Tuesday, August 25, 2020

Polar Bears Their Habiat Essays - Bears, Apex Predators

Polar Bears: Their Habiat Polar Bear, normal name for a white bear found on the ocean ice of the Arctic all through the North Polar bowl. The main marine bear, it is longer than different bears and smoothed out for amphibian life. It has the plantigrade feet (impact point and bottom contacting the ground) regular of bears, with five sharp, bended paws on each foot for getting a handle on the ice and holding its prey. Long hair between the cushions shields the bear's feet from the cold and gives footing on the ice. Solid hairs on the forelegs, and expansive front feet, help the bear swim. Every single polar bear are white, despite the fact that their hide may yellow in the late spring. The biggest wild bears ever weighedmore than 800 kg (more than 1800 lb)have been polar bears. In any case, most male polar bears gauge a normal of around 350 kg (around 880 lb), and most females weigh around 250 kg (550 lb). Polar bears have a solid navigational sense, a very decent feeling of smell, and they are bizarrely cunning at taking care of issues so as to get food. They eat fundamentally ringed seals, and at times unshaven seals, walruses, or white whales. They additionally feed on berries, sedges, mussels, and kelp. Similarly as with other genuine bears, polar-bear moms and youthful structure solid bonds. The youthful are little when conceived: around 1 kg (around 2 lb). Their eyes stay shut for around 40 days and they should nurture at regular intervals. The mother holds them near keep them warm. With the exception of during the reproducing season, male polar bears are singular and meander over immense regions of ocean ice while chasing. During the reproducing season (May to June), the guys battle irately over females. Both the male and female may mate with others too. Polar bears have little enthusiasm for other Arctic species, and they regularly disregard individuals totally. Polar bears are pursued widely in Canada and Greenland, and less so in Russia and Alaska. They are ensured in Svalbard, Norway. Polar-bear populaces are moderately secure in light of the fact that couple of individuals share their territory, however delivery and seaward penetrating for oil compromise their status. The polar bear, the biggest of the earthbound carnivores, is found along the northernmost shores of the northern half of the globe just as on ocean ice floes and islands. Solid swimmers, polar bears paddle with their front legs and steer with the back and have been referred to swim similar to 80 km (50 mi). Ashore polar bears effectively spread separations of up to 80 km (50 mi) a day and 1100 km (690 mi) a year. Science

Saturday, August 22, 2020

How To Increase Reach With Video Marketing [Podcast]

Step by step instructions to Increase Reach With Video Marketing [Podcast] Video promoting: When you use it to develop your crowd, it’s as much a science as it is a workmanship. There are such a large number of stages, methodologies, and systems how would you realize where to center your time, cash, and vitality for the greatest return? Today we’re conversing with Mark Robertson, the fellow benefactor of Little Monster Media, the originator of ReelSEO, and a computerized video veteran. He’s going to converse with us about expanding your compass and developing your crowd through video promoting. A portion of the features of the show include: Data about Little Monster Media and what Mark does there. What stages to concentrate on for individuals who are new to video promoting. How brands can fabricate their crowds utilizing YouTube and Facebook Video. How brands can follow the acts of distributers to see achievement with regards to promoting and substance showcasing. Imprint gives instances of brands that make convincing substance without being â€Å"in your face.† The most effective method to know whether video is a medium you should utilize and outfit, just as details on how video influences the cerebrum in contrast with how content influences the mind. The significance of testing and estimation with regards to getting your material before the perfect individuals. What estimations and specialized subtleties to focus on so as to prevail with video promoting. Fueled by PodcastMotor Noteworthy Content Marketing controlled by By 00:00/00:00 1x 100 > Download document Buy in on iTunes Leave Review Offer Connections: Little Monster Media In the event that you enjoyed today’s appear, if you don't mind buy in on iTunes to The Actionable Content Marketing Podcast! The digital broadcast is additionally accessible on SoundCloud, Stitcher, and Google Play. Statements by Mark: â€Å"I genuinely accept that each brand ought to be engaged with video advertising or substance promoting one way or another.† â€Å"What distributers do truly well is see how to recount to a story they comprehend that drawing in with the crowd is important.† â€Å"Every brand should attempt video and everything comes down to procedure, crowd, estimation and reiteration.†

Friday, July 31, 2020

How to Stop Procrastination

How to Stop Procrastination Stress Management Management Techniques Time Management Print How to Stop Procrastination: 9 Tips to Try By Elizabeth Scott, MS twitter Elizabeth Scott, MS, is a wellness coach specializing in stress management and quality of life, and the author of 8 Keys to Stress Management. Learn about our editorial policy Elizabeth Scott, MS Updated on October 24, 2018 More in Stress Management Management Techniques Time Management Physical Techniques Relaxation Effects on Health Situational Stress Job Stress Household Stress Relationship Stress Wondering how to stop procrastination? Many people are. Most of us have found ourselves putting things off and just watching ourselves do it, as if from the perspective of an outsider looking in, at least at one time or another. While we may tackle certain projects with gusto, some tasks leave us feeling paralyzed with inertia, watching our deadlines approach (or pass us by) as we wonder how to force ourselves to move forward. If this sounds dreadfully familiar, I have help! The next time you find yourself battling procrastination, you will have more tools on your side. Read on for 9 tips on how to stop procrastination. Keep Perfectionism In Check While not all procrastination comes from perfectionism, this can definitely be a factor. Think about it: when youre letting perfectionism take hold, you may let projects become so large that youre intimidated to start. You may then be at the mercy of procrastination. If you find yourself procrastinating out of perfectionism, you can help yourself by relaxing your standards. Shoot for good enough and work your way up to great if you have the time and energy. Dont let the goal of perfection keep you from starting! Get Quick Things Out of the Way Sometimes a too-long to-do list can intimidate you into procrastination; all those items that need your attention can sap you of the energy you need to get started. One helpful how to stop procrastination tip is to make a list of the things you need to get done and note how long each item should take to complete. As you review the list, take any item that can be completed in 5 minutes or less, and do it immediately. This can not only shorten your to-do list quickly but can energize you as you mark off the items. It also sets you started in the right direction to finish the rest. Take Small Steps Breaking procrastination-worthy projects down into smaller steps is a well-known and effective procrastination-busting technique. It can be much easier to begin tackling a project that you know you can complete quickly, and once youve taken a few initial steps in the right direction, you can keep moving more easily and continue until youre finished. (As you complete each step, youll likely feel more energized and motivated to complete more.) One important key is to make the steps short, concrete, and set in your schedule. Small steps lead to big gains! Reward Yourself As you complete each of these smaller steps, the sense of satisfaction and accomplishment you feel can be its own reward and can create its own motivation to move on to the next step. However, sometimes you can benefit from an extra reward. In these cases, you can propel yourself forward by attaching small rewards to each of your small steps, or a bigger reward when you complete several. Go to a movie, celebrate milestones with friends, do things you enjoy when you complete your tasks. You may be dreading the task itself, but the treat on the other side can motivate you to get started! Do the Easy Things First When a task feels overwhelming, its often because we doubt our ability to tackle it. One way to build self-confidence is to tackle the easier parts of the job first. This can give you a boost in two ways: first, as you complete the easier tasks, the job may feel less daunting, and itll be easier to stop procrastination as you complete it; second, once the easy parts of the job are completed, youll be left with less overall work to do, so the rest of the job is smaller and may seem easier to take on. In both ways, your confidence can grow by taking on the easy parts of the job first. Or Do the Hard Things First If you know you can do the task at hand, but you just cringe when you think of the work thats involved, save yourself some stress and tackle the unpleasant or difficult parts of the job first. Like quickly pulling off a bandage, youll get the most uncomfortable part of the job out of the way, and save yourself all the discomfort that comes from dreading and avoiding it before you finally stop procrastination and do it anyway. Dont prolong all that stress! Get the hard parts out of the way, and the rest of the job will be much easier to do. Be an Optimist Another way to combat the self-doubt that often leads to procrastination is to start thinking more like a classic optimist: highlight the positive and minimize the negative parts of the job and of yourself. Look more closely at why you may feel you cant do this task and challenge those views by actively looking at reasons you can: your strengths, your resources, and your successesâ€"similar tasks youve successfully completed in the past. Focus more heavily on why you can do this, and less on why you think you cant. Let Your Temptations Fuel You Never has a television show seemed so inviting to me as when Im procrastinating and avoiding a big project. T.V. shows, conversations with friends, snackingâ€"suddenly these activities can feel irresistible! Im sure you can relate. When youre wondering how to stop procrastination, part of the solution is staring you in the face: look at these things that come up as tempting distractions, and use them as rewards instead! Just tell yourself that whatever it is youd rather be doing, can be your reward for a job well done once you complete part of your work. Use Your Energy Wisely Have you ever noticed that you have more energy at certain times of the day? (For me its usually late morning.) Tackling those things that usually fall prey to procrastination during these high energy windows can help you to be much more productive, can make the job itself feel easier, and can help you stop procrastination much more easily. For the next few days, notice when these higher-energy times of day are for you. Then leave the easier tasks for when youre frazzled at the end of the day, and use your energy on your more challenging tasks when you have higher amounts of it.

