Social Media for Small Business
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Principles, Models, and Methods for the Characterization and Analysis of Lurkers in Online Social Networks
Principles, models, and methods for the characterization and analysis of lurkers in online social networks Roberto Interdonato, Andrea Tagarelli DIMES Dept., Università della Calabria, Italy The 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining Lurking in OSNs: Principles, Models, and Methods Lurking in OSNs: Principles, Models, and Methods Lurk(er): what meanings Lurking in OSNs: Principles, Models, and Methods “Lurker”: let’s google it … Lurking in OSNs: Principles, Models, and Methods Lurk(er): what meanings Lurking in OSNs: Principles, Models, and Methods Outline 1. Lurking in online communities 2. Modeling lurking behaviors Topology-driven lurking definition The issue of controversial definitions Lurking and online behavioral 3. Lurker ranking methods models 4. Experimental evaluation The opportunity of de-lurking Static scenarios Dynamic scenarios 5. Applications to other domains Vicariously learning Lurking in social trust contexts 6. Delurking via Targeted Influence Maximization The DEvOTION algorithm 7. Conclusion and future work Lurking in OSNs: Principles, Models, and Methods LURKING IN ONLINE COMMUNITIES Lurking in OSNs: Principles, Models, and Methods The 1:9:90 rule of participation inequality (1/3) Arthur, C. (2006). What is the 1% rule? In: The guardian. UK: Guardian News and Media. Lurking in OSNs: Principles, Models, and Methods The 1:9:90 rule of participation inequality (2/3) • [Nonnecke & Preece, 2000] Email-based discussion lists: • 77 online health support groups and 21 online technical support groups • 46% of the health support group members and 82% of the technical support group members are lurkers • [Swartz, 2006] On Wikipedia: over 50% of all the edits are done by only 0.7% of the users • [van Mierlo, 2014] On four DHSNs (AlcoholHelpCenter, DepressionCenter, PanicCenter, and StopSmokingCenter): • 63,990 users, 578,349 posts • Lurkers account for 1.3% (n=4668), Contributors for 24.0% (n=88,732), and Superusers for 74.7% (n=276,034) of content Nonnecke, B., Preece, J. -
A Guide to Social Media Marketing for Small Businesses
A Guide to Social Media Marketing for Small Businesses New York Small Business Development Center This is only an excerpt of this business planning guide. To get a full copy, please visit your local SBDC. Visit www.nysbdc.org/locations.html or call 800-732-SBDC A Guide to Social Media Marketing For Small Business NEW YORK SMALL BUSINESS DEVELOPMENT CENTER April 2020 Funded in part through a cooperative agreement with the U.S. Small Business Administration. All opinions, conclusions or recommendations expressed are those of the author(s) and do not necessarily reflect the views of the SBA. This publication may not be reproduced in whole or in part without the express written consent of the NY Small Business Development Center. About this Text: Participants will be introduced to key social media marketing concepts and learn how to create a comprehensive social media marketing strategy. This text includes hands-on activities for exploring audience analysis, goal planning, and content creation. Additionally, helpful material for generating a strong brand identity and voice as well as general content ideas across social media platforms is provided. Readers can access the PDF version of this text here: https://www.sbdcjcc.org/tip-resources About the Author: Simone Sellstrom is a tenured assistant professor and director of the Communication and Media Arts departments at Jamestown Community College in Jamestown, New York. In 2014, Simone partnered with the Small Business Development Center at JCC to create a social media marketing course for college students. This course includes an internship where students gain hands-on experience managing social media accounts for local businesses in Jamestown and Chautauqua County. -
The Effects of Content Likeability, Content Credibility
Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 15 / ISSUE 3 / SEPTEMBER 2020 / 1-19 DOI: 10.4067/S0718-18762020000300102 © 2020 Universidad de Talca - Chile The Effects of Content Likeability, Content Credibility, and Social Media Engagement on Users’ Acceptance of Product Placement in Mobile Social Networks Ivan Ka Wai Lai 1 and Yide Liu 2 1 City University of Macau, Faculty of International Tourism and Management, Taipa, Macau, [email protected] 2 Macau University of Science and Technology, School of Business, Taipa, Macau, [email protected] Received 29 August 2018; received in revised form 11 June 2019; accepted 1 October 2019 Abstract Nowadays, product placements are commonly presented on mobile social media but related studies are rare. The main purpose of the study is to investigate the effects of content likeability, content credibility, and social media engagement on users’ acceptance of product placement in mobile social networks. The results of the online survey indicate that content likeability is an antecedent of social media engagement and content credibility; social media engagement has an influence on content credibility; and content likeability, content credibility, and social media engagement both directly affect user acceptance of product placement in mobile social networks. Furthermore, social media engagement has an interaction effect with content likeability on the content credibility of mobile social networks. The results of the multi-group analysis indicate that young adults show differences with middle-aged adults in the direct effect of content likeability on social media engagement and in the interaction effect of content credibility and social media engagement on the acceptance of product placement in mobile social networks. -
