Campbell et al v. Facebook Inc.
Filing
199
NOTICE by Facebook Inc. Joint Notice of Refiling of Documents Accompanying Class Certification Briefs and Evidentiary Objections (Attachments: # 1 Ex. 1 - Replacement for Dkt. 178-1, # 2 Ex. 2 - Replacement for Dkt. 183-4, # 3 Ex. 3 - Replacement for Dkt. 179-1, # 4 Ex. 4 - Replacement for Dkt. 184-3, # 5 Ex. 5 - Replacement for Dkt. 179-2, # 6 Ex. 6 - Replacement for Dkt. 179-3, # 7 Ex. 7 - Replacement for Dkt. 179-4, # 8 Ex. 8 - Replacement for Dkt. 179-5, # 9 Ex. 9 - Replacement for Dkt. 179-6, # 10 Ex. 10 - Replacement for Dkt. 179-7, # 11 Ex. 11 - Replacement for Dkt. 179-10, # 12 Ex. 12 - Replacement for Dkt. 179-11, # 13 Ex. 13 - Replacement for Dkt. 179-12, # 14 Ex. 14 - Replacement for Dkt. 179-13, # 15 Ex. 15 - Replacement for Dkt. 179-14, # 16 Ex. 16 - Replacement for Dkt. 179-15, # 17 Ex. 17 - Replacement for Dkt. 179-16, # 18 Ex. 18 - Replacement for Dkt. 179-17, # 19 Ex. 19 - Replacement for Dkt. 179-18, # 20 Ex. 20 - Replacement for Dkt. 179-20, # 21 Ex. 21 - Replacement for Dkt. 180-2, # 22 Ex. 22 - Replacement for Dkt. 180-3, # 23 Ex. 23 - Replacement for Dkt. 184-9, # 24 Ex. 24 - Replacement for Dkt. 180-7, # 25 Ex. 25 - Replacement for Dkt. 180-9, # 26 Ex. 26 - Replacement for Dkt. 180-12, # 27 Ex. 27 - Replacement for Dkt. 180-17, # 28 Ex. 28 - Replacement for Dkt. 180-18, # 29 Ex. 29 - Replacement for Dkt. 180-19, # 30 Ex. 30 - Replacement for Dkt. 180-20, # 31 Ex. 31 - Replacement for Dkt. 180-21, # 32 Ex. 32 - Replacement for Dkt. 180-22, # 33 Ex. 33 - Replacement for Dkt. 180-23, # 34 Ex. 34 - Replacement for Dkt. 178-5)(Chorba, Christopher) (Filed on 6/15/2016)
EXHIBIT 2
1
2
3
4
5
6
7
Michael W. Sobol (State Bar No. 194857)
msobol@lchb.com
David T. Rudolph (State Bar No. 233457)
drudolph@lchb.com
Melissa Gardner (State Bar No. 289096)
mgardner@lchb.com
LIEFF CABRASER HEIMANN & BERNSTEIN, LLP
275 Battery Street, 29th Floor
San Francisco, CA 94111-3339
Telephone: 415.956.1000
Facsimile: 415.956.1008
12
Hank Bates (State Bar No. 167688)
hbates@cbplaw.com
Allen Carney
acarney@cbplaw.com
David Slade
dslade@cbplaw.com
CARNEY BATES & PULLIAM, PLLC
11311 Arcade Drive
Little Rock, AR 72212
Telephone: 501.312.8500
Facsimile: 501.312.8505
13
Attorneys for Plaintiffs and the Proposed Class
8
9
10
11
14
UNITED STATES DISTRICT COURT
15
NORTHERN DISTRICT OF CALIFORNIA
16
17
18
MATTHEW CAMPBELL and MICHAEL
HURLEY, on behalf of themselves and all
others similarly situated,
19
Plaintiffs,
20
v.
21
FACEBOOK, INC.,
22
Defendant.
Case No. C 13-05996 PJH (MEJ)
REPORT OF DR. JENNIFER GOLBECK
IN SUPPORT OF PLAINTIFFS’ MOTION
FOR CLASS CERTIFICATION
HEARING
Date: March 16, 2016
Time: 9:00 a.m.
Place: Courtroom 3, 3rd Floor
The Honorable Phyllis J. Hamilton
23
24
25
26
27
28
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
TABLE OF CONTENTS
2
Page
3
4
5
6
I.
II.
III.
7
8
9
10
IV.
11
12
V.
13
14
VI.
15
16
17
18
VII.
VIII.
IX.
QUALIFICATIONS ............................................................................................... 1
METHODOLOGY AND SUMMARY OF CONCLUSIONS ............................... 3
FACEBOOK’S INTERCEPTION OF PRIVATE MESSAGE CONTENT........... 5
A.
Facebook’s Private Message Architecture Functionality............................ 5
B.
Facebook’s Interception and Logging of Private Message Content ........... 9
C.
Facebook’s Use Of Code-Based Devices To Intercept Private
Message Content ....................................................................................... 14
FACEBOOK’S USES OF INTERCEPTED PRIVATE MESSAGE DATA ....... 15
A.
Facebook Used Private Message Content To Push Content To
Users Via Its Recommendation Algorithms And Other Features ............. 15
B.
Incrementing Like Counter ....................................................................... 23
FACEBOOK’S CONDUCT CONTINUES TO THE PRESENT ........................ 26
A.
Facebook Has Not Ceased Its Practice Of Intercepting, Analyzing,
and Using URLs in Private Message Content ........................................... 26
CLASS MEMBERS ARE ASCERTAINABLE ................................................... 27
A.
Class Members Can Be Identified Through EntShare Objects. ................ 27
THE CODE FOR ANALYZING PRIVATE MESSAGES OPERATED
THE SAME FOR ALL USERS ............................................................................ 29
“ORDINARY COURSE OF BUSINESS” .......................................................... 29
“IN TRANSMISSION” ........................................................................................ 32
19
20
21
22
23
24
25
26
27
28
-i-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
2
I.
QUALIFICATIONS
1.
As indicated in my curriculum vitae, attached hereto as Exhibit A, I have been a
3
professor in the College of Information Studies (“The iSchool”) at the University of Maryland
4
since 2007 (assistant professor from 2007-2013, associate professor with tenure to present),
5
where I have focused my research and teaching efforts on aspects of social media and the web.
6
2.
I have been doing freelance professional web design and programming since 1993.
7
I worked as a web designer for the University of Chicago from 1995-2000. I operated my own
8
web design company, Gargoyle Web Design, from 1999-2001, which I closed when I began my
9
Ph.D. work.
10
3.
I have taught university level classes on the web and social media, including:
11
“Analyzing Social Networks and Social Media,” “Social Networks: Technology and Society,”
12
“Development of Internet Applications,” “Fundamentals of Human-Computer Interaction,”
13
“Information Users in Social Context,” and “Small Worlds, Social Networks, and Algorithms.” In
14
addition, I have published and presented many articles in refereed journals and conferences, and
15
over 100 of these relate to social media and the web.
16
4.
I received two Bachelor’s degrees, in Computer Science and Economics, from the
17
University of Chicago in 1999, a Master’s degree in Computer Science from the University of
18
Chicago in 2001, and a Ph.D. in Computer Science from the University of Maryland in 2005. My
19
Ph.D. thesis focused on social media and was titled “Computing and Applying Trust in Web-
20
based Social Networks.”
21
5.
I have been teaching at universities on issues related to computer science, the web,
22
and social media since 1999 when I was a Lecturer in the Computer Science Department at the
23
University of Chicago. Over the past fourteen years, in a variety of different capacities, I have
24
taught classes at University of Chicago, George Mason University, Johns Hopkins University,
25
Georgetown University, George Washington University, American University, and University of
26
Maryland.
27
28
6.
Through my research and studies, I have won a variety of awards including the
2015 University of Maryland Research Communicator Impact Award, 2015 University of
-1-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
Maryland System Mentoring Award, Best Paper Award at the 2011 IEEE Social Computing
2
Conference, Best Paper Award at the 2009 International Semantic Web Conference, Research
3
Fellow for the Web Science Research Initiative (2008 – present), IEEE Intelligent Systems Ten to
4
Watch in May 2006, and the 2005 DARPA IPTO Young Investigator Award.
5
7.
I also presented a TED talk titled “The curly fry conundrum: Why social media
6
‘likes’ say more than you might think.”1 It received 1.7 million views and was named one of
7
TED’s “Most Powerful Talks of 2014.”2 TED (Technology, Engineering, Design) is a non-profit
8
organization that presents “Ideas Worth Spreading.” Videos of their invited presentations have
9
over half a billion total views.
10
8.
I have authored over 100 scientific papers related to the web. Most recently, I have
11
authored two books on social media, entitled “Social Media Investigation” and “Analyzing the
12
Social Web.” Both books focus on various aspects of web and social media interaction, such as
13
using location-based services on mobile devices as well as interaction with friends for business
14
purposes. I have also authored other books including “Trust on the World Wide Web: A Survey”
15
and “Art Theory for Web Design.”
16
9.
I have given expert testimony in the following proceedings:
•
Rembrandt Social Media LP v. Facebook Inc. et al, No. 13-cv-00158
U.S. District Court for the Eastern District of Virginia
2013-2014 (plaintiff)
•
Peter Daou and James Boyce vs. Ariana Huffington, Kenneth Lerer and
Thehuffingtonpost.com, No. 651997/2010
Supreme Court of The State Of New York, County of New York 20132014 (plaintiff)
•
17
Blue Calypso Inc. v. Groupon Inc., No. 12-cv-00486,
U.S. District Court for the Eastern District of Texas
2014-2015 (plaintiff)
18
19
20
21
22
23
24
25
26
27
28
1
Available at
https://www.ted.com/talks/jennifer_golbeck_the_curly_fry_conundrum_why_social_media_likes
_say_more_than_you_might_think?language=en.
2
See http://yearinideas.ted.com/2014/.
-2-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
10.
A copy of my full curriculum vitae is attached as Exhibit A to this report. I am
2
being compensated at the rate of $400 per hour for my services in this matter, and payment is not
3
contingent on the outcome of this proceeding.
4
II.
5
METHODOLOGY AND SUMMARY OF CONCLUSIONS
11.
I am submitting this report on behalf of the Plaintiffs. I have been retained as a
6
technical expert to study and provide my opinions regarding the topics discussed in paragraph 16
7
below. My opinions, as well as the evidence I rely upon to support them, are set forth in detail in
8
this report. The contents of the various exhibits that I identify by name are meant to be
9
incorporated, in their entirety, by such reference.
10
12.
In preparing this report, I have employed methods and analyses of a type
11
reasonably relied upon by experts in my field in forming opinions or inferences on the subject.
12
The opinions expressed are based upon a reasonable degree of computer science certainty.
13
13.
Between now and such time that I may be asked to testify before the Court, I
14
expect to continue my review, evaluation, and analysis of information generated during
15
discovery, as well as of relevant evidence presented before and/or at trial. I also expect to review
16
the reports submitted by Facebook’s experts. I reserve the right to amend or supplement this
17
report, as necessary and as acceptable to the Court. I also reserve the right to develop materials
18
and exhibits as appropriate for use in helping to demonstrate and explain my opinions in the event
19
that I am asked to testify at trial.
20
14.
In forming my opinions, I have reviewed source code which I understand was
21
provided by Facebook’s counsel and which was represented as containing the relevant source
22
code between some time in 2009 and December 2012.
23
15.
Additionally I have reviewed numerous internal Facebook documents produced in
24
this litigation, as well as certain public materials. The list of documents I have considered in
25
forming my opinions is attached to this report as Exhibit B.
26
27
28
16.
I have been asked by the Plaintiffs through their counsel to opine on the following
issues:
a.
The structure and function of Facebook’s messaging system;
-3-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
b.
2
Facebook’s interception of Private Message content, including:
i.
Whether and what devices Facebook employs to intercept message
4
ii.
Whether the interceptions occurred in transit;
5
iii.
Whether the interception of Private Message content was necessary
3
6
content;
for Facebook to deliver private messages;
7
c.
Facebook’s subsequent use of that Private Message content;
8
d.
Whether the class members can be readily determined based on Facebook’s
9
own records; and
10
11
12
13
14
15
16
e.
Whether the Facebook’s uniformly processed Private Messages during the
relevant period.
17.
Based on my review and analysis of Facebook’s source code as well as internal
Facebook documents and deposition testimony, I conclude the following:
a.
The structure and function of Facebook’s messaging system is described in
detail in Section III below;
b.
Facebook intercepted and redirected user’s Private Message content using
17
various code-based devices while the message was in transit, and this interception was not
18
necessary for Facebook to deliver private messages;
19
c.
Facebook used the intercepted Private Message content to provide
20
recommendations to Facebook users, and to provide analytics to third-party developers and
21
websites, as well as to increment the “Like” social plugin counter;
22
23
24
d.
The class members can be determined from Facebook’s own records using
various query methods and through self-identification; and
e.
Facebook’s source code operated consistently during the relevant period.
25
26
27
28
-4-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
III.
2
FACEBOOK’S INTERCEPTION OF PRIVATE MESSAGE CONTENT
A.
3
Facebook’s Private Message Architecture Functionality
1.
18.
4
Overview of Facebook’s Private Message Architecture
An overview of Facebook’s Private Message architecture is useful. Say Alice is
5
sending a Private Message to Bob. In order to do so, Alice opens her Facebook message window
6
and begins to compose her message.
Figure 1
Message Window
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
19.
body of the message, Facebook detects that URL as she types. Once it sees a URL, it extracts the
URL from the message and sends it to the Facebook servers.3
22
23
She types her text and, if she types, pastes, or otherwise enters a URL into the
20.
Facebook describes this process in its Supplemental Responses and Objections to
Plaintiffs’ First Set of Interrogatories: “[I]f a user typed a URL into the text field of the Facebook
24
25
26
27
28
3
Facebook’s servers are the computers on which the Facebook system operates. They store code
and data, run the code, provide web content, and manage back-end functionality. Essentially,
every part of Facebook other than the code that runs in the user’s browser is running on Facebook
servers, and those servers provide every element of Facebook that a user interacts with.
-5-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
Messages product, and the user had JavaScript enabled in her browser, the JavaScript code
2
running in the user’s browser may have detected the existence of a URL.”4
3
21.
The vast majority of web users have JavaScript enabled. In 2010, Yahoo!
4
engineers issued a report stating that 1-2% of traffic came from users without Javascript enabled.5
5
Those numbers appear to have remained relatively stable over time. A 2013 analysis showed
6
about 1% of users were not accessing JavaScript-based content.6 Thus, 98-99% of users have
7
JavaScript active and this Facebook code would run in their browsers.
8
9
22.
The URL detection process is also described by Ray He, an engineer at Facebook.
In his September 25, 2015 deposition (He Depo.), Mr. He states:
10
A. When the user types in a URL, the client
side code will, this is the Java script, running on
the user’s browser, would detect that they entered a
URL and will attempt to create an attachment for
them to send.7
11
12
13
23.
Based on my analysis of Facebook’s source code (the “Code”), this process
14
appears in the
files, as follows:
15
a.