Friday, May 22, 2020

Wannacry a cyber security issue - Free Essay Example

Sample details Pages: 4 Words: 1081 Downloads: 7 Date added: 2019/10/10 Did you like this example? Despite the growth of technology displaying definite significant to the society, it has been subjected to many challenges with the most conspicuous challenge being the cyber security issue.   To be in a position of defining how cyber security has negatively affected the technology industry, it serves great importance mentioning that cyber security is a set of methods made up of technologies, processes, and practices designed to safeguard networks, programs and data from attacks and damages from viruses or access by unauthorized access.   The process of ensuring cyber security needs coordinated efforts from interested stakeholders in an information system within an organization. In the course of providing a secure information system, the traditional approach concentrated most of it efforts in seeing to it that the most vital system components are protected against the biggest identified threat. Through enhancing the security details of critical components in an information system, information systems components that are thought less important are left unsecured thus exposing them to the attack by viruses.. Don’t waste time! Our writers will create an original "Wannacry a cyber security issue" essay for you Create order In many organizations, the information technology department installs antivirus to protect their organization crucial information from attack by viruses putting less attention on ways in which the whole operating system can be protected from virus attacks. Addressing the issue of operating system attacks by viruses, Wannacry can be viewed as a   cyber security issue in that it affects the Windows operating system. The most conspicuous event that qualifies the Wannacry as a cyber safety issue is that the virus first harmful effects were felt after it attacked over one hundred and fifty regions around the world. A notion that saw to it some people giving the incident the name the begging of a new era that was marked with hackers being in a position of gaining access to other users weak spots in online security. Further prove that Wannacry is a cyber security issue is proven by the fact that the major virus target was Microsoft’s Windows operating system utilizing a malicious software ransomware. Making use of the mentioned virus, Wannacry blocked users from entry to computers system and demanded that the affected user make some payments through crypto media of exchange known as bitcoin. Together with locking down users from accessing important files from their computers in many parts of Europe, Asia and fewer parts of North America,   a well-known electronic company from Japan Known as Hitachi claimed that they experienced hard times in the process of operating their emails.   Some of the complaints raised by the company are that it was not possible for them to send or receive electronic mails, opening attached files a problem that the Hitachi Company attributed to the Wannacry attack. As noted in the introduction paragraph, a cyber security issue is any occurrence that compensates the proper flow of data processing in an information system. Through taking advantage of the Windows operating system exploit called Eterbal Blue, Wannacry ruins the functionality of the software system a perspective that qualifies Wannacry as a cyber security issue.   By inhibiting users from accessing their files unless they make a certain payment via the bitcoin currency, Wannacry rendered the users to a situation in which they could not operate their laptops effectively. Also,   Eternal Blue which takes advantage of  Ã‚   Microsoft patched in security update   MS 17-010 made hackers conversant with using Wannacry virus thus could gain   access to remote computers users and install programs with malicious effects on a given user computer thus locking down the users from accessing their stored information.   For a user to in a position of obtaining his or her stored informa tion, the user was required to make some payments to a certain site.   . Accessing personal information without the authority of the person in question renders the user whose information have been accessed to a situation in which individuals privacy is exposed.   Since Wannacry virus enabled the act, it is a fact Wannacry qualifies a cyber security issue.   Even though the ruins associated with Wannacry attacks were maintained after the ransomware attacks with remediation plans, it serves great importance for organizations dealing with information technology to set an effective means of mitigating chances of cyber security.   The best way in which information Technology Company can figure out the issues of cyber security is through enhancing awareness of using the Internet safely in a whole in an organization. Following the Wannacry attack, it was proven beyond reasonable doubts that any business organization despite the complexity of its system subjected to a risk factor of a cyber attack that in one way or the other compensates the overall functionality of the group in question. As defined in the introduction section of this discussion a cyber security issue is an intentional act that jeopardizes the typical workflow within an organization. On the other hand, cyber security entails the actions aimed at ensuring that malicious users who might harm the way in which computer users carry out their data processing activities safeguard information system from access. Facts provided in the essay give a clear reference to the way in which Wannacry attack caused mishaps on different sections regions across the world.   The first notable effect that Wannacry displayed the traits of a cyber security issue is that it barricaded computers users from accessing their files.   As the discussion high lights, for a user to be in a position of accessing individual’s data, the user in question was required to pay some cash a definite site that he or she would receive an electronic mail.   In addition to denying users access to their information, through making use of Wannacry, malicious users   gained access of other people information thus exposing their privacy. In the process of ensuring data security is arrived at in a given institution, cyber security ensures that malicious users cannot access personal information. This notion is however compensated after Wannacry comes in play. By allowing malicious users gain access of personal Wannacry has proven a cyber security issue.   Despite the fact that Wannacry acting as a cyber security issue, through the application of some of some specific measures organization can mitigate chances of Wannacry and other cyber security issues. For instance ensuring all information system components are safe safeguarded from cases of attack by viruses or access by unauthorized users. In addition to initiating security measures to all elements of information system, the organization in question should see to it that computer users are taken through awareness training to that will help them mitigate chances of unsafe use of internet.

Sunday, May 10, 2020

The Voyager Mission

In 1979, two tiny spacecraft were launched on one-way missions of planetary discovery. They were the twin  Voyager spacecraft, predecessors to the  Cassini spacecraft at Saturn, the Juno mission at Jupiter, and the New Horizons mission to Pluto and beyond. They were preceded in gas giant space by the Pioneers 10 and 11. The Voyagers, which are still transmitting data back to Earth as they leave the solar system, each  carry an array of cameras and instruments designed to  record magnetic, atmospheric, and other data about the planets and their moons, and to send images and data for further study back on Earth.   Voyagers Trips Voyager 1 is speeding along at about 57,600 kph (35,790 mph), which is  fast enough to travel from Earth to the Sun three and a half times in one year. Voyager 2 is   Both spacecraft  carry a gold record greeting to the universe  containing sounds and images selected to portray the diversity of life and culture on Earth. The two-spacecraft Voyager missions were designed to replace original plans for a Grand Tour of the planets that would have used four complex spacecraft to explore the five outer planets during the late 1970s. NASA canceled the plan in 1972 and instead proposed to send two spacecraft to Jupiter and Saturn in 1977. They were  designed to explore the two gas giants in more detail than the two Pioneers (Pioneers 10 and 11) that preceded them. The Voyager Design and Trajectory The original design of the two spacecraft was based on that of the older Mariners (such as Mariner 4, which went to Mars). Power was provided by three plutonium oxide radioisotope thermoelectric generators (RTGs) mounted at the end of a boom. Voyager 1 was launched after Voyager 2, but because of a faster route, it exited the Asteroid Belt earlier than its twin. Both spacecraft got gravitational assists at each planet they passed, which aligned them for their next targets.   Voyager 1 began its Jovian imaging mission in April 1978 at a range of 265 million kilometers from the planet; images sent back by January the following year indicated that Jupiters atmosphere was more turbulent than during the Pioneer flybys in 1973 and 1974. Voyager Studies Jupiters Moons On February 10, 1979, the spacecraft crossed into the Jovian moon system, and in early March, it had already discovered a thin (less than 30 kilometers thick) ring circling Jupiter. Flying past Amalthea, Io, Europa, Ganymede, and Callisto (in that order) on March 5th, Voyager 1 returned spectacular photos of these worlds. The more interesting find was on Io, where images showed a bizarre yellow, orange and brown world with a least eight active volcanoes spewing material into space, making it one of the most (if not the most) geologically active planetary bodies in the solar system. The spacecraft also discovered two new moons, Thebe and Metis. Voyager 1s closest encounter with Jupiter was at 12:05 UT on March 5, 1979, at a range of 280,000 kilometers. On to Saturn Following the Jupiter encounter, Voyager 1 completed a single course correction on April 89 1979, in preparation for its rendezvous with Saturn. The second correction on October 10, 1979, ensured that the spacecraft would not hit Saturns moon Titan. Its flyby of the Saturn system in November 1979 was as spectacular as its previous encounter. Exploring Saturns Icy Moons Voyager 1 found five new moons and a ring system consisting of thousands of bands, discovered a new ring (the G  Ring), and found shepherding satellites on either side of the F-ring satellites that keep the rings well defined. During its flyby, the spacecraft photographed Saturns moons Titan, Mimas, Enceladus, Tethys, Dione, and Rhea. Based on incoming data, all the moons appeared to be largely composed of water ice. Perhaps the most interesting target was Titan, which Voyager 1 passed at 05:41 UT on  November 12th at a range of 4,000 kilometers. Images showed a thick atmosphere that completely hid the surface. The spacecraft found that the moons atmosphere was composed of 90 percent nitrogen. Pressure and temperature at the surface were 1.6 atmospheres and -180 ° C, respectively. Voyager 1s closest approach to Saturn was at 23:45 UT on November 12,  1980, at a range of 124,000 kilometers. Voyager 2 followed up with visits to Jupiter in 1979, Saturn in 1981, Uranus in 1986, and Neptune in 1986. Like its sister ship, it investigated planetary atmospheres, magnetospheres, gravitational fields, and climates, and discovered fascinating facts about the moons of all the planets. Voyager 2 also was the first to visit all four gas giant planets. Outward Bound Because of the specific requirements for  the Titan flyby, the spacecraft was not directed to Uranus and Neptune. Instead,  following the encounter with Saturn, Voyager 1 headed on a trajectory out of the solar system at a speed of 3.5 AU per year. It is on a course 35 ° out of the ecliptic plane to the north, in the general direction of the Suns motion relative to nearby stars. It is now in interstellar space, having passed through the  heliopause boundary, the outer limit of the Suns magnetic field, and the outward flow of the solar wind. Its the first spacecraft from Earth to travel into interstellar space. On February 17, 1998, Voyager 1  became the most distant human-made object in existence when it surpassed Pioneer 10s range from Earth. In mid-2016, the  Voyager 1  was more than  20 billion kilometers from Earth (135 times the Sun-Earth distance) and continuing to move away, while maintaining a tenuous radio link with Earth. Its power supply should last through 2025, allowing the transmitter to keep sending back information about the interstellar environment. Voyager 2 is on a trajectory headed out toward the star Ross 248, which it will encounter in about 40,000 years, and pass by Sirius in just under 300,000 years. It will keep transmitting as long as it has power, which may also be until the year 2025.   Edited and updated by Carolyn Collins Petersen.

Wednesday, May 6, 2020

Act III Scene II Consider the dramatic significance of this episode in the play Free Essays

As an audience, we can foresee the sinister turn of events which will be marked by the appearance of Don John in the latter part of this scene. Having earlier witnessed the deceitful and slanderous plot conjured up between he and Borachio during their discussion, implementation of the plan seems imminent. And yet the descent from the comedy of Benedick trying to pass off his love-sickness as toothache to the threatened tragedy of Hero’s slander is perhaps far more rapid than we might have anticipated. We will write a custom essay sample on Act III Scene II Consider the dramatic significance of this episode in the play or any similar topic only for you Order Now The earlier jovial mockery of Benedick by Don Pedro, Leonato and Claudio provides a striking contrast with the underlying malice of the deliberately ambiguous and disparaging remarks from Don John. Yet such ambiguity seduces Claudio and Don Pedro in a remarkably similar way to the double meanings and innuendo which deceived Benedick earlier on. Don John demonstrates an ability to manipulate his language in a successful bid to influence and target the weaknesses of his audience; that is, Claudio and Don Pedro. He has a shrewd understanding of the court and his insinuations about Hero play upon the tensions within it relating to honour and status. Don John opens with a customary courteous greeting before baiting both men with his declaration that he has something of interest to reveal concerning them both: ‘If your leisure served, I would speak with you / yet Count Claudio may hear; for what I would speak of concerns him.’ ‘I know not that, when he knows what I know’. With their curiosity secured, Don Pedro conveys a rather convoluted proclamation of regret and remorse for the bad news he is about to impart, ‘You may think I love you not: let that appear hereafter†¦Ã¢â‚¬â„¢ and when combined with his fallacious self-deprecation, we observe further his dexterity as their sympathy and trust is won. As he continues with his tacit allegations, Don John uses a loose and undefined disparagement ‘disloyal’ which would imply a certain reluctance to accuse Hero, yet his following remark; ‘The word is too good to paint out her wickedness’ incites the other men to affix their own condemnation of her. A dramatic irony here ensures the audience’s perception of this as a further ruse whilst for the seemingly naà ¯Ã‚ ¿Ã‚ ½ve and gullible Claudio and Don John, it makes the hurried offer of immediate visual evidence irresistible; ‘Go but with me tonight, you shall see her chamber-window entered’, a crude vaginal symbol is used to further offend the newly enamoured Claudio, who in his youthful inexperience has believed in his betrothed’s virginity. Their melodramatic exclamations in response to this, one after another, serve to indicate ironically how they, who tricked Benedick, have been no less suddenly transformed. Claudio asks rhetorically ‘May this be so?’ and vows if it is, ‘†¦should not marry her tomorrow in the congregation, where I should wed, there I will shame her’. The marked use of sibilants serves to emphasise his fury, suggesting suspicion and fear to be the other side of Claudio’s idealisation and the aggressive denunciation may arise from a personal insecurity urging him to make such a pledge. In Messina sexual relations are complicated by conventions and illusions, Claudio has already tried and found Hero guilty before even witnessing the evidence. Such a rash conviction is reminiscent of his earlier behaviour during the masked ball in Act II Scene I which gave us foresight of Claudio’s impulsive and fickle characteristics, a man so easily influenced by the ‘hearsay’ from Don John and his own irrationality and mistrust in women. Though it is easy to criticise and condemn Claudio for such tenuous judgements, one must not disregard Messina’a patriarchal society and the sense of superiority to women which regulated masculine loyalties. Such loyalty is evident in Don Pedro, who; when informed of Hero’s alleged infidelity, endorses Claudio’s vengeance by offering to ‘join with thee to disgrace her’. Such is Don Pedro’s influence and arrogance that Claudio offers to accompany his departure from Messina on the wedding day. We must now question Don Pedro’s willingness to join Claudio’s slandering of Hero which not only seems cowardly but most absurd having himself been the ‘accused’ by the same source of indictment – his rebel brother, the bastard Don John. Whilst for an audience of the twenty-first century this continued credulous behaviour might seem somewhat contrived, we must consider that Don John, a melodramatically sketched, stereotypical villain, serves a thematic and narrative function. His role is principally to expose the flaws within others, namely his brother Don Pedro and Claudio and highlight the shared immorality in his companions Conrade and Borachio as well as present themes of slander, noting, jealousy, honour, illusion and reality. Since the major complication of the play arises from Claudio’s denunciation of Hero on the basis of Don John’s trickery, and in fact therefore ‘nothing’ at all, the use of such a villain as a dramatic device is crucial. Whilst only a brief episode in the play; the significance of the latter part of this scene is paramount to future events. The timing of the episode is most significant as Shakespeare distinguishes misunderstanding and misreport from deliberate and malicious deceit. We prepare ourselves for a potentially tragic consequence yet with the benefit of dramatic irony, remain optimistic that as the title suggests, this will again prove to be ‘much ado about nothing’. How to cite Act III Scene II Consider the dramatic significance of this episode in the play, Papers