A Longitudinal Study of Follow Predictors on Twitter C.J
A Longitudinal Study of Follow Predictors on Twitter C.J. Hutto Sarita Yardi Eric Gilbert School of Interactive Computing School of Information School of Interactive Computing Georgia Institute of Technology University of Michigan Georgia Institute of Technology [email protected] [email protected] [email protected] ABSTRACT ness; and profile completeness [30]. We also assessed nu- Follower count is important to Twitter users: it can indicate merous attributes specific to the content of users’ tweets, popularity and prestige. Yet, holistically, little is understood such as: propensity to express positive versus negative sen- about what factors – like social behavior, message content, timent [26,37]; topical focus [40]; proportions of tweets and network structure – lead to more followers. Such in- with “meformer” content versus informational content [33]; formation could help technologists design and build tools frequency of others “retweeting” a user’s content [5]; lin- that help users grow their audiences. In this paper, we study guistic sophistication (reading difficulty) of tweets; and 507 Twitter users and a half-million of their tweets over 15 hashtag usage. Finally, we evaluated the impact of users’ months. Marrying a longitudinal approach with a negative evolving social network structure, collecting snapshots of binomial auto-regression model, we find that variables for their friends and followers every three months for fifteen message content, social behavior, and network structure should be given equal consideration when predicting link months. With this, we can evaluate the effects of network formations on Twitter. To our knowledge, this is the first status, reciprocity [18], and common network neighbors. longitudinal study of follow predictors, and the first to show Our variables were selected from prominent theoretical that the relative contributions of social behavior and mes- constructs bridging social science, linguistics, computer sage content are just as impactful as factors related to social mediated communications, and network theory. -
Jiajia Luo, Et Al. V. Sogou Inc., Et Al. 19-CV-00230-Complaint for Violation
Case 1:19-cv-00230-JPO Document 1 Filed 01/09/19 Page 1 of 25 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK JIAJIA LUO, Individually and on Behalf of All Case No. Others Similarly Situated, Plaintiff, CLASS ACTION vs. COMPLAINT FOR VIOLATION OF THE FEDERAL SECURITIES LAWS SOGOU INC., SOHU, INC., TENCENT HOLDINGS LIMITED, XIAOCHUAN WANG, CHARLES (CHAOYANG) ZHANG, DEMAND FOR JURY TRIAL YUXIN REN, JOANNA (YANFENG) LU, BIN GAO, JOSEPH CHEN, JANICE LEE, and JAMES (XIUFENG) DENG, Defendants Plaintiff Jiajia Luo, individually and on behalf of all the other persons similarly situated, by plaintiff’s undersigned attorneys, alleges the following based upon personal knowledge as to plaintiff and plaintiff’s own acts, and upon information and belief as to all other matters based on the investigation conducted by and through plaintiff’s attorneys, which included, among other things, a review of Securities and Exchange Commission (“SEC”) filings by Sogou Inc. (“Sogou” or the “Company”), as well as conference call transcripts and media and analyst reports about the Company. Plaintiff believes that substantial evidentiary support will exist for the allegations set forth herein after a reasonable opportunity for discovery. SUMMARY OF THE ACTION 1. This is a federal securities class action on behalf of a class consisting of all persons other than defendants who purchased or otherwise acquired Sogou American Depository Shares (“ADSs”) pursuant and/or traceable to Sogou’s false and misleading Registration Statement and Prospectus issued in connection with the Company’s initial public offering on November 9, 2017 (the “IPO” or the Case 1:19-cv-00230-JPO Document 1 Filed 01/09/19 Page 2 of 25 “Offering”), seeking to recover compensable damages caused by defendants’ Securities Act of 1933 (the “Securities Act”) violations (the “Class”). -
Venture Capital for Small Business Eric Weinmann Small Business Administration
