Presentation
    July 2021 Disclaimer 2 This Presentation (together with oral statements made in connection herewith, the “Presentation”) relates to the proposed business combination (the “Business Combination”) between Khosla Ventures Acquisition Co. II (“Khosla”) and Nextdoor, Inc. (“Nextdoor”). This Presentation does not constitute an offer, or a solicitation of an offer, to buy or sell any securities, investment or other specific product, or a solicitation of any vote or approval, nor shall there be any sale of securities, investment or other specific product in any jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such jurisdiction. The information contained herein does not purport to be all-inclusive and none of Khosla, Nextdoor, Morgan Stanley & Co. LLC, and Evercore Group L.L.C. nor any of their respective subsidiaries, stockholders, affiliates, representatives, control persons, partners, members, managers, directors, officers, employees, advisers or agents make any representation or warranty, express or implied, as to the accuracy, completeness or reliability of the information contained in this Presentation. You should consult with your own counsel and tax and financial advisors as to legal and related matters concerning the matters described herein, and, by accepting this Presentation, you confirm that you are not relying solely upon the information contained herein to make any investment decision. The recipient shall not rely upon any statement, representation
    [Show full text]
  • Sarah Friar the Empathy Flywheel, W/Nextdoor CEO
    Masters of Scale Episode Transcript – Sarah Friar The Empathy Flywheel, w/Nextdoor CEO Sarah Friar Click here to listen to the full Masters of Scale episode featuring Sarah Friar. REID HOFFMAN: For today’s show, we’re talking with Sarah Friar, the CEO of Nextdoor, who’s ​ built a reputation in Silicon Valley as both a skilled operator and a beloved leader. But we’ll start the show – as we often do – by hearing from another person who’s renowned in their field. DR. ROBERT ROSENKRANZ: I might not be Mark Zuckerberg, I might not be Sheldon ​ Adelson, I might not be Tom Brady, all right. I'm Robert Rosenkranz, I'm a dentist in Park Slope, and I love my patients. I love what I do. HOFFMAN: Robert Rosenkranz is a dentist in Brooklyn, New York. A dentist who loves his ​ patients so much he sees 80 of them every day. That means he’s in the office almost 14 hours, six days a week. ROSENKRANZ: Okay. A little less on Sunday. Otherwise my wife would leave me. But ​ six days, we're looking like max hours. Max capacity. HOFFMAN: You know the drill on this show. Working long hours isn’t unusual. What sets ​ Robert’s dental practice apart is that his patients keep multiplying. Not because the good people of Park Slope have particularly bad teeth, but because they just love visiting Robert. ROSENKRANZ: One of my very good friends says to me, “Whenever you see someone, ​ they think you're their best friend. When you talk to them, they feel like you're their best friend." I said, "That's what I want." I take that, and I bring it to work, and I bring it to strangers, and it becomes infectious.
    [Show full text]
  • Social Networking for Scientists Using Tagging and Shared Bookmarks: a Web 2.0 Application
    Social Networking for Scientists Using Tagging and Shared Bookmarks: a Web 2.0 Application Marlon E. Pierce, Geoffrey C. Fox, Joshua Rosen, Siddharth Maini, and Jong Y. Choi Community Grids Laboratory, Indiana University, Bloomington, IN 47404, USA {marpierc, gcf, jjrosen, smaini, jychoi}@indiana.edu ABSTRACT and researchers to find both useful online resources and also potential collaborators on future research projects. Web-based social networks, online personal profiles, We are particularly interested in helping researchers at keyword tagging, and online bookmarking are staples of Minority Serving Institutions (MSIs) connect with each Web 2.0-style applications. In this paper we report our other and with the education, outreach, and training investigation and implementation of these capabilities as services that are designed to serve them, expanding their a means for creating communities of like-minded faculty participation in cyberinfrastructure research efforts. This and researchers, particularly at minority serving portal is a development activity of the Minority Serving institutions. Our motivating problem is to provide Institution-Cyberinfrastructure Empowerment Coalition outreach tools that broaden the participation of these (MSI-CIEC). The portal’s home page view is shown in groups in funded research activities, particularly in Figure 1. cyberinfrastructure and e-Science. In this paper, we The MSI-CIEC social networking Web portal combines discuss the system design, implementation, social social bookmarking and tagging with online curricula network seeding, and portal capabilities. Underlying our vitae profiles. The display shows the logged-in user’s tag system, and folksonomy systems generally, is a graph- cloud (“My Tags” on left), taggable RSS feeds (center), based data model that links external URLs, system users, and tag clouds of all users (“Favorite Tags” and “Recent and descriptive tags.