Wednesday, April 29, 2020

Latalante & Breathless Response Paper Essays - Cinema Of France

L'atalante & Breathless Response Paper L'Atalante & Breathless Response Paper Unfortunately, I was not all that thrilled with L'Atalante. I would have liked to have been able to get a more in depth look into the characters lives before the start of the film. The first mate was very well developed, but the other characters seemed a bit ambiguous because of the deficiency of background information on them. Although it was an excellent example of ?real? mise-en-scene, the lack of action led to my lack of interest. One thing that helped me to recognize the ?real? mise-en-scene of L'Atalante was the type of set used (if you can even call it a set). This movie used location shooting on actual boats and city streets. Also, the costuming, props, and lighting were all minimal but sufficient. Most of these things are synonymous with ?real? mise-en-scene. There were a few things about L'Atalante that I did like. The photography of the underwater scene was nicely done. I thought it was pretty advanced considering when the film was made. The first mate's tattoos were cute. (Although they were seemingly shoddily drawn on with magic markers.) I appreciated the actors too. The were good at what they were supposed to do. Even though these few things made L'Atalante almost bearable, I didn't especially like it. Breathless, on the other hand, held my interest. There was a definite plot as well as plenty of action and romance. I also enjoyed it because I had the feeling that everything I would need to know about the characters was revealed from the beginning. Lambert 2 This film had a much more ?stylized? mise-en-scene than L'Atalante. Some aspects of the mise-en-scene that caught my attention were the costuming and acting styles. The Bogart-esque costuming and mannerisms of Michel aided in explaining his character. Even though the film makers seemingly wanted the audience to never have a clue as to what to expect of Michel, he was a fairly obvious and almost cliche character. Patricia's casual yet beautiful look and manner was helpful in developing her character as well. My expectations of Patricia were not quite met though. I would have never guessed that she would have told Michel that she called the police. She led me to believe that she had made up her mind and was following through with her plan of action when she reported him. I think the writers were smart to include that part because it made me wonder if I could trust anything I thought about any of the characters. This made me watch closer and held my interest for the duration of the film. In conclusion, although I didn't particularly like L'Atalante, it was a great example of ?real? mise-en-scene of its time. It proved to be much different than the new wave Breathless, which had a ?stylized? mise-en-scene. The great differences in these categories was shown through the use of many things including character development, costuming, and acting styles. Film and Cinema

Friday, March 20, 2020

Problem of USA exposed by the great depression

Problem of USA exposed by the great depression USA experienced a horrible economic meltdown that impacted on various aspects of economy such as farming and industrial sector; this was from from1929 to 1942[1]. The recession was triggered by various fiscal features such as the vast margin between the poor and the wealthy, government debts and surplus production of commodities only to mention a few.Advertising We will write a custom critical writing sample on Problem of USA exposed by the great depression specifically for you for only $16.05 $11/page Learn More Business failure, depreciated stock prices, high unemployment rates are some of the negative impacts created by the depression[2]. The depression exposed various societal and economic problems faced by USA that they hardly knew. Since the depression was partially caused by the imbalanced allotment of resources, it revealed that the US economy suffered a colossal wealth imbalance. It indicated the huge margin that existed between the wealthy and the poor. Additionally, it meant that a significant proportion of national wealth was controlled by few tycoons who never even felt the impact during the depression. The depression also revealed how the US administration, commerce and financial entities were incapable of coping with the economic meltdown. This was evident when businesses were unable to sustain the depression leading to closure. Consequently, people lost their jobs leading to reduced purchasing power within the constraints of the economy[3]. In addition, many financial institutions such as banks reduced their operations due to a decrease in customer savings. This was indication that businesses had no mechanisms that would mitigate such a situation. The depression also revealed an incapacitated government that was unable to handle an economic crisis before it worsens[4]. It never had effective immediate strategies such as stimulus packages that would curb the situation but instead it relied on market forces, an approach t hat was unrealistic. The depression revealed a society with ineffective mechanisms that were incapable of handling an economic crunch. Instead of coming up with creative approaches of curbing the situation, the society (the poor) languished in poverty without any concrete efforts.Advertising Looking for critical writing on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More The depression also revealed how prosperous person never cared much about the poor since to them it was an opportunity to gain more wealth at the expense of the poor. Due to doubts of their investment security, Americans lacked confidence on their economy. It was so long before they regained assurance of their financial system, a setback that accelerated the crisis[5]. This clearly pointed out how people in US had lost faith with their economy. Racism was at its peak to an extent that it was applicable even for the fewer jobs available. This exposed how immo ral the US society was at the expense of certain innocent races, especially at this crucial moment. Sometimes one may not understand problems that a country faces until an event that reveals them comes to pass. American’s suffered because they didn’t have effective instruments capable of preventing or minimizing the dreadful period. If only recognized their societal and economic weaknesses in time they could have come up with different approaches to limit the situation. Even though the economy of US was worst hit by the depression, some few individual emerged courageous and successfully regained back their economy, thank to President Franklin Roosevelt’s new ideas. This should act as an example to many states that have no mechanism to combat with recession. The lessons drawn from the recession are numerous and should serve as examples to different nations. Bibliography Constantinides, George. Harris, Milton. Stulz, Rene’. Handbook of the economics of Fin ance (Amsterdam: Elsevier, 2003) 106-134 Cravens, Hamilton. Great Depression: people and perspectives. (California: ABC-CLIO, 2009) 143 Footnotes Cravens, Hamilton. Great Depression: people and perspectives. (California: ABC-CLIO, 2009) 143 Cravens, Hamilton. Great Depression: people and perspectives. (California: ABC-CLIO, 2009) 143 Cravens, Hamilton. Great Depression: people and perspectives. (California: ABC-CLIO, 2009) 143 Cravens, Hamilton. Great Depression: people and perspectives. (California: ABC-CLIO, 2009) 143 Constantinides, George. Harris, Milton. Stulz, Rene’. Handbook of the economics of Finance (Amsterdam: Elsevier, 2003) 106-134

Wednesday, March 4, 2020

Just Deserts vs. Just Desserts

Just Deserts vs. Just Desserts Just Deserts vs. Just Desserts Just Deserts vs. Just Desserts By Maeve Maddox The use of the expression â€Å"just deserts† in a recent DWT exercise brought some reader objections. Here are two: She got her just deserts really? â€Å"Desert†Ã‚  like an arid place? Isnt it desserts? You are surely incorrect. The correct form of the expression is â€Å"just desserts.† Many speakers think that people who get what they deserve get dessert, unaware that there’s another noun pronounced like dessert but spelled with one s: desert [deh-ZERT]. Here are three kinds of desert: desert [DEZ-ert] (noun): an arid place desert [deh-ZERT] (verb): to abandon desert [deh-ZERT] (noun): worthiness of recompense Desert [DEZ-ert] in the sense of a wasteland or wilderness came into English by way of French from Latin  desertum, â€Å"thing abandoned.† Desertum is used in the Latin Vulgate version of the Bible to translate the word for â€Å"wilderness.† Dessert [deh-ZERT] in the sense of the last course of a meal is from French  desservir, â€Å"to clear the table,† literally, â€Å"to un-serve.† The dessert comes at the end of the meal when the table has been cleared of everything that went before. Desert [deh-ZERT] in the sense of consequences comes from French  deservir, â€Å"to be worthy to have,† or â€Å"to deserve,† from Latin  deservire, â€Å"to serve well.† One reader explained why she’s reluctant to accept the correct spelling of the expression: My interpretation of â€Å"just desserts† was that â€Å"dessert† was the sweet stuff at the end of a meal†¦cake, ice cream, etc. So â€Å"just desserts† was you got the dessert you deserved, meaning you didn’t get the sweet stuff or you got something less than sweet. The expression â€Å"Just Desserts† is often used deliberately as a marketing pun for the selling of baked goods, but there are plenty of unintentional errors among the examples that come up in a Web search: In the end she turns on him, but also gets her just desserts when the mob’s lawyer finally sees the light. –The Rotarian (magazine). Woman driver gets her just desserts –Video blog A serial Czech  prankster got his just desserts  after pals spooked him with a hilarious specter stunt.  Ã¢â‚¬â€œNY Daily News The error even appears in books from reputable publishers: He should have been pleased that Ralph Standishhad got his just desserts. –A Parliament of Spies, Cassandra Clark, Minotaur 2012, p. 221. Note: The character Standish is a bad man who has been found murdered. Corrected examples: In the end she turns on him, but also gets her just deserts when the mob’s lawyer finally sees the light. Woman driver gets her just deserts A serial Czech  prankster got his just deserts  after pals spooked him with a hilarious specter stunt.   He should have been pleased that Ralph Standishhad got his just deserts. Although the expression is most frequently used to refer to a deserved punishment, it can also refer to a deserved reward. For example the following headline from the Oye! Times (Toronto) uses the expression in a positive sense. [The actor mentioned has been honored with a star on the Hollywood Walk of Fame]: CHRISTOPH WALTZ GETS HIS JUST DESSERTS [sic] Bottom line: Ice cream and chocolate cake are desserts. People who get what’s coming to them get their just  deserts. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:7 Examples of Passive Voice (And How To Fix Them)In Search of a 4-Dot EllipsisThe Difference Between "Shade" and "Shadow"

Monday, February 17, 2020

Debt in the firms balance sheets Essay Example | Topics and Well Written Essays - 1750 words