University of Baltimore Law Review Volume 3 Article 2 Issue 2 Spring 1974 1974 Venture Capital for Small Business Eric Weinmann Small Business Administration Follow this and additional works at: http://scholarworks.law.ubalt.edu/ublr Part of the Business Administration, Management, and Operations Commons, and the Law Commons Recommended Citation Weinmann, Eric (1974) "Venture Capital for Small Business," University of Baltimore Law Review: Vol. 3: Iss. 2, Article 2. Available at: http://scholarworks.law.ubalt.edu/ublr/vol3/iss2/2 This Article is brought to you for free and open access by ScholarWorks@University of Baltimore School of Law. It has been accepted for inclusion in University of Baltimore Law Review by an authorized administrator of ScholarWorks@University of Baltimore School of Law. For more information, please contact [email protected]. VENTURE CAPITAL FOR SMALL BUSINESS* Eric Weinmannt To close the "equity gap" for small business, Congress enacted the Small Business Investment Act of 1958. Under this Act, the Small Business Administration licenses, regulates and finances investment companies which assist small concerns. The author describes how the Small Business Administration does this under a revised set of regulations, published in late 1973. BACKGROUND In 1958, Congress established a program to be administered by the Small Business Administration ("SBA"), by enacting the Small Business Investment Act of 1958 ("SBIAct").' Its purpose was to close the 2 "equity gap" which was found to affect small business adversely. The term "equity gap" denotes that area in the capital markets that lies between the banks and other institutional lenders, which are not geared to make equity or long-term investments; the SBA's programs of financial assistance to small concerns; and the public securities markets which do not favor the smaller and smallest business concerns. -
Social Media Why You Should Care What Is Social Media? Social Network
Social Media Why You Should Care IST 331 - Olivier Georgeon, Frank Ritter 31 oct 15 • eMarketer (2007) estimated by 2011 one-half Examples of all Internet users will use social networking • Facebook regulary. • YouTube • By 2015, 75% use • Myspace • Twitter • Del.icio.us • Digg • Etc… 2 What is Social Media? Social Network • Social Network • Online communities of people who share • User Generated Content (UGC) interests and activities, • Social Bookmarking • … or who are interested in exploring the interests and activities of others. • Examples: Facebook, MySpace, LinkedIn, Orkut • Falls to analysis with tools in Ch. 9 3 4 User Generated Content (UGC) Social Bookmarking • A method for Internet users to store, organize, search, • or Consumer Generated Media (CGM) and manage bookmarks of web pages on the Internet with the help of metadata. • Based on communities; • Defined: Media content that is publicly – The more people who bookmark a piece of content, the more available and produced by end-users (user). value it is determined to have. • Examples: Digg, Del.icio.us, StumbleUpon, and reddit….and now combinations • Usually supported by a social network • Examples: Blogs, Micro-blogs, YouTube video, Flickr photos, Wiki content, Facebook wall posts, reddit, Second Life… 5 6 Social Media Principles Generate an activity stream • Automatic • Who you are – Google History, Google Analytics – Personalization • Blog • Who you know • Micro-blog – Browse network – Twitter, yammer, identi.ca • What you do • Mailing groups – Generate an activity stream -
POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools
POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application. -
Security and Online Social Networks
Security and Online Social Networks Javier Echaiz and Jorge Ardenghi Laboratorio de Investigaci´on de Sistemas Distribuidos (LISiDi), Departamento de Ciencias e Ingenier´ıa de la Computaci´on Tel´efono: +54 291 4595135, Fax: +54 291 4595136 Universidad Nacional del Sur, Bah´ıa Blanca (8000), Argentina {je,jra}@cs.uns.edu.ar, WWW home page: http://lisidi.cs.uns.edu.ar Abstract. In the last few years we have witnessed a sustained rise in the popularity of online Social Network Sites (SNSs) such as Twitter, Facebook, Myspace, Flickr, LinkedIn, FriendFeed, Google Friend Con- nect, Yahoo! Groups, etc., which are some of the most visited websites worldwide. However, since they are are easy to use and the users are often not aware of the nature of the access of their profiles, they often reveal information which should be kept away from the public eyes. As a result, these social sites may originate security related threats for their members. This paper highlights the benefits of safe use of SNSs and emphasizes the most important threats to members of SNSs. Moreover, we will show the main factors behind these threats. Finally we present policy and technical recommendations in order to improve security without compromising the benefits of information sharing through SNSs. Keywords: Online Social Network, Privacy, Profile squatting, Identity threat, Image Tagging and Cross-profiling. 1 Introduction The advent of the Internet has given rise to many forms of online sociality, from the old e-mail and Usenet services to the more recent instant messaging (IM), blogging, and online social services. Among these, the technological phenomenon that has acquired the greatest popularity in this 21st century is the latter, the Social Networking Sites (SNSs). -
Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook
