2. Enhanced Eyes Emmy Blaner
Twitter Campaign Source 1
● Content pillars - way to focus a brand’s identity and align all campaign
posts to fit the themes (ex: Door Dash uses brand mission, merchant
partnerships, “Dasher stories”, and consumer moments)
● #DeliveringGood - ad campaign to showcase their ties to charity
● Polls allow engagement with followers, co-branded posts, retweeting
follower content
● Utilize the various Twitter Ad campaign tools
● Authenticity is key
4. Enhanced Eyes Emmy Blaner
Twitter Campaign Source 2
● Humanize the experience
● Involve the audience
● Know the local crowd and cater to specific markets
● Interact with customers in real time
● Consider timing (time of day, week, and month), these factors produce
different results
● Utilize celebrity and influencer endorsement
● Utilize multiple platforms
6. Enhanced Eyes Emmy Blaner
Twitter Campaign Source 3
● Ask yourself: What does the consumer want? What do they need? What
can you deliver?
● Be sure the user is getting something out of it
● Create a call-to-action and an experience so users have something to
participate in (send users a product or virtual prize)
10. Enhanced Eyes Emmy Blaner
Digital Footprint Source 1
“Tourists’ Digital Footprint in Cities”
● Big Data can provide information for spatial analysis by tracking GPS
locations, internet searches, bank card transactions, mobile phone activity,
photos posted to social media, meteorological data, and more to figure
out popular tourist spots
Salas-Olmedo, María Henar, et al. “Tourists' Digital Footprint in Cities: Comparing Big Data Sources.”
Tourism Management, vol. 66, June 2018, pp. 13–25., doi:10.1016/j.tourman.2017.11.001.
11. Enhanced Eyes Emmy Blaner
Digital Footprint Source 1
“Tourists’ Digital Footprint in Cities”
● Footprint goes beyond what information you actively put on the
internet-- physical locations are always accessible and can be deducted
based on following different check ins (eating at a restaurant, taking a
subway, where you shopped, etc.)
Salas-Olmedo, María Henar, et al. “Tourists' Digital Footprint in Cities: Comparing Big Data Sources.”
Tourism Management, vol. 66, June 2018, pp. 13–25., doi:10.1016/j.tourman.2017.11.001.
12. Enhanced Eyes Emmy Blaner
Digital Footprint Source 2
“Cross Platform Identification of Anonymous Users in Multiple Social Media
Networks (SMNs)”
● Researchers can examine public user profile attributes, including screen
name, birthday, location, gender, and profile photos to link accounts
across multiple platforms
Zhou, Xiaoping, et al. “Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks.” IEEE
Transactions on Knowledge and Data Engineering, vol. 28, no. 2, 2016, pp. 411–424., doi:10.1109/tkde.2015.2485222.
13. Enhanced Eyes Emmy Blaner
Digital Footprint Source 2
“Cross Platform Identification of Anonymous Users in Multiple Social Media
Networks (SMNs)”
● Post times, locations, and writing style can identify if various accounts
belong to the same user
● Single-following connections and mutual-following connections
Zhou, Xiaoping, et al. “Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks.” IEEE
Transactions on Knowledge and Data Engineering, vol. 28, no. 2, 2016, pp. 411–424., doi:10.1109/tkde.2015.2485222.
14. Enhanced Eyes Emmy Blaner
Digital Footprint Source 3
● Debate over whether parents should post photos of their young children:
○ Pro: Share memories with family and friends
○ Con: Non-consensual, rob children on digital anonymity, create data
early on for facial recognition, etc.
● Photos can negatively portray children even when not intended,
potentially embarrassing when they grow up
Kumar, Priya. “A Digital Footprint From Birth: New Mothers’ Decisions to Share Baby Pictures Online.” Deep Blue, University
of Michigan, 2014, deepblue.lib.umich.edu/handle/2027.42/106577.
15. Enhanced Eyes Emmy Blaner
Digital Footprint Conclusion
● Can anything be created on the internet that is completely isolated from
the rest of a person’s digital footprint?
● What extent do we need to take action to keep our personal information
private? (Is it worth it to try staying anonymous if everything ends up on
the internet anyway?)
● Does creating many accounts across the internet, and therefore using so
many passwords, open up more avenues for hackers?