Debt in the firms balance sheets - Essay Example The paper presents ordinary shares that can be simply defined as shares which are not preferred shares and which do not offer fixed dividend amounts. As Nevin states, an ordinary share directly indicates equity ownership in a company and it entitles the owner to voting rights in various crucial affairs of the company in proportion to their percentage of shareholding. Ordinary shareholders are entitled to receive dividends on their investment only if anything left after all liabilities are paid. In contrast, debt is an obligation owed by one party (debtor) to another party (creditor). In case of debts, lenders have no rights on the firm’s operations and are unable to take part in determining major strategic issues. Organisations and businesses across the world use debt to finance their day to day operations and other particular projects. The levels of debt are fundamental macroeconomic data and it they largely vary from company to company. Generally, levels and flows of public debt are given central importance while levels and flows of private debt are not considered as a major cause of concern. Stocks and flows are two important tools of debt measuring. Stocks are levels of debt and they have units of currency whereas flows change in debt levels and have units of currency/time. All credit is debt and it is created by lenders who agree to lend money for the exchange of adequate future returns. Lundgren reflects that the amount of money lent is considered to be the asset of the creditor while it becomes the liability of the debtor. Debt is often issued along with a specific repayment plan; and the debt maturity time or period of repayment may range from a few days to 50 years or longer. According to the maturity period, debt is classified into three categories such as short term, medium term, and long term debt. In order to accurately calculate total debt of a business, it is necessary to take off-balance sheet debt into account as all debt items may not s how up on the balance sheet. As Shearn (2011, p. 116) states, these debt items may include lease obligations, warranties, purchase contracts, unfunded pension liabilities and any other contractual obligation. However, this type of debt is generally disclosed in the footnotes attached to the financial statements. White, Sondhi & Fried (2006, p. 323) indicates that the liability amount shown on the balance sheet may not always represent total cash flow required to meet the debt. Business houses only record the present value of the future cash flow. To illustrate, if a firm borrows $1,000 at an interest rate of 12%, total amount payable at the end of that period becomes $1,120. However, the balance sheet will only represent the present value of the future payment or $1,000. Factors affecting levels of debt As Crane, Knoop, and Pettigrew (1977) point out, different firms have varying strategies in maintaining their debt levels and this strategic differences cause debt level variances in firms’ balance sheets. A firm considers an array of factors before framing its debt level strategies. In the words of Long and Ravenscraft (1993), no firm would allow its debt level to grow beyond its repayment capacity as this condition may adversely affect the feasibility and market repute of the business. More precisely, a firm’s debt level heavily depends on its borrowing policies. â€Å"Tthe capacity to borrow depends on several factors such as profitability, stability, relative size, asset competition, and the industry position of a business† (Shearn, 2011, p.115). Hart (1995, p. 142) argues that profitability plays a pivotal role in determining the debt level of a business house. General trends indicate that level of debt will be in an

Monday, February 3, 2020

Only Hope comparison Essay Example | Topics and Well Written Essays - 1000 words

Only Hope comparison - Essay Example On the other hand, Condon authored a book describing his findings from an extensive study that sought to describe how the youth of the Inuit people of the Holman island of Canada Arctic coped with the rigorous changes of adolescence amidst many social, economic, and demographic transformations. Both of these books offer an anthropological description of the Inuit youth and Chinese singletons. This paper will offer a comparison of the research questions addressed, methodologies, roles of the research , the content described in the two books and the conclusions drawn. Fong’s as highlighted in the book ‘only hope’ research question centered on determining what type of attributes were exhibited by singletons. The research was probed by the fact that parents of singletons bestowed a lot of hope in these children. Moreover, the possibility that the parents accorded these children all their attention and offered them multiple material things would have had the potential of spoiling such children. On the other hand, Condon realized that the adolescence stage presented rigorous psychological, emotional, hormonal, and physical changes that define the transition from childhood to adulthood (Fong, 2006). This prompted him to analyze how the adolescents of the Inuit youth in the Holman Island in the Canadian Arctic region coped with the social, economic, and demographic factors. He reasoned that understanding how all these changes shaped the maturation process of the adolescents could offer an advanced understanding of functioning processes of humans. Fong carried a study in the Dalian region, a coastal city that was undergoing transformation from an industrial center to service-oriented town. For 27 months, in the years 1997-2002, Fong worked closely with different schools, students, and parents. Her survey was extensive and included 2273 students in different ranks of schools. She had the privilege of visiting about 107 homes in the region (Fong, 2006) . She identified 31 families as her sample after having an extensive interaction through tutorial classes offered within the home setting. The role of her research was to determine whether the one child policy had any impact on the children born. On the other hand, Condon carried out two extensive field studies of the Inuit youth on the Holman Island. Although his first study sought to address a different objective, it offered an introductory understanding of the community (Condon, 1988). He compiled his findings after seven years of an interactive field study. The role of his research was to analyze how the youth coped with the numerous changes that defined their lives. Condon selected sub-section of the Holman Island as his sample population. Fong’s research revealed that singletons faced a surging pressure to become exemplary children as her findings highlight. The different chapters in her book reveal that parents expected singletons to demonstrate a higher sense of focus in school compared to children who had siblings. This translated into different forms of pressure exerted on the children by the parents so that they would meet the defined expectations (Fong, 2006). It becomes evident from the findings described that parents had viewed singletons in terms of the future. The research

Saturday, January 25, 2020

Production Management Of Movies

Production Management Of Movies Producers have overall control on every aspect of a films production, bringing together the Screenwriters, Director, cast, finances and production team. Their primary responsibility is to foster an environment in which the creative talents of the cast and crew can flourish Producers are therefore ultimately accountable for the success of the finished film. Producers many responsibilities span all four phases of production: Â · Development Producers are often responsible for coming up with the underlying premise of a production, or for selecting the screenplay. Producers secure the necessary rights, select the screenwriter and story editing team, raise the development financing, and supervise the development process. Â · Pre-production Producers typically bring together the key members of the creative team, including the Director, Cinematographer and principal cast. They assist the Executive Producers to raise finance for the production. Once this is in place, they select other key personnel, such as the Line Producer, Associate Producer and Production Manager, as well as the remaining Heads of Departments, such as Production Designer, Editor and Composer. Producers also participate in location scouting, and approve the final shooting script, production schedule and budget. Â · Production Producers are responsible for the day-to-day operations of the producing team, though many practical functions are delegated to the Line Producer and any Associate Producers. Producers are also in constant communication and consultation with the Director, and with other key creative personnel, on and off set. Producers approve all script changes and cost reports, and continue to serve as the primary point of contact for all production partners, investors and Distributors. Â · Post-production and marketing Producers are expected to liaise personally with post-production personnel, including the Editor, Composer, and Visual Effects staff. They then consult with all creative and financial personnel on the production of the answer (or final) print, and they are usually involved with the financial and distribution entities in planning the marketing and distribution of the finished film. It is rare to find one Producer who has the expertise and vision to exercise personal decision-making authority across all four phases of production. Producers normally delegate some of these functions to Executive Producers, Co-producers, Line Producers and Associate Producers. However, the Producer is responsible for the majority of the producing functions throughout all the processes of the film. Executive Producer The traditional role of the Executive Producer is to supervise the work of the Producer on behalf of the studio, the financiers or the distributors, and to ensure that the film is completed on time, and within budget, to agreed artistic and technical standards. The term often applies to a producer who has raised a significant proportion of a films finance, or who has secured the underlying rights to the project. Typically, Executive Producers are not involved in the technical aspects of the filmmaking process, but have played a crucial financial or creative role in ensuring that the project goes into production. Responsibilities As there may be several Executive Producers on a film, it is difficult to define their exact responsibilities. However, they usually fall into one or more of the following categories: Â · Development the Executive Producer secures the rights to a story and develops the screenplay, but then hands over to the lead Producer, and has no direct involvement in the physical production of the film. Â · Packaging the Executive Producer authorises and supervises the packaging of the film. Â · Financing the Executive Producer raises a significant proportion of funding for the film, assists with presales, or helps to secure distribution agreements. On smaller independent films, a well-known Producer, Director or star may also be accorded this title because their association with the project helps to facilitate contacts with financiers and Distributors. Â · Production the Executive Producer acts as a mentor to the Producer and supervises production for the financiers. This type of Executive Producer is almost always involved in short film production schemes, where they typically co-ordinate the films production from initial financing through to final distribution. Associate Producer or Assistant Producer Associate Producers carry out significant functions in the production or post-production process, which would otherwise be performed by the Producer, Executive Producer or Co-Producer. These responsibilities may range from helping to raise production finance at the beginning of the production process, to supervising the final stages of post-production. Associate Producers in Film are usually individuals within production companies who have played a particularly significant role in the development of the script or screenplay, or in the packaging process, or who have contributed important creative ideas to the production. They may be another producer; or a senior Script Editor who helps to shape the direction of the final drafts of the screenplay, and without whom the film may not be financed; or the Producers Assistant who supervises development or post production for the Producer in their absence. The term Associate Producer is also sometimes used to describe a Producer from a smalle r production company which is co-producing the film, who has typically raised a small amount of funding for the project, but not enough to warrant an Executive Producer or Co-Producer credit. Responsibilities Associate Producers contribute significantly to the production process, as they are responsible for specific elements delegated to them by the Producer. This diverse role may encompass development, packaging, raising production finance, supervising the production design team (sets, costumes, etc.), supervising post-production, or co-ordinating the work of the various visual effects companies. In fact, they may carry out any production work that the Producer is too busy to supervise personally, and which is not covered by one of the other production roles (e.g. Executive Producer, Co-producer, Line Producer). Whatever their exact role, Associate Producers must be able to troubleshoot any production difficulties or problems that come within their area of responsibility. Line Producer The Line Producer is one of the first people to be employed on a films production by the Producer and Executive Producers. Line Producers are rarely involved in the development of the project, but often play a crucial role in costing the production in order to provide investors with the confidence to invest in the project. As soon as the finance has been raised, the Line Producer supervises the preparation of the films budget, and the day-to-day planning and running of the production. Line Producers are usually employed on a freelance basis. They must expect to work long hours, though the role can be financially very rewarding. Career advancement is based on their experience and reputation. Where a Line Producer has a creative input to the production, he or she is often credited as a Co-producer. Responsibilities Line Producers are in charge of all the business aspects of the physical production of films. They are called Line Producers because they cannot start work until they know what the line is between the above-the-line costs, which relate to writers, producers, directors and cast, and the below-the-line costs which include everything else, e.g., crew salaries, equipment rentals, development costs, locations, set design and construction, insurance, etc. Line Producers are usually recruited onto the production team during the later stages of development. They are given the script and asked to assess the likely below the line cost of the production which involves breaking down the screenplay into a schedule a timetable for the film shoot that shows how long it will take to shoot each scene. From this schedule the Line Producer can accurately estimate the cost of each days shooting, and produce a provisional budget estimating the total amount of funding required. Once the Producer and Exec utive Producers have raised the required finance, the film can go into pre-production. During pre-production, Line Producers work closely with the Director, Production Manager, First Assistant Director, Art Director and other Heads of Department to prepare the production schedule and budget, and to set the shoot date. Line Producers oversee all other pre-production activities, including hiring the production team, setting up the production office, location scouting, ensuring compliance with regulations and codes of practice, sourcing equipment and suppliers, selecting crew, engaging supporting artistes and contributors, and monitoring the progress of the art department and other production departments. During production, Line Producers hand over control of the final budget to the Production Accountant, and delegate the day-to-day operation of the production office to the Production Manager and Production Co-ordinator. However, Line Producers are ultimately responsible for overseeing all activities, and for ensuring that the production is completed on time and within budget. This requires setting up and implementing financial monitoring systems, controlling production expenditure, controlling production materials, and monitoring and controlling the progress of productions. Line Producers usually allow a 10% contingency in the budget to cater for unforeseen circumstances, and spend much of their time juggling figures and resources. Line Producers are responsible for certain Health and Safety procedures, and for sorting out any insurance claims. At the end of the shoot, the Line Producer oversees the wrap, or winding down, of the production. Assistant Production Co-ordinator The Assistant Production Co-ordinator acts as a general assistant to the Production Co-ordinator, performing duties relating to the preparation, distribution and filing of paperwork, both within the production office and on set. Assistant Production Co-ordinators are almost always self-employed, and must be prepared to work long hours, particularly during the final week of pre-production. Most UK films employ one Assistant Production Co-ordinator; however, larger productions may employ two or more. Responsibilities Assistant Production Co-ordinators work under the direct supervision of a Production Co-ordinator. Their duties vary according to the production phase, and the daily requirements of the production office. Responsibilities may be spread across a number of related areas, including: Â · Production Office setting up, maintaining and closing down the Production Office, for example, ordering furniture, equipment and supplies. Â · Travel Accommodation helping to co-ordinate travel, accommodation, work permits, visas, medical examinations and any immunisations for principal crew and cast to conform with insurance and foreign travel requirements. Â · General production duties including typing, filing, answering the telephone, and other related office duties. Â · Transportation helping to organise the pick-up and delivery of equipment and personnel by the Unit Drivers. Â · Production paperwork assisting the Production Co-ordinator to prepare and distribute shooting schedules, crew and cast lists, call sheets, production reports, movement orders, scripts and script revisions. Production Runner or Production Assistant Production Runners are the foot soldiers of the production team, performing small but important tasks in the office, around the set and on location. Their duties may involve anything from office administration to crowd control, and from public relations to cleaning up locations. Production Runners are usually employed on a freelance basis, are not very well paid, and their hours are long and irregular. However, the work is usually extremely varied and provides a good entry-level role into the film industry. What is the job? Production Runners are deployed by the Producer and by other production staff, such as the Production Co-ordinator, to assist wherever they are needed on productions. Their responsibilities vary considerably depending on where Production Runners are assigned. In the Production Office duties typically include: assisting with answering telephones, filing paperwork and data entry, arranging lunches, dinners, and transportation reservations, photocopying, general office administration, and distributing production paperwork. On-set duties typically include: acting as a courier, helping to keep the set clean and tidy and distributing call sheets, Health and Safety notices, and other paperwork. On location shoots, Production Runners may also be required to help to co-ordinate the extras, and to perform crowd control duties, except where this work is dangerous, or performed by police officers or other official personnel. Co-producer A Co-producer is typically a Line Producer who has also performed a substantial portion of the creative producing function. Alternatively, they may be the lead Producer from another production company that is co-producing the film, or a partner or corporate officer from the production entity producing the film. In rare cases, a Co-producer may also be the person who optioned, developed or packaged the project. In all instances, Co-producers are subordinate to the Producer. Occasionally, the title Co-producer is accorded to a producer who finds, options, develops, or packages the project, but does not own the rights, and who plays a less significant role in the physical production of the film. For example, Co-producers may be relatively new Producers who need to work with a more senior Producer in order to package, finance and deliver the finished film. It should be noted that if a project has more than one Producer, it does not mean that these individuals are Co-producers in the tech nical sense of the term. Responsibilities Co-producers responsibilities vary enormously depending on which type of Co-producer they are. However, they always have less responsibility than the Producer for the completion of the film. Â · Where the Co-producer is also the Line Producer, he or she is responsible for all the business and logistical aspects during the main phase of film production. The key difference between this type of Co-producer and the Line Producer is that he or she also performs a significant part of the creative producing function, whether it be helping with casting, recruiting the Director, or hiring other key Heads of Department. Â · Where the Co-producer is a partner or corporate officer of the production entity producing the film, he or she plays a key role in the development of the film project, assists with the physical production, or supervises post-production to enable the Producer to move on to another production. Â · Where the Co-producer is the lead Producer from another production entity that is producing the film as part of an international co-production, he or she will usually raise a significant portion of the budget for the film, but have less creative input than the lead Producer. In some cases Co-producers choose to be credited as Co-producer rather than as Executive Producer, in order to indicate that they played an important part in the physical production of the film.