University of Pennsylvania ScholarlyCommons Marketing Papers Wharton Faculty Research 1-2018 Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Dokyun Lee Kartik Hosanagar University of Pennsylvania Harikesh Nair Follow this and additional works at: https://repository.upenn.edu/marketing_papers Part of the Advertising and Promotion Management Commons, Business Administration, Management, and Operations Commons, Business Analytics Commons, Business and Corporate Communications Commons, Communication Technology and New Media Commons, Marketing Commons, Mass Communication Commons, Social Media Commons, and the Technology and Innovation Commons Recommended Citation Lee, D., Hosanagar, K., & Nair, H. (2018). Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook. Management Science, http://dx.doi.org/10.1287/mnsc.2017.2902 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/marketing_papers/339 For more information, please contact [email protected]. Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Abstract We describe the effect of social media advertising content on customer engagement using data from Facebook. We content-code 106,316 Facebook messages across 782 companies, using a combination of Amazon Mechanical Turk and natural language processing algorithms. We use this data set to study the association of various kinds of social media marketing content with user engagement—defined as Likes, comments, shares, and click-throughs—with the messages. We find that inclusion of widely used content related to brand personality—like humor and emotion—is associated with higher levels of consumer engagement (Likes, comments, shares) with a message. We find that directly informative content—like mentions of price and deals—is associated with lower levels of engagement when included in messages in isolation, but higher engagement levels when provided in combination with brand personality–related attributes. -
ADMS Intermedia Delivery System™
ADMS Intermedia Delivery System™ > A new evolution in home entertainment > Simplifies the way digital media content is acquired and managed > Designed by Crestron® to be secure, reliable, and fun to use! > Provides seamless access to feature films, music, TV episodes, streaming videos, home movies & photos, and the Internet > WorldSearch® quickly finds any kind of content from your local media library and the Internet > Stylish and intuitive onscreen menus with high-res cover art and metadata display ADMS-BR model shown > Embedded Netflix®, Hulu®, YouTube® and more![1,2] > Onboard optical drive can play BD and DVD media and import CDs (ADMS-BR only) Giving you the power to acquire and manage virtually any content you desire is what Intermedia Delivery is all about. The ADMS provides a ® ® > Built-in secure Web browser with Flash and Silverlight plug-ins streamlined solution for storing and playing all your digital videos, music, > High-definition HDMI® theater output photos and home movies. It also delivers a seamless online experience, > 7.1 surround sound audio output letting you rent major motion pictures from Netflix®, stream videos from ® ® > Two independent digital or analog stereo music zone outputs YouTube and Vimeo , and watch your favorite news, sports, and TV shows through Hulu® and Hulu Plus[1], Metacafe®, Comedy Central®, ESPN®, > Audiophile sound quality with support for FLAC, WAV, WMA Loss- ® less, iTunes Plus® & MP3 CNN , and numerous other top providers. Built-in Web browsing completes > 100% HDCP compliant the experience, giving you full access to all that the Internet has to offer without leaving the comfort of your home theater or living room sofa. -
Studying Social Tagging and Folksonomy: a Review and Framework
Studying Social Tagging and Folksonomy: A Review and Framework Item Type Journal Article (On-line/Unpaginated) Authors Trant, Jennifer Citation Studying Social Tagging and Folksonomy: A Review and Framework 2009-01, 10(1) Journal of Digital Information Journal Journal of Digital Information Download date 02/10/2021 03:25:18 Link to Item http://hdl.handle.net/10150/105375 Trant, Jennifer (2009) Studying Social Tagging and Folksonomy: A Review and Framework. Journal of Digital Information 10(1). Studying Social Tagging and Folksonomy: A Review and Framework J. Trant, University of Toronto / Archives & Museum Informatics 158 Lee Ave, Toronto, ON Canada M4E 2P3 jtrant [at] archimuse.com Abstract This paper reviews research into social tagging and folksonomy (as reflected in about 180 sources published through December 2007). Methods of researching the contribution of social tagging and folksonomy are described, and outstanding research questions are presented. This is a new area of research, where theoretical perspectives and relevant research methods are only now being defined. This paper provides a framework for the study of folksonomy, tagging and social tagging systems. Three broad approaches are identified, focusing first, on the folksonomy itself (and the role of tags in indexing and retrieval); secondly, on tagging (and the behaviour of users); and thirdly, on the nature of social tagging systems (as socio-technical frameworks). Keywords: Social tagging, folksonomy, tagging, literature review, research review 1. Introduction User-generated keywords – tags – have been suggested as a lightweight way of enhancing descriptions of on-line information resources, and improving their access through broader indexing. “Social Tagging” refers to the practice of publicly labeling or categorizing resources in a shared, on-line environment.