In
the ability to detect typing (key press and paste) event is
16
enabled in
This processes those keystrokes, in part with the function
17
‘URLScraper.check.’
18
b.
checks if it should do a URL check and performs
19
the check if so. If a URL is detected, then it lets other code know that this has occurred, and it
20
calls that code along with the matched URL.
21
c.
Then, in
the function
22
sees that a URL was detected, and performs the URL
23
scrape request call.8 This initiates the process of scraping the URL.
24
25
26
27
28
4
Id. at 12:26 – 13:2.
See
https://web.archive.org/web/20101016010319/http://developer.yahoo.com/blogs/ydn/posts/2010/
10/how-many-users-have-javascript-disabled/
6
See https://gds.blog.gov.uk/2013/10/21/how-many-people-are-missing-out-on-javascriptenhancement/
7
He Depo. at 187:7-11.
8
FB000027054; FB000027055.
5
-6-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
24.
After this Code detects that Alice has typed a URL in her Private Message, a
2
request is sent to Facebook’s servers to retrieve information related to the URL. One of the
3
purposes of retrieving this information is to create a URL “preview” within the Private Message.
4
Facebook describes the preview as “a brief description of the URL and, if available, a relevant
5
image from the website.”9
6
25.
The process of detecting the URL within a Private Message, executing Code to
7
find information about the URL, and then processing that information in Alice’s message window
8
employs what Facebook refers to as a “share scraper” or “scraper.”10
9
26.
As mentioned above, in
10
, the function
performs the URL scrape request call when a URL is
is the API11 call handler.
11
detected. This is a call to
12
In this file, the URL preview is rendered from a collection of information about the URL,
13
including URL scrape information, returned by a call to
14
15
. The result from the
back to the browser. The function
in the file
p file is sent, using AJAX,
in
is the handler for a successful response to the URL scrape request.12
16
17
27.
The preview then appears as part of the message that the Alice is composing
18
(“When the URL preview was generated, it was displayed for the message sender before sending
19
the message.”).13
20
21
22
23
24
25
26
27
28
9
Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at
13:4-5.
10
The “share scraper” is analogous to the “web crawler” referenced in Plaintiffs’ Consolidated
Amended Complaint (“CAC”).
11
API stands for “Application Program Interface.” It's a set of code one can use to interact with a
system (Facebook in this case).
12
FB000027055
13
Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at
13:19-20
-7-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
Figure 2
Message Window
2
3
4
5
6
7
8
9
10
11
12
13
28.
However, this preview in Alice’s message is not the only result of the data
14
structure created by Facebook’s Code. The preview returned is actually part of an attachment to
15
the message, so while a preview is rendered visually in Alice’s message window, this attachment
16
is “separate and distinct from the message itself.”14
17
29.
As described in further detail below, Facebook has pulled data related to this URL
18
from a “global share object,” which is a data structure that Facebook uses to track its users
19
interactions with URLs across the Web. If no global share object existed prior to Alice’s typing
20
the URL into her Private Message, Facebook’s share scraper will create a new global share
21
object.
22
30.
When Alice finishes the message and hits send, both the text of her message and
23
the URL attachment are sent to Facebook’s servers. In a series of steps, detailed further below,
24
Facebook processes the message and attachment, ultimately delivering the message to Bob. For
25
that high level message sending to happen, there are many sub-processes that have to take place.
26
27
28
14
Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at
14:5.
-8-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
Michael Adkins, a Facebook engineer, provides a broad overview of this transmission process in
2
his October 28, 2015 deposition (Adkins Depo.):
3
Messages are sent from clients to our edge of our network where
they are directed to a specific Web server based on availability.
That Web server is the one that runs the php code we are currently
looking at. It accepts the message from the client, performs its
necessary processing on the message while it is resident in memory,
and then determines the next internal destination to send the
message. The next internal destination to send the message would
typically be what we refer to as the message’s back end or
application server where all the user mailboxes are stored. As you
can imagine, that is a fairly large complex of machines. So it is one
of the functions of the Web server and a connection manager that it
uses to determine which specific set of application server machines
to send the message to, specifically the ones that are currently
caching the sender and recipient’s mailboxes. It sends it on to one
of those machines, which then likewise accepts it, stores it
temporarily in memory, performs its necessary data processing, and
then ultimately deposits it to storage, which is a system called
Hbase which is an open source database system. At that point in
time the message is delivered or considered delivered.15
4
5
6
7
8
9
10
11
12
13
31.
The focus of this report, which is the interception and acquisition of the URL
14
attachments in Private Messages, occurs early in the above-described transmission, before the
15
message arrives in Hbase and is considered delivered.
16
B.
17
Facebook’s Interception and Logging of Private Message Content
1.
18
32.
Creation of Share Objects
Facebook has large and complex data behind its site. They store this in a data
19
model called TAO (The Associations and Objects).16 As the name suggests, there are two pieces
20
in this model: objects and associations.
21
33.
Objects represent things on Facebook – users, pages, checkins, comments,
22
locations, etc. Associations represent relationships between objects. Those could be friendships
23
between users, a like that connects a user to a page, or a location that is tied to a user check-in.
24
25
26
27
28
34.
There are a number of objects that Facebook creates in the process of scanning
Private Messages that include URLs. Two of these are user URL share objects and global URL
15
Adkins Depo. at 67:23-69:1. Similarly, Ray He stated in his deposition that “[t]here are many
systems that the user-specific message information would have to go through” before “end[ing]
up in the persistent storage.” He Depo. at 204:21-24
16
See https://www.facebook.com/notes/facebook-engineering/tao-the-power-of-thegraph/10151525983993920
-9-
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
share objects. The user URL share object contains details about the specific user’s interaction
2
with the given URL, while the global URL share object contains information related to all
3
interactions between Facebook users and the given URL.
4
35.
As described in the previous section, when Facebook is generating the preview for
5
a URL in a user’s message window, it sends a request to Facebook servers to see if there is
6
already information that Facebook has logged about the URL (the global URL share object). It is
7
information from this global share object that is used to generate the preview and the
8
accompanying message attachment. If no global URL share object exists, Facebook’s scraper
9
goes to the web page associated with the URL and collects data to create a new global URL share.
10
(“[I]f information to generate the URL preview was not available already on a Facebook server, a
11
Facebook server may have sent a request to the website, generated an image and description if
12
available, and delivered those components to the user’s browser to generate a URL preview.”).17
13
14
36.
if a global URL share object does not already exist:
15
16
Based on my analysis of Facebook’s Code, this is the process for the URL scrape,
a.
scrape data.
calls function
17
18
Makes the top-level call to get the URL
to get either cached URL scrape data, scrape data from the
global URL share, or perform a new URL scrape.
19
b.
: Makes call to get the URL scrape data. Function
20
21
to get
either cached URL scrape data or perform a new URL scrape.
22
c.
: Makes call to get the URL scrape data.
23
24
to check for cached URL scrape or
scrape data from global URL share.
25
d.
26
27
28
17
Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at
13:8-11
- 10 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
e.
2
3
to perform a URL scrape if no suitable URL scrape data
found in the cache or the global URL share.
4
f.
: Performs a URL scrape.
1)
5
6
, which performs the URL scrape
using a
7
8
and a
37.
.18
This scraping process creates a new global URL share object, known in this case
as an EntGlobalShare object.19
9
38.
The EntGlobalShare also contains a number of tracking information fields,
10
including “share_count,” “post_count,” “like_count,” “comment_count,” and “click_count.”
11
These counts each represent the number of times Facebook users have engaged in a specific
12
action related to the URL at issue.20
13
39.
When the user sends a Private Message containing a URL, whether it is new to
14
Facebook or not, the share_count field of the EntGlobalShare is incremented. In other words, the
15
count that indicates how many times the URL has been shared goes up by 1. The process for this
16
is as follows.
17
40.
After the user hits “send” but before the message is delivered, the Facebook Code
18
processes information about the sent message. Specific to this litigation, the Code searches for
19
message attachments created from Private Message URLs and creates user-specific share objects.
20
These user URL share objects are recorded in an EntShare object. According to Facebook’s
21
internal documentation, “An EntShare represents a user or page post from a composer that also
22
attaches another object such as an external URL or another post on Facebook.”21 In the case of
23
24
25
26
27
28
18
FB000014199.
In some cases, this includes a pointer to the user who initiated the private message as the
“creator” of the global URL share, known in this case as an EntGlobalShare object. See
Facebook’s Second Supplemental Responses and Objections to Plaintiffs’ Narrowed Second Set
of Interrogatories at14:5-6: “The EntGlobalShare includes a field for ‘creator,’ which sometimes
includes a reference to the Facebook user whose action resulted in the creation of the Global
Share Object.”
20
FB000014204.
21
FB000011543.
19
- 11 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
Private Messages, the EntShare represents a URL detected by Facebook software monitoring the
2
keystrokes typed by the user while composing a private message.22
3
41.
The creation of the user URL share object (and related EntShare) occurs early in
4
the message transmission process. As discussed in greater detail in Section III.B, infra, the Code
5
in
is executed. This calls the function
6
7
which creates a user URL share object, links it to the global
URL share, and increments the global URL share “tracking_info” share count.
8
9
42.
Based on my analysis of Facebook’s Code and documents, in my opinion, and as
discussed further below, the creation of the user URL share object and related EntShare, and
10
increase in the share_count in the EntGlobalShare’s tracking_info field constitute the
11
interception, analysis, and use of the contents of user’s Private Message.
12
2.
13
43.
Logging of Private Message Content
Once Facebook intercepts the URL contents of users’ Private Messages, in the
14
form of user URL share objects and EntShares, it logs that content in numerous ways, including
15
in various tables.
16
a.
17
44.
Share stats
Facebook’s Code, as well as Facebook’s internal documents, indicate that when a
18
user has shared a URL in a Private Message, this share was logged and stored in a table called
19
share_stats.
20
45.
The share_stats table records the user ID, an action that user has taken (like a share
21
or like), the time of that action, and pointers to data structures that have more information about
22
the URL, in this case sent through a Private Message. With this data, Facebook can expose URL
23
shares from private messages in a variety of ways. The URLs people share privately may appear
24
to other users, may be searchable, and may be used to make recommendations for others.
25
Facebook has used private message data in this way in the past.
26
27
28
46.
For example, on December 3, 2010, a Facebook engineer named Xin Liu noted
that functionality within Facebook’s platform was publicly displaying Private Message content.23
22
An example of the data represented in an EntShare object is FB000005528.
- 12 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
The particular Facebook functionality at issue in this document is “Taste,” which Facebook
2
documents describe as “recommendation systems for discovery.”24 Ray He further explains that
3
“Taste is a back end for providing recommendations” and that “[a] recommendation is a link,
4
typically, a link that we think a user would find relevant.”25
5
47.
Concerning the public display of Private Message information via Taste, Xin Liu
6
discussed “post-processing step[s]…for the social activities returned from the Taste backend. As
7
we don’t have the is_posted attribute logged in share_stats, the taste recommendation results may
8
contain non-posted shares (from messaging etc), we should exclude those private shares.” This
9
is_posted attribute indicates if a message was posted to a public area (e.g. timeline) or not (e.g. in
10
a message). Because the attribute was not included in the share_stats table, Private Messages
11
content was used by Taste. This is further corroborated by a test Liu ran, consisting of “send[ing]
12
a message with a shared URL to another testing user…without [adding the is_posted attribute] the
13
share was shown in the recommendations results.”26 This could only be the case if Private
14
Messages were indeed logged in the share_stats table.
15
48.
Indeed, Xin Liu confirms that Private Message shares are logged to share_stats in
16
a later communication, dated February 10, 2011 and titled “Recommendations fallback of the
17
activity plugin may leak private shares,” in which Liu states “In share stats we logging [sic] all
18
shares (including posts and non posts), so Taste picks up both.”27
19
49.
In the Facebook Code base, the
contains a message that also
20
supports this. It begins with this comment: “Is_posted field in share_stats is available since
21
2010-12-07. It means that the share is a separate post, not a private share through message.”28
22
23
50.
Again, the presence of the is_posted field to differentiate Private Message shares
from other shares indicates that Private Message shares must be present in the table.
24
25
26
27
28
23
FB000002651.
FB000003118.
25
He Depo. at 227:3-4, 11-12.
26
FB000002651.
27
FB000002843.
28
FB000014183.
24
- 13 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
51.
While the addition of the is_posted attribute is now used to separate out private
2
message shares, Facebook could still use information from the Private Messages in the future
3
since they continue to collect all of this data in share_stats.
4
b.
5
52.
Nectar
Nectar is a platform Facebook uses for logging data. In Facebook document
6
FB000008505, Facebook employees describe the “the structure/tracking of likes”. In this, they
7
indicate that “Relevant actions that create relationships / show clickable links” include posting
8
messages on Facebook’s “Inbox (sending a link to a friend via inbox).” The Inbox is part of the
9
private message interface.
10
11
53.
In the same document describing this data collection, they list “Places we log the
data”, which includes “nectar_platform ; nectar_content_action ; [link stats].”
12
54.
When a URL is scraped or a pre-scraped URL is accessed, Facebook logs the
13
event in Nectar. This is handled by
14
‘
15
, and the details include the user ID and the URL.
C.
Facebook’s Use Of Code-Based Devices To Intercept Private Message
Content
55.
As discussed above, Facebook employs various code-based devices to intercept
16
17
. The logger class is
18
Private Message content. Set forth below are the discrete components of Facebook’s Code that
19
execute the interceptions, each of which operate as separate devices, i.e., they each perform
20
separate and unique functions, and their deletion from the Code would still leave intact the
21
functioning of the other devices used to process and deliver the messages:
22
23
24
• Processes the attachment to create share objects:
o After a user sends a message, the Code processes the URL attachment and
creates and EntShare object. As described in paragraph 41,
25
is executed when the message is sent.
26
This calls the function
27
user URL share object, links it to the global URL share, and increments the
28
global URL share “tracking_info”share count.
, which creates a
- 14 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
59.
In this code,
comes from the
information stored in
2
the global URL share object. It is the sum of the share count (which includes private message
3
shares) and post count.
4
the code says: “calculate the boosting factor based on how many friends of the user contributed to
5
the node.”29 This “node” refers to the global URL share.
6
60.
is an extensive calculation. A comment in
That score is then used to make recommendations. It is used in the
7
Recommendations widget and recommendations bar, which showed recommendations on
8
external pages, and in an API call in
9
message content was used to affect these external recommendations made to other users.
10
2.
11
12
61.
30
This use proves that private
Taste
Taste is Facebook’s recommendation system that replaced
ExternalNodeRecommender. My review of the Facebook Code shows that the file
13
replaced
as Facebook
14
shifted to using the Taste system for recommendations. This, along with other evidence, strongly
15
suggests that Facebook continued to use Private Message content to make recommendations as
16
they shifted to Taste.
17
62.
As discussed above, Taste is a recommendation system that Facebook used to push
18
content to its users. Among its functionalities, it recommends links to people that Facebook
19
believes they might be interested in.
20
21
63.
In deposition, Ray He explained that Taste was using counts that included share
objects created from private messages:
22
A. The internal share stat, in February 2011,
was incrementing for both posts and nonposts, I
believe.