    [Show full text]
  • Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook
    University of Pennsylvania ScholarlyCommons Marketing Papers Wharton Faculty Research 1-2018 Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Dokyun Lee Kartik Hosanagar University of Pennsylvania Harikesh Nair Follow this and additional works at: https://repository.upenn.edu/marketing_papers Part of the Advertising and Promotion Management Commons, Business Administration, Management, and Operations Commons, Business Analytics Commons, Business and Corporate Communications Commons, Communication Technology and New Media Commons, Marketing Commons, Mass Communication Commons, Social Media Commons, and the Technology and Innovation Commons Recommended Citation Lee, D., Hosanagar, K., & Nair, H. (2018). Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook. Management Science, http://dx.doi.org/10.1287/mnsc.2017.2902 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/marketing_papers/339 For more information, please contact [email protected]. Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Abstract We describe the effect of social media advertising content on customer engagement using data from Facebook. We content-code 106,316 Facebook messages across 782 companies, using a combination of Amazon Mechanical Turk and natural language processing algorithms. We use this data set to study the association of various kinds of social media marketing content with user engagement—defined as Likes, comments, shares, and click-throughs—with the messages. We find that inclusion of widely used content related to brand personality—like humor and emotion—is associated with higher levels of consumer engagement (Likes, comments, shares) with a message. We find that directly informative content—like mentions of price and deals—is associated with lower levels of engagement when included in messages in isolation, but higher engagement levels when provided in combination with brand personality–related attributes.
    [Show full text]
  • CDC Social Media Guidelines: Facebook Requirements and Best Practices
    Social Media Guidelines and Best Practices Facebook Purpose This document is designed to provide guidance to Centers for Disease Control and Prevention employees and contractors on the process for planning and development, as well as best practices for participating and engaging, on the social networking site Facebook. Background Facebook is a social networking service launched in February 2004. As of March 2012, Facebook has more than 901 million active users, who generate an average of 3.2 billion Likes and Comments per day. For additional information on Facebook, visit http://newsroom.fb.com/. The first CDC Facebook page, managed by the Office of the Associate Director for Communication Science (OADC), Division of News and Electronic Media (DNEM), Electronic Media Branch (EMB), was launched in May 2009 to share featured health and safety updates and to build an active and participatory community around the work of the agency. The agency has expanded its Facebook presence beyond the main CDC profile, and now supports multiple Facebook profiles connecting users with information on a range of CDC health and safety topics. Communications Strategy Facebook, as with other social media tools, is intended to be part of a larger integrated health communications strategy or campaign developed under the leadership of the Associate Director of Communication Science (ADCS) in the Health Communication Science Office (HCSO) of CDC’s National Centers, Institutes, and Offices (CIOs). Clearance and Approval 1. New Accounts: As per the CDC Enterprise Social Media policy (link not available outside CDC network): • All new Facebook accounts must be cleared by the program’s HCSO office.
    [Show full text]
  • Narcissism and Social Media Use: a Meta-Analytic Review
    Psychology of Popular Media Culture © 2016 American Psychological Association 2018, Vol. 7, No. 3, 308–327 2160-4134/18/$12.00 http://dx.doi.org/10.1037/ppm0000137 Narcissism and Social Media Use: A Meta-Analytic Review Jessica L. McCain and W. Keith Campbell University of Georgia The relationship between narcissism and social media use has been a topic of study since the advent of the first social media websites. In the present manuscript, the authors review the literature published to date on the topic and outline 2 potential models to explain the pattern of findings. Data from 62 samples of published and unpublished research (N ϭ 13,430) are meta-analyzed with respect to the relationships between grandiose and vulnerable narcissism and (a) time spent on social media, (b) frequency of status updates/tweets on social media, (c) number of friends/followers on social media, and (d) frequency of posting pictures of self or selfies on social media. Findings suggest that grandiose narcissism is positively related to all 4 indices (rs ϭ .11–.20), although culture and social media platform significantly moderated the results. Vul- nerable narcissism was not significantly related to social media use (rs ϭ .05–.42), although smaller samples make these effects less certain. Limitations of the current literature and recommendations for future research are discussed. Keywords: narcissism, social media, meta-analysis, selfies, Facebook Does narcissism relate to social media use? Or introverted form) narcissism spend more time is the power to selectively present oneself to an on social media than those low in narcissism? online audience appealing to everyone, regardless (b) Do those high in grandiose and vulnerable of their level of narcissism? Social media websites narcissism use the features of social media (i.e., such as Facebook, Twitter, or Instagram can adding friends, status updates, and posting pic- sound like a narcissistic dream.