Friday, January 17, 2020

Key Success Factors for Online Advertising

Social Advertising Catherine Tucker? February 15, 2012 Abstract In social advertising, ads are targeted based on underlying social networks and their content is tailored with information that pertains to the social relationship. This paper explores the e? ectiveness of social advertising using data from ? eld tests of di? erent ads on Facebook. We ? nd evidence that social advertising is e? ective, and that this e? cacy seems to stem mainly from the ability of targeting based on social networks to uncover similarly responsive consumers.However, social advertising is less e? ective if the advertiser explicitly states they are trying to promote social in? uence in the text of their ad. This suggests that advertisers must avoid being overt in their attempts to exploit social networks in their advertising. Catherine Tucker is Associate Professor of Marketing at MIT Sloan School of Management, Cambridge, MA. and Faculty Research Fellow at the NBER. Thank-you to Google for ? nancial suppor t and to an anonymous non-pro? t for their cooperation.Thank-you to Jon Baker, Ann Kronrod, Preston Mcafee, and seminar participants at the George Mason University Roundtable on the Law and Economics of Internet Search, the University of Rochester, UCLA and Wharton for valuable comments. All errors are my own. ? 1 Electronic copy available at: http://ssrn. com/abstract=1975897 1 Introduction Recent advances on the internet have allowed consumers to interact across digital social networks. This is taking place at unprecedented levels: Facebook was the most visited website in the US in 2010, accounting for 20% of all time spent on the internet, a higher proportion than Google or Yahoo! ComScore, 2011). However, it is striking that traditional marketing communications have been at the periphery of this explosion of social data despite the documented power of social in? uence on purchasing behavior. Much of the emphasis on marketing in social media, so far, has been on the achievement o f ‘earned reach,’ whereby a brand builds its subscriber base organically and also hopes that this will in? uence others organically through sharing links with their social networks (Corcoran, 2009). However, recent research by Bakshy et al. 2011) has emphasized that this kind of organic sharing is far rarer than previously supposed, and that there are very few examples of a commercial message being consistently transmitted across social networks. Further, Tucker (2011a) shows that in order to achieve virality, an advertiser may have to sacri? ce the commercial e? ectiveness of their message. This means that advertisers may need to use paid advertising to facilitate the sharing of their commercial message through social networks. Both Facebook and LinkedIn have recently introduced a new form of advertising called ‘social advertising. A social ad is an online ad that ‘incorporates user interactions that the consumer has agreed to display and be shared. The res ulting ad displays these interactions along with the user’s persona (picture and/or name) within the ad content’ (IAB, 2009). This represents a radical technological development for advertisers, because it means that potentially they can co-opt the power of an individual’s social network to target advertising and engage their audience. This paper asks whether social advertising is e? ective, and what active steps advertisers themselves should take in their ads to promote social in? ence. 2 Electronic copy available at: http://ssrn. com/abstract=1975897 We explore the e? ectiveness of social ads using data from a ? eld experiment conducted on Facebook by a non-pro? t. This ? eld experiment compared the performance of social ads with conventionally targeted and untargeted ads. The social ads were targeted to the friends of ‘fans’ of the charity on Facebook. The ads featured that fan’s name and the fact that they had become a fan of this charity . We ? nd that on average these social ads were more e? ective than demographically targeted or untargeted ads.Further, this technique is useful for improving both the performance of demographically targeted and untargeted campaigns. Comparing the performance of these ads that contained the name of the fan and were targeted towards the fan’s friends with those that were simply targeted to that fan’s friends suggests that their e? ectiveness stems predominantly from the ability of social targeting to uncover similarly responsive consumers. We present results that suggest that as well as being more e? ective at gathering clicks, social advertising is also more e? ective at promoting actual subscriptions to the newsfeed and is more cost-e? ctive. We then turn to investigate how advertisers should word their social advertising. Through randomized ? eld tests, we investigate the e? ectiveness of advertisers deliberately promoting social in? uence in their advertising copy t hrough including a statement that encourages the viewer to, for example, ‘be like their friend. ’ We ? nd that consumers reject attempts by advertisers to explicitly harness or refer to a friend’s actions in their ad copy. This result contrasts with previous empirical research that ? nds consistent bene? ts to ? rms from highlighting previous consumer actions to positively in? ence the consumers’ response (Algesheimer et al. , 2010; Tucker and Zhang, 2011). This rejection is reasonably uniform across di? erent wording, though slightly less severe for ads that make a less explicit reference to friendship. We then present additional evidence to rule out two potential explanations for our ? ndings. First, we rule out that the overt mention of social in? uence simply made people aware they were seeing an ad rather than something organic to the site. We do this by comparing an ad that states it is an ad with an ad that does not, and ? nding no di? rence. 3 Seco nd, to investigate whether it was simply bad advertising copy, we examined how the ads perform for a group of Facebook users who have shown a visible propensity for social in? uence. We identify such users by whether or not they have a stated attachment to a ‘Fashion Brand’ on their Facebook pro? le. These users, in contrast to our earlier results, react more positively to the advertiser explicitly co-opting social in? uence than to a message that did not. This suggests that it was not simply that the message was badly communicated, but instead re? cts a taste (or more accurately distaste) for explicit references to social in? uence among most, though not all, consumers. This research builds on a literature that has studied the interplay between social networks and word of mouth. Zubcsek and Sarvary (2011) present a theoretical model that examines the e? ects of advertising to a social network, but assume that a ? rm cannot directly use the social network for marketing purposes. Instead, ? rms have to rely on consumers to organically pass their advertising message within the social networks. There has been little work on advertising in social networks.Previous studies in marketing about social network sites have questioned how such sites can use advertising to obtain members (Trusov et al. , 2009), and also how makers of applications designed to be used on social network sites can best advertise their products (Aral and Walker, 2011) through viral marketing. Hill et al. (2006) show that phone communications data can be used to predict who is more likely to adopt a service, Bagherjeiran et al. (2010) present a practical application where they use data from instant messaging logs at Yahoo! to improve online advertising targeting, and similarly Provost et al. 2009) show how to use browsing data to match groups of users who are socially similar. Tucker (2011b) explores how privacy controls mediate the e? ectiveness of advertising on Facebook. However, to our knowledge this is the ? rst academic study of the e? ectiveness of social advertising. Managerially, our results have important implications. Social advertising and the use of online social networks is e? ective. However, when advertisers attempt to reinforce this social 4 in? uence in ad copy, consumers appear less likely to respond positively to the ad. This is, to our knowledge, the ? st piece of empirical support for emerging managerial theories that emphasize the need for ? rms to not appear too obviously commercial when exploiting social media (Gossieaux and Moran, 2010). 5 2 Field Experiment The ? eld experiment was run by a small non-pro? t that provides educational scholarships for girls to attend high school in East Africa. Without the intervention of this non-pro? t, and other non-pro? ts like them, girls do not attend secondary school because their families prioritize the education of sons. Though the non-pro? t’s main mission is funding these educational scholarships, the non-pro? has a secondary mission which is to inform young people in the US about the state of education for African girls. It was in aid of this secondary mission that the non-pro? t set up a Facebook page. This page serves as a repository of interviews with girls where they describe the challenges they have faced. To launch the ? eld experiment, the non-pro? t followed the procedure described in ‘A/B Testing your Facebook Ads: Getting better results through experimentation’ (Facebook, 2010) which involved setting up multiple competing campaigns. These ad campaigns was targeted to three di? erent groups as shown in Table 1. The ? st group was a broad untargeted campaign for all Facebook users aged 18 and older in the US. The second group were people who had already expressed interest in other charities. These people were identi? ed using Facebook’s ‘broad category targeting’ of ‘Charity + Causes. ’ The third group were people who had already expressed an interest in ‘Education + Teaching. ’ Previously, the charity had tried such reasonably broad targeting with little success and was hopeful that social advertising would improve the ads’ performance (Tucker, 2011b). In all cases, the charity explicitly excluded current fans from seeing its ads.For each of these groups of Facebook users, the non-pro? t launched a socially targeted variant. These ads employed the Facebook ad option that meant that they were targeted only to users who were friends of existing fans of the charity. This also meant that when the fan had not opted-out on Facebook, the ad also displayed a ‘social endorsement’ where the name of the friend was shown at the bottom of the ad as shown in Figure 1. 6 Table 1: Di? erent Groups Targeted Condition Untargeted Baseline: Only Shown Baseline text All people in US over age of 18 who are not fans of the non-pro? t already.All people in US over age of 18 w ho state a? nity with charities on their Facebook pro? le who are not fans of the non-pro? t already. All people in US over age of 18 who state a? nity with education on their Facebook pro? le who are not fans of the non-pro? t already. Social Variant: Shown all 5 texts from Table 2 All people in US over age of 18 who are friends of the non-pro? t’s supporters who are not fans of the non-pro? t already. All people in US over age of 18 who state a? nity with charities on their Facebook pro? le who are friends of the non-pro? t’s supporters who are not fans of the nonpro? already. All people in US over age of 18 who state a? nity with education on their Facebook pro? le who are friends of the non-pro? t’s supporters who are not fans of the nonpro? t already. Charity Education The non-pro? t varied whether the campaign was demographically targeted and whether the campaign was socially targeted, and also explored di? erent ad-text conditions. Table 2 describes the d i? erent ad-copy for each condition. Each di? erent type of ad-copy was accompanied by the same picture of an appealing secondary-school student who had bene? ted from their program.The socially targeted ads displayed all ? ve variants of the advertising message depicted in Table 2. For each of the non-socially-targeted campaigns, we ran the baseline variant of the ad text which, as shown in Table 2, simply says ‘Help girls in East Africa change their lives through education. ’ The non-pro? t could not run the other four conditions that refer to others’ actions, because federal regulations require ads to be truthful and they did not want to mislead potential supporters. The di? erent ad conditions were broadly designed to cover the kinds of normative and informational social in? ence described by Deutsch and Gerard (1955); Burnkrant and Cousineau (1975). 