Q. So let me ask you about the external now.
A. The external share stat counted – which
external field?
Q. Which external field is share stat
reflected in?
A. There’s share count or total count.
Q. Okay. Both.
23
24
25
26
27
28
29
30
FB000027029.
FB000027051.
- 16 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
A. I believe share count included just posts,
and total count included both.
Q. And with respect to the internal share
stat, was taste picking up both posts and nonposts?
A. The internal share stat taste would have
been picking up both.31
2
3
4
5
6
7
8
9
10
11
64.
Mr. He provided further testimony confirming that Private Message URL sends
were used in Taste’s recommendations algorithm. When discussing how Taste and
recommendations works, Ray He was asked whether he was “involved in drafting source code for
purposes of identifying recommendations,” to which he replied “[w]ell we’ve previously
established that I wrote the code to add a counter [for tracking Private Message sends], and I
believe that code was indirectly used for recommendations…The counts were taken into account
to assess the relative engagement or popularity of a given URL. More popular URLs are more
likely to be recommended.”32
12
3.
13
14
65.
17
The Insights dashboard provides demographic information about people who have
interacted with an external website. This includes interactions that took place in private messages.
15
16
Insights/Developer API
66.
In FB000007286, Facebook describes SharePro, a tool that allows people to see
how often Facebook users have shared content on Facebook. Under “Phase 4” in that document,
Facebook describes the information included in the Analytics API:
18
19
20
21
22
23
24
25
26
27
28
31
32
He Depo. at 234:14-25.
He Depo. at 229:19-230:6.
- 17 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
Figure 3
(Facebook Document FB000007286)
2
3
4
5
6
7
8
9
10
11
12
67.
13
The “interaction data” described here includes information on when and how
14
people shared the content (i.e. URL) and information about the people. The first bullet point
15
shows that content “sent in message” is included in this data. It also shows that API users can
16
access that information, which includes data about private messages, broken down by age and
17
gender.
18
19
20
21
22
23
68.
Facebook document FB000006178, which has the subject “SharePro brief spec,”
supports Facebook’s intention to show these demographics in the Insights dashboard. It states: “If
we can uniquely map a user ID as an owner of a URL/share ID (via some kind of authentication),
then building an Insights dashboard with demographics will be straightforward (not more than a
few days of work). Also super psyched for this.”
69.
Section 4.2 of Facebook document FB000010688 describes “Domain Insights”:
24
25
26
27
28
- 18 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
Figure 4
(Facebook Document FB000010688)
2
3
4
5
6
7
8
The document goes on to explain that the Domain Insights include “Demographic Insights:
9
Aggregated demographics on referral traffic from Facebook to your site.”
10
70.
As described above, Kelly Winters stated how data tracking for social plugins was
11
recorded. This included “Relevant actions that create relationships / show clickable links,” which
12
in turn included “Inbox (sending message link to a friend via inbox).” She goes on to list where
13
this data is logged, including “nectar_platform…nectar_content_action…[link stats].” She also
14
lists where it is publicly shared: “In the product…in the like button…in the sharepro
15
button…Insights (UI)…search typeahead” and“Via API…Insights API (not real-time, shows
16
same as Insights UI)…Link stats (real-time)…Graph API.” Id.
17
71.
This indicates that “sending message” actions like including URLs in Private
18
Messages are recorded in Nectar and are shared in, among other locations, Insights. These private
19
messages generate referral traffic, as described in FB000010688, and thus it is reasonable to
20
conclude that demographics of users sharing private messages are displayed Insights.
21
72.
Facebook document FB000008722 also supports this. It describes “Insights for
22
Websites” and states that it provides descriptions of analytics for (1) Like button, (2) Comment
23
box, (3) Demographics, (4) Organic Sharing. Organic sharing may include sharing in private
24
messages.
25
73.
In the “Demographics” section of FB000008722, Facebook explains that they
26
provide demographic information: “To help you tailor your content and products to your users,
27
we now provide demographic information for the interactions that occur on your sire and on
28
Facebook. We display demographics for gender, age range, country, and language.”
- 19 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
74.
Experiments by journalist Ashkan Soltani also suggest that Facebook was
2
displaying demographic information about Private Message shares in the Insights Dashboard.
3
FB000000298 summarizes his description of Facebook’s Private Message scanning as follows:
4
“That said, user demographics of those who share via Facebook messages are included in the stats
5
seen by page owners, according to Soltani. Here’s a screenshot of what that looks like:”
Figure 5
(Facebook Document FB000000298)
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
4.
23
24
25
75.
Activity Feed
Taste was also utilized by Facebook to show URLs shared in Private Messages to
other users. The Facebook Activity Plugin allowed third parties to show recent activity in
Facebook that related to their site: 33
26
27
28
33
https://web.archive.org/web/20101205130048/http://developers.facebook.com/
docs/reference/plugins/activity.
- 20 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
The Activity Feed plugin displays the most interesting recent
activity taking place on your site. Since the content is hosted by
Facebook, the plugin can display personalized content whether or
not the user has logged into your site. The activity feed displays
stories both when users like content on your site and when users
share content from your site back to Facebook. If a user is logged
into Facebook, the plugin will be personalized to highlight content
from their friends. If the user is logged out, the activity feed will
show recommendations from your site, and give the user the option
to log in to Facebook.
2
3
4
5
6
The plugin is filled with activity from the user’s friends. If there
isn’t enough friend activity to fill the plugin, it is backfilled with
recommendations. If you set the recommendations param to true,
the plugin is split in half, showing friends activity in the top half,
and recommendations in the bottom half. If there is not enough
friends activity to fill half of the plugin, it will include more
recommendations.
7
8
9
10
76.
11
In early 2011, users discovered that links they shared in private messages were
12
appearing in the Activity Plugin results, even if those pages weren’t otherwise accessible on the
13
web. Nick Bilogorskiy of Facebook wrote “A user reports that sending a message to a friend with
14
a secret URL exposes this URL if you search for that domain in this page:
15
http://developers.facebook.com/docs/reference/plugins/activity
16
You could use this to browser a ‘private’ photo sharing site, or see unpublished pages for stealth
17
startups if you wanted to monitor (if said startups were using FB to mail each other).”34
77.
18
In response, Facebook employee Xin Liu stated “…in share stats we logging [sic]
19
all shares (including posts and non posts), so Taste picks up both, we did add that signals to the
20
scribe logs, but haven’t picked up that yet. The old fix prevented from showing ‘show shared that
21
URL’, so the whole fix should be if this is a private share, we should not even show the URL! I
22
can work on a part fix to not show the URL if someone of your friend shared this secretly. A real
23
fix should be we don’t even index the URL if it’s a private share. We’ll do that in another round
24
of index build.”35
25
26
27
28
34
35
FB000002843.
Id.
- 21 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
78.
This exchange demonstrates that shared URLs within Private Messages were not
2
treated differently than public shares, and as a result, evidence of that private activity was visible
3
to others.
4
5
5.
79.
API Queries
Private Message data through URL share counts was also available through the
6
Facebook API. Facebook document FB000008643 explains that anyone could pull those counts
7
through the API:
8
“This data is OPEN – anyone can access it…It can be done like
this: Ask for the data on any URL like so:
https://api.facebook.com/method/fql.query?query=select%20%20li
ke_count,%20total_count,%20click_count%20from%20link_stat%
20where%20url=%22http://techcrunch.com/2011/06/07/investorsfred-wilson-chris-dixon-and-david-lee-on-software-patents-get-ridof-them-video/%22
9
10
11
12
“This will return XML like this:
12 28
16 0
“
13
14
15
80.
Facebook document FB000008499 describes the data that can be seen from Graph
16
API, link_stat, and Insights, respectively:
17
Figure 6
(Facebook Document FB000008499)
18
19
20
21
22
23
24
25
81.
For the Graph API and link_stat, the numbers in “share_count” include the shares
from private messages. That means these counts are used in “total_count” as well. The document
goes on to say “Insights…takes the metrics above and breaks them down more granularly.”
26
27
28
- 22 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
nor is the discussion over whether or not a “like” should indicate positive association or just
2
sharing.”
3
87.
Facebook then set out to determine what percentage of “likes” were a result of
4
private message shares. Alex Himel reported on October 16, 2012 1:56 PM that his experiments
5
showed 0.5%-4% of likes came from private message shares.39 Code for these experiments is
6
included in Himel’s declaration as Exhibit E.40
7
88.
Because the magnitude of shares from private messages would not significantly
8
affect the like count (a concern expressed in FB000002190 when initial experiments incorrectly
9
showed very high percentages), Facebook resolved to remove the private message shares from the
10
external like count. This is expressed in Exhibit F of Alex Himel’s declaration (FB000001606) in
11
the summary field, as well as in the email exchange in Facebook document FB000002196, which
12
also makes no mention of the Code changes impacting the way in which messages are sent or
13
received.
14
89.
Indeed, the described change to the Code simply moved public posts, like ones a
15
user would make on his or her wall or timeline, into a post_count variable and tracked private
16
message shares in the share_count variable. The post_count variable is what was then displayed
17
as the public like count.
18
90.
Changes in what number is shown as a “like” count do not impact the way that
19
Facebook handles private messages in any way. The Code change that eliminated private
20
message shares from the total share count, mentioned above, was essentially a change in one line
21
of Code. That line of Code was not part of the messaging system but rather a line that determined
22
which numbers to display publicly.
23
91.
This is further highlighted in Facebook document FB000006429. That document,
24
which discusses adjusting the number displayed as the total “like” count, emphasizes that the
25
Code change required to adjust this number is minimal. Mike Vernal writes in that document that
26
27
28
39
40
FB000002196.
FB000001599.
- 25 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
removing shares from Like count is “0.1% a code change and 99.9% messaging / PMM / etc.
2
change.”
3
92.
Note that in the changes discussed above, Facebook never decided to stop counting
4
private message shares nor did they suggest they would change the process of scanning the
5
messages. They simply separated the count of wall posts and private message posts into two
6
variables, and excluded the private message share count from the value shown on the external
7
share button.
8
9
93.
This is supported in an email from Alex Himel to CEO Mark Zuckerberg, which
read: “Heads up: planning on dropping private message sends from contributing to the like button
10
count for URLs, effective tomorrow afternoon….Context is we added/re-added a handful of
11
separate metrics around activity with urls a few weeks ago to boost the count displayed on the
12
like button. This particular one got the attention of the press because it was…viewed as
13
creepy.”41
14
V.
15
FACEBOOK’S CONDUCT CONTINUES TO THE PRESENT
A.
Facebook Has Not Ceased Its Practice Of Intercepting, Analyzing, and Using
URLs in Private Message Content
94.
In addressing the issue of removing private message shares from the like count,
16
17
Facebook adjusted their Code. This removed the share_count variable from being included in the
18
external message_count. This appears redacted in FB000001606. However, there is no evidence
19
that Facebook ever stopped incrementing the share_count with private message shares.
20
95.
Instead, evidence from the Code shows that Facebook continued to analyze and
21
record information from Private Message shares at least through December 31, 2012 (the last date
22
for which we had access to source Code). I analyzed the files
23
24
, which are all part of the core process of
25
recording Private Message shares. There were no substantial changes to these files, and they
26
continued to record the private message shares up until the latest date in the Code.
27
28
41
FB000000425.
- 26 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
100.
The creator of these private EntShares can also be determined. Each user’s unique
2
Facebook ID number is present in the EntShare, as indicated in the “OwnerID” and “CreatorID”
3
field as shown below in FB000008499:
Figure 7
(Facebook Document FB000008499)
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
101.
This ID,
to https://www.facebook.com/
https://www.facebook.com/
102.
, belongs to Michael Hurley, which can be verified by going
. That resolves to
and Michael Hurley’s homepage.
I understand that the Plaintiffs in this case seek to certify a class of “All natural-
person Facebook users located within the United States who have sent, or received from a
Facebook user, private messages that included URLs in their content (and from which Facebook
generated a URL attachment), from within two years of the filing of this action up through the
date of class certification.”
103.
To retrieve a list of class members, the Code process should be relatively
straightforward. A database query could be used to select the Facebook user IDs of everyone
whose actions had created an EntShare from a private message.
104.
The exact code will vary based on the type of database, but example query code
could roughly take this form:
24
25
26
27
Where “name” is the Facebook user ID of the class member, and the field names and values
28
correspond to the above examples from the Code.
- 28 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
is, the ability to provide the underlying service or good.” Id. (citing In re Google Inc. Gmail
2
Litig., 2013 U.S. Dist. LEXIS 172784 (N.D. Cal. Sept. 26, 2013).
3
109.
Having reviewed Facebook’s Code and the documents provided in discovery, I
4
conclude that the interception, analysis, and use of URL shares in Private Messages is not
5
necessary for the functionality of message sharing in Facebook.
6
110.
Facebook itself confirms this in its Interrogatory Responses, where it notes that on
7
some occasions a message with a URL preview attachment may be sent, but no corresponding
8
EntShare object is created: “During the relevant time period, if a URL was included in a draft
9
message typed into the message text field on the Facebook website, and a URL preview
10
attachment was successfully created and not deleted, and the messages information (including the
11
URL preview attachment) was successfully received by a Facebook server, a Share Object
12
reflecting information about the URL preview attachment may have been created . . .”45 Facebook
13
further states that “Share Objects . . . were sometimes created from share attachments that were
14
sometimes generated from URLs in messages.”46
15
111.
Facebook goes on to explain that the URL attachment might not be logged in a
16
variety of circumstances. This shows that the logging is not necessary for successful delivery of
17
the message: “If a URL attachment was successfully created (and not deleted by the user) prior to
18
the message being sent, then, after the message was sent and the message and components were
19
received and stored on a Facebook server, and if the message was not blocked in the course of
20
abuse- and security-related processing, the message event was logged in a number of ways, and
21
several records (‘share objects’) were created reflecting the fact that the message had a URL as an
22
attachment (a ‘URL share’).”47
23
112.
The Code also shows that these steps are unnecessary. When a message is sent
24
with an attachment, the user URL share and global URL share objects are not necessary to deliver
25
the content of the message with its URL to the recipient. The counts tracked in these objects are
26
27
28
45
Facebook's Second Supplemental Response and Objections to Interrogatory No. 8 at 12:3-7
(emphasis added).
46
Id. 16:24-28 (emphasis added).
47
Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories at
15:10-15.
- 30 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
1
is moving from one temporary place in memory to another until it is put in permanent storage and
2
delivered.53
3
118.
As described above, all the processing of the message, including creating objects
4
linking senders with URLs, logging, and count incrementing, happens before the message is
5
delivered. Thus, in my opinion, Facebook’s interception and redirection of user’s Private
6
Message content happens while the message is in transit and not while it is in storage.
7
8
Dated: November 13, 2015
9
10
__________________
11
Jennifer Golbeck
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
53
Ray He’s testimony also confirms this. See He Depo. at 206:4-6 (“The user-specific share
object is similarly routed through Facebook's infrastructure before going into persistent
storage.”).