    [Show full text]
  • Building Relationships on Social Networking Sites from a Social Work Approach
    Journal of Social Work Practice Psychotherapeutic Approaches in Health, Welfare and the Community ISSN: 0265-0533 (Print) 1465-3885 (Online) Journal homepage: https://www.tandfonline.com/loi/cjsw20 Building relationships on social networking sites from a social work approach Joaquín Castillo De Mesa, Luis Gómez Jacinto, Antonio López Peláez & Maria De Las Olas Palma García To cite this article: Joaquín Castillo De Mesa, Luis Gómez Jacinto, Antonio López Peláez & Maria De Las Olas Palma García (2019) Building relationships on social networking sites from a social work approach, Journal of Social Work Practice, 33:2, 201-215, DOI: 10.1080/02650533.2019.1608429 To link to this article: https://doi.org/10.1080/02650533.2019.1608429 Published online: 16 May 2019. Submit your article to this journal Article views: 204 View related articles View Crossmark data Citing articles: 2 View citing articles Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=cjsw20 JOURNAL OF SOCIAL WORK PRACTICE 2019, VOL. 33, NO. 2, 201–215 https://doi.org/10.1080/02650533.2019.1608429 Building relationships on social networking sites from a social work approach Joaquín Castillo De Mesa a, Luis Gómez Jacinto a, Antonio López Peláez b and Maria De Las Olas Palma García a aDepartment of Social Psychology, Social Work, Social Anthropology and East Asian Studies, University of Málaga, Málaga, Spain; bDepartment of Social Work, National Distance Education University, Madrid, Spain ABSTRACT KEYWORDS Our current age of connectedness has facilitated a boom in inter- Relationships; active dynamics within social networking sites. It is, therefore, possi- connectedness; interaction; ble for the field of Social Work to draw on these advantages in order communities; social mirror; to connect with the unconnected by strengthening online mutual social work support networks among users.
    [Show full text]
  • Implementation on Social Media Platforms
    Implementation on Social Media Platforms Overview The Eko Video Player is whitelisted for the Twitter and Facebook environments. When end viewers share an Eko video to one of these services, they essentially embed the Eko Video Player onto their timeline. Depending on the service (i.e. Facebook or Twitter), the end viewer’s platform, and whether the post is promoted (on Facebook only), the Eko Video Player will either play inline within the social media feed, in a new tab within the social media space, or in a new browser tab. Support for the Eko Video Player within these services is made possible by meta tags that are added to the HTML of the site where the video is hosted. These meta tags enable a Facebook Preview and Twitter Card to display in the feed when the video site url is shared on these services. The cards link directly to the interactive video object, enable playback, and specify the sharing copy for the content (provided by the partner). Direct links to videos hosted by Eko automatically include the meta tags to enable inline playback on shared posts, but for videos embedded outside of helloeko.com on a client’s website, the meta tags will need to be added to the website in the <head> part of the page’s HTML and tested. Facebook Open Graph Meta Tags When someone shares a video project hosted on your site to Facebook, Facebook’s crawler will scrape the HTML of the URL that is shared. On a regular HTML page this content is basic and may be incorrect, because the scraper has to guess which content is important, and which is not.
    [Show full text]
  • Engineering Egress with Edge Fabric Steering Oceans of Content to the World
    Engineering Egress with Edge Fabric Steering Oceans of Content to the World Brandon Schlinker,?y Hyojeong Kim,? Timothy Cui,? Ethan Katz-Bassett,yz Harsha V. Madhyasthax Italo Cunha,] James Quinn,? Saif Hasan,? Petr Lapukhov,? Hongyi Zeng? ? Facebook y University of Southern California z Columbia University x University of Michigan ] Universidade Federal de Minas Gerais ABSTRACT 1 INTRODUCTION Large content providers build points of presence around the world, Internet traffic has very different characteristics than it did a decade each connected to tens or hundreds of networks. Ideally, this con- ago. The traffic is increasingly sourced from a small number of large nectivity lets providers better serve users, but providers cannot content providers, cloud providers, and content delivery networks. obtain enough capacity on some preferred peering paths to han- Today, ten Autonomous Systems (ASes) alone contribute 70% of the dle peak traffic demands. These capacity constraints, coupled with traffic [20], whereas in 2007 it took thousands of ASes to add up to volatile traffic and performance and the limitations of the 20year this share [15]. This consolidation of content largely stems from old BGP protocol, make it difficult to best use this connectivity. the rise of streaming video, which now constitutes the majority We present Edge Fabric, an SDN-based system we built and of traffic in North America [23]. This video traffic requires both deployed to tackle these challenges for Facebook, which serves high throughput and has soft real-time latency demands, where over two billion users from dozens of points of presence on six the quality of delivery can impact user experience [6].