1 We want to be clear that we do not argue that these advertising measures 1 Other forms of social in? uence s tudied in the literature involve network externalities where there is a performance bene? t to multiple people adopting (Tucker, 2008). However, that does not seem to be relevant 7 Table 2: Di? erent Ad-Text Conditions Condition Baseline Be like your friend Ad-Text Help girls in East Africa change their lives through education. Be like your friend.Help girls in East Africa change their lives through education. Don’t be left out. Help girls in East Africa change their lives through education. Your friend knows this is a good cause. Help girls in East Africa change their lives through education. Learn from your friend. Help girls in East Africa change their lives through education. Don’t be left out. Your friend knows Learn from your friend. capture all types of social in? uence or are necessarily successful at distinguishing between the di? erent types of social in? uence that are possible. The literature on social in? ence has emphasized that the underlying mechanism i s nuanced and complex. Obviously, di? erent types of social in? uence relate and interact in ways that cannot be teased apart simply with di? erent wording. However, the variation in messages does allow us to study whether explicit advertising messages that attempt to use di? erent types of wording to evoke social in? uence are e? ective in general. Figure 1: Sample Ad Figure 1 displays an anonymized sample ad for a social ad in the ‘be like your friend’ condition. The blacked-out top of the ad contained the non-pro? t’s name. The grayedhere. out bottom of the ad contained a supporter’s name, who had ‘liked’ the charity and was a Facebook friend of the person who was being advertised to. It is only with developments in technology and the development of automated algorithms that such individualized display of the friend’s name when pertinent is possible. Table 3 describes the demographics of the roughly 1,500 fans at the beginning of the campaign. Though the initial fans were reasonably spread out across di? erent age cohorts, they were more female than the average population, which makes sense given the nature of the charity.At the end of the experiment, the fans were slightly more likely to be male than before. The way that Facebook reports data means that we have access to the demographics only of the fans of the charity, not of those who were advertised to. Table 3: Demographics of the non-pro? t’s fans before and after the ? eld experiment Age 18-24 25-34 35-44 45-54 55+ Total Before Male 5 5 6 3 3 22 Experiment After Experiment Female Male Female 13 8 14 14 6 14 17 6 16 13 3 13 10 4 10 67 27 67 The ‘Total’ row does not add up to 100% because fans who are below 18 years of age are omitted. 9 3 DataThe data that Facebook shares with advertisers is both anonymous and aggregate. This means that we cannot trace the e? ects of social advertising on the friends of any one individual. It also mean s that we cannot examine heterogeneity in the degrees of in? uence across individuals, as is studied, for example, by Godes and Mayzlin (2009) in their study of o? ine ? rm-sponsored communications. However, given that the central research question of the study is whether, on average, di? erent types of social advertising are more e? ective, the aggregate nature of the data is su? cient.Table 4 reports daily summary statistics for the campaigns in our data. Over a 5-week period, there were 630 observations. There were 18 campaigns in total that consisted of a) The three baseline conditions that were demographically targeted to everyone, charity-lovers and education-supporters and used the baseline text, and b) The ? fteen social ad conditions that had all the ? ve di? erent types of text, and socially targeted separately to everyone, charity-lovers and education-supporters. Table A2 in the appendix provides a summary of these campaigns. Table 4: Summary Statistics Mean Std Dev Min M ax Average Impressions 13815. 13898. 6 1 98037 Average Clicks 5. 06 5. 17 0 37 Connections 2. 70 3. 52 0 24 Unique Clicks 5. 04 5. 14 0 36 Daily Click Rate 0. 11 0. 10 0 1. 27 Impression Click Rate 0. 045 0. 047 0 0. 50 Cost Per Click (USD) 0. 98 0. 40 0. 31 3. 90 Cost Per 1000 views (USD) 0. 52 1. 37 0 24. 5 Ad-Reach 6165. 7 6185. 0 1 60981 Frequency 2. 32 0. 82 1 9. 70 18 ad variants at the daily level for 5 weeks (630 observations) There are two click-through rates reported in Table 4. The ? rst click-through rate is the proportion of people who clicked on an ad that day. The denominator here is the 10Ad-Reach measure that captures the number of people exposed to an ad each day. The second click-through rate is per ad impression. We focus on the former in our econometric analysis, because impressions can be a function of person refreshing their page or using the back button on the browser or other actions which do not necessarily lead to increased exposure to the ad. We show robu stness subsequently to using this click-through rate per impression measure. Due to the relatively small number of clicks, these click through rates are expressed as percentage points or sometimes as fractions of a percentage point.In our regression analysis we also use this scaling in order to make our coe? cients more easily readable. 2 The data also contains an alternative means of measuring advertising success. The connection rate measures the number of people who liked a Facebook page within 24 hours of seeing a sponsored ad, where the denominator is the ad’s reach that day. We compare this measure to clicks in subsequent analysis to check that the click-through rate is capturing something meaningful. We also use the cost data about how much the advertiser paid for each of these ads in a robustness check.The data reassuringly suggests that there were only ? ve occasions where someone clicked twice on the ads. Therefore, 99. 8% of the click-through rate we measure capture s a single individual clicking on the ad. 2 11 Figure 2: Social advertising is e? ective 4 4. 1 Results Does Social Advertising Work? First, we present some simple evidence about whether social advertising is more e? ective than regular display advertising. Figure 2 displays the basic comparison of aggregate (that is, across the whole ? ve-week period) click-through rates between non-socially-targeted ads and ads that were socially targeted.Since these are aggregate click-through rates they di? er from the daily click-through rates reported in Table 4. These are expressed as fractions of a percentage point. It is clear that social advertising earned far larger click-through rates. The di? erence between the two bars is quite striking. To check the robustness and statistical signi? cance of this relationship, we turn to econometrics. The econometric analysis is relatively straightforward because of the randomization induced by the ? eld tests. We model the click-through rate of campa ign j on day t targeted to demographic group k as: 2 ClickRatejt = ? SocialT argeting Endorsementj + ? k + ? t + j (1) SocialT argeting Endorsementj is an indicator for whether or not this campaign variance was socially targeted and displayed the endorsement. Since Facebook does not allow the testing of these di? erent features separately, this is a combined (rather than separable) indicator. ?k is a ? xed e? ect that captures whether this was the untargeted variant of the ad. This controls for underlying systematic di? erences in how likely people within that target and untargeted segment were to respond to this charity.We include a vector of date dummies ? t . Because the ads are randomized, ? t and ? k should primarily improve e? ciency. We estimate the speci? cation using ordinary least squares. Though we recognize that theoretically a click-through rate is bounded at one hundred since it is measured in percentage points, click-through rates in our data are never close to this u pper bound or lower bound. 3 Table 5 reports our initial results. Column (1) presents results for the simple speci? cation implied by equation (1) but without the date and demographic controls.The point estimates suggest that social targeting and a friend’s endorsement increased the average daily clickthrough rate by around half. Column (2) repeats the analysis with the controls for date. It suggests that after controlling for date, the result holds. This is reassuring and suggests that any unevenness in how ads were served across days does not drive our results. It also suggests that our result is not an artifact of a failure of randomization. Column (3) adds an extra coe? cient that indicates whether that campaign was untargeted rather than being targeted to one of the customer groups identi? d as being likely ‘targets’ by the non-pro? t We also tried alternative speci? cations where we use the unbounded clicks measure (rather than a rate) as the dependent vari able and show that our results are robust to such a speci? cation in Table A1, in the appendix. 3 13 – Educational and Charity supporters. It suggests that indeed, as expected, an untargeted campaign was weakly ine? ective, though the estimate is not signi? cant at conventional levels. We speculate that the apparent weakness of demographic targeting may be because target markets of charity and educational supporters is reasonably broad, and consequently may have ontained many individuals who would not support an international charity. An obvious question is what explains the success of social advertising. One explanation is that the endorsement of a friend is informative. Another explanation is that social targeting uncovers people who will be more likely to be interested in their charity as they are similar, in unobserved ways, to their friends who are already fans of the charity. Manski (1993) pointed out that this particular issue of distinguishing homophily (unobserved ch aracteristics that make friends behave in a similar way) from the explicit in? ence of friends on each other is empirically problematic. Ideally, to address this we would simply randomize whether users saw the endorsement or not. However, Facebook’s advertiser interface does not allow that. What we can do is take advantage of the fact that sometimes ads are shown to people without the endorsement if that fan has selected a privacy setting which restricts the use of their image and name. The interface which users use to do this is displayed in Figure A1; all users do is simply select the ‘No One’ rather than the ‘Only my friends’ option.Of course, this will not represent perfect randomization. It is likely that the fans who select stricter privacy settings di? er in unobserved ways from those who do not, and that therefore their social networks may di? er as well. However, despite this potential for bias, this does represent a useful opportunity to tr y to disentangle the power of social targeting to enable homophily and the power of personal endorsements. Column (4) displays the results of a speci? cation for equation (1) where the dependent variable is the conversion rate for these socially targeted but not socially endorsed ads.Here for ads that were being shown to friends, the click-through rate was only calculated for occasions when the endorsement was not shown. A comparison of Column 14 (3) and Column (4) in Table 5 makes it clear the ads that were displayed to friends of fans but lacked a clear endorsement were less e? ective than those that had a clear endorsement. However, they were still measurably more e? ective than non-socially-targeted ads. It appears that, roughly, the endorsement accounted for less than half of the persuasive e? ect and the ability to use social networks to target the ad accounted for slightly more than half of such ads’ e? acy. Columns (5) and (6) of Table 5 estimate the speci? cation sep arately by whether the campaign was targeted or untargeted. Though the point estimate for the targeted campaigns is higher, it is notable that social advertising improved the performance of both targeted and untargeted campaigns. Given the widely reported lack of e? cacy of untargeted campaigns (Reiley and Lewis, 2009), the increase in e? ectiveness allowed by social advertising appears large for untargeted campaigns. 