- 33 -
REPORT OF DR. GOLBECK IN SUPPORT OF
PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION
C 13-05996 PJH (MEJ)
EXHIBIT A
Jennifer Golbeck
College of Information Studies (The iSchool)
University of Maryland
College Park, MD 20742, USA
E-mail: jgolbeck@umd.edu
Homepage: http://www.cs.umd.edu/∼golbeck/
1
1.A
Personal Information
University Appointments
8/2013–present
Associate Professor,
College of Information Studies (100%),
University of Maryland (College Park, Maryland)
8/2007–present
Assistant Professor,
College of Information Studies (100%),
University of Maryland (College Park, Maryland)
1.B
Education
8/2001–5/2005
University of Maryland (College Park, Maryland)
Doctor of Philosophy in Computer Science
9/1999–6/2001
University of Chicago (Chicago, Illinois)
ScientiæMagister in Computer Science
9/1995–6/1999
University of Chicago (Chicago, Illinois)
Scientiæ Baccalaureus in Computer Science
Artium Baccalaureus in Economics
1
1.C
Academic Employment Background
6/2005–8/2007
Faculty Research Associate
Institute for Advanced Computer Studies
Department of Computer Science
University of Maryland (College Park, Maryland)
8/2006–12/2006
Adjunct Professor
Computer Science Department
American University (Washington, DC)
6/2005–9/2006
Research Director
Joint Institute for Knowledge Discovery (JIKD)
University of Maryland (College Park, Maryland)
8/2001–5/2005
Research Assistant
Department of Computer Science
University of Maryland (College Park, Maryland)
8/2001–5/2005
Adjunct Lecturer
Computer Science Department
George Washington University (Washington, DC)
6/2001–5/2003
Adjunct Lecturer
Computer Science Department
Georgetown University (Washington, DC)
5/2002–8/2002
Adjunct Professor
Advanced Physics Lab
Johns Hopkins University (Laurel, Maryland)
8/2001–12/2001
Adjunct Lecturer
Computer Science Department
George Mason University (Fairfax, Virginia)
6/2000–9/2000
Visiting Graduate
Mathematics and Computer Science Division
Futures Laboratory
Argonne National Laboratory (Argonne, Illinois)
6/1999–6/2001
Lecturer
Computer Science Department
University of Chicago (Chicago, Illinois)
2
2
Research, Scholarly, and Creative Activities
• In all references, my name is in bold.
• Unless otherwise indicated, the first author is the lead author.
• Underlined names indicate students with whom I collaborated—this includes students for
whom I am/was the (co-)advisor and other students where the collaboration was limited to
specific projects.
• For work in which a student took the lead, it is customary for the student to be first author,
followed by faculty who have played an advisory or mentoring role, followed by other individuals who have contributed. In cases where a student is listed as the first author, a wavy
::::
underline indicates colleagues with whom I shared this advisory or mentoring role (to the
:::::::::
extent of my knowledge).
• References marked with α indicate that authors are listed in alphabetical order, or that all
co-authors contributed equally.
2.A
2.A.i
Books
Books Authored
B1. Jennifer Golbeck. January 2015. Introduction to Social Media Investigation: A Hands On
Approach. Syngress.
B2. Jennifer Golbeck. 2013. Analyzing the Social Web. Burlington, MA: Morgan Kaufmann.
B3. Jennifer Golbeck. 2008. Trust on the World Wide Web: A Survey. Hanover, MA: Now
Publishers Inc.
B4. Jennifer Golbeck. 2005. Art Theory for Web Design. Boston, MA: Addison–Wesley.
2.A.ii
Books Edited
B5. Jennifer Golbeck (ed). 2008. Computing with Social Trust, London, UK: Springer.
B6. K. Aberer, K.-S.Choi, N. Noy, D. Allemang, K.-I. Lee, L. Nixon, Jennifer Golbeck, P. Mika,
D. Maynard, R. Mizoguchi, G. Schreiber, P. Cudr´ -Mauroux(Eds.) The Semantic Web – 6th
e
International Semantic Web Conference, 2nd Asian Semantic Web Conference (proceedings),
Lecture Notes in Computer Science, Vol. 4825, November 2007.
2.A.iii
Chapters in Books
BC1. Jennifer Golbeck. 2015. “Who Needs an Untrustworthy Doctor? Maslow’s Hierarchy of
Needs” in The Walking Dead Psychology: Psych of the Living Dead, Travis Langley (ed.).
Sterling.
BC2. Ziegler, Cai-Nicolas, and Jennifer Golbeck. ”Models for Trust Inference in Social Networks.” Propagation Phenomena in Real World Networks. Springer International Publishing,
2015. 53-89.
3
BC3. Jennifer Golbeck, Ugur Kuter. 2008. “The Ripple Effect: Change in Trust and Its Impact
over a Social Network” in Computing with Social Trust. Jennifer Golbeck (ed.). Springer.
BC4. Jennifer Golbeck, Aaron Mannes, James Hendler, 2006. “Semantic Web Technologies for
Terrorist Network Analysis,” in Emergent Information Technologies and Enabling Policies
for Counter Terrorism. Robert Popp and John Yen (eds). Wiley-IEEE Press.
BC5. Jennifer Golbeck and Paul Mutton, 2005. “Spring-embedded Graph Visualizations of
Semantic Metadata and Ontologies,” in Visualizing the Semantic Web, 2nd Ed, Vladimir
Geroimenko, Chaomei Chen (eds.). Springer Verlag.
BC6. Jennifer Golbeck, 2004. “IRC with ChatZilla” in Paul Mutton, IRC Hacks, 2004. O’Reilly
Associates: Cambridge, MA.
BC7. Jennifer Golbeck, 2004. “IRC in Mac OS X” in Paul Mutton, IRC Hacks, 2004. O’Reilly
Associates: Cambridge, MA.
BC8. Jennifer Golbeck, 2004. “Getting Friendly with FOAFBot” in Paul Mutton, IRC Hacks,
2004. O’Reilly Associates: Cambridge, MA.
BC9. Jennifer Golbeck, 2004. “Interrogate Trust Networks with TrustBot” in Paul Mutton,
IRC Hacks, 2004. O’Reilly Associates: Cambridge, MA.
BC10. Jennifer Golbeck, 2004. “Check the Weather” in Paul Mutton, IRC Hacks, 2004. O’Reilly
Associates: Cambridge, MA.
BC11. Jennifer Golbeck, 2004. “Convert Currency” in Paul Mutton, IRC Hacks, 2004. O’Reilly
Associates: Cambridge, MA.
BC12. Jennifer Golbeck, 2004. “Don’t Get Lost in Translation” in Paul Mutton, IRC Hacks,
2004. O’Reilly Associates: Cambridge, MA.
BC13. Jennifer Golbeck, 2004. “IRC: Chatrooms for Hackers” in Rael Dornfest and James Duncan Davidson, OS X Panther Hacks, 2004. O’Reilly Associates: Cambridge, MA.
BC14. Jennifer Golbeck, Amy Alford, Ron Alford, James Hendler, 2004. “Organization and
Structure of Information using Semantic Web Technologies,” in Handbook of Human Factors in Web Design, Robert W. Proctor and Kim-Phuong L. Vu (eds.). Lawrence Erlbaum
Associates, NJ.
2.B
Articles in Refereed Journals1
J1. Jennifer Golbeck. Benford’s Law Applies to Online Social Networks. PLoS ONE. in press
3.534
J2. Irene Eleta and Jennifer Golbeck. Multilingual Use of Twitter: Social Networks at the
Language Frontier. Computers in Human Behavior. December 2014
2.489
J3. Jennifer Golbeck and Derek Hansen. A Method for Computing Political Preference Among
Twitter Followers. Social Networks. 36: 20 pages, 2014.
4.059
1
The right column indicates ISI Impact factors of the journal in the year of publication, or most recently available
impact factor otherwise. Missing values indicate that the impact factor is not available.
4
J4. Rebecca LaPlante, Judith :::::::: Jennifer Golbeck. Subject Matter Categorization of
Klavans,
::::::
Tags Applied to Digital Images from Art Museums Journal of the American Society for
Information Science and Technology. 23 pages, in press.
2.137
J5. Awalin Sopan, Manuel Freire, Meirav Taieb-Maimon, :::::::::::::::::: Jennifer GolCatherine Plaisant,
beck, and ::::::::::::::::: Exploring Data Distributions: Visual Design and Evaluation
Ben Shneiderman.
International Journal of Human-Computer Interaction, 29(2), 27 pages, 2013
0.943
J6. Jennifer Golbeck, Jes Koepfler, Beth Emmerling. An Experimental Study of Social Tagging Behavior and Image Content. Journal of the American Society for Information Science
and Technology, 62(9): 1750–1760, 2011.
2.137
J7. Jennifer Golbeck. The more people I meet, the more I like my dog: A study of petoriented social networks on the Web. First Monday, 16(2): 12 pages. 2011
J8. :::::: Watkins, I., Golbeck, J., & Huang, M. Understanding and changing older adults
Xie, B.,
perceptions and learning of social media. Educational Gerontology, (38)4: 282–296, 2011.
0.550
J9. Ugur Kuter and Jennifer Golbeck.α Using Probabilistic Confidence Models for Trust
Inference in Web-Based Social Networks. ACM Transactions on Internet Technology, 10,
2, Article 8 (June 2010), 23 pages, 2010.
2.080
J10. Jennifer Golbeck, Justin Grimes, Anthony Rogers Twitter Use by the US Congress.
Journal of the American Society for Information Science and Technology, 61(8): 1612–
162, 2010.
2.137
J11. P. T. Jaeger, J. Golbeck, A. Druin, K. R. Fleischmann. The First Workshop on the Future
of iSchool Doctoral Education: Issues, Challenges, and Aspirations. Journal of Education
for Library and Information Science, 51(3):201–208, 2010.
J12. Druin, A. Jaeger, P.T., Jennifer Golbeck., Fleischmann, K. R., Lin, J. Qu, Y., Wang,
P. & Xie, B.. The Maryland Modular Method: An Approach to Doctoral Education in
Information Studies. Journal of Education in Library and Information Science (JELIS),
50(4), 293-301, 2010.
J13. Jennifer Golbeck and Christian Halaschek-Wiener. Trust-Based Revision for Expressive
Web Syndication. Journal of Logic and Computation. 19, 5 (October 2009), 771-790.
0.821
J14. Jennifer Golbeck. Trust and Nuanced Profile Similarity in Online Social Networks. ACM
Transactions on the Web, 3, 4, Article 12, 33 pages, 2009.
2.810
J15. Jennifer Golbeck. 2008. Weaving a Web of Trust. Science 19 September 2008: 1640–
1641.
29.78
J16. James Hendler, Jennifer Golbeck. Metcalfe’s Law Applies to Web 2.0 and the Semantic
Web. Journal of Web Semantics. 6(1): 14–20, 2008.
3.410
J17. Jennifer Golbeck. The Dynamics of Web-based Social Networks: Membership, Relationships, and Change. First Monday, 12(11): 1-33, 2007.
J18. Jennifer Golbeck, James Hendler. A Semantic Web and Trust Approach to the Provenance Challenge. Concurrency and Computation: Practice and Experience, 20(5): 431–439,
2007.
5
0.535
J19. L. Moreau, B. Ludascher, I. Altintas, R. S. Barga, S. Bowers, S. Callahan, G. Chin Jr.,
B. Clifford, S. Cohen, S. Cohen-Boulakia, S. Davidson, E. Deelman, L. Digiampietri, I.
Foster, J. Freire, J. Frew, J. Futrelle, T. Gibson, Y. Gil, C. Goble, J. Golbeck, P. Groth,
D. A. Holland, S. Jiang, J. Kim, D. Koop, A. Krenek, T. McPhillips, G. Mehta, S. Miles,
D. Metzger, S. Munroe, J. Myers, B. Plale, N. Podhorszki, V. Ratnakar, E. Santos, C.
Scheidegger, K. Schuchardt, M. Seltzer, Y. L. Simmhan, C. Silva, P. Slaughter, E. Stephan,
R. Stevens, D. Turi, H. Vo, M. Wilde, J. Zhao, and Y. Zhao. The First Provenance
Challenge. Concurrency and Computation: Practice and Experience, 20(5): 409–418, 2007.
0.535
J20. Cai-Nicolas Ziegler, Jennifer Golbeck. Investigating Interactions of Trust and Interest
Similarity. Decision Support Systems, 43(2): 460–475, 2006.
1.190
J21. Richard J. Williams, Neo Martinez, Jennifer Golbeck. Ontologies for Ecoinformatics,
Journal of Web Semantics, 4(4): 237–242, 2006.
3.410
J22. Jennifer Golbeck, James Hendler. Inferring Trust Relationships in Web-Based Social
Networks, ACM Transactions on Internet Technology, 6(4): 497–529, 2006.
0.893
J23. Jennifer Golbeck, Bijan Parsia. Trust network-based filtering of aggregated claims. International Journal of Metadata, Semantics, and Ontologies, 1(1); 58–65, 2005.
J24. Jennifer Golbeck. Semantic Social Networks for Email Filtering: A Prototype and Analysis, AIS SIGSEMIS Bulletin, Vol. 2, Issue (3&4) 2005: 36–40, 2005.
J25. Frank W Hartel, Sherri de Coronado, Robert Dionne, Gilberto Fragoso, Jennifer Golbeck.
Modeling a Description Logic Vocabulary for Cancer Research. Journal of Biomedical
Informatics, 38(2): 114–129, 2005.
1.792
J26. P. Domingos, J. Golbeck, P. Mika, A. Nowak. Trends & Controversies: Social Networks
and Intelligent Systems. IEEE Intelligent Systems, 20(1): 80 – 93, 2005.
1.438
J27. Staab, Steffen, Pedro Domingos, P. Mika, Jennifer Golbeck, Li Ding, Tim Finin, Anupam
Joshi, Andrzej Nowak, and Robin R. Vallacher. Social networks applied. IEEE Intelligent
Systems, page 80-93, 2005.
J28. Aditya Kalyanpur, Jennifer Golbeck, Jay Banerjee, James Hendler. OWL: Capturing
semantic information using a standardized web ontology language. Multilingual Computing
& Technology, 15(7): 8 pages, 2004.
J29. Leslie E. Chipman, Benjamin B. Bederson, Jennifer Golbeck. SlideBar: Analysis of a
linear input device. Behaviour and Information Technology, 23(1): 1–9, 2004.
1.028
J30. Jennifer Golbeck, Gilberto Fragoso, Frank Hartel, Jim Hendler, Jim Oberthaler, Bijan
Parsia. The National Cancer Institute’s Thesaurus and Ontology. Journal of Web Semantics, 1(1): 75–80, 2004.
3.410
2.C
Monographs, Reports, and Extension Publications
R1. Aditya Kalyanpur, James Hendler, Bijan Parsia, Jennifer Golbeck.
markup, ontology, and RDF editor. 2006.
SMORE-semantic
R2. Jennifer Golbeck. Computing and Applying Trust in Web-based Social Networks, Ph.D.
Thesis, University of Maryland, College Park, 2005.
R3. Jennifer Golbeck. Genetic Algorithms for Strategic Optimization. Master’s Thesis, University of Chicago, 2001.