    [Show full text]
  • Koo Seunghwui Is a Sculptor Based in New York
    [Silence Is Accurate] KARToISToS Seunghwui POP UP EXHIBITIONS STORE website: www.kooseunghwui.com ABOUT US CONTACT social media: @kooseunghwui (Insta & twitter) kooseunghwui (facebook) “There is no correct answer. No one is perfect.” ...this is my own personal quote or thought. Born in South Korea, Koo Seunghwui is a sculptor based in New York. She uses resin, acrylic, plaster, clay, and mixed media to create her works. The pig is a recurring image in her art. It’s hard not to instantaneously love Koo. She is worldly and charismatic, has a playful spirit and underlying strength. Her work is born of love and precision. Also, she wore a necklace with a dinosaur! Out of the rain, we snuggled in Koo’s beautiful studio as she told us about her time with Chashama Organization (loves it!), the most authentic restaurant in Koreatown as well as her exciting upcoming exhibitions which include a few awards: ACRoTpyright ©2015 [Silence is Accurate] When I was young, my parents owned a butcher shop. During that time, I saw a lot of butchered pig heads. In Korea, when one opens a new business, buys a new car, or starts a big new endeavor, it is tradition to have a celebration with a pig's head in the center, while money is put into the pig's mouth. The person then bows and prays for a good and comfortable life. There is a belief that when one dreams of a pig, the next day one should buy a lottery ticket and put a lucky pig charm on their cellphone.
    [Show full text]
  • CORPORATE VENTURE INVESTMENTS John Park May 23, 2019
    CORPORATE VENTURE INVESTMENTS John Park May 23, 2019 © 2019 Morgan, Lewis & Bockius LLP Overview: Current Trend • Corporate Venture Capital investment is on the rise – The global number of active CVCs tripled between 2011 and 2018 (Forbes). – Most deals were $10-25M in 2018 – CVCs currently constitute more than 20% of venture deals. – Almost 2/3 of the deals were in the mobile and internet sectors 2 Overview • How and when does a CVC typically enter an investment? – CVCs as lead • Usually for strategic alignment that is tightly linked between the investment company’s operations and the startup company. – VCs as lead • Having a VC co-investor can help mitigate conflict of interest issues (i.e., separate the investment decision from the decision to enter into a business/vendor relationship) – Up rounds/down rounds • MLB CVC Survey for 2018—almost all of the transactions we reviewed involved a higher valuation than previous rounds. Only one down-round was observed. 3 Overview – Stages of a Financing I. Term sheet for Investment II. Diligence III. Capitalization Table (current and pro forma) IV. Financing Documents, Side Letter and any Strategic Commercial Agreement 4 Negotiating Deal Terms – Basics • Things to consider when negotiating deal terms: – Any prior rounds or investments (equity, convertible debt or other form of investment) with other VC/sophisticated investors? – Warrants? If provided, companies will often couple warrants with milestone conditions and exercise limitations so that the equity kicker is tied to tangible benefits for the company. – Be mindful of NDAs: strategic investors may now or in the future be actively competing with the issuer.
    [Show full text]
  • Arxiv:1403.5206V2 [Cs.SI] 30 Jul 2014
    What is Tumblr: A Statistical Overview and Comparison Yi Chang‡, Lei Tang§, Yoshiyuki Inagaki† and Yan Liu‡ † Yahoo Labs, Sunnyvale, CA 94089, USA § @WalmartLabs, San Bruno, CA 94066, USA ‡ University of Southern California, Los Angeles, CA 90089 [email protected],[email protected], [email protected],[email protected] Abstract Traditional blogging sites, such as Blogspot6 and Living- Social7, have high quality content but little social interac- Tumblr, as one of the most popular microblogging platforms, tions. Nardi et al. (Nardi et al. 2004) investigated blogging has gained momentum recently. It is reported to have 166.4 as a form of personal communication and expression, and millions of users and 73.4 billions of posts by January 2014. showed that the vast majority of blog posts are written by While many articles about Tumblr have been published in ordinarypeople with a small audience. On the contrary, pop- major press, there is not much scholar work so far. In this pa- 8 per, we provide some pioneer analysis on Tumblr from a va- ular social networking sites like Facebook , have richer so- riety of aspects. We study the social network structure among cial interactions, but lower quality content comparing with Tumblr users, analyze its user generated content, and describe blogosphere. Since most social interactions are either un- reblogging patterns to analyze its user behavior. We aim to published or less meaningful for the majority of public audi- provide a comprehensive statistical overview of Tumblr and ence, it is natural for Facebook users to form different com- compare it with other popular social services, including blo- munities or social circles.
    [Show full text]