15 Table 5: Social Targeting and Endorsement is E? ective (4) No Endorsement Click Rate SocialTargeting EndorsementAll (1) Click Rate 0. 0386 (0. 0123) (2) Click Rate 0. 0385 (0. 0108) 0. 0287 (0. 0143) -0. 000275 (0. 0122) 0. 0794 (0. 0116) 0. 0132 (0. 0166) (3) Click Rate 0. 0386 (0. 0125) Untargeted (5) Click Rate 0. 0297 (0. 00755) Targeted (6) Click Rate 0. 0376 (0. 00927) SocialTargeting Untargeted Constant 16 Date Controls No Yes Yes Yes Yes Yes Observations 630 630 630 630 210 420 Log-Likelihood 542. 1 610. 3 610. 3 427. 8 187. 7 452. 3 R-Squared 0. 0221 0. 212 0. 212 0. 119 0. 317 0. 228 OLS Estimates. Dependent variable is the percentage point of people who click on the ad.Dependent variable in Columns (4) for social ads is the percentage point daily click-through rate of ads that did not display the endorsement. Robust standard errors. * p < 0. 10, ** p < 0. 05, *** p < 0. 01 4. 2 Robustness Table 6 checks the robustness of the ? nding that social targeting and endorsement are effective, to di? erent de? nitions of the dependent variable. Column (1) reports the results of using a dependent measure which is the percentage click-through per impression. Again, we ? nd that social advertising is more e? ective, though the e? ectiveness is less pronounced and less precisely estimated than before.This suggests that the appeal of social advertising is not necessarily enhanced by multiple exposure. It could also, of course, merely re? ect noise introduced into the process by someone refreshing their browser multiple times. The results so far s uggest that consumer privacy concerns or the intrusiveness of such ads do not seem to outweigh the appeal of social advertising for consumers. 4 There is always the possibility of course that people clicked on the ads because they were annoyed or wanted to understand more the extent of privacy intrusion rather than because the ads were actually e? ective.To explore this, we estimate a speci? cation where the dependent measure was the proportion of clicks that became subscribers of the newsfeed. The results are reported in Column (2). We see that again social advertising appears to be more e? ective at encouraging Facebook users to take the intended action as well as simply clicking. This is evidence that people are not clicking on social ads due to annoyance at their intrusiveness but instead are clicking on them and taking the action the ads intend to encourage them to take. Untargeted ads are less likely to lead to conversions than those targeted at appropriate demographics.This m akes sense – these people are being targeted precisely because they are the kind of people who have signed up for such news feeds in the past. A ? nal question is whether ads that are socially targeted and display endorsements are more expensive for advertisers, thereby wiping out their relative e? ectiveness in terms of return on advertising investment. We explore this in Column (3) of Table 6. There are This may be because Facebook users ? nd it reassuring that these ads, though narrowly targeted, are not overly visually intrusive (Goldfarb and Tucker, 2011). 4 17 everal missing observations where there were no clicks that day and consequently there was no price recorded. In Column (3), we report the results of a speci? cation where our explanatory variables is the relative price per click. The results suggest that advertisers pay less for these clicks that are socially targeted. This suggests that Facebook is not charging a premium for this kind of advertising. Though Face book shrouds in secrecy the precise pricing and auction mechanism underlying their advertising pricing, this result would be consistent with a mechanism whereby advertisers pay less for clicks if they have higher clickthrough rates.In other words, prices paid bene? t from an improved ‘quality-score’ (Athey and Nekipelov, 2011). The results also suggest that advertisers pay less for demographically untargeted clicks which is in line with previous studies such as Beales (2010). Table 6: Social Advertising is E? ective: Checking robustness to di? erent dependent variables SocialTargeting Endorsement (1) Click Rate (Multiple) 0. 0108 (0. 00501) 0. 00526 (0. 00582) Yes 630 1086. 5 0. 150 (2) Clicks to Connections Rate 0. 433 (0. 0997) -0. 321 (0. 0768) Yes 554 -467. 5 0. 163 (3) Cost Per Click (USD) -0. 95 (0. 0480) -0. 177 (0. 0520) Yes 559 -129. 0 0. 426 Untargeted Date Controls Observations Log-Likelihood R-Squared OLS Estimates. Dependent variable is the click-through ra te (expressed as a fraction of a percentage point) for impressions in Column (1). Dependent variable in Column (2) is the clicks to conversions rate. Dependent variable in Column (3) is cost per click. Robust standard errors. * p < 0. 10, ** p < 0. 05, *** p < 0. 01 4. 3 What Kind of Social Advertising Messages Work? We then go on to explore what kind of advertising message works in social ads.We distinguish between ads that rely simply on the Facebook algorithm to promote social in? uence by featuring the automated endorsement at the bottom of their ad, and ads that explicitly refer to this endorsement in their ad copy. 18 Table 7: Social Advertising is Less E? ective if an Advertiser is Too Explicit (3) No Endorsement Click Rate SocialTargeting Endorsement All (1) Click Rate 0. 0577 (0. 0139) (2) Click Rate 0. 0571 (0. 0113) 0. 0333 (0. 0168) -0. 0287 (0. 00886) -0. 000463 (0. 0122) -0. 0136 (0. 0115) -0. 0189? (0. 01000) -0. 0378 (0. 0115) -0. 0429 (0. 0144) -0. 101 (0. 0124) Yes 630 615. 4 0. 225 Yes 630 618. 1 0. 232 Yes 630 429. 5 0. 124 Yes 210 189. 6 0. 329 Yes 420 461. 0 0. 260 -0. 000281 (0. 0177) 0. 0161 (0. 0169) -0. 0303? (0. 0167) -0. 0284 (0. 0124) Untargeted (4) Click Rate 0. 0498 (0. 0245) Targeted (5) Click Rate 0. 0527 (0. 0130) SocialTargeting SocialTargeting Endorsement ? Explicit Untargeted SocialTargeting Endorsement ? Don’t be left out SocialTargeting Endorsement ? Be like your friend SocialTargeting Endorsement ? Learn from your friend 19 SocialTargeting Endorsement ? Your friend knows SocialTargeting ? ExplicitDate Controls Observations Log-Likelihood R-Squared OLS Estimates. Dependent variable is the percentage points of people who click on the ad. Dependent variable in Columns (3) adjusted for social ads so that is the percentage point daily click-through rate of ads that did not display the endorsement. Robust standard errors. * p < 0. 10, ** p < 0. 05, *** p < 0. 01 We use the additional binary indicator variable Explicitj to indicate when the advertiser uses a message that evokes social in? uence explicitly in their ad copy, in addition to the social endorsement automated by the Facebook algorithm.This covers all the non-baseline conditions described in Table 2. We interact this with the SocialT argeting Endorsementj , meaning that SocialT argeting Endorsementj now measures the e? ect of the baseline effect, and the interacted variable measures the incremental advantage or disadvantage of mentioning the friend or the potential for social in? uence in the ad. Column (1) of Table 7 reports the results. The negative coe? cient on the interaction between Explicit and SocialT argeting Endorsementj suggests that explicit reference to a social in? uence mechanism in the ad a? ected the performance of the ad negatively.That is, when the advertiser themselves were explicit about their intention to harness social in? uence, it back? res. Further, the large point estimate for SocialT argeting Endorsementj sugge sts that the baseline message is even more e? ective than the estimates of Table 5 suggested. Column (2) in Table 7 reports the results of a speci? cation where we break up Explicit by the di? erent types of ‘social in? uence’-focused advertising messages featured in Table 2. It is striking that all measures are negative. It is also suggestive that the one message that was not statistically signi? ant and had a smaller point estimate than the others did not refer to the friend explicitly but instead referred obliquely to the friend’s action. This is speculative, since the point estimate here is not statistically di? erent from the others due to its large standard error. Column (3) repeats the exercise for the click-through rate for the ads that did not display an endorsement that we investigated in Table 5. Since these ads did not display the friend’s name at the bottom, it should not be so obvious to a viewer that the ? rm is explicitly trying to harness the social in? uence that results from the friend being a fan of the charity.We recognize that there may of course be some confusion at the mention of a friend when no name is displayed, but this confusion should work against us rather than for us. In this case, 20 we do not see a negative and signi? cant e? ect of the ‘Explicit’ advertising message which referred to a friend. This suggests that it was the combination of the friend’s name and the mention of social in? uence which was particularly o? -putting. The results in Column (3) suggest that what is damaging is the combination of an advertiser making it explicit they are trying to harness social in? ence and the algorithmic social advertising message. We next explored whether this ? nding that attempts by advertisers to explicitly harness social in? uence in their ad text damaged the e? ectiveness of social advertising di? ered by the target group selected. Column (4) presents the results for the campaign t hat was targeted at friends of fans who were simply over 18 years old and based in the US. Column (5) presents the results for the group of users whom the charity selected as being in the target ‘demographic’ groups for the campaign – that is users whose Facebook pro? e revealed their support for other educational and charitable causes. What is striking is the similarity of the estimates for the e? cacy of social advertising and the damage done by the advertiser being overly explicit about social in? uence across Columns (4) and (5). Again, similar to the results reported in Table 5 social advertising appears to be able to o? er as nearly as large a lift to ad e? cacy for an untargeted population as a targeted one. 4. 4 Behavioral Mechanism We then collected additional data to help rule out alternative explanations of our ? nding that the explicit mention of social in? ence was undesirable in social ads. One obvious potential explanation is that what we are measu ring is simply that people are unaware that what they are seeing is actually an ad, rather than part of Facebook. When a non-pro? t uses a message such as ‘Be like your friend’ then it becomes obvious that this is an ad, and people respond di? erently. To test this, we persuaded the non-pro? t to run a subsequent experiment that allowed us to explicitly tease this apart. In this experiment we compared the performance of ads that said ‘Please read this ad. Help girls in East Africa 21 change their lives through education. , and ads that simply said ‘Help girls in East Africa change their lives through education. ’5 If it is was the case that Facebook users were simply mistaking socially targeted ads for regular content and the explicit appeals to social in? uence stopped them making this mistake, we would expect to also see a negative e? ect of wording that made it clear that the message was an ad. However, it appears that adding ‘Please read thi s ad’ if anything helped ad performance, which suggests that it was not the case that Facebook users were simply mistaking socially targeted ads for content if there is no explicit message.Obviously, though, the sample size here is very small, making more de? nitive pronouncements unwise. Table 8: Not Driven by Lack of Awareness of Advertising or Universally Unappealing Ad Copy Knowledge (1) Click Rate 0. 