6
2.D
Book Reviews, Other Articles, and Notes
1. “Data Meets Design: a Review of Judith Donath’s The Social Machine”
Science, January 15, 2015
2. “The Live-Tweeted Prostitution Sting Was a Total Bust, and Not in a Good Way”
Slate, May 7, 2014
3. “What a Toilet Hoax Can Tell Us About the Future of Surveillance, on The Atlantic”
The Atlantic, April 29, 2014
4. “Google Tweaked How It Displays Search Results. Heres How to Change It Back”
Slate, March 14, 2014 Slate, January 1, 2014
5. “Beacon, ShopKick: Privacy Policies for location-tracking apps arent clear enough”
Slate January 28, 2014
6. “Facebook Cleansing: How to delete all of your account activity”
Slate, January 1, 2014
7. “Facebook self-censorship: What happens to the posts you don’t publish”
Slate, December 13, 2013
8. “Lovely Spam! Wonderful Spam! (book review of Spam A Shadow History of the Internet)”
Science: Vol. 340 no. 6137 p. 1171, 7 June 2013
2.E
2.E.i
Talks, Abstracts, and Other Professional Papers Presented
Invited Talks: Keynote (and Similar) Addresses
T1. “Privacy, Social Context, and Social Media”
TEDxUMD
College Park, MD (May 3, 2014)
T2. “Trust and Social Media”
AAAI 2013 Fall Symposium Series (Keynote)
Arlington, VA (November 15-17, 2013)
T3. “Hidden Information Uncovered”
TEDxMidAtlantic
Washington, DC (October 25, 2013)
T4. “User Profiling: a two-sided argument”
Conference on Social Computing and Its Applications (Keynote)
Karlsruhe, Germany (October 2, 2013)
T5. “Analyzing the Social Web”
Baltimore Data Day, Federal Reserve Bank of Richmond (Keynote)
Baltimore, MD (July 11, 2013)
T6. “Uncovering Hidden Social Information”
Data Science DC
Washington, DC (March 28, 2013)
7
T7. “Pets on the Internet”
TEDxGeorgetown
Washington, DC (March 23, 2011)
T8. “Tutorial on Using Social Trust for Recommender Systems”
ACM Conference on Recommender Systems (RecSys ’09)
New York, New York (October 22, 2009)
T9. “Computing with Social Trust: Web Algorithms, Social Networks, and Recommendations”
Haverford College Distinguished Visitors Program, and Fantastic Lectures in Computer Science
Series
Haverford, Pennsylvania (March 17, 2009)
T10. “Social Recommender Systems”
SONIC and NICO Lecture Series, Northwestern University
Evanston, Illinois (November 12, 2008)
T11. “The Dynamics of Web-based Social Networks: Membership, Relationships, and Change”
International Sunbelt Social Networking Conference (Sunbelt XXVIII)
St. Pete, Florida (January 22, 2008)
T12. “Social Networks, the Semantic Web, and the Future of Online Scientific Collaboration”
FermiLab Colloquium Lecture
Batavia, Illinois (October 25 2006)
T13. “Trust and Web Policy Systems”
Keynote talk at the Second International Workshop on the Value of Security through Collaboration
Baltimore, Maryland (September 1, 2006)
2.E.ii
2.E.ii.1
Refereed conference proceedings
Papers at Top-Tier Conferences
1
C1. Kan-Leung Cheng and I Zuckerman and D Nau, and J Golbeck ”Predicting Agents Behavior by Measuring their Social Preferences.” Proceedings on the European Conference
on Artificial Intelligence. (2014).
C2. Tammar Shrot, Avi Rosenfeld, Jennifer Golbeck, Sarit Kraus. Timing Interruptions to
Improve User Performance. In Proceedings of the ACM Conference on Human Factors in
Computing Systems (CHI’14). 10 pages. April 2014, Toronto, Canada
23%
C3. Jennifer Golbeck, Eric Norris. Personality, Movie Preferences, and Recommendations. In
Proceedings of the International Conference on Advances in Social Network Analysis and
Mining, 4 pages. August 2013, Niagra Falls, Canada.
15%
C4. Bert Huang, Angelika Kimmig and Lise Getoor and Jennifer Golbeck. Flexible Framework for Probabilistic Models of Social Trust. In 2013 Conference on Social Computing,
Behavioral Modeling and Prediction, 9 pages. April 2013, College Park, MD
31%
1
Conferences with highly-selective acceptance rates and/or top reputations in their field.
8
C5. Carman Neustaedter and Jennifer Golbeck. Exploring pet video chat: the remote awareness and interaction needs of families with dogs and cats. In Proceedings of Computer
Supported Cooperative Work (CSCW’13), in press, 6 pages. February 2013, San Antonio,
TX
C6. Jennifer Golbeck. The Twitter Mute Button: A Web Filtering Challenge. In Proceedings
of the 30th International Conference on Human Factors in Computing Systems (CHI ’12),
pages 2755–2758. May 2012, Austin, TX.
23%
C7. Irene Eleta and Jennifer Golbeck. A Study of Multilingual Social Tagging of Art Images:
Cultural Bridges and Diversity. In Proceedings of Computer Supported Cooperative Work
(CSCW’12), pages 695–704. February 2012, Seattle, Washington
40%
C8. Cheng, K.L., Zuckerman, I., Nau,::: and Golbeck, J. The Life Game: Cognitive StrateD.,
::::
gies for Repeated Stochastic Games. In IEEE Third International Conference on and 2011
IEEE Third International Conference on Social Computing (SocialCom), pages 495-102.
October 2011, Boston, Massachusetts.
10%
C9. Nicholas Violi, Jennifer Golbeck, Kan-leung Cheng, and Ugur Kuter. Caretaker: A
Social Game for Studying Trust Dynamics. In IEEE Third International Conference on
and 2011 IEEE Third International Conference on Social Computing (SocialCom), pages
451–456. October 2011, Boston, Massachusetts.
10%
C10. J. Golbeck, C. Robles, M. Edmondson, and K. Turner. Predicting personality from twitter. In IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), pages 149–156. October 2011, Boston, Massachusetts.
10%
C11. K.L. Cheng, U. Kuter, and J. Golbeck. Coevolving strategies in social-elimination games.
In IEEE Third International Conference on and 2011 IEEE Third International Conference
on Social Computing (SocialCom), pages 118–126. October 2011, Boston, Massachusetts.
10%
C12. Thomas Dubois, Jennifer Golbeck, and ::::::::::::::::::: Network Clustering ApAravind Srinivasan.
proximation Algorithm Using One Pass Black Box Sampling. In Third IEEE International
Conference on Social Computing (SocialCom), pages 418–424. October 2011, Boston, Massachusetts. (Best Paper Award).
10%
C13. Thomas Dubois, Jennifer Golbeck, and ::::::::::::::::::: Predicting Trust and DisAravind Srinivasan.
trust in Social Networks. In Third IEEE International Conference on Social Computing
(SocialCom), pages 418–424. October 2011, Boston, Massachusetts.
10%
C14. Jennifer Golbeck and Derek Hansen. Computing Political Preference Among Twitter
Followers. In Proceedings of the 29th International Conference on Human Factors in Computing Systems (CHI ’11), pages 1105–1108. April 2011, Vancouver, Canada.
23%
C15. Greg Walsh and Jennifer Golbeck Curator: a game with a purpose for collection recommendation. In Proceedings of the 28th international Conference on Human Factors in
Computing Systems (CHI ’10), pages 2079–2082. April 2010, Atlanta, Georgia.
22%
C16. Freire, M., Plaisant, C., Shneiderman, B., and Golbeck, J. ManyNets: an interface for
multiple network analysis and visualization. In Proceedings of the 28th international Conference on Human Factors in Computing Systems (CHI ’10), pages 213–222. Atlanta,
Georgia, USA, April 10–15, 2010.
22%
9
C17. Ugur Kuter, Jennifer Golbeckα . Semantic Web Service Composition in Social Environments. Proceedings of the International Semantic Web Conference (ISWC09), pages
344–358. November 2009, Washington, D.C. (Best Paper Award)
20%
C18. Thomas DuBois, Jennifer Golbeck, ::::::::::::::::::: Rigorous Probabilistic Trust InAravind Srinivasan.
ference with applications to clustering. Proceedings of the IEEE/WIC/ACM International
Conference on Web Intelligence, pages 655–658. September 2009, Milan Italy.
18%
C19. Derek Hansen, Jennifer Golbeck. Mixing it Up: Recommending Collections of Items.
Proceedings of the Conference on Human Factors in Computing Systems (CHI’09), pages
1217–1226. April 2009, Boston, Massachusetts.
24.5%
C20. Jennifer Golbeck, Matthew Rothstein. Linking Social Networks on the Web with FOAF:
A Semantic Web Case Study. Proceedings of the Twenty-Third National Conference on
Artificial Intelligence (AAAI-08), pages 1138–1143. July 2008, Chicago, Illinois.
24%
C21. Ugur Kuter and Jennifer Golbeckα . SUNNY: A New Algorithm for Trust Inference in
Social Networks, using Probabilistic Confidence Models. Proceedings of the Twenty-Second
National Conference on Artificial Intelligence (AAAI-07), pages 1377–1382. July 2007,
Vancouver, Canada.
27%
C22. Yarden Katz and Jennifer Golbeck. Social Network-based Trust in Prioritized Default
Logic. Proceedings of The Twenty-First National Conference on Artificial Intelligence
(AAAI-06), pages 1345–1350. July 2006, Boston, Massachusetts.
30%
C23. Jennifer Golbeck, James Hendler. Inferring reputation on the semantic web. Proceedings
of the 13th International World Wide Web Conference, 8 pages. May 2004. New York, NY.
14.6%
C24. Jennifer Golbeck, Michael Grove, Bijan Parsia, Aditya Kalyanpur, and James Hendler.
New Tools for the Semantic Web, Proceedings of the 13th International Conference on
Knowledge Engineering and Knowledge Management (EKAW 2002), pages 392–400. October 2002, Siguenza, Spain.
34%
2.E.ii.2
Papers at Other Conferences
C25. Cody Buntain and Jennifer Golbeck. ”Identifying social roles in reddit using network
structure.” Proceedings of the companion publication of the 23rd international conference
on World wide web companion. International World Wide Web Conferences Steering Committee, 2014.
C26. Greg Walsh and Jennifer Golbeck. 2014. StepCity: a preliminary investigation of a
personal informatics-based social game on behavior change. In CHI ’14 Extended Abstracts
on Human Factors in Computing Systems (CHI EA ’14). ACM, New York, NY, USA, 23712376.
C27. Sibel Adali and Jennifer Golbeck. Predicting personality with social behavior. In 2012
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 8 pages. August 2012, Istanbul, Turkey.
C28. Buntain,Cody, Jennifer Golbeck, Dana::::::::::::::::::::::: Advice and Trust in
Nau, and Sarit Kraus.
:::::
Games of Choice. In Tenth Annual Conference on Privacy, Security and Trust, 2 pages.
July 2012, Paris, France.
10
C29. Jennifer Golbeck, Hal Warren, and Eva Winer. Making trusted attribute assertions
online with the publish trust framework. In Tenth Annual Conference on Privacy, Security
and Trust, 2 pages. July 2012, Paris, France.
C30. David Yates and Jennifer Golbeck. Is facebook appropriate for the classroom? a comparison of student and faculty perspectives. In Proceedings of the Euro-American Conference
for Academic Disciplines and Creativity, 27 pages. June 2012, Prague, Czech Republic.
(Outstanding Research Presentation).
C31. Jennifer Golbeck. STEM initiatives for improved communication skills in the zombie
apocalypse. In Proceedings of the 2012 ACM Conference on Human Factors in Computing
Systems Extended Abstracts, pages 1425–1426. May 2012, Austin, TX.
C32. Jennifer Golbeck and Carman Neustaedter. Pet video chat: monitoring and interacting
with dogs over distance. In Proceedings of the 2012 ACM Conference on Human Factors
in Computing Systems Extended Abstracts, pages 1425–1426. May 2012, Austin, TX.
C33. Jennifer Golbeck, Cristina Robles, Karen Turner Predicting Personality with Social Media. Proceedings of alt.chi, ACM Conference on Human Factors in Computing (CHI 2011),
pages 253–262. April 2011, Vancouver, Canada.
C34. James Michaelis, Jennifer Golbeck, ::::::::::::::: Leveraging the Semantic Web to
James Hendler
Enable Content Mashup For End Users. Proceedings of HCI International 2011, 10 pages.
July 2011, Orlando, Florida.
C35. Jennifer Golbeck, Kenneth Fleischmann. Trust in Social Q &A: The Impact of Text
and Photo Cues of Expertise. Proceedings of ASIST 2010, pages 1–10. October 2010,
Pittsburgh, Pennsylvania.
C36. Klavans, Judith, Jennifer Golbeck. Integrating Multiple Computational Techniques for
Improving Image Access: Applications to Digital Collections. Proceedings of the 2010 Grace
Hopper Conference, 5 pages. September 2010, Atalanta, Georgia.
C37. Dana Rotman, Jennifer Golbeck, ::::::::::::::: The Community is Where the Rapport
Jennifer Preece.
Is: On Sense and Structure in the YouTube Community. 2009 Communities & Technologies
Conference, pages 41–50. June, 2009. University Park, Pennsylvania.
C38. Jennifer Golbeck. On the Internet, Everybody Knows You’re a Dog: The Human-Pet
Relationship in Online Social Networks. ACM Conference on Human Factors in Computing
Systems Extended Abstracts, pages 4495-4500. April 2009, Boston, Massachusetts.
C39. Jennifer Golbeck, Michael Wasser. SocialBrowsing: Integrating Social Networks into Web
Browsing. ACM Conference on Human Factors in Computing Systems Extended Abstracts,
pages 2381–2386. April 2007, San Jose, California.
C40. Aaron Mannes, Jennifer Golbeck. Ontology Building: A Terrorism Specialist’s Perspective. Proceedings of the IEEE Aerospace Conference, 5 pages. March 2007, Big Sky,
Montana.
C41. Aaron Mannes, Jennifer Golbeck. Building a Semantic Web Portal for Counterterror
Analysis. Proceedings of the IEEE Aerospace Conference, 5 pages. March 2007, Big Sky,
Montana.
C42. Jennifer Golbeck, Computing with Trust: Definition, Properties, and Algorithms. Proceedings of International Conference on Security and Privacy in Communication Networks,
pages 1-7. August 2006, Baltimore, Maryland.
11
C43. Jennifer Golbeck. Generating Predictive Movie Recommendations from Trust in Social
Networks. Proceedings of the Fourth International Conference on Trust Management, pages
93–104. May 2006, Pisa, Italy.
C44. Jennifer Golbeck, James Hendler. FilmTrust: Movie recommendations using trust in
web-based social networks. Proceedings of the IEEE Consumer Communications and Networking Conference, pages 497–529. January 2006, Las Vegas, Nevada.