0312? (0. 0160) 0. 0114 (0. 0288) Fashion (2) Click Rate 0. 0194 (0. 0208) 0. 0376? (0. 0221) 0. 0449? (0. 0254) -0. 00448 (0. 0218) 0. 0172 (0. 0254) 0. 127 (0. 0584) (3) Click Rate 0. 0182 (0. 0208) SocialTargeting Endorsement SocialTargeting Endorsement ? Explicit SocialTargeting Endorsement ? Don’t be left out SocialTargeting Endorsement Be like your friend SocialTargeting Endorsement ? Learn from your friend SocialTargeting Endorsement ? Your friend knows Date Controls Yes Yes Yes Observations 20 60 60 Log-Likelihood 55. 43 91. 77 103. 7 R-Squared 0. 916 0. 267 0 . 508 OLS Estimates. Dependent variable is the percentage point of people who click on ad that day. Robust standard errors. * p < 0. 10, ** p < 0. 05, *** p < 0. 01 Recent research has questioned the use of the imperative in advertising copy, which is why we used ‘please’ (Kronrod et al. , 2012) 5 22 Another alternative explanation for our ? dings is that the messages referring to the friend were poorly-written or unappealing. To test whether this was the case, we selected an alternative set of users whom might be expected to react in an opposite way to potential presumptions of social in? uence. Speci? cally, the charity agreed to run test conditions identical to those in Table 2 for the people who expressed a? nity with ‘Fashion’ goods on their Facebook pro? les. The Fashion category of users were chosen because typical models of social in? uence have focused on fashion cycles (Bikhchandani et al. , 1992).These models emphasize the extent to which people who participate in Fashion cycles receive explicit utility from conformity, even when this conformity is provoked by a ? rm. In other words, they may ? nd advertiser-endorsed social in? uence more persuasive and advertiser attempts at emphasizing the power of social in? uence more acceptable than the general population does. This group of users exhibits a very di? erent pattern to that exhibited by the general population. They appear to respond somewhat positively to social advertising, though this estimate is imprecise and the point estimate is smaller than for the other conditions.However, strikingly, they reacted particularly positively to advertising messages that emphasized social in? uence and the actions of the friend in the ad copy. In other words, social advertising for this group worked even when the advertiser explicitly embraced the potential for social in? uence. This result suggests that there may be heterogeneity in consumer responses to the wording of social advertis ing messages depending on their previous consumption patterns. This is evidence against an alternative explanation for our results in Table 7 based on these advertising messages which explicitly refer to the potential for social in? ence being confusing or overly wordy, since they were e? ective for this group of Fashion fans. In general, the results of Tables 7 and 8 suggest that there is heterogeneity in distaste for advertiser attempts to harness social in? uence given previous consumption patterns, but that for the average person the e? ects are negative. 23 5 Implications How helpful is data on social relationships when it comes to targeting and delivering advertising content? This paper answers this question using ? eld test data of di? erent ads on the large social network site Facebook. We ? nd evidence that social advertising is indeed very e? ctive. This is important, as for the past few years social network websites have often been dismissed by advertisers as venues for à ¢â‚¬Ëœpaid media’, that is, paid advertising. Instead, the emphasis was on ‘earned’ or organic media whereby social networks were venues for organic word of mouth. This dismissal of paid advertisements was echoed in the popular and marketing press with headlines such as ‘Online Social Network and Advertising Don’t Mix’ and ‘Facebook Ad Click-Through Rates Are Really Pitiful’ (Joel, 2008; Barefoot and Szabo, 2008). Our results suggest, however, that as social advertising develops this will change swiftly.In particular, social networks will be able to exploit their considerable inherent network e? ects to enlarge their share of advertising dollars. Strikingly, we ? nd that the average Facebook user appears to ? nd social advertising as done by the standard Facebook algorithm appealing. However, when advertisers attempt to emulate or reinforce this social in? uence, consumers appear less likely to respond positively to the ad. Specul atively, the results suggest that intrusive or highly personal advertising is more acceptable if done algorithmically by a faceless entity uch as a computer than when it is the result of evident human agency. Very speculatively, there is perhaps a parallel with users of web-based email programs accepting an algorithm scanning their emails to serve them relevant ads when the interception of emails by a human agent would not be acceptable. Our results suggest that social advertising works well for both targeted and untargeted populations, which may mean that social advertising is a particularly useful technique when 24 advertising to consumers outside the product’s natural or obvious market segment since their are less obvious ways of targeting in these settings.The majority of this e? cacy appears to be because social targeting uncovers unobserved homophily between users of a website and their underlying receptiveness to an advertising message. There are of course limitations to our study. First, the non-pro? t setting may bias our results in ways that we cannot predict. Second, the aims of the non-pro? t also means the outcome measure we study is whether or not people sign up to hear more about the nonpro? t, rather than studying the direct e? ect of advertising on for-pro? t outcomes such as customers making purchases.Third, we studied this advertising at a time when Facebook was just launching and promoting its social advertising features. It is not clear whether the results will be as strong if the advertising market becomes saturated with social ads. Notwithstanding these limitations, we believe that this paper makes a useful contribution in terms of documenting when social advertising is useful and when it is not. 25 References Algesheimer, R. , S. Borle, U. M. Dholakia, and S. S. Singh (July/August 2010). The impact of customer community participation on customer behaviors: An empirical investigation.Marketing Science 29 (4), 756–769. Aral, S. and D. Walker (September 2011). Creating social contagion through viral product design: A randomized trial of peer in? uence in networks. Management Science 57 (9), 1623–1639. Athey, S. and D. Nekipelov (2011). A structural model of sponsored search advertising auctions. Mimeo, Berkeley. Bagherjeiran, A. , R. P. Bhatt, R. Parekh, and V. Chaoji (2010). Online advertising in social networks. In B. Furht (Ed. ), Handbook of Social Network Technologies and Applications, pp. 651–689. Springer US. Bakshy, E. , J. M. Hofman, W. A. Mason, and D. J. Watts (2011). Everyone’s an in? encer: quantifying in? uence on Twitter. In Proceedings of the fourth ACM international conference on Web search and data mining, WSDM ’11, New York, NY, USA, pp. 65–74. ACM. Barefoot, D. and J. Szabo (2008, April). Facebook ad click-through rates are really pitiful. Friends with Bene? ts: A social media handbook blog. Beales, H. (2010). The value of behavioral targeting. Mime o, George Washington University. Bikhchandani, S. , D. Hirshleifer, and I. Welch (1992, October). A theory of fads, fashion, custom, and cultural change in informational cascades. Journal of Political Economy 100 (5), 992–1026. 6 Burnkrant, R. E. and A. Cousineau (1975, December). Informational and normative social in? uence in buyer behavior. Journal of Consumer Research 2 (3), 206–15. ComScore (2011). ComScore’s 2011 social report: Facebook leading, microblogging growing, world connecting. White Paper . Corcoran, S. (2009, December 16). De? ning earned, owned and paid media. Forrester Research. Deutsch, M. and H. B. Gerard (1955). A study of normative and informational social in? uences upon individual judgment. The Journal of Abnormal and Social Psychology 51 (3), 629–636. Facebook (2010, September).A/B testing your Facebook ads: Getting better results through experimentation’. Technical Report. Godes, D. and D. Mayzlin (2009). Firm-Created Word -of-Mouth Communication: Evidence from a Field Test. Marketing Science 28 (4), 721–739. Goldfarb, A. and C. Tucker (2011, May). Online display advertising: Targeting and obtrusiveness. Marketing Science 30, 389–404. Gossieaux, F. and E. Moran (2010). The Hyper-Social Organization: Eclipse Your Competition by Leveraging Social Media. McGraw-Hill. Hill, S. , F. Provest, and C. Volinksky (2006). Network-based marketing: Identifying likely adopters via consumer networks.Statistical Science 21 (2), 256276. IAB (2009). IAB social advertising best practices. Interactive Advertising Bureau. Joel, M. (2008, February 8). Online social networks and advertising don’t mix. Six Pixels of Separation, Twist Image. 27 Kronrod, A. , A. Grinstein, and L. Wathieu (2012, January). Go green! Should environmental messages be so assertive? Journal of Marketing 76, 95–102. Manski, C. F. (1993, July). Identi? cation of endogenous social e? ects: The re? ection problem. Review of E conomic Studies 60 (3), 531–42. Provost, F. , B. Dalessandro, R. Hook, X. Zhang, and A. Murray (2009).Audience selection for on-line brand advertising: privacy-friendly social network targeting. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD ’09, New York, NY, USA, pp. 707–716. ACM. Reiley, D. and R. Lewis (2009). Retail advertising works! measuring the e? ects of advertising on sales via a controlled experiment on Yahoo! †. Working Paper, Yahoo! Research. Trusov, M. , R. E. Bucklin, and K. Pauwels (2009, September). E? ects of word-of-mouth versus traditional marketing: Findings from an internet social networking site.Journal of Marketing 73, 90–102. Tucker, C. (2008). Identifying formal and informal in? uence in technology adoption with network externalities. Management Science 54 (12), 2024–2038. Tucker, C. (2011a). Ad virality and ad persuasiveness. Mimeo, MIT . Tucker, C. (2011b ). Mimeo, MIT . Tucker, C. and J. Zhang (2011). How does popularity information a? ect choices? A ? eld experiment. Management Science 57 (5), 828–842. Zubcsek, P. and M. Sarvary (2011). Advertising to a social network. Quantitative Marketing and Economics 9, 71–107. Social Networks, Personalized Advertising, and Privacy Controls. 28Figure A1: Control interface for switching o? Endorsement A-1 Table A1: Robustness of Table 5 to using number of clicks as dependent variable OLS (1) Average Clicks SocialTargeting Endorsement 1. 991 (0. 394) -0. 0385 (0. 422) 0. 000405 (0. 0000443) Poisson (2) Average Clicks 0. 258 (0. 0746) 0. 134 (0. 0817) 0. 0000327 (0. 00000638) Negative Binomial (3) Average Clicks 0. 230 (0. 0922) 0. 187 (0. 123) 0. 0000455 (0. 0000135) Untargeted Ad-Reach Date Controls Yes Yes Yes Observations 630 630 630 Log-Likelihood -1484. 8 -1417. 6 -1394. 7 R-Squared 0. 755 OLS Estimates in Columns (1)-(2).Dependent variable is the Number of clicks on the ad in Columns (3)-(4). Robust standard errors. * p < 0. 10, ** p < 0. 05, *** p < 0. 01 A-2 Table A2: Summary of 18 Campaigns Campaign 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Social Ad? Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Social Advertising Non-Social Advertising Non-Social Advertising Non-Social Advertising Demo Targeting?Demo 1 Targeted Demo 1 Targeted Demo 1 Targeted Demo 1 Targeted Demo 1 Targeted Demo 2 Targeted Demo 2 Targeted Demo 2 Targeted Demo 2 Targeted Demo 2 Targeted Untargeted Untargeted Untargeted Untargeted Untargeted Demo 1 Targeted Demo 2 Targeted Untargeted Message Baseline Message 1 Message 2 Message 3 Message 4 Baseline Message 1 Message 2 Message 3 Message 4 Baseline Message 1 Message 2 Message 3 Message 4 Baseline Baseline Baseline A- 3