C45. Jennifer Golbeck, Bernardo Cuenca Grau, Christian Halaschek-Wiener, Aditya Kalyanpur, Yarden Katz, Bijan Parsia, Andrew Schain, Evren Sirin, and James Hendler. Semantic
web research trends and directions. Proceedings of the First international Conference on
Pattern Recognition and Machine Intelligence, PReMI. 2005, pages 160-169. December
2005, Kolkata, India.
C46. Jennifer Golbeck, James Hendler. Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-based Social Networks, Proceedings of 14th International Conference
on Knowledge Engineering and Knowledge Management, pages 116–131. October 2004,
Northamptonshire, UK.
C47. Jennifer Golbeck, James Hendler. Reputation Network Analysis for Email Filtering.
Proceedings of the First Conference on Email and Anti-Spam, pages 54–58. July 2004,
MountableView, California.
C48. Jennifer Golbeck, Bijan Parsia, James Hendler. Trust Networks on the Semantic Web,
Proceedings of Cooperative Information Agents, pages 238–249. August 2003, Helsinki,
Finland.
C49. Mutton, Paul and Jennifer Golbeck. Visualization of Semantic Metadata and Ontologies,
Proceedings of Information Visualization, pages 300–305. July 2003, London, UK.
C50. Kalyanpur, Aditya and Jennifer Golbeck and Michael Grove and Jim Hendler. 2002.
An RDF Editor and Portal for the Semantic Web, Proceedings of Semantic Authoring,
Annotation & Knowledge Markup (ECAI 2002), 4 pages. July 2002, Lyon, France.
C51. Jennifer Golbeck. Evolving Strategies for the Prisoner’s Dilemma, Advances in Intelligent Systems, Fuzzy Systems, and Evolutionary Computation, pages 299–306. February
2002, Interlaken, Switzerland.
2.E.iii.3
Papers at Refereed Workshops
W1. Jennifer Golbeck, Thameem Khan, Nilay Sanghavi and Nishita Thakker. Multiple Personalities on the Web: A Study of Shared Mboxes in FOAF. Proceedings of the 2009 Workshop
on Social Data on the Web, 12 pages. October 2009, Washington, DC.
W2. Thomas DuBois, Jennifer Golbeck, John Kleint, ::::::::::::::::::: Improving RecomAravind Srinivasan.
mendation Accuracy by Clustering Social Neworks with Trust. Proceedings of the ACM RecSys 2009 Workshop on Recommender Systems and the Social Web, 8 pages. October 2009,
New York, New York.
W3. Audun Josang, Jennifer Golbeck, Challenges for robust trust and reputation systems. Proceedings of the 5th International Workshop on Security and Trust Management. 12 pages.
August, 2009, Saint Malo, France.
12
W4. Elena Zheleva, Jennifer Golbeck, Lise ::::::: Ugur Kuter. Using Friendship Ties and
Getoor,
::::
Family Circles for Link Prediction. SNA-KDD Workshop on Social Network Mining and
Analysis, pages 97-113. August 2008, Las Vegas, Nevada.
W5. V. Shiv Naga Prasad, Behjat Siddiquie, Jennifer Golbeck, and :::::::::::::: Classifying
Larry S. Davis.
Computer Generated Charts. In Proceedings of the Workshop on Content Based Multimedia
Indexing, pages 85-92. June 2007, Bordeaux, France.
W6. Jennifer Golbeck, Aaron Mannes. Using Trust and Provenance for Content Filtering on
the Semantic Web. Proceedings of the Workshop on Models of Trust on the Web, 9 pages.
May 2006, Edinburgh, UK.
W7. Christian Halaschek-Wiener, Jennifer Golbeck, Bijan Parsia, Vladimir Kolovski, and ::::
Jim
Hendler. Image browsing and natural language paraphrases of semantic web annotations.
:::::::
First International Workshop on Semantic Web Annotations for Multimedia (SWAMM), 12
pages. May 2006, Edinburgh, UK.
W8. Christian Halaschek-Wiener, Jennifer Golbeck, Andrew Schain, Michael Grove, Bijan Parsia,
and :::::::::::: Annotation and provenance tracking in semantic web photo libraries. ProJim Hendler.
ceedings of the International Provenance and Annotation Workshop, pages 82–89. May 2006,
Chicago, Illinois.
W9. Jennifer Golbeck. Combining Provenance with Trust in Social Networks for Semantic Web
Content Filtering. Proceedings of the International Provenance and Annotation Workshop,
pages 101–108. May 2006, Chicago, Illinois.
W10. Yarden Katz and Jennifer Golbeck. Nonmonotonic Reasoning with Web-Based Social Networks. Proceedings of the Workshop on Reasoning on the Web, pages 469–475. May 2006,
Edinburgh, UK.
W11. Aaron Mannes, Jennifer Golbeck, James Hendler. Semantic Web and Target-Centric Intelligence: Building Flexible Systems that Foster Collaboration. Proceedings of Workshop
Intelligent User Interfaces for Intelligence Analysis, 4 pages. January 2006, Sydney, Australia.
W12. Jennifer Golbeck. Semantic Web Interaction through Trust Network Recommender Systems. End User Semantic Web Interaction Workshop, pages 327–339. November 2005, Sanibel
Island, Florida.
W13. Jennifer Golbeck. Personalizing Applications through Integration of Inferred Trust Values
in Semantic Web-Based Social Networks. Semantic Network Analysis Workshop, pages 1005–
1018. November 2005, Sanibel Island, Florida.
W14. Bijan Parsia, Taowei Wang, and Jennifer Golbeck. Visualizing Web Ontologies with CropCircles. End User Semantic Web Interaction Workshop, pages 1–8. November 2005, Sanibel
Island, Florida.
W15. Christian Halaschek-Wiener, Andrew Schain, Jennifer Golbeck, Michael Grove, Bijan Parsia, Jim Hendler. A flexible approach for managing digital images on the semantic web.
5th International Workshop on Knowledge Markup and Semantic Annotation, pages 49–58.
November 2005, Galway, Ireland.
13
W16. Kalyanpur, Aditya, Nada Hashmi, Jennifer Golbeck, Bijan Parsia. Lifecycle of a Casual
Web Ontology Development Process. Proceedings of the Workshop on Application Design,
Development and Implementation Issues in the Semantic Web, 8 pages. May 2004, New
York, New York.
W17. Jennifer Golbeck, Paul Mutton, Semantic Web Interaction on Internet Relay Chat, Proceedings of Interaction Design on the Semantic Web, 5 pages. May 2004, New York, New
York.
2.E.iii.4
Refereed Posters2
P1. Irena Eleta and Jennifer Golbeck. Bridging Languages in Social Networks: How Multilingual
Users of Twitter Connect Language Communities?, ASIS&T 2012 Annual Meeting, October
2012, Baltimore, Maryland.
P2. Bert Huang and Angelika Kimmigand Lise Getoor and Jennifer Golbeck. Probabilistic Soft
Logic for Trust Analysis in Social Networks, International Workshop on Statistical Relational
AI. August 2012, Catalina Island, CA.
P3. Cristina Robles, Jennifer Golbeck. Facebook Relationships in the Workplace. Proceedings
of CompleNet 2012. March 2012, Marathon, Florida.
L. Klavans,
Dagobert Soergel,
P4. Judith:::::::::::: Susan Chun, Jennifer Golbeck, ::::::::::::::::: Robert Stein, Ed
::::::
Bachta, Rebecca LaPlante, Kate Mayo, John Kleint. Language and Image: T3 = Text, Tags,
and Trust. 2009 Digital Humanities Conference. July 2009, College Park, Maryland.
P5. Jennifer Golbeck, Jeanne Kramer-Smyth. Visualizing Archival Collections with ArchivesZ.
Proceedings of the 2009 Digital Humanities Conference, July 2009, College Park, Maryland.
P6. Praveen Paruchuri, Preetam Maloor, Bob Pokorny, Aaron Mannes, Jennifer Golbeck. Cultural Modeling in a Game-Theoretic Framework, AAAI Fall Symposium on Adaptive Agents
in Cultural Contexts. November 2008, Washington, DC.
P7. Wu, P. F., Qu, Y., Fleischmann, K., Golbeck, J., Jaeger, P., Preece, J., & Shneiderman,
B. Designing a Community-Based Emergency Communication System: Requirements and Implications. Annual Meeting of the American Society for Information Science and Technology
(ASIS&T 2008). October 2008, Columbus, OH.
P8. Jennifer Golbeck, FilmTrust: Movie Recommendations from Semantic Web-based Social
Networks. IEEE Consumer Communications and Networking Conference. January 2006, Las
Vegas, Nevada.
P9. Jennifer Golbeck, FilmTrust: Movie Recommendations from Semantic Web-based Social
Networks. International Semantic Web Conference. November 2005, Galway, Ireland
P10. Halaschek-Wiener, Christian , Jennifer Golbeck, Andrew Schain, Michael Grove, Bijan Parsia,
Jim HendlerPhotostuff-an image annotation tool for the semantic web. Proceedings of the
Poster Track, 4th International Semantic Web Conference. November 2005, Galway, Ireland.
2
Peer-reviewed poster presentations, typically accompanied by short descriptions in associated proceedings.
14
P11. Pin Xu, Lyubov Remennik, N. Rao Thotakura, Jennifer Golbeck, Liju Fan. Prototype
development of an immunology ontology that integrates multiple biomedical ontologies. 7th
International Protege Conference. July 2004, Washington, DC.
P12. Jennifer Golbeck, Bijan Parsia, James Hendler. Trust Networks on the Semantic Web.
Twelfth International World Wide Web Conference, May 2003, Budapest, Hungary.
P13. Jennifer Golbeck, Ron Alford, Ross Baker, Mike Grove, Jim Hendler, Aditya Kalyanpur,
Amy Loomis, Ron Reck. Semantic Web Tools from MINDSWAP. 1st Annual International
Semantic Web Conference, June 2002, Sardinia, Italy.
2.I
Fellowships, Prizes, and Awards
•
•
•
•
•
•
•
•
2.J
2.J.i
2015 University of Maryland Research Communication Award
2014 University System of Maryland Board of Regents Mentoring Award
TED Most Powerful Talks of 2014
2011 IEEE Conference on Social Computing Best Paper Award
2009 International Semantic Web Conference Best Paper Award
Research Fellow, Web Science Research Initiative (2008 – present)
IEEE Intelligent Systems Ten to Watch3 (May 2006)
2005 DARPA IPTO Young Investigator (May 2005)
Editorships, Editorial Boards, and Reviewing Activities for Journals and
Other Learned Publications
Editorial Boards
• Editorial Board, Data Science
• Editorial Committee, Journal of Web Semantics – Special Issue “Exploring New Interaction
Designs Made Possible by the Semantic Web”
• Guest Editor, Security & Privacy Magazine, Special Issue on “Security in Social Networks”
2.J.ii
•
•
•
•
•
•
•
•
•
3
Conference Chair Positions
Program Co-chair, Recsys 2015: Conference on Recommender Systems
Fellowships Chair, ISWC 2012: 11th International Semantic Web Conference
Fellowships Chair, ISWC 2011: 10th International Semantic Web Conference
Tutorials Co-chair, Program Committee Vice Chair, ISWC 2009: 8th International Semantic
Web Conference
Co-organizer, SWUI 2009: Semantic Web User Interactions: Exploring HCI Challenges
Workshop at ISWC09.
Co-organizer, Workshop on Social Technology for Biodiversity: Motivation, Credibility &
Community, 2008
Co-organizer, SWUI 2008: Semantic Web User Interactions: Exploring HCI Challenges
Workshop at CHI’08
Semantic Web Challenge Co-chair, ISWC 2007: 6th International Semantic Web Conference
Semantic Web Challenge Co-chair, ASWC 2007: 2nd Asian Semantic Web Conference
list of top ten young AI researchers
15
•
•
•
•
Co-organizer, Helping Users Make Sense of Social Networks: A Workshop, 2007
Proceedings Chair, ISWC 2006: 5th International Semantic Web Conference
Co-organizer, Workshop on Trust, Security, and Reputation on the Semantic Web, 2006
Organizer, Developers Day Trust on the Web Track, WWW 2005: 13th International World
Wide Web Conference
2.J.iii
Reviewing: Journals
•
•
•
•
•
•
•
•
•
•
•
•
•
ACM Computing Surveys: 2012 (1)
ACM Transactions on Intelligent Systems: 2012 (2)
ACM Transactions on Internet Technology: 2009 (1)
ACM Transactions on Multimedia Computing, Communications, and Applications: 2009 (1)
ACM Transactions on the Web: 2008 (2), 2009(1), 2012 (1)
Behaviour and Information Technology: 2008 (1)
Artificial Intelligence: 2008 (1)
European Journal of Operational Research: 2007 (1)
Foundations and Trends in Information Retrieval: 2015 (1)
Foundations and Trends in Web Science: 2013 (1),
International Journal of Human Computer Studies: 2008 (1)
International Journal on Semantic Web and Information Systems: 2007 (1)
Journal of the American Society for Information Science and Technology: 2010 (1), 2011 (1),
2012 (1)
• Journal of Web Semantics: 2006 (1), 2007 (3), 2008 (1), 2012 (2)
• Policy & Internet: 2012 (1)
2.J.iv
Reviewing: Top-Tier Conferences
• AAAI: AAAI Conference on Artificial Intelligence, Senior Program Committee 2011, 2012;
Program Committee 2006, 2007, 2008, 2009, 2010
• RecSys: ACM Conference on Recommender Systems, Senior Program Committee 2010,
2011, 2012
• CSCW: Computer Supported Cooperative Work, Program Committee 2008, 2012, 2013
• CHI: ACM Conference on Human Factors in Computing, Program Committee 2009, 2010,
2011, 2012
• IJCAI, International Joint Conference on Artificial Intelligence, Program Committee 2009
• WWW: International World Wide Web Conference, Program Committee 2006, 2007, 2008,
2009
• ISWC: International Semantic Web Conference, Senior Program Committee 2009, 2010,
2011, 2012, Program Committee 2008
• KDD: Conference on Knowledge Discovery and Data Mining, Senior Program Committee
2010
• GROUP: Conference on Supporting Group Work, Program Committee 2009
• IJCAI: International Joint Conferences on Artificial Intelligence, Program Committee 2009
2.J.v
Reviewing: Other Venues
• IFIPTM: International Conference on Trust Management, Program Committee 2009, 2010,
2011, 2012
• IEA-AIE: Engineering Knowledge and Semantic Systems, Program Committee 2011
16
• SSW: AAAI Symposium on the Social Semantic Web, Program Committee: 2009
• WebSci: Web Science Conference: Society On-Line International Semantic Web Conference,
Program Committee 2008
• BlogTalk: International Conference on Social Software, Program Committee 2008
• PST: Conference on Privacy, Security and Trust, Program Committee 2008
• SAC: ACM Symposium on Applied Computing, Program Committee 2008, 2005
• CoSoSo: International Conference on Social Software, Program Committee 2008
• IUI: Intelligent User Interfaces Conference, Program Committee 2008
• CEAS: Conference on Email and Anti-Spam, Program Committee 2007
• CIKM: onference on Information and Knowledge Management, Program Committee 2007
• CAT: Context Awareness and Trust, Program Committee 2007
• Policy: IEEE Policy, Program Committee 2007
• SWC: Semantic Web Challenge, Program Committee 2007
• SCCSW: Social and Collaborative Construction of Structured Knowledge Workshop, Program Committee 2007
• SWCKA: AAAI Fall Symposium on Semantic Web for Collaborative Knowledge Acquisition,
Program Committee 2006
• EKAW: International Conference on Knowledge Engineering and Knowledge Management,
Program Committee 2006
• SECOVAL: The Value of Security through Collaboration Workshop, Program Committee
2005, 2006.
• SWUI: Semantic Web User Interaction Workshop, Program Committee 2006
• OWLED: OWL Experiences and Directions, Program Committee 2006
• SPTWS: Workshop on Security, Privacy, and Trust in Web Services, Program Committee
2006
• MTW: Models of Trust Workshop, Program Committee 2006
• OWLED: OWL: Experiences and Directions Workshop, Program Committee 2005
• FOAF: Workshop on Friend of a Friend, Social Networking, and the Semantic Web, Program
Committee 2004
• SWUI: First International Workshop on Interaction Design and the Semantic Web, Program
Committee 2004
• VIKE: Visualizing Information in Knowledge Engineering (VIKE), Program Committee 2003
2.K
2.K.i
Other
External Talks (see section 2.E.i for keynote and similar talks)
• “Opportunities and risks of discovering personality traits from social media”
CHI 2014
Toronto, Canada (May 29, 2014)
• “Predicting User Attributes in Social Media ”
Society 2013
State College, PA (May 9, 2013)
• “Generational Computing and Social Media”
Department of Defense Deep Dive on Obesity
Portsmouth, VA (August 19, 2012)
• “Information Sharing in Social Networks”
FBI Lookout Group Meeting
17
Dallas, TX (August 14, 2012)
• “Social Networks and HCI Research”
National Reconnaissance Office
Chantilly, VA (March 15, 2012)
• “Information Sharing in Social Networks”
Potomac Valley Chapter (PVC) of the American Society of Information Science and Technology
Washington, DC (April 10, 2012)
• “Computing Trust and Personality in Social Networks”
Aberdeen Proving Ground Network Science Meeting
Aberdeen, MD (March 5, 2012)
• “Managing Content With Trust’
Professional & Scholarly Publishers 2012 Annual Conference
Washington, DC (February 2, 2012)
• “Information Sharing in Social Networks”
FBI Lookout Group Meeting
Dallas, TX (January 9, 2012)
• “From Open Data to Open Worlds: The Power of the Semantic Web” World Bank Information
Management Technology Group Forum
Washington, DC (December 8, 2011)
• “Information Sharing in Social Networks”
FBI Headquarters – Counterintelligence Division All-hands Meeting
Washington, DC (November 17, 2011)
• “Predicting Personality from Social Media”
FBI Counterintelligence Behavioral Analysis Unit
Quantico, VA (November 1, 2011)
• “Computing with Social Trust”
Army Research Lab Seminar Series
Adelphi, MD (December 8, 2010)
• “Computing with Social Trust”
Aberdeen Proving Ground CTA Seminar
Aberdeen, MD (November 16, 2010)
• “Personality Traits and Facebook Profiles”
Social and Cognitive Network Academic Research Center Seminar Series
Rensselaer Polytechnic Institute, Troy, NY (April 18, 2010)
• “Social Recommender Systems on the Semantic Web”
National Archives Semantic Web Myth and Fact
Washington, DC (November 17, 2009)
• “Social Software in Digital Libraries and Archives”
Online Computer Library Center (OCLC)
Arlington, VA (November 5, 2009)
• “Recommender Systems, Social Trust, and Television Applications”
StreamSage (a division of Comcast)
Washington, DC (September 9, 2009)
• “Social Networks on the Semantic Web”
Microsoft Research Faculty Summit
Redmond, Washington (July 28, 2008)
• “Understanding Social Networks”
18
•
•
•
•
The 25th Annual Human-Computer Interaction Lab Symposium
College Park, Maryland (May 29, 2008)
“Social Networks and Intelligent Systems: Using Relationships for Information Access”
University of Illinois Urbana-Champaign HCI Seminar
Urbana, Illinois (February 29, 2008)
“Social Networks and the Semantic Web”
Invited talk at Rensselaer Polytechnic Institute
Troy, New York (February 4, 2008)
“Recommending Movies with Social Networks”
Streamsage / Comcast
Washington, DC (November 2007)
“Social Information Access: Connecting Distributed Information and People on the Web”
Presentations with similar titles and content given in the following venues
– Northeastern University College of Computer and Information Science
Boston, Massachusetts (February 2007)
– University of Maryland College of Information Studies
College Park, Maryland (February 2007)
– Drexel College of Information Science and Technology
Philadelphia, Pennsylvania (April 2007)
• “Analysis and Applications of Web-based Social Networks”
University of Illinois at Urbana-Champaign Age of Networks: Social, Cultural, and Technological Connections Speaker Series
Urbana, Illinois (January 22 2007)
• “Provenance Challenge: A Semantic Web Approach”
Global Grid Forum – GGF18/GridWorld
Washington, DC (September 13 2006)
• “The Other Kind of Networking: Social Networks on the Web”
Duke University (March 2006)
• Web-based Social Network Analysis for Socially Intelligent Applications
University of Illinois at Chicago (November 2005)
• “Trust in Social Networks”
National Security Agencys Knowledge Discovery Research Colloquium
Ft. Meade, Maryland (August 2005)
• “Connections, Computation, and Cinema”
Presentations with similar titles and content given in the following venues
– University of Georgia, March 2005.
– MIT Media Lab, March 2005.
• “Inferring Trust in Web-based Social Networks”
National Security Agency
Ft. Meade, Maryland (February 2005)
• “Trust on the Semantic Web”
Thirteenth Annual World Wide Web Conference Developers Day
New York, New York (May 2004)
• “The Semantic Web as a Complex System”
International Conference on Complex Systems
Boston, Massachusetts (May 2004)
19
• “Metadata Visualization Challenges”
NASA Goddard Semantic Web Interest Group
Greenbelt, Maryland (November 2003)
• “Semantic Web: Structure and Modeling”
Half-day workshop at the Howard University
Washington, DC (June 2003)
• “Putting Time into Cognitive Systems: From Real-Time Operating Systems to Information
Dynamics”
Virtual Worlds and Simulation Conference
Orlando, Florida (January 2003)
• “Tools on the Semantic Web”
Half-day workshop at the Howard University
Washington, DC (November2002)
• “Small Worlds on the Semantic Web”
Science on the Semantic Web (SWS) Workshop
Boston, Massachusetts (October 2002)
• “Evolving Strategies for the Prisoners Dilemma”
13th International Conference on Game Theory
Stony Brook, New York (July 2002)
• “Semantic Web Do-It-Yourself: Tools for Generating RDF Content”
NASA Goddard Semantic Web Interest Group
Greenbelt, Maryland (April 2002)
2.K.ii
Internal Talks
• “Video Chat for Pets”
HCIL Symposium
College Park, Maryland (May 22, 2012)
• “Social Network Strategies for Surviving the Zombie Apocalypse”
HCIL Symposium
College Park, Maryland (May 22, 2012)
• “The Twitter Mute Button”
HCIL Symposium
College Park, Maryland (May 22, 2012)
• “Understanding Users and Relationships in Social Networks”
MURI Virtual Brown Bag
College Park, Maryland (April 9, 2012)
• “Computing Trust in Social Networks”
Guest Lecture to PSY228Q: The psychology of social networking and social computing
College Park, Maryland (April 2, 2012)
• “Social Computing 2”
Guest Lecture to CMSC434: Intro to HCI
College Park, Maryland (November 30, 2011)
• “Social Computing 1”
Guest Lecture to CMSC434: Intro to HCI
College Park, Maryland (September 21, 2011)
• “Understanding Users and Relationships in Social Networks”
20
•
•
•
•
•
•
•
•
•
HCIL Symposium
College Park, Maryland (May 25, 2011)
“Trust, Ties, and Information Diffusion in Social Networks”
Guest Lecture in INFM289j: Social Media Campaigns for the WellBeing of Humankind
College Park, Maryland (November 22, 2010)
“Recommender Systems, Social Networks, and Applications”
Guest lecture to CPSP218J: Media, Self, and Society
College Park, Maryland (September 20, 2010)
“Twitter Use by the US Congress”
HCIL Symposium
College Park, Maryland (May 26, 2010)
“Recommender Systems, Social Networks, and Applications”
Guest lecture to CPSP218J: Media, Self, and Society
College Park, Maryland (September 8, 2009)
“Designing Systems to Help Find Experts”
iSchool Colloquium
College Park, Maryland (September 15, 2008)
“Social Networks on the Web: Challenges and Opportunities”
Smith School of Business, University of Maryland
College Park, Maryland (March 14, 2008)
“Social Trust for Information Access”
Center for Information Policy and E-Government (CIPEG) Policy Seminar Series
College Park, Maryland (February 25, 2008)
“Social information access -using social networks to sort, filter, and aggregate”
Human-Computer Interaction Lab (HCIL) Brown Bag Lunch
College Park, Maryland (November 8, 2008)
“Inferring Trust in Social Networks for Information Presentation”
Computational Linguistics and Information Processing (CLIP) Lab Colloquium
College Park, Maryland (October 3, 2007)
2.K.iii
Panels4
• Panelist, Social Media, NewsVision (digital media conference), March 30, 2009, Washington,
DC (invited)
• Panelist, Data Fusion and Data Enrichment Panel, Director of National Intelligence Open
Source Conference, July 2007, Washington, DC (invited)
2.K.iv
Media Mentions
Online and Print Media5
• Huffington Post: The Fall of Facebook - and What’s Next (June 25, 2014)
• Understanding User Generated Tags for Digital Collections: An Interview with Jennifer Golbeck* (May 1, 2013)
• Associated Press: What you ‘like’ on Facebook can be revealing (March 11, 2013)†
• Politico: ‘Weinergate’ a cautionary tale? (May 31, 2011)†
• Daily Caller: Facebook can serve as personality test (May 23, 2011)
4
5
Appearances on panels, not accompanied by papers. Refereed or invited as noted.
†Denotes cases where I was interviewed.
21
• ABC News: Facebook can serve as personality test (May 13, 2011)
• Jezebel: Your Facebook Is The New “Personality Test” (May 13, 2011)
• Time: Put Your Best Face Forward: Facebook Deemed an Accurate Personality Test for
Employers (May 10, 2011)
• ABC Online: Facebook can serve as personality test (May 9, 2011)
• Discovery News: Facebook can serve as personality test (May 9, 2011)
• Seattle Post Intelligencer: What Facebook tells your boss about your personality (May 9,
2011)
• Hindustan Times: Facebooks employee personality test (May 10, 2011)
• New Scientist: Why Facebook friends are worth keeping (July 15, 2010)†
• Corp Comms Magazine: Politicians Tweet Sweet Nothings (September 22, 2009)
• Sacramento Bee: Tweet-tweet goes Schwarzenegger, a big Twitter user (September 22, 2009)†
• Stars & Stripes (U.S. Military Newspaper)
– Japan Edition (September 22, 2009)†
– Mideast Edition (September 22, 2009)†
– Korea Edition (September 21, 2009)†
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
USTINET News: Study: Congress Tweets Lack Citizen Talk (September 21, 2009)
United Press International: Study: Congress Tweets lack citizen talk (September 21, 2009)†
Baltimore Sun: Congressional Twitter mostly twaddle (September 21, 2009)†
San Diego Union-Tribune: Politicians on Twitter have a lot to say about themselves (September 20, 2009)†
Lawrence Journal World & News: Members of Congress tweet their own horns (September
20, 2009)†
The Telegraph (Calcutta, India): Blowing tweet horns (September 20, 2009)†
The News Journal (Wilmington, DE): For Twitter-happy politicians, the service is all about
them (September 20, 2009)†
Honolulu Advertiser: Politicians Tweets self-promotional (September 20, 2009)†
Huffington Post: Politicians On Twitter: Tweets By Lawmakers Boastful Or Boring: Study
(September 19, 2009)†
Hawaii Reporter: Politicians Tweets Are Mostly Self-Promotional, Researchers Say (September 19, 2009)†
Austin American Statesman: Lawmakers use Twitter for self-promotion, study finds (September 19, 2009)†
The Arizona Republic: Surprise! Twitter from D.C. about self-promotion (September 18,
2009)†
St. Petersburg Times: Times Wires (September 18, 2009)†
The Hill: Lawmakers Tweets Largely Self-Promotional (September 18, 2009)†
The Washington Post: Politicians Tweets Are Mostly Self-Promotional, Researchers Say
(September 18, 2009)†
Politico: Study: Congress Needs Twitter Help (September 16, 2009)†
Kansas City Star: Study: Congress all a Twitter (September 15, 2009)†
Ars Technica: Who do you trust 2.0: Building better preference predictions (September 21,
2008)†
Delmarva Daily Times: ALL ABOUT ME: ‘25 Things’ becomes one of Facebook‘s biggest
fads. (February 27, 2008)†
WEYI NBC25: Facebook backs down on change (February 18, 2009)†
Wired.com: Obama Supporters Act to Clear FUD. (November 12, 2007)†
22
• Physics World: Talking Physics in the Social Web (January 2007)
• Salon.com: You are who you know (June 15, 2004)†
Podcasts, Radio, and TV
• , NPR, The Kojo Nnamdi Show, guest host (January 2014-present)
• NPR, To The Point (January 3, 2014)
• NPR, The Kojo Nnamdi Show, interview on “From :) to GIFS: Expressing ourselves with
images online” (March 21, 2013)
• Wisconsin Public Radio, The Joy Cardin Show, interview on “What your Facebook Likes say
about you” (March 21, 2013)
• NPR, interview on social media and the Olympics (August 1, 2012)
• NPR, The Kojo Nnamdi Show, interview on “The Future Of Neighborhood Communication”
(July 31, 2012)
• NPR, The Kojo Nnamdi Show, interview on “Frictionless Web: Social Readers And Seamless
Sharing” (June 12, 2012)
• NPR, The Kojo Nnamdi Show, interview on “The Interest in Pinterest” (February 28, 2012)
• NPR, The Kojo Nnamdi Show, interview on “The New Sharing Economy” (October 31, 2011)
• NPR, The Kojo Nnamdi Show, interview on “Social Networking Grows Up” (March 24, 2011)
• NPR, The Kojo Nnamdi Show, interview on photos and social media (February 15, 2011)
• NPR, The Animal House, interview on social networks for pets (January 15, 2011)
• BBC World Service Newshour, interview on Twitter use by PMs (October 21, 2009)
• WHIO TV, interview on the use of Twitter by Congress (October 3, 2009)
• KCSN Radio, interview on the use of Twitter by Congress (September 21, 2009)
• WTOP Radio, interview on the use of Twitter by Congress (September 15, 2009)
• NBC 4, TV interview on Facebook data sharing policy (February 17, 2009)
• Science Podcast, interview on trust in social networks (September 18, 2008)
• NBC 4, TV interview on internet predators (February 21, 2008)
• The Diane Rehm Show (National Public Radio), panelist for discussion of Social Networks
(July 10, 2006)
3
Teaching, Mentoring, and Advising
3.A
Courses Taught in the Last Five Years
• INST 775: HCI Capstone Prep
– Fall 2013 (enrollment 12)
• INST 631 / LBSC795: Fundamentals of HCI
– Fall 2012 (enrollment 13)
– Fall 2011 (enrollment 15)
• INST 633 / LBSC708L: Analyzing Social Networks and Social Media
–
–
–
–
–
Spring 2011 (enrollment 22)
Spring 2013 (enrollment 18)
Summer 2013 (enrollment 19)
Winter 2013 (enrollment 13)
Summer 2015 enrollment 20
23
• INFM289I: Social Networks: Technology and Society
– Spring 2010 (enrollment 67)
– Fall 2010 (enrollment 64)
– Spring 2012 (enrollment 75)
• LBSC 690: Information Technology
–
–
–
–
–
–
Summer 2012 (enrollment 18)
Spring 2012 (enrollment 18)
Winter 2011 (enrollment 22)
Winter 2010 (enrollment 16)
Spring 2009 (enrollment 26)
Fall 2007 (enrollment 25)
• LBSC 743: Development of Internet Applications
– Spring 2010 (enrollment 32)
– Fall 2009 (enrollment 27)
– Spring 2009 (enrollment 36)
• LBSC 888: Doctoral Seminar
– Fall 2008 (enrollment 7)
– Spring 2014 (enrollment 7)
• INFM 220: Information Users in Social Context
– Spring 2008 (enrollment 22)
• CMSC 498N: Small Worlds, Social Networks, and Web Algorithms
– Spring 2007 (enrollment 14)
3.B
Course or Curriculum Development
• Fall 2012: Development of HCI Masters capstone classes, INST 775 and 776
• Fall 2011: Redevelopment of LBSC795 / INST631 for HCI Masters program
• Spring 2010: First offering of new course for undergraduate iSeries, INFM289I: Social Networks, Technology, and Society
• Winter 2010. Developed online version of LBSC690: Information Technology
• Spring 2009. First offering of new course. INFM 743: Development of Internet Applications
• Spring 2009. Significant course revision. LBSC 690: Information Technology
• Spring 2008. First offering of new course. INFM 220: Information Users in Social Context
• Fall 2007. Development of new course LBSC 888: Doctoral Seminar (with Allison Druin)
• Spring 2007. First offering of new course. CMSC 498N: Small Worlds, Social Networks, and
Web Algorithms
3.C
3.C.i
Textbooks, Manuals, Notes, Software, Web pages and Other Contributions
to Teaching
Textbooks
• Jennifer Golbeck, Social Network and Social Media Analysis. Burlington, MA: Morgan
Kaufmann, 2013.
24
3.C.ii
Other Contributions to Teaching
• Developed Web-accessible course material (slides, exercises, assignments, sample exams, etc.)
for LBSC 690. Adapted from material by Jimmy Lin and Allison Druin.
• Developed Web-accessible course material for INFM 743.
• Developed Web-accessible course material for INFM 220.
• Built three two-week modules (mini-courses) for LBSC 888.
• Developed and implemented online module system for LBSC 888, where faculty can build
and submit two-week modules for the doctoral seminar.
• Developed Web-accessible course material for CMSC 498N.
3.E
3.E.i
Advising: Other Than Research Direction
Undergraduate
• Anthony Rogers, Individual Studies Program, Fall 2007 – present
• Ben Falk, Individual Studies Program, Spring 2008 – present
• Ryan McCormick, Individual Studies Program, Spring 2008 – present
3.E.ii
Master’s
• Spring 2009: 13 advisees
• Fall 2008: 13 advisees
3.F
3.F.i
Advising: Research Direction
Undergraduate
• Danny Laurence
Spring 2012 – present
Research topic: Computing trust in social networks
• Elaine Wang
Spring 2012 – present
Research topic: Multilingual Use of Twitter
• Vincent Kuyatt (Undergraduate Student, Computer Science)
Spring 2011
Research Topic: Real time strategy games for social strategy analysis
• Michon Edmonson (Undergraduate Student, Computer Science)
Spring 2011 – present
Research Topic: Computing personality and trust
• Wendy Mock (Undergraduate Student, Computer Science)
Spring 2011 – present
Research Topic: Social tagging of images
• Eric Norris (Undergraduate Student, Computer Science)
Summer 2010 – present
Research Topic: processing social network data
25
• Nima Rad (Undergraduate Student, Computer Science)
Summer 2010 – Winter 2011
Research Topic: Games for understanding social strategies
• Karen Turner (Undergraduate Student, Psychology)
Spring 2010 – Fall 2010
Research topic: Use of Facebook
• Anthony Rogers (Undergraduate Student, Individual Studies)
Spring 2008 – present
Research topic: Social networks on the web
• Stuart Moore (Undergraduate Student)
Spring 2008, In the context of INFM 220
Research topic: Expert search
• Joanne Kim (Undergraduate Student)
Spring 2008, In the context of INFM 220
Research topic: Expert search
• Mariya Filippova (Undergraduate Student, Computer Science)
Fall 2007 – Spring 2008
Research topic: Social Applications in Facebook
• Greg Phillips (Undergraduate Student, Computer Science)
Spring 2008, In the context of INFM 220
Research topic: Sentiment analysis in online communities
• Matthew Rothstein (Undergraduate Student, Computer Science)
Spring 2007 – Summer 2008
Research topic: Merging social networks on the Semantic Web with FOAF
• Michael Wasser (Undergraduate Student, Computer Science)
Fall 2005 – Spring 2007
Research topic: Adding social context to web pages
3.F.ii
Master’s
Masters Thesis Committees
• Member, Thesis Committee
Kelly Hoffman (MLS student, the iSchool): Fall 2007 – Spring 2008
• Member, Thesis Committee
Chris Zamerelli (MLS student, the iSchool): Fall 2007 – Spring 2008
• Member, Thesis Committee
D. Adam Anderson (MLS student, the iSchool): Fall 2007 – Spring 2008
26
Other
• Zahra Ashktorab (HCIM Student, the iSchool)
Fall 2011 – present
Research topic; Social Recommender Systems
• Beth Emmerling (PhD student, the iSchool)
Spring 2010 – Fall 2011
Research topic: Image tagging
• Cristina Robles (MLS student, the iSchool)
Spring 2010 – Spring 2011
Research topic: Use of Facebook
• Alon Motro (MIM student, the iSchool)
Spring 2009 – Spring 2012
Research topic: Computing trust in social networks
• Jeanne Kramer-Smyth (MLS student, the iSchool)
Fall 2008 – Spring 2009
In the context of NEH Digital Humanities Startup Grant
Research Topic: Development of ArchivesZ visualization tool for archival collections
• Rishabh Vyas (MIM student, the iSchool)
Fall 2008 – Spring 2009
In the context of a Graduate Research Assistantship (GRA)
Research Topic: expert search through document indexing
• Manasee Mahajan (MIM student, the iSchool)
Fall 2007 – Fall 2008
Research Topic: expert search through document indexing
3.F.iii
Doctoral
As Advisor/Co-Advisor
•
•
•
•
•
•
Advisor, Zahra Ashktorab (Ph.D. Student, iSchool)
Advisor, Cody Buntain (Ph.D. Student, Computer Science)
Advisor, Irene Eleta (Ph.D. Student, iSchool)
Advisor, Jes Koepfler (Ph.D. Student, iSchool)
Advisor, John Kleint (Ph.D. Student, Computer Science)
Co-Advisor with Don Perlis, Hamid Shahri (Ph.D Student, Computer Science)
Graduated Spring 2011
First permanent position: Technology Researcher at the Mayo Clinic
• Co-Advisor with Jim Hendler, Vladimir Kolovski (Ph.D. Student, Computer Science)
Graduated May 2008.
First permanent position: Research Scientist, Oracle (Nashua, NH)
• Co-Advisor with Jim Hendler, Christian Halaschek-Weiner (Ph.D. Student, Computer Science)
Graduated December 2007.
First permanent position: Chief Technology Officer of Clados Management LLC.
27
Other Dissertation Committees
• Member, dissertation committee
Ed Condon (Ph.D. Student, Computer Engineering), Fall 2012–present
• Member, dissertation committee
Jared Sylvester (Ph.D. Student, Computer Science, Fall 2014
• Member, dissertation committee
Megan Monroe (Ph.D. Student, Computer Science), Fall 2013–Spring 2014
• Member, dissertation committee
Kan Leung Cheng (Ph.D. Student, Computer Science), Fall 2010–Summer 2013
• Member, dissertation committee
Greg Walsh (Ph.D. Student, the iSchool), Fall 2010–Summer 2012
• Member, dissertation committee
Bo Han (Ph.D. Student, Computer Science), Summer 2012
• Member, dissertation committee
Tom Dubois (Ph.D. Student, Computer Science), Fall 2010 – Spring 2011
• Member, dissertation committee
Elena Zheleva (Ph.D. Student, Computer Science), Fall 2008 – Spring 2011
• Member, dissertation committee
Hamid Shahri (Ph.D. Student, Computer Science): Fall 2009 – Spring 2011
• Member, dissertation committee
Chuk-Yang Seng (Ph.D. Student, Computer Science): Fall 2008 – Summer 2009
• Member, dissertation committee
Adam Perer (Ph.D. Student, Computer Science): Fall 2007 – Spring 2008
Other6
• Dana Rotman (Ph.D. Student, the iSchool): Fall 2009 – present
Research Topic: Community structure in YouTube
• Tom DuBois (Ph.D. student, Computer Science): Spring 2009 – Spring 2011
Research Topic: Computing trust in social networks
• Justin Grimes (Ph.D. Student, the iSchool): Spring 2009
Research Topic: Twitter Usage in Congress
• Elena Zheleva (Ph.D. Student, Computer Science): Fall 2008 – Spring 2011
Research Topic: Link prediction in social networks
• Christina Pikas (Ph.D. Student, the iSchool): Spring 2008
Research Topic: Social networks in science blogs
• Philip Fei Wu (Ph.D. Student, the iSchool), Fall 2007 – Spring 2008
Research Topic: Community Response Grids
6
Students with whom I have had significant research interaction on specific projects, in a capacity other than
their advisor/co-advisor.
28
4
Service
4.A
4.A.i
Professional
Offices and committee memberships held in professional organizations7
• World Wide Web Consortium Semantic Web Best Practices Working Group, March 2004 –
October 2004
4.A.ii
Reviewing activities for agencies
• Review panelist, NASA Postdoctoral Fellows program Summer 2011
• Review panelist, National Science Foundation (NSF), Directorate for Computer and
mation Science and Engineering (CISE), Spring 2011
• Review panelist, National Science Foundation (NSF), Directorate for Computer and
mation Science and Engineering (CISE), Spring 2010
• Review panelist, National Science Foundation (NSF), Directorate for Computer and
mation Science and Engineering (CISE), Fall 2009
• Review panelist, National Science Foundation (NSF), Directorate for Computer and
mation Science and Engineering (CISE), Fall 2008
• Outside Reviewer, National Science Foundation (NSF), Directorate for Computer and
mation Science and Engineering (CISE), Fall 2007
4.A.iii
InforInforInforInforInfor-
Other unpaid services to local, state, and federal agencies
• Production of video campaign and social media contest for Department of Defense anti-obesity
initiative, in conjunction with Deputy Assistant Secretary of Defense for Health Affairs
Summer 2012 – present
4.B
Campus
4.B.i
College8
•
•
•
•
•
•
•
•
•
•
•
•
Program Director, HCI Masters Program, Summer 2012 – present)
Director, Human-Computer Interaction Lab (Spring 2011 – present)
Member, HCI Masters Committee (Fall 2009 – Spring 2012)
Member, iSchool Search Committee (Fall 2011– Spring 2012)
Chair, iSchool Student Awards Committee (Fall 2011 – Spring 2012)
Co-Director, HCIL (Spring 2009 – Spring 2011)
Chair, iSchool Undergraduate Committee (Fall 2010 – Spring 2011)
Member, iSchool Search Committee (Fall 2010 – Spring 2011)
Member, iSchool Search Committee (Fall 2009 – Spring 2011)
Member, iSchool ad hoc Research Committee (Fall 2009 – Spring 2011)
Member, iSchool Undergraduate Committee (Fall 2008 – Spring 2009)
Assistant Director, Center for Information Policy and E-Government (Fall 2007 – Spring
2010)
• Member, iSchool Doctoral Committee (Fall 2007 – Spring 2010)
7
Position on journal board, chairship/membership on conference program committees, and related reviewing
activities already reported in Section 2.K are not repeated here.
8
Membership on dissertation/examination committees are listed in Section 3.F.iii and not duplicated here.
29
• Secretary, College Assembly (Fall 2008 – Spring 2009)
4.C
University
• Member, University of Maryland Provost Search Committee (Fall 2011 – Spring 2012)
30
EXHIBIT B
Exhibit B: List of Materials Relied On
I relied on the following documents and materials in forming my opinions:
Documents from Campbell, et al. v. Facebook, Inc.:
Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories
Facebook’s Second Supplemental Responses and Objections to Plaintiffs’ Narrowed
Second Set of Interrogatories
Deposition of Ray He (September 25, 2015)
Deposition of Michael Adkins (October 28, 2015)
Plaintiffs’ Consolidated Amended Complaint
Exhibit F to the Declaration of Alex Himel on Behalf of Defendant Facebook, Inc.
FB000011543
FB000002651
FB000003118
FB000002651
FB000002843
FB000007286
FB000006178
FB000010688
FB000008505
FB000010688
FB000008722
FB000000298
FB000008643
FB000008499
FB000002141
FB000002190
FB000002196
FB000006429
FB000000699
FB000002197
FB000001599
FB000001608-9
FB000000425
FB000005827
FB000005802-R
FB000008499
Source Code Produced by Facebook
Other Materials
https://web.archive.org/web/20101016010319/http://developer.yahoo.com/blogs/ydn/post
s/2010/10/how-many-users-have-javascript-disabled/
https://gds.blog.gov.uk/2013/10/21/how-many-people-are-missing-out-on-javascriptenhancement/
https://www.facebook.com/notes/facebook-engineering/tao-the-power-of-thegraph/10151525983993920
https://web.archive.org/web/20101205130048/http://developers.facebook.com/
docs/reference/plugins/activity
http://developers.facebook.com/docs/reference/plugins/activity
http://blogs.wsj.com/digits/2012/10/03/how-private-are-your-private-messages/
https://developers.facebook.com/blog/post/476
https://www.facebook.com/1556441609
https://www.facebook.com/michael.s.hurley.73
Campbell v. Facebook Inc., 77 F. Supp. 3d 836, 844 (N.D. Cal. 2014).
In re Google Inc. Gmail Litig., 2013 U.S. Dist. LEXIS 172784 (N.D. Cal. Sept. 26, 2013)
In re Carrier IQ, Inc., Consumer Privacy Litig., 78 F. Supp. 3d 1051, 1076 (N.D. Cal.
2015)
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?